0s autopkgtest [03:31:14]: starting date and time: 2024-03-19 03:31:14+0000 0s autopkgtest [03:31:14]: git checkout: b506e79c ssh-setup/nova: fix ARCH having two lines of data 0s autopkgtest [03:31:14]: host juju-7f2275-prod-proposed-migration-environment-2; command line: /home/ubuntu/autopkgtest/runner/autopkgtest --output-dir /tmp/autopkgtest-work.7jczhe4h/out --timeout-copy=6000 --setup-commands /home/ubuntu/autopkgtest-cloud/worker-config-production/setup-canonical.sh --apt-pocket=proposed=src:sudo,src:openssl --apt-upgrade sssd --timeout-short=300 --timeout-copy=20000 --timeout-build=20000 '--env=ADT_TEST_TRIGGERS=sudo/1.9.15p5-3ubuntu3 openssl/3.0.13-0ubuntu2' -- ssh -s /home/ubuntu/autopkgtest/ssh-setup/nova -- --flavor autopkgtest --security-groups autopkgtest-juju-7f2275-prod-proposed-migration-environment-2@bos02-ppc64el-13.secgroup --name adt-noble-ppc64el-sssd-20240319-033114-juju-7f2275-prod-proposed-migration-environment-2 --image adt/ubuntu-noble-ppc64el-server --keyname testbed-juju-7f2275-prod-proposed-migration-environment-2 --net-id=net_prod-proposed-migration -e TERM=linux -e ''"'"'http_proxy=http://squid.internal:3128'"'"'' -e ''"'"'https_proxy=http://squid.internal:3128'"'"'' -e ''"'"'no_proxy=127.0.0.1,127.0.1.1,login.ubuntu.com,localhost,localdomain,novalocal,internal,archive.ubuntu.com,ports.ubuntu.com,security.ubuntu.com,ddebs.ubuntu.com,changelogs.ubuntu.com,launchpadlibrarian.net,launchpadcontent.net,launchpad.net,10.24.0.0/24,keystone.ps5.canonical.com,objectstorage.prodstack5.canonical.com'"'"'' --mirror=http://ftpmaster.internal/ubuntu/ 309s autopkgtest [03:36:23]: testbed dpkg architecture: ppc64el 309s autopkgtest [03:36:23]: testbed apt version: 2.7.12 309s autopkgtest [03:36:23]: @@@@@@@@@@@@@@@@@@@@ test bed setup 310s Get:1 http://ftpmaster.internal/ubuntu noble-proposed InRelease [117 kB] 310s Get:2 http://ftpmaster.internal/ubuntu noble-proposed/universe Sources [3756 kB] 312s Get:3 http://ftpmaster.internal/ubuntu noble-proposed/restricted Sources [6540 B] 312s Get:4 http://ftpmaster.internal/ubuntu noble-proposed/main Sources [486 kB] 312s Get:5 http://ftpmaster.internal/ubuntu noble-proposed/multiverse Sources [52.6 kB] 312s Get:6 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el Packages [647 kB] 312s Get:7 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el c-n-f Metadata [3116 B] 312s Get:8 http://ftpmaster.internal/ubuntu noble-proposed/restricted ppc64el Packages [1372 B] 312s Get:9 http://ftpmaster.internal/ubuntu noble-proposed/restricted ppc64el c-n-f Metadata [116 B] 312s Get:10 http://ftpmaster.internal/ubuntu noble-proposed/universe ppc64el Packages [4027 kB] 313s Get:11 http://ftpmaster.internal/ubuntu noble-proposed/universe ppc64el c-n-f Metadata [8652 B] 313s Get:12 http://ftpmaster.internal/ubuntu noble-proposed/multiverse ppc64el Packages [47.3 kB] 313s Get:13 http://ftpmaster.internal/ubuntu noble-proposed/multiverse ppc64el c-n-f Metadata [116 B] 316s Fetched 9153 kB in 4s (2544 kB/s) 316s Reading package lists... 319s Reading package lists... 319s Building dependency tree... 319s Reading state information... 319s Calculating upgrade... 319s The following packages will be REMOVED: 319s libssl3 319s The following NEW packages will be installed: 319s libssl3t64 319s The following packages will be upgraded: 319s openssl sudo 320s 2 upgraded, 1 newly installed, 1 to remove and 0 not upgraded. 320s Need to get 4157 kB of archives. 320s After this operation, 77.8 kB of additional disk space will be used. 320s Get:1 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el sudo ppc64el 1.9.15p5-3ubuntu3 [1005 kB] 320s Get:2 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el openssl ppc64el 3.0.13-0ubuntu2 [1026 kB] 321s Get:3 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libssl3t64 ppc64el 3.0.13-0ubuntu2 [2125 kB] 322s Fetched 4157 kB in 2s (2050 kB/s) 322s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 70095 files and directories currently installed.) 322s Preparing to unpack .../sudo_1.9.15p5-3ubuntu3_ppc64el.deb ... 322s Unpacking sudo (1.9.15p5-3ubuntu3) over (1.9.15p5-3ubuntu1) ... 322s Preparing to unpack .../openssl_3.0.13-0ubuntu2_ppc64el.deb ... 322s Unpacking openssl (3.0.13-0ubuntu2) over (3.0.10-1ubuntu4) ... 322s dpkg: libssl3:ppc64el: dependency problems, but removing anyway as you requested: 322s wget depends on libssl3 (>= 3.0.0). 322s tnftp depends on libssl3 (>= 3.0.0). 322s tcpdump depends on libssl3 (>= 3.0.0). 322s systemd-resolved depends on libssl3 (>= 3.0.0). 322s systemd depends on libssl3 (>= 3.0.0). 322s rsync depends on libssl3 (>= 3.0.0). 322s python3-cryptography depends on libssl3 (>= 3.0.0). 322s openssh-server depends on libssl3 (>= 3.0.10). 322s openssh-client depends on libssl3 (>= 3.0.10). 322s linux-headers-6.8.0-11-generic depends on libssl3 (>= 3.0.0). 322s libsystemd-shared:ppc64el depends on libssl3 (>= 3.0.0). 322s libssh-4:ppc64el depends on libssl3 (>= 3.0.0). 322s libsasl2-modules:ppc64el depends on libssl3 (>= 3.0.0). 322s libsasl2-2:ppc64el depends on libssl3 (>= 3.0.0). 322s libpython3.12-minimal:ppc64el depends on libssl3 (>= 3.0.0). 322s libpython3.11-minimal:ppc64el depends on libssl3 (>= 3.0.0). 322s libnvme1 depends on libssl3 (>= 3.0.0). 322s libkrb5-3:ppc64el depends on libssl3 (>= 3.0.0). 322s libkmod2:ppc64el depends on libssl3 (>= 3.0.0). 322s libfido2-1:ppc64el depends on libssl3 (>= 3.0.0). 322s libcurl4:ppc64el depends on libssl3 (>= 3.0.0). 322s libcryptsetup12:ppc64el depends on libssl3 (>= 3.0.0). 322s kmod depends on libssl3 (>= 3.0.0). 322s dhcpcd-base depends on libssl3 (>= 3.0.0). 322s bind9-libs:ppc64el depends on libssl3 (>= 3.0.0). 322s 322s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 70095 files and directories currently installed.) 322s Removing libssl3:ppc64el (3.0.10-1ubuntu4) ... 322s Selecting previously unselected package libssl3t64:ppc64el. 322s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 70084 files and directories currently installed.) 322s Preparing to unpack .../libssl3t64_3.0.13-0ubuntu2_ppc64el.deb ... 322s Unpacking libssl3t64:ppc64el (3.0.13-0ubuntu2) ... 322s Setting up libssl3t64:ppc64el (3.0.13-0ubuntu2) ... 322s Setting up sudo (1.9.15p5-3ubuntu3) ... 322s Setting up openssl (3.0.13-0ubuntu2) ... 322s Processing triggers for man-db (2.12.0-3) ... 323s Processing triggers for libc-bin (2.39-0ubuntu2) ... 323s Reading package lists... 324s Building dependency tree... 324s Reading state information... 324s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 324s Hit:1 http://ftpmaster.internal/ubuntu noble-proposed InRelease 324s Hit:2 http://ftpmaster.internal/ubuntu noble InRelease 325s Hit:3 http://ftpmaster.internal/ubuntu noble-updates InRelease 325s Hit:4 http://ftpmaster.internal/ubuntu noble-security InRelease 326s Reading package lists... 326s Reading package lists... 326s Building dependency tree... 326s Reading state information... 326s Calculating upgrade... 326s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 326s Reading package lists... 327s Building dependency tree... 327s Reading state information... 327s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 327s autopkgtest [03:36:41]: rebooting testbed after setup commands that affected boot 502s autopkgtest-virt-ssh: WARNING: ssh connection failed. Retrying in 3 seconds... 510s autopkgtest [03:39:44]: testbed running kernel: Linux 6.8.0-11-generic #11-Ubuntu SMP Wed Feb 14 00:33:03 UTC 2024 512s autopkgtest [03:39:46]: @@@@@@@@@@@@@@@@@@@@ apt-source sssd 529s Get:1 http://ftpmaster.internal/ubuntu noble/main sssd 2.9.4-1ubuntu1 (dsc) [5269 B] 529s Get:2 http://ftpmaster.internal/ubuntu noble/main sssd 2.9.4-1ubuntu1 (tar) [7983 kB] 529s Get:3 http://ftpmaster.internal/ubuntu noble/main sssd 2.9.4-1ubuntu1 (asc) [833 B] 529s Get:4 http://ftpmaster.internal/ubuntu noble/main sssd 2.9.4-1ubuntu1 (diff) [48.4 kB] 529s gpgv: Signature made Mon Feb 26 21:56:54 2024 UTC 529s gpgv: using RSA key E92FD0B36B14F1F4D8E0EB2F106DA1C8C3CBBF14 529s gpgv: Can't check signature: No public key 529s dpkg-source: warning: cannot verify inline signature for ./sssd_2.9.4-1ubuntu1.dsc: no acceptable signature found 530s autopkgtest [03:40:04]: testing package sssd version 2.9.4-1ubuntu1 531s autopkgtest [03:40:05]: build not needed 551s autopkgtest [03:40:25]: test ldap-user-group-ldap-auth: preparing testbed 554s Reading package lists... 554s Building dependency tree... 554s Reading state information... 554s Starting pkgProblemResolver with broken count: 0 554s Starting 2 pkgProblemResolver with broken count: 0 554s Done 555s The following additional packages will be installed: 555s expect ldap-utils libavahi-client3 libavahi-common-data libavahi-common3 555s libbasicobjects0 libc-ares2 libcollection4 libcrack2 libdhash1 555s libevent-2.1-7 libini-config5 libipa-hbac-dev libipa-hbac0 libjose0 libkrad0 555s libldb2 libltdl7 libnfsidmap1 libnss-sss libnss-sudo libodbc2 555s libpam-pwquality libpam-sss libpath-utils1 libpwquality-common libpwquality1 555s libref-array1 libsmbclient libsss-certmap-dev libsss-certmap0 555s libsss-idmap-dev libsss-idmap0 libsss-nss-idmap-dev libsss-nss-idmap0 555s libsss-sudo libtalloc2 libtcl8.6 libtdb1 libtevent0 libverto-libevent1 555s libverto1 libwbclient0 python3-libipa-hbac python3-libsss-nss-idmap 555s python3-sss samba-libs slapd sssd sssd-ad sssd-ad-common sssd-common 555s sssd-dbus sssd-idp sssd-ipa sssd-kcm sssd-krb5 sssd-krb5-common sssd-ldap 555s sssd-passkey sssd-proxy sssd-tools tcl-expect tcl8.6 555s Suggested packages: 555s tk8.6 libsasl2-modules-gssapi-mit | libsasl2-modules-gssapi-heimdal 555s odbc-postgresql tdsodbc adcli libsasl2-modules-ldap tcl-tclreadline 555s Recommended packages: 555s cracklib-runtime libsasl2-modules-gssapi-mit 555s | libsasl2-modules-gssapi-heimdal 555s The following NEW packages will be installed: 555s autopkgtest-satdep expect ldap-utils libavahi-client3 libavahi-common-data 555s libavahi-common3 libbasicobjects0 libc-ares2 libcollection4 libcrack2 555s libdhash1 libevent-2.1-7 libini-config5 libipa-hbac-dev libipa-hbac0 555s libjose0 libkrad0 libldb2 libltdl7 libnfsidmap1 libnss-sss libnss-sudo 555s libodbc2 libpam-pwquality libpam-sss libpath-utils1 libpwquality-common 555s libpwquality1 libref-array1 libsmbclient libsss-certmap-dev libsss-certmap0 555s libsss-idmap-dev libsss-idmap0 libsss-nss-idmap-dev libsss-nss-idmap0 555s libsss-sudo libtalloc2 libtcl8.6 libtdb1 libtevent0 libverto-libevent1 555s libverto1 libwbclient0 python3-libipa-hbac python3-libsss-nss-idmap 555s python3-sss samba-libs slapd sssd sssd-ad sssd-ad-common sssd-common 555s sssd-dbus sssd-idp sssd-ipa sssd-kcm sssd-krb5 sssd-krb5-common sssd-ldap 555s sssd-passkey sssd-proxy sssd-tools tcl-expect tcl8.6 555s 0 upgraded, 65 newly installed, 0 to remove and 0 not upgraded. 555s Need to get 14.3 MB/14.3 MB of archives. 555s After this operation, 69.9 MB of additional disk space will be used. 555s Get:1 /tmp/autopkgtest.8eyYB7/1-autopkgtest-satdep.deb autopkgtest-satdep ppc64el 0 [868 B] 555s Get:2 http://ftpmaster.internal/ubuntu noble/main ppc64el libltdl7 ppc64el 2.4.7-7 [48.0 kB] 555s Get:3 http://ftpmaster.internal/ubuntu noble/main ppc64el libodbc2 ppc64el 2.3.12-1 [187 kB] 555s Get:4 http://ftpmaster.internal/ubuntu noble/main ppc64el slapd ppc64el 2.6.7+dfsg-1~exp1ubuntu1 [1768 kB] 556s Get:5 http://ftpmaster.internal/ubuntu noble/main ppc64el libtcl8.6 ppc64el 8.6.13+dfsg-2 [1179 kB] 556s Get:6 http://ftpmaster.internal/ubuntu noble/main ppc64el tcl8.6 ppc64el 8.6.13+dfsg-2 [14.8 kB] 556s Get:7 http://ftpmaster.internal/ubuntu noble/universe ppc64el tcl-expect ppc64el 5.45.4-2build1 [112 kB] 556s Get:8 http://ftpmaster.internal/ubuntu noble/universe ppc64el expect ppc64el 5.45.4-2build1 [137 kB] 556s Get:9 http://ftpmaster.internal/ubuntu noble/main ppc64el ldap-utils ppc64el 2.6.7+dfsg-1~exp1ubuntu1 [154 kB] 556s Get:10 http://ftpmaster.internal/ubuntu noble/main ppc64el libavahi-common-data ppc64el 0.8-13ubuntu2 [29.5 kB] 556s Get:11 http://ftpmaster.internal/ubuntu noble/main ppc64el libavahi-common3 ppc64el 0.8-13ubuntu2 [25.8 kB] 556s Get:12 http://ftpmaster.internal/ubuntu noble/main ppc64el libavahi-client3 ppc64el 0.8-13ubuntu2 [30.6 kB] 556s Get:13 http://ftpmaster.internal/ubuntu noble/main ppc64el libcrack2 ppc64el 2.9.6-5.1 [30.9 kB] 556s Get:14 http://ftpmaster.internal/ubuntu noble/main ppc64el libevent-2.1-7 ppc64el 2.1.12-stable-9 [169 kB] 556s Get:15 http://ftpmaster.internal/ubuntu noble/universe ppc64el libjose0 ppc64el 11-3 [50.3 kB] 556s Get:16 http://ftpmaster.internal/ubuntu noble/main ppc64el libverto-libevent1 ppc64el 0.3.1-1ubuntu5 [5960 B] 556s Get:17 http://ftpmaster.internal/ubuntu noble/main ppc64el libverto1 ppc64el 0.3.1-1ubuntu5 [11.6 kB] 556s Get:18 http://ftpmaster.internal/ubuntu noble/main ppc64el libkrad0 ppc64el 1.20.1-5build1 [24.3 kB] 556s Get:19 http://ftpmaster.internal/ubuntu noble/main ppc64el libtalloc2 ppc64el 2.4.2-1 [36.6 kB] 556s Get:20 http://ftpmaster.internal/ubuntu noble/main ppc64el libtdb1 ppc64el 1.4.10-1 [62.7 kB] 556s Get:21 http://ftpmaster.internal/ubuntu noble/main ppc64el libtevent0 ppc64el 0.16.1-1 [50.8 kB] 556s Get:22 http://ftpmaster.internal/ubuntu noble/main ppc64el libldb2 ppc64el 2:2.8.0+samba4.19.5+dfsg-1ubuntu1 [219 kB] 556s Get:23 http://ftpmaster.internal/ubuntu noble/main ppc64el libnfsidmap1 ppc64el 1:2.6.3-3ubuntu1 [53.0 kB] 556s Get:24 http://ftpmaster.internal/ubuntu noble-proposed/universe ppc64el libnss-sudo all 1.9.15p5-3ubuntu3 [15.1 kB] 556s Get:25 http://ftpmaster.internal/ubuntu noble/main ppc64el libpwquality-common all 1.4.5-3 [7658 B] 556s Get:26 http://ftpmaster.internal/ubuntu noble/main ppc64el libpwquality1 ppc64el 1.4.5-3 [16.9 kB] 556s Get:27 http://ftpmaster.internal/ubuntu noble/main ppc64el libpam-pwquality ppc64el 1.4.5-3 [12.5 kB] 556s Get:28 http://ftpmaster.internal/ubuntu noble/main ppc64el libwbclient0 ppc64el 2:4.19.5+dfsg-1ubuntu1 [76.5 kB] 556s Get:29 http://ftpmaster.internal/ubuntu noble/main ppc64el samba-libs ppc64el 2:4.19.5+dfsg-1ubuntu1 [6674 kB] 557s Get:30 http://ftpmaster.internal/ubuntu noble/main ppc64el libnss-sss ppc64el 2.9.4-1ubuntu1 [36.3 kB] 557s Get:31 http://ftpmaster.internal/ubuntu noble/main ppc64el libpam-sss ppc64el 2.9.4-1ubuntu1 [56.4 kB] 557s Get:32 http://ftpmaster.internal/ubuntu noble/main ppc64el python3-sss ppc64el 2.9.4-1ubuntu1 [48.0 kB] 557s Get:33 http://ftpmaster.internal/ubuntu noble/main ppc64el libc-ares2 ppc64el 1.27.0-1 [99.0 kB] 557s Get:34 http://ftpmaster.internal/ubuntu noble/main ppc64el libdhash1 ppc64el 0.6.2-2 [9830 B] 557s Get:35 http://ftpmaster.internal/ubuntu noble/main ppc64el libbasicobjects0 ppc64el 0.6.2-2 [5806 B] 557s Get:36 http://ftpmaster.internal/ubuntu noble/main ppc64el libcollection4 ppc64el 0.6.2-2 [35.3 kB] 557s Get:37 http://ftpmaster.internal/ubuntu noble/main ppc64el libpath-utils1 ppc64el 0.6.2-2 [10.2 kB] 557s Get:38 http://ftpmaster.internal/ubuntu noble/main ppc64el libref-array1 ppc64el 0.6.2-2 [7724 B] 557s Get:39 http://ftpmaster.internal/ubuntu noble/main ppc64el libini-config5 ppc64el 0.6.2-2 [53.9 kB] 557s Get:40 http://ftpmaster.internal/ubuntu noble/main ppc64el libsss-certmap0 ppc64el 2.9.4-1ubuntu1 [53.6 kB] 557s Get:41 http://ftpmaster.internal/ubuntu noble/main ppc64el libsss-idmap0 ppc64el 2.9.4-1ubuntu1 [24.7 kB] 557s Get:42 http://ftpmaster.internal/ubuntu noble/main ppc64el libsss-nss-idmap0 ppc64el 2.9.4-1ubuntu1 [37.4 kB] 557s Get:43 http://ftpmaster.internal/ubuntu noble/main ppc64el sssd-common ppc64el 2.9.4-1ubuntu1 [1280 kB] 557s Get:44 http://ftpmaster.internal/ubuntu noble/universe ppc64el sssd-idp ppc64el 2.9.4-1ubuntu1 [30.8 kB] 557s Get:45 http://ftpmaster.internal/ubuntu noble/universe ppc64el sssd-passkey ppc64el 2.9.4-1ubuntu1 [35.4 kB] 557s Get:46 http://ftpmaster.internal/ubuntu noble/main ppc64el sssd-ad-common ppc64el 2.9.4-1ubuntu1 [88.6 kB] 557s Get:47 http://ftpmaster.internal/ubuntu noble/main ppc64el sssd-krb5-common ppc64el 2.9.4-1ubuntu1 [103 kB] 557s Get:48 http://ftpmaster.internal/ubuntu noble/main ppc64el libsmbclient ppc64el 2:4.19.5+dfsg-1ubuntu1 [70.4 kB] 557s Get:49 http://ftpmaster.internal/ubuntu noble/main ppc64el sssd-ad ppc64el 2.9.4-1ubuntu1 [147 kB] 557s Get:50 http://ftpmaster.internal/ubuntu noble/main ppc64el libipa-hbac0 ppc64el 2.9.4-1ubuntu1 [17.4 kB] 557s Get:51 http://ftpmaster.internal/ubuntu noble/main ppc64el sssd-ipa ppc64el 2.9.4-1ubuntu1 [240 kB] 557s Get:52 http://ftpmaster.internal/ubuntu noble/main ppc64el sssd-krb5 ppc64el 2.9.4-1ubuntu1 [14.4 kB] 557s Get:53 http://ftpmaster.internal/ubuntu noble/main ppc64el sssd-ldap ppc64el 2.9.4-1ubuntu1 [31.6 kB] 557s Get:54 http://ftpmaster.internal/ubuntu noble/main ppc64el sssd-proxy ppc64el 2.9.4-1ubuntu1 [48.0 kB] 557s Get:55 http://ftpmaster.internal/ubuntu noble/main ppc64el sssd ppc64el 2.9.4-1ubuntu1 [4124 B] 557s Get:56 http://ftpmaster.internal/ubuntu noble/main ppc64el sssd-dbus ppc64el 2.9.4-1ubuntu1 [122 kB] 557s Get:57 http://ftpmaster.internal/ubuntu noble/universe ppc64el sssd-kcm ppc64el 2.9.4-1ubuntu1 [160 kB] 557s Get:58 http://ftpmaster.internal/ubuntu noble/main ppc64el sssd-tools ppc64el 2.9.4-1ubuntu1 [108 kB] 557s Get:59 http://ftpmaster.internal/ubuntu noble/main ppc64el libipa-hbac-dev ppc64el 2.9.4-1ubuntu1 [6666 B] 557s Get:60 http://ftpmaster.internal/ubuntu noble/main ppc64el libsss-certmap-dev ppc64el 2.9.4-1ubuntu1 [5734 B] 557s Get:61 http://ftpmaster.internal/ubuntu noble/main ppc64el libsss-idmap-dev ppc64el 2.9.4-1ubuntu1 [8380 B] 557s Get:62 http://ftpmaster.internal/ubuntu noble/main ppc64el libsss-nss-idmap-dev ppc64el 2.9.4-1ubuntu1 [6722 B] 557s Get:63 http://ftpmaster.internal/ubuntu noble/universe ppc64el libsss-sudo ppc64el 2.9.4-1ubuntu1 [22.4 kB] 558s Get:64 http://ftpmaster.internal/ubuntu noble/universe ppc64el python3-libipa-hbac ppc64el 2.9.4-1ubuntu1 [19.2 kB] 558s Get:65 http://ftpmaster.internal/ubuntu noble/universe ppc64el python3-libsss-nss-idmap ppc64el 2.9.4-1ubuntu1 [9542 B] 558s Preconfiguring packages ... 558s Fetched 14.3 MB in 3s (4992 kB/s) 558s Selecting previously unselected package libltdl7:ppc64el. 558s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 70097 files and directories currently installed.) 558s Preparing to unpack .../00-libltdl7_2.4.7-7_ppc64el.deb ... 558s Unpacking libltdl7:ppc64el (2.4.7-7) ... 558s Selecting previously unselected package libodbc2:ppc64el. 558s Preparing to unpack .../01-libodbc2_2.3.12-1_ppc64el.deb ... 558s Unpacking libodbc2:ppc64el (2.3.12-1) ... 558s Selecting previously unselected package slapd. 558s Preparing to unpack .../02-slapd_2.6.7+dfsg-1~exp1ubuntu1_ppc64el.deb ... 558s Unpacking slapd (2.6.7+dfsg-1~exp1ubuntu1) ... 558s Selecting previously unselected package libtcl8.6:ppc64el. 558s Preparing to unpack .../03-libtcl8.6_8.6.13+dfsg-2_ppc64el.deb ... 558s Unpacking libtcl8.6:ppc64el (8.6.13+dfsg-2) ... 558s Selecting previously unselected package tcl8.6. 558s Preparing to unpack .../04-tcl8.6_8.6.13+dfsg-2_ppc64el.deb ... 558s Unpacking tcl8.6 (8.6.13+dfsg-2) ... 558s Selecting previously unselected package tcl-expect:ppc64el. 558s Preparing to unpack .../05-tcl-expect_5.45.4-2build1_ppc64el.deb ... 558s Unpacking tcl-expect:ppc64el (5.45.4-2build1) ... 558s Selecting previously unselected package expect. 558s Preparing to unpack .../06-expect_5.45.4-2build1_ppc64el.deb ... 558s Unpacking expect (5.45.4-2build1) ... 559s Selecting previously unselected package ldap-utils. 559s Preparing to unpack .../07-ldap-utils_2.6.7+dfsg-1~exp1ubuntu1_ppc64el.deb ... 559s Unpacking ldap-utils (2.6.7+dfsg-1~exp1ubuntu1) ... 559s Selecting previously unselected package libavahi-common-data:ppc64el. 559s Preparing to unpack .../08-libavahi-common-data_0.8-13ubuntu2_ppc64el.deb ... 559s Unpacking libavahi-common-data:ppc64el (0.8-13ubuntu2) ... 559s Selecting previously unselected package libavahi-common3:ppc64el. 559s Preparing to unpack .../09-libavahi-common3_0.8-13ubuntu2_ppc64el.deb ... 559s Unpacking libavahi-common3:ppc64el (0.8-13ubuntu2) ... 559s Selecting previously unselected package libavahi-client3:ppc64el. 559s Preparing to unpack .../10-libavahi-client3_0.8-13ubuntu2_ppc64el.deb ... 559s Unpacking libavahi-client3:ppc64el (0.8-13ubuntu2) ... 559s Selecting previously unselected package libcrack2:ppc64el. 559s Preparing to unpack .../11-libcrack2_2.9.6-5.1_ppc64el.deb ... 559s Unpacking libcrack2:ppc64el (2.9.6-5.1) ... 559s Selecting previously unselected package libevent-2.1-7:ppc64el. 559s Preparing to unpack .../12-libevent-2.1-7_2.1.12-stable-9_ppc64el.deb ... 559s Unpacking libevent-2.1-7:ppc64el (2.1.12-stable-9) ... 559s Selecting previously unselected package libjose0:ppc64el. 559s Preparing to unpack .../13-libjose0_11-3_ppc64el.deb ... 559s Unpacking libjose0:ppc64el (11-3) ... 559s Selecting previously unselected package libverto-libevent1:ppc64el. 559s Preparing to unpack .../14-libverto-libevent1_0.3.1-1ubuntu5_ppc64el.deb ... 559s Unpacking libverto-libevent1:ppc64el (0.3.1-1ubuntu5) ... 559s Selecting previously unselected package libverto1:ppc64el. 559s Preparing to unpack .../15-libverto1_0.3.1-1ubuntu5_ppc64el.deb ... 559s Unpacking libverto1:ppc64el (0.3.1-1ubuntu5) ... 559s Selecting previously unselected package libkrad0:ppc64el. 559s Preparing to unpack .../16-libkrad0_1.20.1-5build1_ppc64el.deb ... 559s Unpacking libkrad0:ppc64el (1.20.1-5build1) ... 559s Selecting previously unselected package libtalloc2:ppc64el. 559s Preparing to unpack .../17-libtalloc2_2.4.2-1_ppc64el.deb ... 559s Unpacking libtalloc2:ppc64el (2.4.2-1) ... 559s Selecting previously unselected package libtdb1:ppc64el. 559s Preparing to unpack .../18-libtdb1_1.4.10-1_ppc64el.deb ... 559s Unpacking libtdb1:ppc64el (1.4.10-1) ... 559s Selecting previously unselected package libtevent0:ppc64el. 559s Preparing to unpack .../19-libtevent0_0.16.1-1_ppc64el.deb ... 559s Unpacking libtevent0:ppc64el (0.16.1-1) ... 559s Selecting previously unselected package libldb2:ppc64el. 559s Preparing to unpack .../20-libldb2_2%3a2.8.0+samba4.19.5+dfsg-1ubuntu1_ppc64el.deb ... 559s Unpacking libldb2:ppc64el (2:2.8.0+samba4.19.5+dfsg-1ubuntu1) ... 559s Selecting previously unselected package libnfsidmap1:ppc64el. 559s Preparing to unpack .../21-libnfsidmap1_1%3a2.6.3-3ubuntu1_ppc64el.deb ... 559s Unpacking libnfsidmap1:ppc64el (1:2.6.3-3ubuntu1) ... 559s Selecting previously unselected package libnss-sudo. 559s Preparing to unpack .../22-libnss-sudo_1.9.15p5-3ubuntu3_all.deb ... 559s Unpacking libnss-sudo (1.9.15p5-3ubuntu3) ... 559s Selecting previously unselected package libpwquality-common. 559s Preparing to unpack .../23-libpwquality-common_1.4.5-3_all.deb ... 559s Unpacking libpwquality-common (1.4.5-3) ... 559s Selecting previously unselected package libpwquality1:ppc64el. 559s Preparing to unpack .../24-libpwquality1_1.4.5-3_ppc64el.deb ... 559s Unpacking libpwquality1:ppc64el (1.4.5-3) ... 559s Selecting previously unselected package libpam-pwquality:ppc64el. 559s Preparing to unpack .../25-libpam-pwquality_1.4.5-3_ppc64el.deb ... 559s Unpacking libpam-pwquality:ppc64el (1.4.5-3) ... 559s Selecting previously unselected package libwbclient0:ppc64el. 559s Preparing to unpack .../26-libwbclient0_2%3a4.19.5+dfsg-1ubuntu1_ppc64el.deb ... 559s Unpacking libwbclient0:ppc64el (2:4.19.5+dfsg-1ubuntu1) ... 559s Selecting previously unselected package samba-libs:ppc64el. 559s Preparing to unpack .../27-samba-libs_2%3a4.19.5+dfsg-1ubuntu1_ppc64el.deb ... 559s Unpacking samba-libs:ppc64el (2:4.19.5+dfsg-1ubuntu1) ... 559s Selecting previously unselected package libnss-sss:ppc64el. 559s Preparing to unpack .../28-libnss-sss_2.9.4-1ubuntu1_ppc64el.deb ... 559s Unpacking libnss-sss:ppc64el (2.9.4-1ubuntu1) ... 559s Selecting previously unselected package libpam-sss:ppc64el. 559s Preparing to unpack .../29-libpam-sss_2.9.4-1ubuntu1_ppc64el.deb ... 559s Unpacking libpam-sss:ppc64el (2.9.4-1ubuntu1) ... 559s Selecting previously unselected package python3-sss. 559s Preparing to unpack .../30-python3-sss_2.9.4-1ubuntu1_ppc64el.deb ... 559s Unpacking python3-sss (2.9.4-1ubuntu1) ... 559s Selecting previously unselected package libc-ares2:ppc64el. 559s Preparing to unpack .../31-libc-ares2_1.27.0-1_ppc64el.deb ... 559s Unpacking libc-ares2:ppc64el (1.27.0-1) ... 559s Selecting previously unselected package libdhash1:ppc64el. 559s Preparing to unpack .../32-libdhash1_0.6.2-2_ppc64el.deb ... 559s Unpacking libdhash1:ppc64el (0.6.2-2) ... 559s Selecting previously unselected package libbasicobjects0:ppc64el. 559s Preparing to unpack .../33-libbasicobjects0_0.6.2-2_ppc64el.deb ... 559s Unpacking libbasicobjects0:ppc64el (0.6.2-2) ... 559s Selecting previously unselected package libcollection4:ppc64el. 559s Preparing to unpack .../34-libcollection4_0.6.2-2_ppc64el.deb ... 559s Unpacking libcollection4:ppc64el (0.6.2-2) ... 559s Selecting previously unselected package libpath-utils1:ppc64el. 559s Preparing to unpack .../35-libpath-utils1_0.6.2-2_ppc64el.deb ... 559s Unpacking libpath-utils1:ppc64el (0.6.2-2) ... 559s Selecting previously unselected package libref-array1:ppc64el. 559s Preparing to unpack .../36-libref-array1_0.6.2-2_ppc64el.deb ... 559s Unpacking libref-array1:ppc64el (0.6.2-2) ... 559s Selecting previously unselected package libini-config5:ppc64el. 559s Preparing to unpack .../37-libini-config5_0.6.2-2_ppc64el.deb ... 559s Unpacking libini-config5:ppc64el (0.6.2-2) ... 559s Selecting previously unselected package libsss-certmap0. 559s Preparing to unpack .../38-libsss-certmap0_2.9.4-1ubuntu1_ppc64el.deb ... 559s Unpacking libsss-certmap0 (2.9.4-1ubuntu1) ... 559s Selecting previously unselected package libsss-idmap0. 559s Preparing to unpack .../39-libsss-idmap0_2.9.4-1ubuntu1_ppc64el.deb ... 559s Unpacking libsss-idmap0 (2.9.4-1ubuntu1) ... 559s Selecting previously unselected package libsss-nss-idmap0. 559s Preparing to unpack .../40-libsss-nss-idmap0_2.9.4-1ubuntu1_ppc64el.deb ... 559s Unpacking libsss-nss-idmap0 (2.9.4-1ubuntu1) ... 559s Selecting previously unselected package sssd-common. 559s Preparing to unpack .../41-sssd-common_2.9.4-1ubuntu1_ppc64el.deb ... 559s Unpacking sssd-common (2.9.4-1ubuntu1) ... 559s Selecting previously unselected package sssd-idp. 559s Preparing to unpack .../42-sssd-idp_2.9.4-1ubuntu1_ppc64el.deb ... 559s Unpacking sssd-idp (2.9.4-1ubuntu1) ... 559s Selecting previously unselected package sssd-passkey. 559s Preparing to unpack .../43-sssd-passkey_2.9.4-1ubuntu1_ppc64el.deb ... 559s Unpacking sssd-passkey (2.9.4-1ubuntu1) ... 560s Selecting previously unselected package sssd-ad-common. 560s Preparing to unpack .../44-sssd-ad-common_2.9.4-1ubuntu1_ppc64el.deb ... 560s Unpacking sssd-ad-common (2.9.4-1ubuntu1) ... 560s Selecting previously unselected package sssd-krb5-common. 560s Preparing to unpack .../45-sssd-krb5-common_2.9.4-1ubuntu1_ppc64el.deb ... 560s Unpacking sssd-krb5-common (2.9.4-1ubuntu1) ... 560s Selecting previously unselected package libsmbclient:ppc64el. 560s Preparing to unpack .../46-libsmbclient_2%3a4.19.5+dfsg-1ubuntu1_ppc64el.deb ... 560s Unpacking libsmbclient:ppc64el (2:4.19.5+dfsg-1ubuntu1) ... 560s Selecting previously unselected package sssd-ad. 560s Preparing to unpack .../47-sssd-ad_2.9.4-1ubuntu1_ppc64el.deb ... 560s Unpacking sssd-ad (2.9.4-1ubuntu1) ... 560s Selecting previously unselected package libipa-hbac0. 560s Preparing to unpack .../48-libipa-hbac0_2.9.4-1ubuntu1_ppc64el.deb ... 560s Unpacking libipa-hbac0 (2.9.4-1ubuntu1) ... 560s Selecting previously unselected package sssd-ipa. 560s Preparing to unpack .../49-sssd-ipa_2.9.4-1ubuntu1_ppc64el.deb ... 560s Unpacking sssd-ipa (2.9.4-1ubuntu1) ... 560s Selecting previously unselected package sssd-krb5. 560s Preparing to unpack .../50-sssd-krb5_2.9.4-1ubuntu1_ppc64el.deb ... 560s Unpacking sssd-krb5 (2.9.4-1ubuntu1) ... 560s Selecting previously unselected package sssd-ldap. 560s Preparing to unpack .../51-sssd-ldap_2.9.4-1ubuntu1_ppc64el.deb ... 560s Unpacking sssd-ldap (2.9.4-1ubuntu1) ... 560s Selecting previously unselected package sssd-proxy. 560s Preparing to unpack .../52-sssd-proxy_2.9.4-1ubuntu1_ppc64el.deb ... 560s Unpacking sssd-proxy (2.9.4-1ubuntu1) ... 560s Selecting previously unselected package sssd. 560s Preparing to unpack .../53-sssd_2.9.4-1ubuntu1_ppc64el.deb ... 560s Unpacking sssd (2.9.4-1ubuntu1) ... 560s Selecting previously unselected package sssd-dbus. 560s Preparing to unpack .../54-sssd-dbus_2.9.4-1ubuntu1_ppc64el.deb ... 560s Unpacking sssd-dbus (2.9.4-1ubuntu1) ... 560s Selecting previously unselected package sssd-kcm. 560s Preparing to unpack .../55-sssd-kcm_2.9.4-1ubuntu1_ppc64el.deb ... 560s Unpacking sssd-kcm (2.9.4-1ubuntu1) ... 560s Selecting previously unselected package sssd-tools. 560s Preparing to unpack .../56-sssd-tools_2.9.4-1ubuntu1_ppc64el.deb ... 560s Unpacking sssd-tools (2.9.4-1ubuntu1) ... 560s Selecting previously unselected package libipa-hbac-dev. 560s Preparing to unpack .../57-libipa-hbac-dev_2.9.4-1ubuntu1_ppc64el.deb ... 560s Unpacking libipa-hbac-dev (2.9.4-1ubuntu1) ... 560s Selecting previously unselected package libsss-certmap-dev. 560s Preparing to unpack .../58-libsss-certmap-dev_2.9.4-1ubuntu1_ppc64el.deb ... 560s Unpacking libsss-certmap-dev (2.9.4-1ubuntu1) ... 560s Selecting previously unselected package libsss-idmap-dev. 560s Preparing to unpack .../59-libsss-idmap-dev_2.9.4-1ubuntu1_ppc64el.deb ... 560s Unpacking libsss-idmap-dev (2.9.4-1ubuntu1) ... 560s Selecting previously unselected package libsss-nss-idmap-dev. 560s Preparing to unpack .../60-libsss-nss-idmap-dev_2.9.4-1ubuntu1_ppc64el.deb ... 560s Unpacking libsss-nss-idmap-dev (2.9.4-1ubuntu1) ... 560s Selecting previously unselected package libsss-sudo. 560s Preparing to unpack .../61-libsss-sudo_2.9.4-1ubuntu1_ppc64el.deb ... 560s Unpacking libsss-sudo (2.9.4-1ubuntu1) ... 560s Selecting previously unselected package python3-libipa-hbac. 560s Preparing to unpack .../62-python3-libipa-hbac_2.9.4-1ubuntu1_ppc64el.deb ... 560s Unpacking python3-libipa-hbac (2.9.4-1ubuntu1) ... 560s Selecting previously unselected package python3-libsss-nss-idmap. 560s Preparing to unpack .../63-python3-libsss-nss-idmap_2.9.4-1ubuntu1_ppc64el.deb ... 560s Unpacking python3-libsss-nss-idmap (2.9.4-1ubuntu1) ... 560s Selecting previously unselected package autopkgtest-satdep. 560s Preparing to unpack .../64-1-autopkgtest-satdep.deb ... 560s Unpacking autopkgtest-satdep (0) ... 560s Setting up libpwquality-common (1.4.5-3) ... 560s Setting up libpath-utils1:ppc64el (0.6.2-2) ... 560s Setting up libnfsidmap1:ppc64el (1:2.6.3-3ubuntu1) ... 560s Setting up libsss-idmap0 (2.9.4-1ubuntu1) ... 560s Setting up libbasicobjects0:ppc64el (0.6.2-2) ... 560s Setting up libsss-idmap-dev (2.9.4-1ubuntu1) ... 560s Setting up libtdb1:ppc64el (1.4.10-1) ... 560s Setting up libc-ares2:ppc64el (1.27.0-1) ... 560s Setting up ldap-utils (2.6.7+dfsg-1~exp1ubuntu1) ... 560s Setting up libjose0:ppc64el (11-3) ... 560s Setting up libwbclient0:ppc64el (2:4.19.5+dfsg-1ubuntu1) ... 560s Setting up libtalloc2:ppc64el (2.4.2-1) ... 560s Setting up libdhash1:ppc64el (0.6.2-2) ... 560s Setting up libtevent0:ppc64el (0.16.1-1) ... 560s Setting up libavahi-common-data:ppc64el (0.8-13ubuntu2) ... 560s Setting up libevent-2.1-7:ppc64el (2.1.12-stable-9) ... 560s Setting up libtcl8.6:ppc64el (8.6.13+dfsg-2) ... 560s Setting up libltdl7:ppc64el (2.4.7-7) ... 560s Setting up libcrack2:ppc64el (2.9.6-5.1) ... 560s Setting up libcollection4:ppc64el (0.6.2-2) ... 560s Setting up libodbc2:ppc64el (2.3.12-1) ... 560s Setting up libipa-hbac0 (2.9.4-1ubuntu1) ... 560s Setting up python3-libipa-hbac (2.9.4-1ubuntu1) ... 560s Setting up libref-array1:ppc64el (0.6.2-2) ... 560s Setting up libnss-sudo (1.9.15p5-3ubuntu3) ... 560s Setting up libldb2:ppc64el (2:2.8.0+samba4.19.5+dfsg-1ubuntu1) ... 560s Setting up libsss-nss-idmap0 (2.9.4-1ubuntu1) ... 560s Setting up libnss-sss:ppc64el (2.9.4-1ubuntu1) ... 560s Setting up slapd (2.6.7+dfsg-1~exp1ubuntu1) ... 560s Creating new user openldap... done. 560s Creating initial configuration... done. 560s Creating LDAP directory... done. 561s Setting up tcl8.6 (8.6.13+dfsg-2) ... 561s Setting up libsss-sudo (2.9.4-1ubuntu1) ... 561s Setting up libsss-nss-idmap-dev (2.9.4-1ubuntu1) ... 561s Setting up libipa-hbac-dev (2.9.4-1ubuntu1) ... 561s Setting up libini-config5:ppc64el (0.6.2-2) ... 561s Setting up libavahi-common3:ppc64el (0.8-13ubuntu2) ... 561s Setting up tcl-expect:ppc64el (5.45.4-2build1) ... 561s Setting up python3-sss (2.9.4-1ubuntu1) ... 561s Setting up libsss-certmap0 (2.9.4-1ubuntu1) ... 561s Setting up libpwquality1:ppc64el (1.4.5-3) ... 561s Setting up python3-libsss-nss-idmap (2.9.4-1ubuntu1) ... 561s Setting up libavahi-client3:ppc64el (0.8-13ubuntu2) ... 561s Setting up expect (5.45.4-2build1) ... 561s Setting up libpam-pwquality:ppc64el (1.4.5-3) ... 561s Setting up samba-libs:ppc64el (2:4.19.5+dfsg-1ubuntu1) ... 561s Setting up libsss-certmap-dev (2.9.4-1ubuntu1) ... 561s Setting up libsmbclient:ppc64el (2:4.19.5+dfsg-1ubuntu1) ... 561s Setting up libpam-sss:ppc64el (2.9.4-1ubuntu1) ... 561s Setting up sssd-common (2.9.4-1ubuntu1) ... 561s Creating SSSD system user & group... 561s warn: The home directory `/var/lib/sss' already exists. Not touching this directory. 561s warn: Warning: The home directory `/var/lib/sss' does not belong to the user you are currently creating. 562s Warning: found usr.sbin.sssd in /etc/apparmor.d/force-complain, forcing complain mode 562s Warning from /etc/apparmor.d/usr.sbin.sssd (/etc/apparmor.d/usr.sbin.sssd line 63): Caching disabled for: 'usr.sbin.sssd' due to force complain 562s Created symlink /etc/systemd/system/sssd.service.wants/sssd-autofs.socket → /usr/lib/systemd/system/sssd-autofs.socket. 562s Created symlink /etc/systemd/system/sssd.service.wants/sssd-nss.socket → /usr/lib/systemd/system/sssd-nss.socket. 563s Created symlink /etc/systemd/system/sssd.service.wants/sssd-pam-priv.socket → /usr/lib/systemd/system/sssd-pam-priv.socket. 563s Created symlink /etc/systemd/system/sssd.service.wants/sssd-pam.socket → /usr/lib/systemd/system/sssd-pam.socket. 563s Created symlink /etc/systemd/system/sssd.service.wants/sssd-ssh.socket → /usr/lib/systemd/system/sssd-ssh.socket. 563s Created symlink /etc/systemd/system/sssd.service.wants/sssd-sudo.socket → /usr/lib/systemd/system/sssd-sudo.socket. 564s Created symlink /etc/systemd/system/multi-user.target.wants/sssd.service → /usr/lib/systemd/system/sssd.service. 564s sssd-autofs.service is a disabled or a static unit, not starting it. 564s sssd-nss.service is a disabled or a static unit, not starting it. 564s sssd-pam.service is a disabled or a static unit, not starting it. 564s sssd-ssh.service is a disabled or a static unit, not starting it. 564s sssd-sudo.service is a disabled or a static unit, not starting it. 564s Could not execute systemctl: at /usr/bin/deb-systemd-invoke line 148. 564s Setting up sssd-proxy (2.9.4-1ubuntu1) ... 564s Setting up sssd-kcm (2.9.4-1ubuntu1) ... 564s Created symlink /etc/systemd/system/sockets.target.wants/sssd-kcm.socket → /usr/lib/systemd/system/sssd-kcm.socket. 565s sssd-kcm.service is a disabled or a static unit, not starting it. 565s Setting up sssd-dbus (2.9.4-1ubuntu1) ... 565s sssd-ifp.service is a disabled or a static unit, not starting it. 565s Setting up sssd-ad-common (2.9.4-1ubuntu1) ... 566s Created symlink /etc/systemd/system/sssd.service.wants/sssd-pac.socket → /usr/lib/systemd/system/sssd-pac.socket. 566s sssd-pac.service is a disabled or a static unit, not starting it. 566s Could not execute systemctl: at /usr/bin/deb-systemd-invoke line 148. 566s Setting up sssd-krb5-common (2.9.4-1ubuntu1) ... 566s Setting up sssd-krb5 (2.9.4-1ubuntu1) ... 566s Setting up sssd-ldap (2.9.4-1ubuntu1) ... 566s Setting up sssd-ad (2.9.4-1ubuntu1) ... 566s Setting up sssd-tools (2.9.4-1ubuntu1) ... 566s Setting up sssd-ipa (2.9.4-1ubuntu1) ... 566s Setting up sssd (2.9.4-1ubuntu1) ... 566s Setting up libverto-libevent1:ppc64el (0.3.1-1ubuntu5) ... 566s Setting up libverto1:ppc64el (0.3.1-1ubuntu5) ... 566s Setting up libkrad0:ppc64el (1.20.1-5build1) ... 566s Setting up sssd-passkey (2.9.4-1ubuntu1) ... 566s Setting up sssd-idp (2.9.4-1ubuntu1) ... 566s Setting up autopkgtest-satdep (0) ... 566s Processing triggers for libc-bin (2.39-0ubuntu2) ... 566s Processing triggers for ufw (0.36.2-5) ... 566s Processing triggers for man-db (2.12.0-3) ... 567s Processing triggers for dbus (1.14.10-4ubuntu1) ... 578s (Reading database ... 71382 files and directories currently installed.) 578s Removing autopkgtest-satdep (0) ... 579s autopkgtest [03:40:53]: test ldap-user-group-ldap-auth: [----------------------- 579s + . debian/tests/util 579s + . debian/tests/common-tests 579s + mydomain=example.com 579s + myhostname=ldap.example.com 579s + mysuffix=dc=example,dc=com 579s + admin_dn=cn=admin,dc=example,dc=com 579s + admin_pw=secret 579s + ldap_user=testuser1 579s + ldap_user_pw=testuser1secret 579s + ldap_group=ldapusers 579s + adjust_hostname ldap.example.com 579s + local myhostname=ldap.example.com 579s + echo ldap.example.com 579s + hostname ldap.example.com 579s + grep -qE ldap.example.com /etc/hosts 579s + echo 127.0.1.10 ldap.example.com 579s + reconfigure_slapd 579s + debconf-set-selections 579s + rm -rf /var/backups/*slapd* /var/backups/unknown*ldapdb 579s + dpkg-reconfigure -fnoninteractive -pcritical slapd 579s Backing up /etc/ldap/slapd.d in /var/backups/slapd-2.6.7+dfsg-1~exp1ubuntu1... done. 579s Moving old database directory to /var/backups: 579s - directory unknown... done. 579s Creating initial configuration... done. 579s Creating LDAP directory... done. 580s + generate_certs ldap.example.com 580s + local cn=ldap.example.com 580s + local cert=/etc/ldap/server.pem 580s + local key=/etc/ldap/server.key 580s + local cnf=/etc/ldap/openssl.cnf 580s + cat 580s + openssl req -new -x509 -nodes -out /etc/ldap/server.pem -keyout /etc/ldap/server.key -config /etc/ldap/openssl.cnf 580s ..............++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ 580s .....................++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ 580s ----- 580s + chmod 0640 /etc/ldap/server.key 580s + chgrp openldap /etc/ldap/server.key 580s + [ ! -f /etc/ldap/server.pem ] 580s + [ ! -f /etc/ldap/server.key ] 580s + enable_ldap_ssl 580s + cat 580s + cat 580s + ldapmodify -H ldapi:/// -Y EXTERNAL -Q 580s + populate_ldap_rfc2307 580s + cat 580s + ldapadd -x -D cn=admin,dc=example,dc=com -w secret 580s + configure_sssd_ldap_rfc2307 580s + cat 580s + chmod 0600 /etc/sssd/sssd.conf 580s + systemctl restart sssd 580s modifying entry "cn=config" 580s 580s adding new entry "ou=People,dc=example,dc=com" 580s 580s adding new entry "ou=Group,dc=example,dc=com" 580s 580s adding new entry "uid=testuser1,ou=People,dc=example,dc=com" 580s 580s adding new entry "cn=testuser1,ou=Group,dc=example,dc=com" 580s 580s adding new entry "cn=ldapusers,ou=Group,dc=example,dc=com" 580s 580s + enable_pam_mkhomedir 580s + grep -qE ^session.*pam_mkhomedir\.so /etc/pam.d/common-session 580s + echo session optional pam_mkhomedir.so 580s + run_common_tests 580s + echo Assert local user databases do not have our LDAP test data 580s + check_local_userAssert local user databases do not have our LDAP test data 580s testuser1 580s + local local_user=testuser1 580s + grep -q ^testuser1 /etc/passwd 580s + check_local_group testuser1 580s + local local_group=testuser1 580s + grep -q ^testuser1 /etc/group 580s + check_local_group ldapusers 580s + local local_group=ldapusers 580s + grep -q ^ldapusers /etc/group 580s + echo The LDAP user is known to the system via getent 580s The LDAP user is known to the system via getent 580s + check_getent_user testuser1 580s + local getent_user=testuser1 580s + local output 580s + getent passwd testuser1 580s + output=testuser1:*:10001:10001:testuser1:/home/testuser1:/bin/bash 580s + [ -z testuser1:*:10001:10001:testuser1:/home/testuser1:/bin/bash ] 580s + echo The LDAP user's private group is known to the system via getent 580s + check_getent_group testuser1 580s The LDAP user's private group is known to the system via getent 580s + local getent_group=testuser1 580s + local output 580s + getent group testuser1 580s The LDAP group ldapusers is known to the system via getent 580s + output=testuser1:*:10001:testuser1 580s + [ -z testuser1:*:10001:testuser1 ] 580s + echo The LDAP group ldapusers is known to the system via getent 580s + check_getent_group ldapusers 580s + local getent_group=ldapusers 580s + local output 580s + getent group ldapusers 580s The id(1) command can resolve the group membership of the LDAP user 580s + output=ldapusers:*:10100:testuser1 580s + [ -z ldapusers:*:10100:testuser1 ] 580s + echo The id(1) command can resolve the group membership of the LDAP user 580s + id -Gn testuser1 580s + output=testuser1 ldapusersThe LDAP user can login on a terminal 580s 580s + [ testuser1 ldapusers != testuser1 ldapusers ] 580s + echo The LDAP user can login on a terminal 580s + /usr/bin/expect -f debian/tests/login.exp testuser1 testuser1secret 580s spawn login 580s ldap.example.com login: testuser1 580s Password: 580s Welcome to Ubuntu Noble Numbat (development branch) (GNU/Linux 6.8.0-11-generic ppc64le) 580s 580s * Documentation: https://help.ubuntu.com 580s * Management: https://landscape.canonical.com 580s * Support: https://ubuntu.com/pro 580s 580s 580s The programs included with the Ubuntu system are free software; 580s the exact distribution terms for each program are described in the 580s individual files in /usr/share/doc/*/copyright. 580s 580s Ubuntu comes with ABSOLUTELY NO WARRANTY, to the extent permitted by 580s applicable law. 580s 580s 580s The programs included with the Ubuntu system are free software; 580s the exact distribution terms for each program are described in the 580s individual files in /usr/share/doc/*/copyright. 580s 580s Ubuntu comes with ABSOLUTELY NO WARRANTY, to the extent permitted by 580s applicable law. 580s 580s Creating directory '/home/testuser1'. 580s [?2004htestuser1@ldap:~$ id -un 580s [?2004l testuser1 581s [?2004htestuser1@ldap:~$ autopkgtest [03:40:55]: test ldap-user-group-ldap-auth: -----------------------] 581s ldap-user-group-ldap-auth PASS 581s autopkgtest [03:40:55]: test ldap-user-group-ldap-auth: - - - - - - - - - - results - - - - - - - - - - 582s autopkgtest [03:40:56]: test ldap-user-group-krb5-auth: preparing testbed 586s Reading package lists... 587s Building dependency tree... 587s Reading state information... 587s Starting pkgProblemResolver with broken count: 0 587s Starting 2 pkgProblemResolver with broken count: 0 587s Done 588s The following additional packages will be installed: 588s krb5-admin-server krb5-config krb5-kdc krb5-user libgssrpc4 588s libkadm5clnt-mit12 libkadm5srv-mit12 libkdb5-10 588s Suggested packages: 588s krb5-kdc-ldap krb5-kpropd krb5-k5tls krb5-doc 588s The following NEW packages will be installed: 588s autopkgtest-satdep krb5-admin-server krb5-config krb5-kdc krb5-user 588s libgssrpc4 libkadm5clnt-mit12 libkadm5srv-mit12 libkdb5-10 588s 0 upgraded, 9 newly installed, 0 to remove and 0 not upgraded. 588s Need to get 669 kB/670 kB of archives. 588s After this operation, 3104 kB of additional disk space will be used. 588s Get:1 /tmp/autopkgtest.8eyYB7/2-autopkgtest-satdep.deb autopkgtest-satdep ppc64el 0 [892 B] 588s Get:2 http://ftpmaster.internal/ubuntu noble/main ppc64el krb5-config all 2.7 [22.0 kB] 588s Get:3 http://ftpmaster.internal/ubuntu noble/main ppc64el libgssrpc4 ppc64el 1.20.1-5build1 [64.3 kB] 588s Get:4 http://ftpmaster.internal/ubuntu noble/main ppc64el libkadm5clnt-mit12 ppc64el 1.20.1-5build1 [43.7 kB] 588s Get:5 http://ftpmaster.internal/ubuntu noble/main ppc64el libkdb5-10 ppc64el 1.20.1-5build1 [46.3 kB] 588s Get:6 http://ftpmaster.internal/ubuntu noble/main ppc64el libkadm5srv-mit12 ppc64el 1.20.1-5build1 [60.8 kB] 588s Get:7 http://ftpmaster.internal/ubuntu noble/universe ppc64el krb5-user ppc64el 1.20.1-5build1 [117 kB] 588s Get:8 http://ftpmaster.internal/ubuntu noble/universe ppc64el krb5-kdc ppc64el 1.20.1-5build1 [207 kB] 588s Get:9 http://ftpmaster.internal/ubuntu noble/universe ppc64el krb5-admin-server ppc64el 1.20.1-5build1 [108 kB] 589s Preconfiguring packages ... 590s Fetched 669 kB in 1s (820 kB/s) 590s Selecting previously unselected package krb5-config. 590s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 71382 files and directories currently installed.) 590s Preparing to unpack .../0-krb5-config_2.7_all.deb ... 590s Unpacking krb5-config (2.7) ... 590s Selecting previously unselected package libgssrpc4:ppc64el. 590s Preparing to unpack .../1-libgssrpc4_1.20.1-5build1_ppc64el.deb ... 590s Unpacking libgssrpc4:ppc64el (1.20.1-5build1) ... 590s Selecting previously unselected package libkadm5clnt-mit12:ppc64el. 590s Preparing to unpack .../2-libkadm5clnt-mit12_1.20.1-5build1_ppc64el.deb ... 590s Unpacking libkadm5clnt-mit12:ppc64el (1.20.1-5build1) ... 590s Selecting previously unselected package libkdb5-10:ppc64el. 590s Preparing to unpack .../3-libkdb5-10_1.20.1-5build1_ppc64el.deb ... 590s Unpacking libkdb5-10:ppc64el (1.20.1-5build1) ... 590s Selecting previously unselected package libkadm5srv-mit12:ppc64el. 590s Preparing to unpack .../4-libkadm5srv-mit12_1.20.1-5build1_ppc64el.deb ... 590s Unpacking libkadm5srv-mit12:ppc64el (1.20.1-5build1) ... 590s Selecting previously unselected package krb5-user. 590s Preparing to unpack .../5-krb5-user_1.20.1-5build1_ppc64el.deb ... 590s Unpacking krb5-user (1.20.1-5build1) ... 590s Selecting previously unselected package krb5-kdc. 590s Preparing to unpack .../6-krb5-kdc_1.20.1-5build1_ppc64el.deb ... 590s Unpacking krb5-kdc (1.20.1-5build1) ... 590s Selecting previously unselected package krb5-admin-server. 590s Preparing to unpack .../7-krb5-admin-server_1.20.1-5build1_ppc64el.deb ... 590s Unpacking krb5-admin-server (1.20.1-5build1) ... 590s Selecting previously unselected package autopkgtest-satdep. 590s Preparing to unpack .../8-2-autopkgtest-satdep.deb ... 590s Unpacking autopkgtest-satdep (0) ... 590s Setting up libgssrpc4:ppc64el (1.20.1-5build1) ... 590s Setting up krb5-config (2.7) ... 591s Setting up libkadm5clnt-mit12:ppc64el (1.20.1-5build1) ... 591s Setting up libkdb5-10:ppc64el (1.20.1-5build1) ... 591s Setting up libkadm5srv-mit12:ppc64el (1.20.1-5build1) ... 591s Setting up krb5-user (1.20.1-5build1) ... 591s update-alternatives: using /usr/bin/kinit.mit to provide /usr/bin/kinit (kinit) in auto mode 591s update-alternatives: using /usr/bin/klist.mit to provide /usr/bin/klist (klist) in auto mode 591s update-alternatives: using /usr/bin/kswitch.mit to provide /usr/bin/kswitch (kswitch) in auto mode 591s update-alternatives: using /usr/bin/ksu.mit to provide /usr/bin/ksu (ksu) in auto mode 591s update-alternatives: using /usr/bin/kpasswd.mit to provide /usr/bin/kpasswd (kpasswd) in auto mode 591s update-alternatives: using /usr/bin/kdestroy.mit to provide /usr/bin/kdestroy (kdestroy) in auto mode 591s update-alternatives: using /usr/bin/kadmin.mit to provide /usr/bin/kadmin (kadmin) in auto mode 591s update-alternatives: using /usr/bin/ktutil.mit to provide /usr/bin/ktutil (ktutil) in auto mode 591s Setting up krb5-kdc (1.20.1-5build1) ... 591s Created symlink /etc/systemd/system/multi-user.target.wants/krb5-kdc.service → /usr/lib/systemd/system/krb5-kdc.service. 592s Could not execute systemctl: at /usr/bin/deb-systemd-invoke line 148. 592s Setting up krb5-admin-server (1.20.1-5build1) ... 593s Created symlink /etc/systemd/system/multi-user.target.wants/krb5-admin-server.service → /usr/lib/systemd/system/krb5-admin-server.service. 593s Setting up autopkgtest-satdep (0) ... 593s Processing triggers for man-db (2.12.0-3) ... 594s Processing triggers for libc-bin (2.39-0ubuntu2) ... 603s (Reading database ... 71475 files and directories currently installed.) 603s Removing autopkgtest-satdep (0) ... 604s autopkgtest [03:41:18]: test ldap-user-group-krb5-auth: [----------------------- 604s + . debian/tests/util 604s + . debian/tests/common-tests 604s + mydomain=example.com 604s + myhostname=ldap.example.com 604s + mysuffix=dc=example,dc=com 604s + myrealm=EXAMPLE.COM 604s + admin_dn=cn=admin,dc=example,dc=com 604s + admin_pw=secret 604s + ldap_user=testuser1 604s + ldap_user_pw=testuser1secret 604s + kerberos_principal_pw=testuser1kerberos 604s + ldap_group=ldapusers 604s + adjust_hostname ldap.example.com 604s + local myhostname=ldap.example.com 604s + echo ldap.example.com 604s + hostname ldap.example.com 604s + grep -qE ldap.example.com /etc/hosts 604s + reconfigure_slapd 604s + debconf-set-selections 604s + rm -rf /var/backups/slapd-2.6.7+dfsg-1~exp1ubuntu1 /var/backups/unknown-2.6.7+dfsg-1~exp1ubuntu1-20240319-034053.ldapdb 604s + dpkg-reconfigure -fnoninteractive -pcritical slapd 605s Backing up /etc/ldap/slapd.d in /var/backups/slapd-2.6.7+dfsg-1~exp1ubuntu1... done. 605s Moving old database directory to /var/backups: 605s - directory unknown... done. 605s Creating initial configuration... done. 605s Creating LDAP directory... done. 605s + generate_certs ldap.example.com 605s + local cn=ldap.example.com 605s + local cert=/etc/ldap/server.pem 605s + local key=/etc/ldap/server.key 605s + local cnf=/etc/ldap/openssl.cnf 605s + cat 605s + openssl req -new -x509 -nodes -out /etc/ldap/server.pem -keyout /etc/ldap/server.key -config /etc/ldap/openssl.cnf 605s ......++++modifying entry "cn=config" 605s 605s adding new entry "ou=People,dc=example,dc=com" 605s 605s adding new entry "ou=Group,dc=example,dc=com" 605s 605s adding new entry "uid=testuser1,ou=People,dc=example,dc=com" 605s 605s adding new entry "cn=testuser1,ou=Group,dc=example,dc=com" 605s 605s adding new entry "cn=ldapusers,ou=Group,dc=example,dc=com" 605s 605s ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ 605s .......++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ 605s ----- 605s + chmod 0640 /etc/ldap/server.key 605s + chgrp openldap /etc/ldap/server.key 605s + [ ! -f /etc/ldap/server.pem ] 605s + [ ! -f /etc/ldap/server.key ] 605s + enable_ldap_ssl 605s + cat 605s + cat 605s + ldapmodify -H ldapi:/// -Y EXTERNAL -Q 605s + populate_ldap_rfc2307 605s + cat 605s + ldapadd -x -D cn=admin,dc=example,dc=com -w secret 605s + create_realm EXAMPLE.COM ldap.example.com 605s + local realm_name=EXAMPLE.COM 605s + local kerberos_server=ldap.example.com 605s + rm -rf /var/lib/krb5kdc/* 605s + rm -rf /etc/krb5kdc/kdc.conf 605s + rm -f /etc/krb5.keytab 605s + cat 605s + cat 605s + echo # */admin * 605s + kdb5_util create -s -P secretpassword 605s + systemctl restart krb5-kdc.service krb5-admin-server.service 605s Initializing database '/var/lib/krb5kdc/principal' for realm 'EXAMPLE.COM', 605s master key name 'K/M@EXAMPLE.COM' 605s + create_krb_principal testuser1 testuser1kerberos 605s + local principal=testuser1 605s + local password=testuser1kerberos 605s + kadmin.local -q addprinc -pw testuser1kerberos testuser1 605s No policy specified for testuser1@EXAMPLE.COM; defaulting to no policy 605s Authenticating as principal root/admin@EXAMPLE.COM with password. 605s Principal "testuser1@EXAMPLE.COM" created. 605s + configure_sssd_ldap_rfc2307_krb5_auth 605s + cat 606s + chmod 0600 /etc/sssd/sssd.conf 606s + systemctl restart sssd 606s + enable_pam_mkhomedir 606s + grep -qE ^session.*pam_mkhomedir\.so /etc/pam.d/common-session 606s Assert local user databases do not have our LDAP test data 606s + run_common_tests 606s + echo Assert local user databases do not have our LDAP test data 606s + check_local_user testuser1 606s + local local_user=testuser1 606s + grep -q ^testuser1 /etc/passwd 606s + check_local_group testuser1 606s + local local_group=testuser1 606s + grep -q ^testuser1 /etc/group 606s + check_local_group ldapusers 606s + local local_group=ldapusers 606s + grep -q ^ldapusers /etc/group 606s + The LDAP user is known to the system via getent 606s echo The LDAP user is known to the system via getent 606s + check_getent_user testuser1 606s + local getent_user=testuser1 606s + local output 606s + getentThe LDAP user's private group is known to the system via getent 606s passwd testuser1 606s + output=testuser1:*:10001:10001:testuser1:/home/testuser1:/bin/bash 606s + [ -z testuser1:*:10001:10001:testuser1:/home/testuser1:/bin/bash ] 606s + echo The LDAP user's private group is known to the system via getent 606s + check_getent_group testuser1 606s + local getent_group=testuser1 606s + local output 606s + getent group testuser1 606s + output=testuser1:*:10001:testuser1 606s + [ -z testuser1:*:10001:testuser1 ] 606s The LDAP group ldapusers is known to the system via getent 606s + echo The LDAP group ldapusers is known to the system via getent 606s + check_getent_group ldapusers 606s + local getent_group=ldapusers 606s + local output 606s + getent group ldapusers 606s The id(1) command can resolve the group membership of the LDAP user 606s + output=ldapusers:*:10100:testuser1 606s + [ -z ldapusers:*:10100:testuser1 ] 606s + echo The id(1) command can resolve the group membership of the LDAP user 606s + id -Gn testuser1 606s + output=testuser1 ldapusers 606s + [ testuser1 ldapusers != testuser1 ldapusers ] 606s + echo The Kerberos principal can login on a terminalThe Kerberos principal can login on a terminal 606s 606s + kdestroy 606s + /usr/bin/expect -f debian/tests/login.exp testuser1 testuser1kerberos testuser1@EXAMPLE.COM 606s spawn login 606s ldap.example.com login: testuser1 606s Password: 606s Welcome to Ubuntu Noble Numbat (development branch) (GNU/Linux 6.8.0-11-generic ppc64le) 606s 606s * Documentation: https://help.ubuntu.com 606s * Management: https://landscape.canonical.com 606s * Support: https://ubuntu.com/pro 606s 606s 606s The programs included with the Ubuntu system are free software; 606s the exact distribution terms for each program are described in the 606s individual files in /usr/share/doc/*/copyright. 606s 606s Ubuntu comes with ABSOLUTELY NO WARRANTY, to the extent permitted by 606s applicable law. 606s 606s Last login: Tue Mar 19 03:40:54 UTC 2024 on pts/0 606s [?2004htestuser1@ldap:~$ id -un 606s [?2004l testuser1 606s [?2004htestuser1@ldap:~$ klist 606s [?2004l Ticket cache: FILE:/tmp/krb5cc_10001_60ExmV 607s Default principal: testuser1@EXAMPLE.COMautopkgtest [03:41:21]: test ldap-user-group-krb5-auth: -----------------------] 607s autopkgtest [03:41:21]: test ldap-user-group-krb5-auth: - - - - - - - - - - results - - - - - - - - - - 607s ldap-user-group-krb5-auth PASS 608s autopkgtest [03:41:22]: test sssd-softhism2-certificates-tests.sh: preparing testbed 725s autopkgtest [03:43:19]: testbed dpkg architecture: ppc64el 725s autopkgtest [03:43:19]: testbed apt version: 2.7.12 725s autopkgtest [03:43:19]: @@@@@@@@@@@@@@@@@@@@ test bed setup 726s Get:1 http://ftpmaster.internal/ubuntu noble-proposed InRelease [117 kB] 726s Get:2 http://ftpmaster.internal/ubuntu noble-proposed/multiverse Sources [52.6 kB] 727s Get:3 http://ftpmaster.internal/ubuntu noble-proposed/restricted Sources [6540 B] 727s Get:4 http://ftpmaster.internal/ubuntu noble-proposed/main Sources [486 kB] 727s Get:5 http://ftpmaster.internal/ubuntu noble-proposed/universe Sources [3756 kB] 728s Get:6 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el Packages [647 kB] 729s Get:7 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el c-n-f Metadata [3116 B] 729s Get:8 http://ftpmaster.internal/ubuntu noble-proposed/restricted ppc64el Packages [1372 B] 729s Get:9 http://ftpmaster.internal/ubuntu noble-proposed/restricted ppc64el c-n-f Metadata [116 B] 729s Get:10 http://ftpmaster.internal/ubuntu noble-proposed/universe ppc64el Packages [4027 kB] 730s Get:11 http://ftpmaster.internal/ubuntu noble-proposed/universe ppc64el c-n-f Metadata [8652 B] 730s Get:12 http://ftpmaster.internal/ubuntu noble-proposed/multiverse ppc64el Packages [47.3 kB] 730s Get:13 http://ftpmaster.internal/ubuntu noble-proposed/multiverse ppc64el c-n-f Metadata [116 B] 733s Fetched 9153 kB in 5s (1854 kB/s) 733s Reading package lists... 736s Reading package lists... 736s Building dependency tree... 736s Reading state information... 736s Calculating upgrade... 736s The following packages will be REMOVED: 736s libssl3 736s The following NEW packages will be installed: 736s libssl3t64 736s The following packages will be upgraded: 736s openssl sudo 736s 2 upgraded, 1 newly installed, 1 to remove and 0 not upgraded. 736s Need to get 4157 kB of archives. 736s After this operation, 77.8 kB of additional disk space will be used. 736s Get:1 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el sudo ppc64el 1.9.15p5-3ubuntu3 [1005 kB] 737s Get:2 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el openssl ppc64el 3.0.13-0ubuntu2 [1026 kB] 737s Get:3 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libssl3t64 ppc64el 3.0.13-0ubuntu2 [2125 kB] 738s Fetched 4157 kB in 1s (2866 kB/s) 738s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 70095 files and directories currently installed.) 738s Preparing to unpack .../sudo_1.9.15p5-3ubuntu3_ppc64el.deb ... 738s Unpacking sudo (1.9.15p5-3ubuntu3) over (1.9.15p5-3ubuntu1) ... 738s Preparing to unpack .../openssl_3.0.13-0ubuntu2_ppc64el.deb ... 738s Unpacking openssl (3.0.13-0ubuntu2) over (3.0.10-1ubuntu4) ... 738s dpkg: libssl3:ppc64el: dependency problems, but removing anyway as you requested: 738s wget depends on libssl3 (>= 3.0.0). 738s tnftp depends on libssl3 (>= 3.0.0). 738s tcpdump depends on libssl3 (>= 3.0.0). 738s systemd-resolved depends on libssl3 (>= 3.0.0). 738s systemd depends on libssl3 (>= 3.0.0). 738s rsync depends on libssl3 (>= 3.0.0). 738s python3-cryptography depends on libssl3 (>= 3.0.0). 738s openssh-server depends on libssl3 (>= 3.0.10). 738s openssh-client depends on libssl3 (>= 3.0.10). 738s linux-headers-6.8.0-11-generic depends on libssl3 (>= 3.0.0). 738s libsystemd-shared:ppc64el depends on libssl3 (>= 3.0.0). 738s libssh-4:ppc64el depends on libssl3 (>= 3.0.0). 738s libsasl2-modules:ppc64el depends on libssl3 (>= 3.0.0). 738s libsasl2-2:ppc64el depends on libssl3 (>= 3.0.0). 738s libpython3.12-minimal:ppc64el depends on libssl3 (>= 3.0.0). 738s libpython3.11-minimal:ppc64el depends on libssl3 (>= 3.0.0). 738s libnvme1 depends on libssl3 (>= 3.0.0). 738s libkrb5-3:ppc64el depends on libssl3 (>= 3.0.0). 738s libkmod2:ppc64el depends on libssl3 (>= 3.0.0). 738s libfido2-1:ppc64el depends on libssl3 (>= 3.0.0). 738s libcurl4:ppc64el depends on libssl3 (>= 3.0.0). 738s libcryptsetup12:ppc64el depends on libssl3 (>= 3.0.0). 738s kmod depends on libssl3 (>= 3.0.0). 738s dhcpcd-base depends on libssl3 (>= 3.0.0). 738s bind9-libs:ppc64el depends on libssl3 (>= 3.0.0). 738s 738s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 70095 files and directories currently installed.) 738s Removing libssl3:ppc64el (3.0.10-1ubuntu4) ... 738s Selecting previously unselected package libssl3t64:ppc64el. 738s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 70084 files and directories currently installed.) 738s Preparing to unpack .../libssl3t64_3.0.13-0ubuntu2_ppc64el.deb ... 738s Unpacking libssl3t64:ppc64el (3.0.13-0ubuntu2) ... 738s Setting up libssl3t64:ppc64el (3.0.13-0ubuntu2) ... 738s Setting up sudo (1.9.15p5-3ubuntu3) ... 738s Setting up openssl (3.0.13-0ubuntu2) ... 738s Processing triggers for man-db (2.12.0-3) ... 739s Processing triggers for libc-bin (2.39-0ubuntu2) ... 739s Reading package lists... 740s Building dependency tree... 740s Reading state information... 740s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 740s Hit:1 http://ftpmaster.internal/ubuntu noble-proposed InRelease 740s Hit:2 http://ftpmaster.internal/ubuntu noble InRelease 740s Hit:3 http://ftpmaster.internal/ubuntu noble-updates InRelease 740s Hit:4 http://ftpmaster.internal/ubuntu noble-security InRelease 742s Reading package lists... 742s Reading package lists... 742s Building dependency tree... 742s Reading state information... 742s Calculating upgrade... 742s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 742s Reading package lists... 742s Building dependency tree... 742s Reading state information... 743s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 743s autopkgtest [03:43:37]: rebooting testbed after setup commands that affected boot 908s autopkgtest-virt-ssh: WARNING: ssh connection failed. Retrying in 3 seconds... 919s Reading package lists... 919s Building dependency tree... 919s Reading state information... 919s Starting pkgProblemResolver with broken count: 0 919s Starting 2 pkgProblemResolver with broken count: 0 919s Done 919s The following additional packages will be installed: 919s gnutls-bin libavahi-client3 libavahi-common-data libavahi-common3 919s libbasicobjects0 libc-ares2 libcollection4 libcrack2 libdhash1 919s libevent-2.1-7 libgnutls-dane0 libini-config5 libipa-hbac0 libldb2 919s libnfsidmap1 libnss-sss libpam-pwquality libpam-sss libpath-utils1 919s libpwquality-common libpwquality1 libref-array1 libsmbclient libsofthsm2 919s libsss-certmap0 libsss-idmap0 libsss-nss-idmap0 libtalloc2 libtdb1 919s libtevent0 libunbound8 libwbclient0 python3-sss samba-libs softhsm2 919s softhsm2-common sssd sssd-ad sssd-ad-common sssd-common sssd-ipa sssd-krb5 919s sssd-krb5-common sssd-ldap sssd-proxy 919s Suggested packages: 919s dns-root-data adcli libsss-sudo sssd-tools libsasl2-modules-ldap 919s Recommended packages: 919s cracklib-runtime libsasl2-modules-gssapi-mit 919s | libsasl2-modules-gssapi-heimdal ldap-utils 919s The following NEW packages will be installed: 919s autopkgtest-satdep gnutls-bin libavahi-client3 libavahi-common-data 919s libavahi-common3 libbasicobjects0 libc-ares2 libcollection4 libcrack2 919s libdhash1 libevent-2.1-7 libgnutls-dane0 libini-config5 libipa-hbac0 libldb2 919s libnfsidmap1 libnss-sss libpam-pwquality libpam-sss libpath-utils1 919s libpwquality-common libpwquality1 libref-array1 libsmbclient libsofthsm2 919s libsss-certmap0 libsss-idmap0 libsss-nss-idmap0 libtalloc2 libtdb1 919s libtevent0 libunbound8 libwbclient0 python3-sss samba-libs softhsm2 919s softhsm2-common sssd sssd-ad sssd-ad-common sssd-common sssd-ipa sssd-krb5 919s sssd-krb5-common sssd-ldap sssd-proxy 919s 0 upgraded, 46 newly installed, 0 to remove and 0 not upgraded. 919s Need to get 11.4 MB/11.4 MB of archives. 919s After this operation, 56.9 MB of additional disk space will be used. 919s Get:1 /tmp/autopkgtest.8eyYB7/3-autopkgtest-satdep.deb autopkgtest-satdep ppc64el 0 [752 B] 919s Get:2 http://ftpmaster.internal/ubuntu noble/main ppc64el libevent-2.1-7 ppc64el 2.1.12-stable-9 [169 kB] 920s Get:3 http://ftpmaster.internal/ubuntu noble/main ppc64el libunbound8 ppc64el 1.19.1-1ubuntu1 [537 kB] 920s Get:4 http://ftpmaster.internal/ubuntu noble/main ppc64el libgnutls-dane0 ppc64el 3.8.3-1ubuntu1 [24.5 kB] 920s Get:5 http://ftpmaster.internal/ubuntu noble/universe ppc64el gnutls-bin ppc64el 3.8.3-1ubuntu1 [290 kB] 920s Get:6 http://ftpmaster.internal/ubuntu noble/main ppc64el libavahi-common-data ppc64el 0.8-13ubuntu2 [29.5 kB] 920s Get:7 http://ftpmaster.internal/ubuntu noble/main ppc64el libavahi-common3 ppc64el 0.8-13ubuntu2 [25.8 kB] 920s Get:8 http://ftpmaster.internal/ubuntu noble/main ppc64el libavahi-client3 ppc64el 0.8-13ubuntu2 [30.6 kB] 920s Get:9 http://ftpmaster.internal/ubuntu noble/main ppc64el libcrack2 ppc64el 2.9.6-5.1 [30.9 kB] 920s Get:10 http://ftpmaster.internal/ubuntu noble/main ppc64el libtalloc2 ppc64el 2.4.2-1 [36.6 kB] 920s Get:11 http://ftpmaster.internal/ubuntu noble/main ppc64el libtdb1 ppc64el 1.4.10-1 [62.7 kB] 920s Get:12 http://ftpmaster.internal/ubuntu noble/main ppc64el libtevent0 ppc64el 0.16.1-1 [50.8 kB] 920s Get:13 http://ftpmaster.internal/ubuntu noble/main ppc64el libldb2 ppc64el 2:2.8.0+samba4.19.5+dfsg-1ubuntu1 [219 kB] 920s Get:14 http://ftpmaster.internal/ubuntu noble/main ppc64el libnfsidmap1 ppc64el 1:2.6.3-3ubuntu1 [53.0 kB] 920s Get:15 http://ftpmaster.internal/ubuntu noble/main ppc64el libpwquality-common all 1.4.5-3 [7658 B] 920s Get:16 http://ftpmaster.internal/ubuntu noble/main ppc64el libpwquality1 ppc64el 1.4.5-3 [16.9 kB] 920s Get:17 http://ftpmaster.internal/ubuntu noble/main ppc64el libpam-pwquality ppc64el 1.4.5-3 [12.5 kB] 920s Get:18 http://ftpmaster.internal/ubuntu noble/main ppc64el libwbclient0 ppc64el 2:4.19.5+dfsg-1ubuntu1 [76.5 kB] 920s Get:19 http://ftpmaster.internal/ubuntu noble/main ppc64el samba-libs ppc64el 2:4.19.5+dfsg-1ubuntu1 [6674 kB] 921s Get:20 http://ftpmaster.internal/ubuntu noble/universe ppc64el softhsm2-common ppc64el 2.6.1-2.2 [5810 B] 921s Get:21 http://ftpmaster.internal/ubuntu noble/universe ppc64el libsofthsm2 ppc64el 2.6.1-2.2 [294 kB] 921s Get:22 http://ftpmaster.internal/ubuntu noble/universe ppc64el softhsm2 ppc64el 2.6.1-2.2 [196 kB] 921s Get:23 http://ftpmaster.internal/ubuntu noble/main ppc64el python3-sss ppc64el 2.9.4-1ubuntu1 [48.0 kB] 921s Get:24 http://ftpmaster.internal/ubuntu noble/main ppc64el libsss-idmap0 ppc64el 2.9.4-1ubuntu1 [24.7 kB] 921s Get:25 http://ftpmaster.internal/ubuntu noble/main ppc64el libnss-sss ppc64el 2.9.4-1ubuntu1 [36.3 kB] 921s Get:26 http://ftpmaster.internal/ubuntu noble/main ppc64el libpam-sss ppc64el 2.9.4-1ubuntu1 [56.4 kB] 921s Get:27 http://ftpmaster.internal/ubuntu noble/main ppc64el libc-ares2 ppc64el 1.27.0-1 [99.0 kB] 921s Get:28 http://ftpmaster.internal/ubuntu noble/main ppc64el libdhash1 ppc64el 0.6.2-2 [9830 B] 921s Get:29 http://ftpmaster.internal/ubuntu noble/main ppc64el libbasicobjects0 ppc64el 0.6.2-2 [5806 B] 921s Get:30 http://ftpmaster.internal/ubuntu noble/main ppc64el libcollection4 ppc64el 0.6.2-2 [35.3 kB] 921s Get:31 http://ftpmaster.internal/ubuntu noble/main ppc64el libpath-utils1 ppc64el 0.6.2-2 [10.2 kB] 921s Get:32 http://ftpmaster.internal/ubuntu noble/main ppc64el libref-array1 ppc64el 0.6.2-2 [7724 B] 921s Get:33 http://ftpmaster.internal/ubuntu noble/main ppc64el libini-config5 ppc64el 0.6.2-2 [53.9 kB] 921s Get:34 http://ftpmaster.internal/ubuntu noble/main ppc64el libsss-certmap0 ppc64el 2.9.4-1ubuntu1 [53.6 kB] 921s Get:35 http://ftpmaster.internal/ubuntu noble/main ppc64el libsss-nss-idmap0 ppc64el 2.9.4-1ubuntu1 [37.4 kB] 921s Get:36 http://ftpmaster.internal/ubuntu noble/main ppc64el sssd-common ppc64el 2.9.4-1ubuntu1 [1280 kB] 922s Get:37 http://ftpmaster.internal/ubuntu noble/main ppc64el sssd-ad-common ppc64el 2.9.4-1ubuntu1 [88.6 kB] 922s Get:38 http://ftpmaster.internal/ubuntu noble/main ppc64el sssd-krb5-common ppc64el 2.9.4-1ubuntu1 [103 kB] 922s Get:39 http://ftpmaster.internal/ubuntu noble/main ppc64el libsmbclient ppc64el 2:4.19.5+dfsg-1ubuntu1 [70.4 kB] 922s Get:40 http://ftpmaster.internal/ubuntu noble/main ppc64el sssd-ad ppc64el 2.9.4-1ubuntu1 [147 kB] 922s Get:41 http://ftpmaster.internal/ubuntu noble/main ppc64el libipa-hbac0 ppc64el 2.9.4-1ubuntu1 [17.4 kB] 922s Get:42 http://ftpmaster.internal/ubuntu noble/main ppc64el sssd-ipa ppc64el 2.9.4-1ubuntu1 [240 kB] 922s Get:43 http://ftpmaster.internal/ubuntu noble/main ppc64el sssd-krb5 ppc64el 2.9.4-1ubuntu1 [14.4 kB] 922s Get:44 http://ftpmaster.internal/ubuntu noble/main ppc64el sssd-ldap ppc64el 2.9.4-1ubuntu1 [31.6 kB] 922s Get:45 http://ftpmaster.internal/ubuntu noble/main ppc64el sssd-proxy ppc64el 2.9.4-1ubuntu1 [48.0 kB] 922s Get:46 http://ftpmaster.internal/ubuntu noble/main ppc64el sssd ppc64el 2.9.4-1ubuntu1 [4124 B] 922s Fetched 11.4 MB in 2s (4915 kB/s) 922s Selecting previously unselected package libevent-2.1-7:ppc64el. 922s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 70097 files and directories currently installed.) 922s Preparing to unpack .../00-libevent-2.1-7_2.1.12-stable-9_ppc64el.deb ... 922s Unpacking libevent-2.1-7:ppc64el (2.1.12-stable-9) ... 922s Selecting previously unselected package libunbound8:ppc64el. 922s Preparing to unpack .../01-libunbound8_1.19.1-1ubuntu1_ppc64el.deb ... 922s Unpacking libunbound8:ppc64el (1.19.1-1ubuntu1) ... 922s Selecting previously unselected package libgnutls-dane0:ppc64el. 922s Preparing to unpack .../02-libgnutls-dane0_3.8.3-1ubuntu1_ppc64el.deb ... 922s Unpacking libgnutls-dane0:ppc64el (3.8.3-1ubuntu1) ... 922s Selecting previously unselected package gnutls-bin. 922s Preparing to unpack .../03-gnutls-bin_3.8.3-1ubuntu1_ppc64el.deb ... 922s Unpacking gnutls-bin (3.8.3-1ubuntu1) ... 922s Selecting previously unselected package libavahi-common-data:ppc64el. 922s Preparing to unpack .../04-libavahi-common-data_0.8-13ubuntu2_ppc64el.deb ... 922s Unpacking libavahi-common-data:ppc64el (0.8-13ubuntu2) ... 922s Selecting previously unselected package libavahi-common3:ppc64el. 922s Preparing to unpack .../05-libavahi-common3_0.8-13ubuntu2_ppc64el.deb ... 922s Unpacking libavahi-common3:ppc64el (0.8-13ubuntu2) ... 922s Selecting previously unselected package libavahi-client3:ppc64el. 922s Preparing to unpack .../06-libavahi-client3_0.8-13ubuntu2_ppc64el.deb ... 922s Unpacking libavahi-client3:ppc64el (0.8-13ubuntu2) ... 922s Selecting previously unselected package libcrack2:ppc64el. 922s Preparing to unpack .../07-libcrack2_2.9.6-5.1_ppc64el.deb ... 922s Unpacking libcrack2:ppc64el (2.9.6-5.1) ... 922s Selecting previously unselected package libtalloc2:ppc64el. 922s Preparing to unpack .../08-libtalloc2_2.4.2-1_ppc64el.deb ... 922s Unpacking libtalloc2:ppc64el (2.4.2-1) ... 922s Selecting previously unselected package libtdb1:ppc64el. 922s Preparing to unpack .../09-libtdb1_1.4.10-1_ppc64el.deb ... 922s Unpacking libtdb1:ppc64el (1.4.10-1) ... 922s Selecting previously unselected package libtevent0:ppc64el. 922s Preparing to unpack .../10-libtevent0_0.16.1-1_ppc64el.deb ... 922s Unpacking libtevent0:ppc64el (0.16.1-1) ... 922s Selecting previously unselected package libldb2:ppc64el. 922s Preparing to unpack .../11-libldb2_2%3a2.8.0+samba4.19.5+dfsg-1ubuntu1_ppc64el.deb ... 922s Unpacking libldb2:ppc64el (2:2.8.0+samba4.19.5+dfsg-1ubuntu1) ... 922s Selecting previously unselected package libnfsidmap1:ppc64el. 922s Preparing to unpack .../12-libnfsidmap1_1%3a2.6.3-3ubuntu1_ppc64el.deb ... 922s Unpacking libnfsidmap1:ppc64el (1:2.6.3-3ubuntu1) ... 922s Selecting previously unselected package libpwquality-common. 922s Preparing to unpack .../13-libpwquality-common_1.4.5-3_all.deb ... 922s Unpacking libpwquality-common (1.4.5-3) ... 922s Selecting previously unselected package libpwquality1:ppc64el. 922s Preparing to unpack .../14-libpwquality1_1.4.5-3_ppc64el.deb ... 922s Unpacking libpwquality1:ppc64el (1.4.5-3) ... 922s Selecting previously unselected package libpam-pwquality:ppc64el. 922s Preparing to unpack .../15-libpam-pwquality_1.4.5-3_ppc64el.deb ... 922s Unpacking libpam-pwquality:ppc64el (1.4.5-3) ... 922s Selecting previously unselected package libwbclient0:ppc64el. 922s Preparing to unpack .../16-libwbclient0_2%3a4.19.5+dfsg-1ubuntu1_ppc64el.deb ... 922s Unpacking libwbclient0:ppc64el (2:4.19.5+dfsg-1ubuntu1) ... 922s Selecting previously unselected package samba-libs:ppc64el. 922s Preparing to unpack .../17-samba-libs_2%3a4.19.5+dfsg-1ubuntu1_ppc64el.deb ... 922s Unpacking samba-libs:ppc64el (2:4.19.5+dfsg-1ubuntu1) ... 923s Selecting previously unselected package softhsm2-common. 923s Preparing to unpack .../18-softhsm2-common_2.6.1-2.2_ppc64el.deb ... 923s Unpacking softhsm2-common (2.6.1-2.2) ... 923s Selecting previously unselected package libsofthsm2. 923s Preparing to unpack .../19-libsofthsm2_2.6.1-2.2_ppc64el.deb ... 923s Unpacking libsofthsm2 (2.6.1-2.2) ... 923s Selecting previously unselected package softhsm2. 923s Preparing to unpack .../20-softhsm2_2.6.1-2.2_ppc64el.deb ... 923s Unpacking softhsm2 (2.6.1-2.2) ... 923s Selecting previously unselected package python3-sss. 923s Preparing to unpack .../21-python3-sss_2.9.4-1ubuntu1_ppc64el.deb ... 923s Unpacking python3-sss (2.9.4-1ubuntu1) ... 923s Selecting previously unselected package libsss-idmap0. 923s Preparing to unpack .../22-libsss-idmap0_2.9.4-1ubuntu1_ppc64el.deb ... 923s Unpacking libsss-idmap0 (2.9.4-1ubuntu1) ... 923s Selecting previously unselected package libnss-sss:ppc64el. 923s Preparing to unpack .../23-libnss-sss_2.9.4-1ubuntu1_ppc64el.deb ... 923s Unpacking libnss-sss:ppc64el (2.9.4-1ubuntu1) ... 923s Selecting previously unselected package libpam-sss:ppc64el. 923s Preparing to unpack .../24-libpam-sss_2.9.4-1ubuntu1_ppc64el.deb ... 923s Unpacking libpam-sss:ppc64el (2.9.4-1ubuntu1) ... 923s Selecting previously unselected package libc-ares2:ppc64el. 923s Preparing to unpack .../25-libc-ares2_1.27.0-1_ppc64el.deb ... 923s Unpacking libc-ares2:ppc64el (1.27.0-1) ... 923s Selecting previously unselected package libdhash1:ppc64el. 923s Preparing to unpack .../26-libdhash1_0.6.2-2_ppc64el.deb ... 923s Unpacking libdhash1:ppc64el (0.6.2-2) ... 923s Selecting previously unselected package libbasicobjects0:ppc64el. 923s Preparing to unpack .../27-libbasicobjects0_0.6.2-2_ppc64el.deb ... 923s Unpacking libbasicobjects0:ppc64el (0.6.2-2) ... 923s Selecting previously unselected package libcollection4:ppc64el. 923s Preparing to unpack .../28-libcollection4_0.6.2-2_ppc64el.deb ... 923s Unpacking libcollection4:ppc64el (0.6.2-2) ... 923s Selecting previously unselected package libpath-utils1:ppc64el. 923s Preparing to unpack .../29-libpath-utils1_0.6.2-2_ppc64el.deb ... 923s Unpacking libpath-utils1:ppc64el (0.6.2-2) ... 923s Selecting previously unselected package libref-array1:ppc64el. 923s Preparing to unpack .../30-libref-array1_0.6.2-2_ppc64el.deb ... 923s Unpacking libref-array1:ppc64el (0.6.2-2) ... 923s Selecting previously unselected package libini-config5:ppc64el. 923s Preparing to unpack .../31-libini-config5_0.6.2-2_ppc64el.deb ... 923s Unpacking libini-config5:ppc64el (0.6.2-2) ... 923s Selecting previously unselected package libsss-certmap0. 923s Preparing to unpack .../32-libsss-certmap0_2.9.4-1ubuntu1_ppc64el.deb ... 923s Unpacking libsss-certmap0 (2.9.4-1ubuntu1) ... 923s Selecting previously unselected package libsss-nss-idmap0. 923s Preparing to unpack .../33-libsss-nss-idmap0_2.9.4-1ubuntu1_ppc64el.deb ... 923s Unpacking libsss-nss-idmap0 (2.9.4-1ubuntu1) ... 923s Selecting previously unselected package sssd-common. 923s Preparing to unpack .../34-sssd-common_2.9.4-1ubuntu1_ppc64el.deb ... 923s Unpacking sssd-common (2.9.4-1ubuntu1) ... 923s Selecting previously unselected package sssd-ad-common. 923s Preparing to unpack .../35-sssd-ad-common_2.9.4-1ubuntu1_ppc64el.deb ... 923s Unpacking sssd-ad-common (2.9.4-1ubuntu1) ... 923s Selecting previously unselected package sssd-krb5-common. 923s Preparing to unpack .../36-sssd-krb5-common_2.9.4-1ubuntu1_ppc64el.deb ... 923s Unpacking sssd-krb5-common (2.9.4-1ubuntu1) ... 923s Selecting previously unselected package libsmbclient:ppc64el. 923s Preparing to unpack .../37-libsmbclient_2%3a4.19.5+dfsg-1ubuntu1_ppc64el.deb ... 923s Unpacking libsmbclient:ppc64el (2:4.19.5+dfsg-1ubuntu1) ... 923s Selecting previously unselected package sssd-ad. 923s Preparing to unpack .../38-sssd-ad_2.9.4-1ubuntu1_ppc64el.deb ... 923s Unpacking sssd-ad (2.9.4-1ubuntu1) ... 923s Selecting previously unselected package libipa-hbac0. 923s Preparing to unpack .../39-libipa-hbac0_2.9.4-1ubuntu1_ppc64el.deb ... 923s Unpacking libipa-hbac0 (2.9.4-1ubuntu1) ... 923s Selecting previously unselected package sssd-ipa. 923s Preparing to unpack .../40-sssd-ipa_2.9.4-1ubuntu1_ppc64el.deb ... 923s Unpacking sssd-ipa (2.9.4-1ubuntu1) ... 923s Selecting previously unselected package sssd-krb5. 923s Preparing to unpack .../41-sssd-krb5_2.9.4-1ubuntu1_ppc64el.deb ... 923s Unpacking sssd-krb5 (2.9.4-1ubuntu1) ... 923s Selecting previously unselected package sssd-ldap. 923s Preparing to unpack .../42-sssd-ldap_2.9.4-1ubuntu1_ppc64el.deb ... 923s Unpacking sssd-ldap (2.9.4-1ubuntu1) ... 923s Selecting previously unselected package sssd-proxy. 923s Preparing to unpack .../43-sssd-proxy_2.9.4-1ubuntu1_ppc64el.deb ... 923s Unpacking sssd-proxy (2.9.4-1ubuntu1) ... 923s Selecting previously unselected package sssd. 923s Preparing to unpack .../44-sssd_2.9.4-1ubuntu1_ppc64el.deb ... 923s Unpacking sssd (2.9.4-1ubuntu1) ... 923s Selecting previously unselected package autopkgtest-satdep. 923s Preparing to unpack .../45-3-autopkgtest-satdep.deb ... 923s Unpacking autopkgtest-satdep (0) ... 923s Setting up libpwquality-common (1.4.5-3) ... 923s Setting up libpath-utils1:ppc64el (0.6.2-2) ... 923s Setting up softhsm2-common (2.6.1-2.2) ... 923s 923s Creating config file /etc/softhsm/softhsm2.conf with new version 923s Setting up libnfsidmap1:ppc64el (1:2.6.3-3ubuntu1) ... 923s Setting up libsss-idmap0 (2.9.4-1ubuntu1) ... 923s Setting up libbasicobjects0:ppc64el (0.6.2-2) ... 923s Setting up libtdb1:ppc64el (1.4.10-1) ... 923s Setting up libc-ares2:ppc64el (1.27.0-1) ... 923s Setting up libwbclient0:ppc64el (2:4.19.5+dfsg-1ubuntu1) ... 923s Setting up libtalloc2:ppc64el (2.4.2-1) ... 923s Setting up libdhash1:ppc64el (0.6.2-2) ... 923s Setting up libtevent0:ppc64el (0.16.1-1) ... 923s Setting up libavahi-common-data:ppc64el (0.8-13ubuntu2) ... 923s Setting up libevent-2.1-7:ppc64el (2.1.12-stable-9) ... 923s Setting up libcrack2:ppc64el (2.9.6-5.1) ... 923s Setting up libcollection4:ppc64el (0.6.2-2) ... 923s Setting up libipa-hbac0 (2.9.4-1ubuntu1) ... 923s Setting up libref-array1:ppc64el (0.6.2-2) ... 923s Setting up libldb2:ppc64el (2:2.8.0+samba4.19.5+dfsg-1ubuntu1) ... 923s Setting up libsss-nss-idmap0 (2.9.4-1ubuntu1) ... 923s Setting up libnss-sss:ppc64el (2.9.4-1ubuntu1) ... 923s Setting up libsofthsm2 (2.6.1-2.2) ... 923s Setting up softhsm2 (2.6.1-2.2) ... 923s Setting up libini-config5:ppc64el (0.6.2-2) ... 923s Setting up libavahi-common3:ppc64el (0.8-13ubuntu2) ... 923s Setting up python3-sss (2.9.4-1ubuntu1) ... 923s Setting up libsss-certmap0 (2.9.4-1ubuntu1) ... 923s Setting up libunbound8:ppc64el (1.19.1-1ubuntu1) ... 923s Setting up libpwquality1:ppc64el (1.4.5-3) ... 923s Setting up libavahi-client3:ppc64el (0.8-13ubuntu2) ... 923s Setting up libgnutls-dane0:ppc64el (3.8.3-1ubuntu1) ... 923s Setting up libpam-pwquality:ppc64el (1.4.5-3) ... 924s Setting up samba-libs:ppc64el (2:4.19.5+dfsg-1ubuntu1) ... 924s Setting up libsmbclient:ppc64el (2:4.19.5+dfsg-1ubuntu1) ... 924s Setting up libpam-sss:ppc64el (2.9.4-1ubuntu1) ... 924s Setting up gnutls-bin (3.8.3-1ubuntu1) ... 924s Setting up sssd-common (2.9.4-1ubuntu1) ... 924s Creating SSSD system user & group... 924s warn: The home directory `/var/lib/sss' already exists. Not touching this directory. 924s warn: Warning: The home directory `/var/lib/sss' does not belong to the user you are currently creating. 924s Warning: found usr.sbin.sssd in /etc/apparmor.d/force-complain, forcing complain mode 924s Warning from /etc/apparmor.d/usr.sbin.sssd (/etc/apparmor.d/usr.sbin.sssd line 63): Caching disabled for: 'usr.sbin.sssd' due to force complain 924s Created symlink /etc/systemd/system/sssd.service.wants/sssd-autofs.socket → /usr/lib/systemd/system/sssd-autofs.socket. 925s Created symlink /etc/systemd/system/sssd.service.wants/sssd-nss.socket → /usr/lib/systemd/system/sssd-nss.socket. 925s Created symlink /etc/systemd/system/sssd.service.wants/sssd-pam-priv.socket → /usr/lib/systemd/system/sssd-pam-priv.socket. 925s Created symlink /etc/systemd/system/sssd.service.wants/sssd-pam.socket → /usr/lib/systemd/system/sssd-pam.socket. 925s Created symlink /etc/systemd/system/sssd.service.wants/sssd-ssh.socket → /usr/lib/systemd/system/sssd-ssh.socket. 926s Created symlink /etc/systemd/system/sssd.service.wants/sssd-sudo.socket → /usr/lib/systemd/system/sssd-sudo.socket. 926s Created symlink /etc/systemd/system/multi-user.target.wants/sssd.service → /usr/lib/systemd/system/sssd.service. 926s sssd-autofs.service is a disabled or a static unit, not starting it. 926s sssd-nss.service is a disabled or a static unit, not starting it. 926s sssd-pam.service is a disabled or a static unit, not starting it. 926s sssd-ssh.service is a disabled or a static unit, not starting it. 926s sssd-sudo.service is a disabled or a static unit, not starting it. 926s Could not execute systemctl: at /usr/bin/deb-systemd-invoke line 148. 926s Setting up sssd-proxy (2.9.4-1ubuntu1) ... 926s Setting up sssd-ad-common (2.9.4-1ubuntu1) ... 926s Created symlink /etc/systemd/system/sssd.service.wants/sssd-pac.socket → /usr/lib/systemd/system/sssd-pac.socket. 927s sssd-pac.service is a disabled or a static unit, not starting it. 927s Could not execute systemctl: at /usr/bin/deb-systemd-invoke line 148. 927s Setting up sssd-krb5-common (2.9.4-1ubuntu1) ... 927s Setting up sssd-krb5 (2.9.4-1ubuntu1) ... 927s Setting up sssd-ldap (2.9.4-1ubuntu1) ... 927s Setting up sssd-ad (2.9.4-1ubuntu1) ... 927s Setting up sssd-ipa (2.9.4-1ubuntu1) ... 927s Setting up sssd (2.9.4-1ubuntu1) ... 927s Setting up autopkgtest-satdep (0) ... 927s Processing triggers for man-db (2.12.0-3) ... 928s Processing triggers for libc-bin (2.39-0ubuntu2) ... 931s (Reading database ... 70685 files and directories currently installed.) 931s Removing autopkgtest-satdep (0) ... 955s autopkgtest [03:47:09]: test sssd-softhism2-certificates-tests.sh: [----------------------- 956s + '[' -z ubuntu ']' 956s + required_tools=(p11tool openssl softhsm2-util) 956s + for cmd in "${required_tools[@]}" 956s + command -v p11tool 956s + for cmd in "${required_tools[@]}" 956s + command -v openssl 956s + for cmd in "${required_tools[@]}" 956s + command -v softhsm2-util 956s + PIN=053350 956s +++ find /usr/lib/softhsm/libsofthsm2.so 956s +++ head -n 1 956s ++ realpath /usr/lib/softhsm/libsofthsm2.so 956s + SOFTHSM2_MODULE=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so 956s + SSSD_P11_CHILD=/usr/libexec/sssd/p11_child 956s + TOKEN_ID=00112233445566778899FFAABBCCDDEEFF012345 956s + '[' '!' -v NO_SSSD_TESTS ']' 956s + '[' '!' -x /usr/libexec/sssd/p11_child ']' 956s + ca_db_arg=ca_db 956s ++ /usr/libexec/sssd/p11_child --help 956s + p11_child_help='Usage: p11_child [OPTION...] 956s -d, --debug-level=INT Debug level 956s --debug-timestamps=INT Add debug timestamps 956s --debug-microseconds=INT Show timestamps with microseconds 956s --dumpable=INT Allow core dumps 956s --debug-fd=INT An open file descriptor for the debug 956s logs 956s --logger=stderr|files|journald Set logger 956s --auth Run in auth mode 956s --pre Run in pre-auth mode 956s --wait_for_card Wait until card is available 956s --verification Run in verification mode 956s --pin Expect PIN on stdin 956s --keypad Expect PIN on keypad 956s --verify=STRING Tune validation 956s --ca_db=STRING CA DB to use 956s --module_name=STRING Module name for authentication 956s --token_name=STRING Token name for authentication 956s --key_id=STRING Key ID for authentication 956s --label=STRING Label for authentication 956s --certificate=STRING certificate to verify, base64 encoded 956s --uri=STRING PKCS#11 URI to restrict selection 956s --chain-id=LONG Tevent chain ID used for logging 956s purposes 956s 956s Help options: 956s -?, --help Show this help message 956s --usage Display brief usage message' 956s + echo 'Usage: p11_child [OPTION...] 956s -d, --debug-level=INT Debug level 956s --debug-timestamps=INT Add debug timestamps 956s --debug-microseconds=INT Show timestamps with microseconds 956s --dumpable=INT Allow core dumps 956s --debug-fd=INT An open file descriptor for the debug 956s logs 956s --logger=stderr|files|journald Set logger 956s --auth Run in auth mode 956s --pre Run in pre-auth mode 956s --wait_for_card Wait until card is available 956s --verification Run in verification mode 956s --pin Expect PIN on stdin 956s --keypad Expect PIN on keypad 956s --verify=STRING Tune validation 956s --ca_db=STRING CA DB to use 956s --module_name=STRING Module name for authentication 956s --token_name=STRING Token name for authentication 956s --key_id=STRING Key ID for authentication 956s --label=STRING Label for authentication 956s --certificate=STRING certificate to verify, base64 encoded 956s --uri=STRING PKCS#11 URI to restrict selection 956s --chain-id=LONG Tevent chain ID used for logging 956s purposes 956s 956s Help options: 956s -?, --help Show this help message 956s --usage Display brief usage message' 956s + grep nssdb -qs 956s + echo 'Usage: p11_child [OPTION...] 956s -d, --debug-level=INT Debug level 956s + grep -qs -- --ca_db 956s --debug-timestamps=INT Add debug timestamps 956s --debug-microseconds=INT Show timestamps with microseconds 956s --dumpable=INT Allow core dumps 956s --debug-fd=INT An open file descriptor for the debug 956s logs 956s --logger=stderr|files|journald Set logger 956s --auth Run in auth mode 956s --pre Run in pre-auth mode 956s --wait_for_card Wait until card is available 956s --verification Run in verification mode 956s --pin Expect PIN on stdin 956s --keypad Expect PIN on keypad 956s --verify=STRING Tune validation 956s --ca_db=STRING CA DB to use 956s --module_name=STRING Module name for authentication 956s --token_name=STRING Token name for authentication 956s --key_id=STRING Key ID for authentication 956s --label=STRING Label for authentication 956s --certificate=STRING certificate to verify, base64 encoded 956s --uri=STRING PKCS#11 URI to restrict selection 956s --chain-id=LONG Tevent chain ID used for logging 956s purposes 956s 956s Help options: 956s -?, --help Show this help message 956s --usage Display brief usage message' 956s + '[' '!' -e /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so ']' 956s ++ mktemp -d -t sssd-softhsm2-XXXXXX 956s + tmpdir=/tmp/sssd-softhsm2-B0ev2A 956s + keys_size=1024 956s + [[ ! -v KEEP_TEMPORARY_FILES ]] 956s + trap 'rm -rf "$tmpdir"' EXIT 956s + trap 'set +x; echo -e "\nUnexpected failure!!!"' ERR 956s + echo -n 01 956s + touch /tmp/sssd-softhsm2-B0ev2A/index.txt 956s + mkdir -p /tmp/sssd-softhsm2-B0ev2A/new_certs 956s + cat 956s + root_ca_key_pass=pass:random-root-CA-password-10763 956s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-B0ev2A/test-root-CA-key.pem -passout pass:random-root-CA-password-10763 1024 956s + openssl req -passin pass:random-root-CA-password-10763 -batch -config /tmp/sssd-softhsm2-B0ev2A/test-root-CA.config -x509 -new -nodes -key /tmp/sssd-softhsm2-B0ev2A/test-root-CA-key.pem -sha256 -days 1024 -set_serial 0 -extensions v3_ca -out /tmp/sssd-softhsm2-B0ev2A/test-root-CA.pem 956s + openssl x509 -noout -in /tmp/sssd-softhsm2-B0ev2A/test-root-CA.pem 956s + cat 956s + intermediate_ca_key_pass=pass:random-intermediate-CA-password-2768 956s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA-key.pem -passout pass:random-intermediate-CA-password-2768 1024 956s + openssl req -batch -new -nodes -passin pass:random-intermediate-CA-password-2768 -config /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA.config -key /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA-key.pem -passout pass:random-root-CA-password-10763 -sha256 -extensions v3_ca -out /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA-certificate-request.pem 956s + openssl req -text -noout -in /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA-certificate-request.pem 956s Certificate Request: 956s Data: 956s Version: 1 (0x0) 956s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 956s Subject Public Key Info: 956s Public Key Algorithm: rsaEncryption 956s Public-Key: (1024 bit) 956s Modulus: 956s 00:c0:8a:9b:18:5f:c6:d0:47:69:ec:e3:5e:8a:01: 956s 27:81:7e:c9:2b:c7:14:72:b9:4a:1e:40:31:7b:ed: 956s ed:45:af:69:cf:be:0f:ad:54:93:d4:06:6a:c0:72: 956s 5f:fd:fa:fc:43:3d:6d:1f:e9:ad:cb:5d:aa:79:aa: 956s f0:16:a5:db:6b:9c:8f:0b:48:32:5b:93:f0:6b:b1: 956s 18:79:a4:c0:c4:ac:00:bd:30:49:50:0a:79:fb:b1: 956s 71:aa:78:7e:5d:17:84:50:95:5c:db:62:d4:6f:07: 956s 29:14:46:34:04:9e:57:bb:3d:6a:7a:16:e7:1c:a9: 956s 22:6e:9a:60:42:50:ba:d2:93 956s Exponent: 65537 (0x10001) 956s Attributes: 956s (none) 956s Requested Extensions: 956s Signature Algorithm: sha256WithRSAEncryption 956s Signature Value: 956s b4:b7:b1:45:5c:1c:bc:cc:55:e9:73:35:f2:29:0f:28:44:3e: 956s 5b:20:57:04:46:49:13:1a:21:56:a9:c8:6b:67:97:52:d9:d8: 956s f6:b6:45:19:6a:14:25:0a:4e:6c:c6:23:bb:a9:fd:a6:95:5a: 956s 8b:05:3d:62:17:51:12:50:13:c7:13:00:c4:f3:5e:27:74:cd: 956s 60:82:bd:64:cd:41:26:6d:38:b5:00:64:34:b1:dc:8a:f5:a8: 956s a3:06:ee:e9:10:81:0c:94:3c:34:8a:35:8f:e1:f3:23:14:ee: 956s 82:6e:28:4b:7c:96:99:4d:ee:04:1e:d4:4f:8e:a4:d2:16:db: 956s 76:a2 956s + openssl ca -batch -notext -config /tmp/sssd-softhsm2-B0ev2A/test-root-CA.config -passin pass:random-root-CA-password-10763 -keyfile /tmp/sssd-softhsm2-B0ev2A/test-root-CA-key.pem -in /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA-certificate-request.pem -days 365 -extensions v3_intermediate_ca -out /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA.pem 956s Using configuration from /tmp/sssd-softhsm2-B0ev2A/test-root-CA.config 956s Check that the request matches the signature 956s Signature ok 956s Certificate Details: 956s Serial Number: 1 (0x1) 956s Validity 956s Not Before: Mar 19 03:47:10 2024 GMT 956s Not After : Mar 19 03:47:10 2025 GMT 956s Subject: 956s organizationName = Test Organization 956s organizationalUnitName = Test Organization Unit 956s commonName = Test Organization Intermediate CA 956s X509v3 extensions: 956s X509v3 Subject Key Identifier: 956s 62:4F:49:22:11:B5:A7:07:13:13:BA:5B:1B:1D:C1:D8:59:4B:DD:A7 956s X509v3 Authority Key Identifier: 956s keyid:57:F2:E4:45:7F:23:3A:7C:85:E8:94:AC:83:03:F0:FC:EF:44:E0:7C 956s DirName:/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root CA 956s serial:00 956s X509v3 Basic Constraints: 956s CA:TRUE 956s X509v3 Key Usage: critical 956s Digital Signature, Certificate Sign, CRL Sign 956s Certificate is to be certified until Mar 19 03:47:10 2025 GMT (365 days) 956s 956s Write out database with 1 new entries 956s Database updated 956s + openssl x509 -noout -in /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA.pem 956s + openssl verify -CAfile /tmp/sssd-softhsm2-B0ev2A/test-root-CA.pem /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA.pem 956s /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA.pem: OK 956s + cat 956s + sub_intermediate_ca_key_pass=pass:random-sub-intermediate-CA-password-14689 956s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-key.pem -passout pass:random-sub-intermediate-CA-password-14689 1024 956s + openssl req -batch -new -nodes -passin pass:random-sub-intermediate-CA-password-14689 -config /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA.config -key /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-key.pem -passout pass:random-intermediate-CA-password-2768 -sha256 -extensions v3_ca -out /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-certificate-request.pem 956s + openssl req -text -noout -in /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-certificate-request.pem 956s Certificate Request: 956s Data: 956s Version: 1 (0x0) 956s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 956s Subject Public Key Info: 956s Public Key Algorithm: rsaEncryption 956s Public-Key: (1024 bit) 956s Modulus: 956s 00:db:26:67:58:15:6b:fb:26:d6:19:88:dc:5f:8f: 956s 28:68:20:47:b2:ee:69:2f:4b:e3:c1:56:f2:57:c8: 956s 2a:e3:1e:73:59:71:49:91:f3:b5:12:1e:55:44:7f: 956s 70:ce:4b:9c:91:fa:d2:14:81:37:27:ae:a3:bd:55: 956s 45:83:78:c0:40:a0:0d:a7:c7:8e:80:50:f3:e7:b7: 956s 27:65:d2:7b:48:3b:e7:44:b1:49:2c:87:03:e1:3f: 956s 02:94:07:f6:3b:31:45:67:80:97:73:f9:1c:f8:20: 956s 1d:24:29:1f:50:62:4e:1c:8a:42:33:7b:d3:3d:2c: 956s 96:48:37:11:50:cb:d5:67:23 956s Exponent: 65537 (0x10001) 956s Attributes: 956s (none) 956s Requested Extensions: 956s Signature Algorithm: sha256WithRSAEncryption 956s Signature Value: 956s 9c:1c:a7:2c:7a:01:43:d3:3d:b8:38:f3:a1:b6:1b:05:96:c4: 956s b6:99:45:f6:39:7f:1b:13:d0:39:76:af:86:03:ff:7b:97:71: 956s fd:51:bf:a2:82:20:4f:a5:b6:15:01:76:8f:81:e0:41:59:2e: 956s 72:5a:52:4c:b8:c0:32:84:64:c0:f2:eb:fc:78:8a:52:dd:29: 956s 89:82:2b:68:77:a4:d5:e4:a0:a4:c8:8b:37:23:26:38:3e:6c: 956s e7:6c:e2:45:3d:cf:20:c7:4f:f3:5b:14:11:db:fb:a9:23:4c: 956s 26:4c:d7:ae:e7:d3:75:fc:fe:ad:9c:10:20:8c:cc:e8:c1:4e: 956s 9e:af 956s + openssl ca -batch -notext -config /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA.config -passin pass:random-intermediate-CA-password-2768 -keyfile /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA-key.pem -in /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-certificate-request.pem -days 365 -extensions v3_intermediate_ca -out /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA.pem 956s Using configuration from /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA.config 956s Check that the request matches the signature 956s Signature ok 956s Certificate Details: 956s Serial Number: 2 (0x2) 956s Validity 956s Not Before: Mar 19 03:47:10 2024 GMT 956s Not After : Mar 19 03:47:10 2025 GMT 956s Subject: 956s organizationName = Test Organization 956s organizationalUnitName = Test Organization Unit 956s commonName = Test Organization Sub Intermediate CA 956s X509v3 extensions: 956s X509v3 Subject Key Identifier: 956s 21:AE:84:EF:FC:52:0F:30:AB:5B:F0:FC:4F:D1:4B:26:86:97:9B:AF 956s X509v3 Authority Key Identifier: 956s keyid:62:4F:49:22:11:B5:A7:07:13:13:BA:5B:1B:1D:C1:D8:59:4B:DD:A7 956s DirName:/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root CA 956s serial:01 956s X509v3 Basic Constraints: 956s CA:TRUE 956s X509v3 Key Usage: critical 956s Digital Signature, Certificate Sign, CRL Sign 956s Certificate is to be certified until Mar 19 03:47:10 2025 GMT (365 days) 956s 956s Write out database with 1 new entries 956s Database updated 956s + openssl x509 -noout -in /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA.pem 956s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA.pem /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA.pem 956s /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA.pem: OK 956s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-B0ev2A/test-root-CA.pem /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA.pem 956s + local cmd=openssl 956s + shift 956s + openssl verify -CAfile /tmp/sssd-softhsm2-B0ev2A/test-root-CA.pem /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA.pem 956s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 956s error 20 at 0 depth lookup: unable to get local issuer certificate 956s error /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA.pem: verification failed 956s + cat 956s + root_ca_trusted_cert_0001_key_pass=pass:random-root-ca-trusted-cert-0001-9634 956s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-B0ev2A/test-root-CA-trusted-certificate-0001-key.pem -passout pass:random-root-ca-trusted-cert-0001-9634 1024 956s + openssl req -new -nodes -reqexts req_exts -passin pass:random-root-ca-trusted-cert-0001-9634 -key /tmp/sssd-softhsm2-B0ev2A/test-root-CA-trusted-certificate-0001-key.pem -config /tmp/sssd-softhsm2-B0ev2A/test-root-CA-trusted-certificate-0001.config -out /tmp/sssd-softhsm2-B0ev2A/test-root-CA-trusted-certificate-0001-request.pem 956s + openssl req -text -noout -in /tmp/sssd-softhsm2-B0ev2A/test-root-CA-trusted-certificate-0001-request.pem 956s Certificate Request: 956s Data: 956s Version: 1 (0x0) 956s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 956s Subject Public Key Info: 956s Public Key Algorithm: rsaEncryption 956s Public-Key: (1024 bit) 956s Modulus: 956s 00:c6:9b:17:fe:69:bd:6e:67:e7:3f:c1:93:9a:a6: 956s 1d:f4:72:ef:51:55:47:7d:f9:f6:2e:f0:7e:af:0e: 956s 37:ef:3c:f0:9f:72:ae:b2:f1:8c:14:b7:ff:35:1c: 956s f4:eb:8a:6f:29:12:2a:7c:6d:d4:3c:77:6d:3b:ad: 956s aa:4e:00:fb:c8:01:42:52:55:a1:70:1f:db:75:ac: 956s 70:ef:c4:2d:d3:d3:e6:db:20:0b:7b:dd:47:d2:93: 956s e5:7b:82:dd:68:e9:fb:f1:17:64:86:0a:58:27:a2: 956s 6d:44:53:f8:fd:52:e8:28:67:b1:76:ff:18:1c:93: 956s 9a:02:a6:0b:ea:cc:ef:e4:17 956s Exponent: 65537 (0x10001) 956s Attributes: 956s Requested Extensions: 956s X509v3 Basic Constraints: 956s CA:FALSE 956s Netscape Cert Type: 956s SSL Client, S/MIME 956s Netscape Comment: 956s Test Organization Root CA trusted Certificate 956s X509v3 Subject Key Identifier: 956s 32:4D:11:24:1F:D3:F6:AF:91:26:DD:EB:7F:22:A5:C9:C8:73:69:0D 956s X509v3 Key Usage: critical 956s Digital Signature, Non Repudiation, Key Encipherment 956s X509v3 Extended Key Usage: 956s TLS Web Client Authentication, E-mail Protection 956s X509v3 Subject Alternative Name: 956s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 956s Signature Algorithm: sha256WithRSAEncryption 956s Signature Value: 956s 94:74:d9:75:1d:bf:10:3d:90:88:40:d4:27:9c:9e:2d:f5:d2: 956s a0:24:94:71:24:c5:b2:af:91:8d:20:93:1d:63:01:49:3f:04: 956s 0b:d2:2d:78:14:72:9c:70:d5:7a:df:a1:c3:de:d0:07:fd:b0: 956s 71:4d:09:14:c1:91:6d:c9:58:bd:a4:d1:18:8e:8e:09:6a:9a: 956s 74:39:e4:68:2c:f9:b5:9e:11:f4:84:f2:11:03:9b:24:03:be: 956s 04:b8:74:73:4c:04:85:ab:93:a3:aa:a3:54:45:d3:d2:61:cf: 956s 50:46:d6:ed:0c:d3:d2:4b:fa:05:e5:a9:ed:d6:a1:35:c8:6a: 956s 3d:46 956s + openssl ca -batch -notext -config /tmp/sssd-softhsm2-B0ev2A/test-root-CA.config -passin pass:random-root-CA-password-10763 -keyfile /tmp/sssd-softhsm2-B0ev2A/test-root-CA-key.pem -in /tmp/sssd-softhsm2-B0ev2A/test-root-CA-trusted-certificate-0001-request.pem -days 365 -extensions usr_cert -out /tmp/sssd-softhsm2-B0ev2A/test-root-CA-trusted-certificate-0001.pem 956s Using configuration from /tmp/sssd-softhsm2-B0ev2A/test-root-CA.config 956s Check that the request matches the signature 956s Signature ok 956s Certificate Details: 956s Serial Number: 3 (0x3) 956s Validity 956s Not Before: Mar 19 03:47:10 2024 GMT 956s Not After : Mar 19 03:47:10 2025 GMT 956s Subject: 956s organizationName = Test Organization 956s organizationalUnitName = Test Organization Unit 956s commonName = Test Organization Root Trusted Certificate 0001 956s X509v3 extensions: 956s X509v3 Authority Key Identifier: 956s 57:F2:E4:45:7F:23:3A:7C:85:E8:94:AC:83:03:F0:FC:EF:44:E0:7C 956s X509v3 Basic Constraints: 956s CA:FALSE 956s Netscape Cert Type: 956s SSL Client, S/MIME 956s Netscape Comment: 956s Test Organization Root CA trusted Certificate 956s X509v3 Subject Key Identifier: 956s 32:4D:11:24:1F:D3:F6:AF:91:26:DD:EB:7F:22:A5:C9:C8:73:69:0D 956s X509v3 Key Usage: critical 956s Digital Signature, Non Repudiation, Key Encipherment 956s X509v3 Extended Key Usage: 956s TLS Web Client Authentication, E-mail Protection 956s X509v3 Subject Alternative Name: 956s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 956s Certificate is to be certified until Mar 19 03:47:10 2025 GMT (365 days) 956s 956s Write out database with 1 new entries 956s Database updated 956s + openssl x509 -noout -in /tmp/sssd-softhsm2-B0ev2A/test-root-CA-trusted-certificate-0001.pem 956s + openssl verify -CAfile /tmp/sssd-softhsm2-B0ev2A/test-root-CA.pem /tmp/sssd-softhsm2-B0ev2A/test-root-CA-trusted-certificate-0001.pem 956s /tmp/sssd-softhsm2-B0ev2A/test-root-CA-trusted-certificate-0001.pem: OK 956s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA.pem /tmp/sssd-softhsm2-B0ev2A/test-root-CA-trusted-certificate-0001.pem 956s + local cmd=openssl 956s + shift 956s + openssl verify -CAfile /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA.pem /tmp/sssd-softhsm2-B0ev2A/test-root-CA-trusted-certificate-0001.pem 956s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 956s error 20 at 0 depth lookup: unable to get local issuer certificate 956s error /tmp/sssd-softhsm2-B0ev2A/test-root-CA-trusted-certificate-0001.pem: verification failed 956s + cat 956s + intermediate_ca_trusted_cert_0001_key_pass=pass:random-intermediate-ca-trusted-cert-0001-30933 956s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA-trusted-certificate-0001-key.pem -passout pass:random-intermediate-ca-trusted-cert-0001-30933 1024 956s + openssl req -new -nodes -reqexts req_exts -passin pass:random-intermediate-ca-trusted-cert-0001-30933 -key /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA-trusted-certificate-0001-key.pem -config /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA-trusted-certificate-0001.config -out /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA-trusted-certificate-0001-request.pem 956s + openssl req -text -noout -in /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA-trusted-certificate-0001-request.pem 956s + openssl ca -passin pass:random-intermediate-CA-password-2768 -config /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA.config -batch -notext -keyfile /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA-key.pem -in /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA-trusted-certificate-0001-request.pem -days 365 -extensions usr_cert -out /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA-trusted-certificate-0001.pem 956s Certificate Request: 956s Data: 956s Version: 1 (0x0) 956s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 956s Subject Public Key Info: 956s Public Key Algorithm: rsaEncryption 956s Public-Key: (1024 bit) 956s Modulus: 956s 00:c6:9d:d7:67:87:f7:25:d3:a2:77:a4:cf:c2:9b: 956s 31:96:18:4d:70:4c:60:11:31:ef:e6:b6:01:06:47: 956s 17:0e:d0:32:fb:4f:11:47:1d:41:72:a7:84:ba:70: 956s e3:3f:a5:2e:1c:ea:ea:1f:fa:d8:d4:6a:2d:3f:d2: 956s 1a:ab:73:bc:bb:5c:bf:5b:57:df:67:03:0c:1c:bf: 956s 02:0f:74:83:78:14:c6:e0:ee:10:6f:58:be:3a:5a: 956s 0d:f1:a2:a1:d2:12:e9:65:f0:73:25:39:52:d8:3e: 956s dc:35:fe:64:46:5f:0b:44:d1:91:a7:84:b2:6b:cf: 956s dc:51:a6:b0:1e:67:b3:53:ff 956s Exponent: 65537 (0x10001) 956s Attributes: 956s Requested Extensions: 956s X509v3 Basic Constraints: 956s CA:FALSE 956s Netscape Cert Type: 956s SSL Client, S/MIME 956s Netscape Comment: 956s Test Organization Intermediate CA trusted Certificate 956s X509v3 Subject Key Identifier: 956s 41:F1:25:22:FC:6F:8A:D6:0D:8F:12:D6:CB:30:6B:76:69:F1:BC:42 956s X509v3 Key Usage: critical 956s Digital Signature, Non Repudiation, Key Encipherment 956s X509v3 Extended Key Usage: 956s TLS Web Client Authentication, E-mail Protection 956s X509v3 Subject Alternative Name: 956s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 956s Signature Algorithm: sha256WithRSAEncryption 956s Signature Value: 956s 68:a0:06:49:53:f3:23:e6:70:09:cd:a8:8c:95:14:67:b1:7b: 956s b1:12:65:dd:dc:0c:61:35:c5:2b:c9:45:e6:a6:e4:ea:8e:ba: 956s 19:7c:37:f1:a2:c6:43:5a:bf:2a:a2:57:d4:07:03:80:81:8a: 956s 92:f1:6a:46:0a:2d:bc:00:12:2a:41:80:6b:2a:14:af:f4:d3: 956s 81:36:7d:90:7f:1c:8c:46:98:82:cd:ba:6b:99:b4:82:5d:19: 956s 4a:84:13:8e:f3:a3:54:30:4d:96:cd:e2:87:68:4c:d7:f3:de: 956s 93:83:e8:7e:d3:bc:70:07:c8:4d:01:e1:e0:78:e0:0d:40:0c: 956s 4e:fc 956s Using configuration from /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA.config 956s Check that the request matches the signature 956s Signature ok 956s Certificate Details: 956s Serial Number: 4 (0x4) 956s Validity 956s Not Before: Mar 19 03:47:10 2024 GMT 956s Not After : Mar 19 03:47:10 2025 GMT 956s Subject: 956s organizationName = Test Organization 956s organizationalUnitName = Test Organization Unit 956s commonName = Test Organization Intermediate Trusted Certificate 0001 956s X509v3 extensions: 956s X509v3 Authority Key Identifier: 956s 62:4F:49:22:11:B5:A7:07:13:13:BA:5B:1B:1D:C1:D8:59:4B:DD:A7 956s X509v3 Basic Constraints: 956s CA:FALSE 956s Netscape Cert Type: 956s SSL Client, S/MIME 956s Netscape Comment: 956s Test Organization Intermediate CA trusted Certificate 956s X509v3 Subject Key Identifier: 956s 41:F1:25:22:FC:6F:8A:D6:0D:8F:12:D6:CB:30:6B:76:69:F1:BC:42 956s X509v3 Key Usage: critical 956s Digital Signature, Non Repudiation, Key Encipherment 956s X509v3 Extended Key Usage: 956s TLS Web Client Authentication, E-mail Protection 956s X509v3 Subject Alternative Name: 956s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 956s Certificate is to be certified until Mar 19 03:47:10 2025 GMT (365 days) 956s 956s Write out database with 1 new entries 956s Database updated 956s + openssl x509 -noout -in /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA-trusted-certificate-0001.pem 956s This certificate should not be trusted fully 956s + echo 'This certificate should not be trusted fully' 956s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA.pem /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA-trusted-certificate-0001.pem 956s + local cmd=openssl 956s + shift 956s + openssl verify -CAfile /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA.pem /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA-trusted-certificate-0001.pem 956s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 956s error 2 at 1 depth lookup: unable to get issuer certificate 956s error /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA-trusted-certificate-0001.pem: verification failed 956s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA.pem /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA-trusted-certificate-0001.pem 956s /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA-trusted-certificate-0001.pem: OK 956s + cat 956s + sub_intermediate_ca_trusted_cert_0001_key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-8222 956s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-trusted-certificate-0001-key.pem -passout pass:random-sub-intermediate-ca-trusted-cert-0001-8222 1024 956s + openssl req -new -nodes -reqexts req_exts -passin pass:random-sub-intermediate-ca-trusted-cert-0001-8222 -key /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-trusted-certificate-0001-key.pem -config /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-trusted-certificate-0001.config -out /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-trusted-certificate-0001-request.pem 956s + openssl req -text -noout -in /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-trusted-certificate-0001-request.pem 956s Certificate Request: 956s Data: 956s Version: 1 (0x0) 956s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 956s Subject Public Key Info: 956s Public Key Algorithm: rsaEncryption 956s Public-Key: (1024 bit) 956s Modulus: 956s 00:f6:ed:4c:61:46:8f:37:83:a0:61:59:04:06:b8: 956s 15:46:47:bd:71:9a:0a:bd:50:44:11:69:7b:3d:22: 956s ee:af:51:4e:e8:45:cd:e9:da:4c:80:9c:0b:c2:09: 956s 34:38:2e:7c:86:89:f9:f5:79:58:58:ea:7e:85:19: 956s b2:32:b6:76:63:c3:0b:66:2d:1e:58:e3:5b:00:eb: 956s e3:78:69:1c:4c:ec:33:02:12:d8:82:14:d1:3b:dd: 956s 96:9b:ba:a9:c0:b2:98:89:51:dd:48:66:0d:de:63: 956s 9e:fb:26:48:7b:fd:d8:50:2f:1a:1d:47:db:d5:51: 956s d9:2b:08:84:d8:d3:20:a1:fd 956s Exponent: 65537 (0x10001) 956s Attributes: 956s Requested Extensions: 956s X509v3 Basic Constraints: 956s CA:FALSE 956s Netscape Cert Type: 956s SSL Client, S/MIME 956s Netscape Comment: 956s Test Organization Sub Intermediate CA trusted Certificate 956s X509v3 Subject Key Identifier: 956s 18:F3:50:B5:A5:EE:AC:F4:7D:3A:3E:95:56:1E:7D:CB:E6:0B:CE:0C 956s X509v3 Key Usage: critical 956s Digital Signature, Non Repudiation, Key Encipherment 956s X509v3 Extended Key Usage: 956s TLS Web Client Authentication, E-mail Protection 956s X509v3 Subject Alternative Name: 956s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 956s Signature Algorithm: sha256WithRSAEncryption 956s Signature Value: 956s 22:85:4c:64:1e:98:94:16:4d:fa:fb:85:68:8b:ee:fb:69:25: 956s a3:d7:0e:35:cb:6f:89:11:ba:01:4a:99:88:17:34:57:e2:16: 956s f1:fb:23:bb:f9:83:36:b5:f1:0e:77:af:5a:62:43:14:90:89: 956s 0d:df:17:f7:10:ea:5c:a8:7e:99:49:5d:ff:36:81:39:51:3a: 956s 21:e3:19:a7:5a:b8:a5:4a:1d:16:cd:d1:05:77:de:20:bd:1d: 956s 7b:62:02:92:8e:a4:4b:fc:b4:3b:90:13:7c:14:d5:c6:08:da: 956s 14:11:b9:84:da:e2:c1:06:8b:2f:ec:db:6e:7a:76:fd:bf:34: 956s d7:5b 956s + openssl ca -passin pass:random-sub-intermediate-CA-password-14689 -config /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA.config -batch -notext -keyfile /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-key.pem -in /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-trusted-certificate-0001-request.pem -days 365 -extensions usr_cert -out /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-trusted-certificate-0001.pem 956s Using configuration from /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA.config 956s Check that the request matches the signature 956s Signature ok 956s Certificate Details: 956s Serial Number: 5 (0x5) 956s Validity 956s Not Before: Mar 19 03:47:10 2024 GMT 956s Not After : Mar 19 03:47:10 2025 GMT 956s Subject: 956s organizationName = Test Organization 956s organizationalUnitName = Test Organization Unit 956s commonName = Test Organization Sub Intermediate Trusted Certificate 0001 956s X509v3 extensions: 956s X509v3 Authority Key Identifier: 956s 21:AE:84:EF:FC:52:0F:30:AB:5B:F0:FC:4F:D1:4B:26:86:97:9B:AF 956s X509v3 Basic Constraints: 956s CA:FALSE 956s Netscape Cert Type: 956s SSL Client, S/MIME 956s Netscape Comment: 956s Test Organization Sub Intermediate CA trusted Certificate 956s X509v3 Subject Key Identifier: 956s 18:F3:50:B5:A5:EE:AC:F4:7D:3A:3E:95:56:1E:7D:CB:E6:0B:CE:0C 956s X509v3 Key Usage: critical 956s Digital Signature, Non Repudiation, Key Encipherment 956s X509v3 Extended Key Usage: 956s TLS Web Client Authentication, E-mail Protection 956s X509v3 Subject Alternative Name: 956s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 956s Certificate is to be certified until Mar 19 03:47:10 2025 GMT (365 days) 956s 956s Write out database with 1 new entries 956s Database updated 956s + openssl x509 -noout -in /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-trusted-certificate-0001.pem 956s + echo 'This certificate should not be trusted fully' 956s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA.pem /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-trusted-certificate-0001.pem 956s This certificate should not be trusted fully 956s + local cmd=openssl 956s + shift 956s + openssl verify -CAfile /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA.pem /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-trusted-certificate-0001.pem 956s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 956s error 2 at 1 depth lookup: unable to get issuer certificate 956s error /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-trusted-certificate-0001.pem: verification failed 956s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA.pem /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-trusted-certificate-0001.pem 956s + local cmd=openssl 956s + shift 956s + openssl verify -CAfile /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA.pem /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-trusted-certificate-0001.pem 956s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 956s error 20 at 0 depth lookup: unable to get local issuer certificate 956s error /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-trusted-certificate-0001.pem: verification failed 956s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA.pem /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-trusted-certificate-0001.pem 956s /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-trusted-certificate-0001.pem: OK 956s + expect_fail openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA.pem /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-trusted-certificate-0001.pem 956s + local cmd=openssl 956s + shift 956s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA.pem /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-trusted-certificate-0001.pem 956s Building a the full-chain CA file... 956s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 956s error 20 at 0 depth lookup: unable to get local issuer certificate 956s error /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-trusted-certificate-0001.pem: verification failed 956s + echo 'Building a the full-chain CA file...' 956s + cat /tmp/sssd-softhsm2-B0ev2A/test-root-CA.pem /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA.pem /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA.pem 956s + cat /tmp/sssd-softhsm2-B0ev2A/test-root-CA.pem /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA.pem 956s + cat /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA.pem /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA.pem 956s + openssl crl2pkcs7 -nocrl -certfile /tmp/sssd-softhsm2-B0ev2A/test-full-chain-CA.pem 956s + openssl pkcs7 -print_certs -noout 956s subject=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 956s issuer=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 956s 956s subject=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 956s issuer=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 956s 956s subject=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 956s issuer=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 956s 956s + openssl verify -CAfile /tmp/sssd-softhsm2-B0ev2A/test-full-chain-CA.pem /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA.pem 956s /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA.pem: OK 956s + openssl verify -CAfile /tmp/sssd-softhsm2-B0ev2A/test-full-chain-CA.pem /tmp/sssd-softhsm2-B0ev2A/test-root-CA-trusted-certificate-0001.pem 956s /tmp/sssd-softhsm2-B0ev2A/test-root-CA-trusted-certificate-0001.pem: OK 956s + openssl verify -CAfile /tmp/sssd-softhsm2-B0ev2A/test-full-chain-CA.pem /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA-trusted-certificate-0001.pem 956s /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA-trusted-certificate-0001.pem: OK 956s /tmp/sssd-softhsm2-B0ev2A/test-root-intermediate-chain-CA.pem: OK 956s + openssl verify -CAfile /tmp/sssd-softhsm2-B0ev2A/test-full-chain-CA.pem /tmp/sssd-softhsm2-B0ev2A/test-root-intermediate-chain-CA.pem 956s + openssl verify -CAfile /tmp/sssd-softhsm2-B0ev2A/test-full-chain-CA.pem /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-trusted-certificate-0001.pem 956s /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-trusted-certificate-0001.pem: OK 956s Certificates generation completed! 956s + echo 'Certificates generation completed!' 956s + [[ -v NO_SSSD_TESTS ]] 956s + invalid_certificate /tmp/sssd-softhsm2-B0ev2A/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-9634 /dev/null 956s + check_certificate /tmp/sssd-softhsm2-B0ev2A/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-9634 /dev/null 956s + local certificate=/tmp/sssd-softhsm2-B0ev2A/test-root-CA-trusted-certificate-0001.pem 956s + local key_pass=pass:random-root-ca-trusted-cert-0001-9634 956s + local key_ring=/dev/null 956s + local verify_option= 956s + prepare_softhsm2_card /tmp/sssd-softhsm2-B0ev2A/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-9634 956s + local certificate=/tmp/sssd-softhsm2-B0ev2A/test-root-CA-trusted-certificate-0001.pem 956s + local key_pass=pass:random-root-ca-trusted-cert-0001-9634 956s + local key_cn 956s + local key_name 956s + local tokens_dir 956s + local output_cert_file 956s + token_name= 956s ++ basename /tmp/sssd-softhsm2-B0ev2A/test-root-CA-trusted-certificate-0001.pem .pem 956s + key_name=test-root-CA-trusted-certificate-0001 956s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-B0ev2A/test-root-CA-trusted-certificate-0001.pem 956s ++ sed -n 's/ *commonName *= //p' 956s + key_cn='Test Organization Root Trusted Certificate 0001' 956s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 956s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-B0ev2A/softhsm2-test-root-CA-trusted-certificate-0001.conf 956s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-B0ev2A/softhsm2-test-root-CA-trusted-certificate-0001.conf 956s ++ basename /tmp/sssd-softhsm2-B0ev2A/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 956s + tokens_dir=/tmp/sssd-softhsm2-B0ev2A/softhsm2-test-root-CA-trusted-certificate-0001 956s + token_name='Test Organization Root Tr Token' 956s + '[' '!' -e /tmp/sssd-softhsm2-B0ev2A/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 956s + local key_file 956s + local decrypted_key 956s + mkdir -p /tmp/sssd-softhsm2-B0ev2A/softhsm2-test-root-CA-trusted-certificate-0001 956s + key_file=/tmp/sssd-softhsm2-B0ev2A/test-root-CA-trusted-certificate-0001-key.pem 956s + decrypted_key=/tmp/sssd-softhsm2-B0ev2A/test-root-CA-trusted-certificate-0001-key-decrypted.pem 956s + cat 956s + softhsm2-util --init-token --label 'Test Organization Root Tr Token' --pin 053350 --so-pin 053350 --free 956s Slot 0 has a free/uninitialized token. 956s The token has been initialized and is reassigned to slot 256416348 956s + softhsm2-util --show-slots 956s Available slots: 956s Slot 256416348 956s Slot info: 956s Description: SoftHSM slot ID 0xf489a5c 956s Manufacturer ID: SoftHSM project 956s Hardware version: 2.6 956s Firmware version: 2.6 956s Token present: yes 956s Token info: 956s Manufacturer ID: SoftHSM project 956s Model: SoftHSM v2 956s Hardware version: 2.6 956s Firmware version: 2.6 956s Serial number: ee9e99110f489a5c 956s Initialized: yes 956s User PIN init.: yes 956s Label: Test Organization Root Tr Token 956s Slot 1 956s Slot info: 956s Description: SoftHSM slot ID 0x1 956s Manufacturer ID: SoftHSM project 956s Hardware version: 2.6 956s Firmware version: 2.6 956s Token present: yes 956s Token info: 956s Manufacturer ID: SoftHSM project 956s Model: SoftHSM v2 956s Hardware version: 2.6 956s Firmware version: 2.6 956s Serial number: 956s Initialized: no 956s User PIN init.: no 956s Label: 956s + p11tool --provider=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --write --no-mark-private --load-certificate=/tmp/sssd-softhsm2-B0ev2A/test-root-CA-trusted-certificate-0001.pem --login --set-pin=053350 --label 'Test Organization Root Trusted Certificate 0001' --id 00112233445566778899FFAABBCCDDEEFF012345 956s + openssl rsa -passin pass:random-root-ca-trusted-cert-0001-9634 -in /tmp/sssd-softhsm2-B0ev2A/test-root-CA-trusted-certificate-0001-key.pem -out /tmp/sssd-softhsm2-B0ev2A/test-root-CA-trusted-certificate-0001-key-decrypted.pem 956s writing RSA key 956s + p11tool --provider=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --write --load-privkey=/tmp/sssd-softhsm2-B0ev2A/test-root-CA-trusted-certificate-0001-key-decrypted.pem --login --set-pin=053350 --label 'Test Organization Root Trusted Certificate 0001 Key' --id 00112233445566778899FFAABBCCDDEEFF012345 956s + rm /tmp/sssd-softhsm2-B0ev2A/test-root-CA-trusted-certificate-0001-key-decrypted.pem 956s + p11tool --provider=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --list-all 956s Object 0: 956s URL: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=ee9e99110f489a5c;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert 956s Type: X.509 Certificate (RSA-1024) 956s Expires: Wed Mar 19 03:47:10 2025 956s Label: Test Organization Root Trusted Certificate 0001 956s ID: 00:11:22:33:44:55:66:77:88:99:ff:aa:bb:cc:dd:ee:ff:01:23:45 956s 956s Test Organization Root Tr Token 956s + echo 'Test Organization Root Tr Token' 956s + '[' -n '' ']' 956s + local output_base_name=SSSD-child-25250 956s + local output_file=/tmp/sssd-softhsm2-B0ev2A/SSSD-child-25250.output 956s + output_cert_file=/tmp/sssd-softhsm2-B0ev2A/SSSD-child-25250.pem 956s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/dev/null 956s [p11_child[2224]] [main] (0x0400): p11_child started. 956s [p11_child[2224]] [main] (0x2000): Running in [pre-auth] mode. 956s [p11_child[2224]] [main] (0x2000): Running with effective IDs: [0][0]. 956s [p11_child[2224]] [main] (0x2000): Running with real IDs [0][0]. 956s [p11_child[2224]] [init_verification] (0x0040): X509_LOOKUP_load_file [/dev/null] failed [92274824][error:05800088:x509 certificate routines::no certificate or crl found]. 956s [p11_child[2224]] [do_work] (0x0040): init_verification failed. 956s [p11_child[2224]] [main] (0x0020): p11_child failed (5) 956s + return 2 956s + valid_certificate /tmp/sssd-softhsm2-B0ev2A/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-9634 /dev/null no_verification 956s + check_certificate /tmp/sssd-softhsm2-B0ev2A/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-9634 /dev/null no_verification 956s + local certificate=/tmp/sssd-softhsm2-B0ev2A/test-root-CA-trusted-certificate-0001.pem 956s + local key_pass=pass:random-root-ca-trusted-cert-0001-9634 956s + local key_ring=/dev/null 956s + local verify_option=no_verification 956s + prepare_softhsm2_card /tmp/sssd-softhsm2-B0ev2A/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-9634 956s + local certificate=/tmp/sssd-softhsm2-B0ev2A/test-root-CA-trusted-certificate-0001.pem 956s + local key_pass=pass:random-root-ca-trusted-cert-0001-9634 956s + local key_cn 956s + local key_name 956s + local tokens_dir 956s + local output_cert_file 956s + token_name= 956s ++ basename /tmp/sssd-softhsm2-B0ev2A/test-root-CA-trusted-certificate-0001.pem .pem 956s + key_name=test-root-CA-trusted-certificate-0001 956s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-B0ev2A/test-root-CA-trusted-certificate-0001.pem 956s ++ sed -n 's/ *commonName *= //p' 956s + key_cn='Test Organization Root Trusted Certificate 0001' 956s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 956s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-B0ev2A/softhsm2-test-root-CA-trusted-certificate-0001.conf 956s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-B0ev2A/softhsm2-test-root-CA-trusted-certificate-0001.conf 956s ++ basename /tmp/sssd-softhsm2-B0ev2A/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 956s Test Organization Root Tr Token 956s + tokens_dir=/tmp/sssd-softhsm2-B0ev2A/softhsm2-test-root-CA-trusted-certificate-0001 956s + token_name='Test Organization Root Tr Token' 956s + '[' '!' -e /tmp/sssd-softhsm2-B0ev2A/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 956s + '[' '!' -d /tmp/sssd-softhsm2-B0ev2A/softhsm2-test-root-CA-trusted-certificate-0001 ']' 956s + echo 'Test Organization Root Tr Token' 956s + '[' -n no_verification ']' 956s + local verify_arg=--verify=no_verification 956s + local output_base_name=SSSD-child-32522 956s + local output_file=/tmp/sssd-softhsm2-B0ev2A/SSSD-child-32522.output 956s + output_cert_file=/tmp/sssd-softhsm2-B0ev2A/SSSD-child-32522.pem 956s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --verify=no_verification --ca_db=/dev/null 956s [p11_child[2230]] [main] (0x0400): p11_child started. 956s [p11_child[2230]] [main] (0x2000): Running in [pre-auth] mode. 956s [p11_child[2230]] [main] (0x2000): Running with effective IDs: [0][0]. 956s [p11_child[2230]] [main] (0x2000): Running with real IDs [0][0]. 956s [p11_child[2230]] [parse_cert_verify_opts] (0x0020): Found 'no_verification' option, disabling verification completely. This should not be used in production. 956s [p11_child[2230]] [do_card] (0x4000): Module List: 956s [p11_child[2230]] [do_card] (0x4000): common name: [softhsm2]. 956s [p11_child[2230]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 956s [p11_child[2230]] [do_card] (0x4000): Description [SoftHSM slot ID 0xf489a5c] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 956s [p11_child[2230]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 956s [p11_child[2230]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0xf489a5c][256416348] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 956s [p11_child[2230]] [do_card] (0x4000): Login NOT required. 956s [p11_child[2230]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 956s [p11_child[2230]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Root Tr Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 956s [p11_child[2230]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200xf489a5c;slot-manufacturer=SoftHSM%20project;slot-id=256416348;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=ee9e99110f489a5c;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 956s [p11_child[2230]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 956s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-B0ev2A/SSSD-child-32522.output 956s + echo '-----BEGIN CERTIFICATE-----' 956s + tail -n1 /tmp/sssd-softhsm2-B0ev2A/SSSD-child-32522.output 956s + echo '-----END CERTIFICATE-----' 956s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-B0ev2A/SSSD-child-32522.pem 957s Certificate: 957s Data: 957s Version: 3 (0x2) 957s Serial Number: 3 (0x3) 957s Signature Algorithm: sha256WithRSAEncryption 957s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 957s Validity 957s Not Before: Mar 19 03:47:10 2024 GMT 957s Not After : Mar 19 03:47:10 2025 GMT 957s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 957s Subject Public Key Info: 957s Public Key Algorithm: rsaEncryption 957s Public-Key: (1024 bit) 957s Modulus: 957s 00:c6:9b:17:fe:69:bd:6e:67:e7:3f:c1:93:9a:a6: 957s 1d:f4:72:ef:51:55:47:7d:f9:f6:2e:f0:7e:af:0e: 957s 37:ef:3c:f0:9f:72:ae:b2:f1:8c:14:b7:ff:35:1c: 957s f4:eb:8a:6f:29:12:2a:7c:6d:d4:3c:77:6d:3b:ad: 957s aa:4e:00:fb:c8:01:42:52:55:a1:70:1f:db:75:ac: 957s 70:ef:c4:2d:d3:d3:e6:db:20:0b:7b:dd:47:d2:93: 957s e5:7b:82:dd:68:e9:fb:f1:17:64:86:0a:58:27:a2: 957s 6d:44:53:f8:fd:52:e8:28:67:b1:76:ff:18:1c:93: 957s 9a:02:a6:0b:ea:cc:ef:e4:17 957s Exponent: 65537 (0x10001) 957s X509v3 extensions: 957s X509v3 Authority Key Identifier: 957s 57:F2:E4:45:7F:23:3A:7C:85:E8:94:AC:83:03:F0:FC:EF:44:E0:7C 957s X509v3 Basic Constraints: 957s CA:FALSE 957s Netscape Cert Type: 957s SSL Client, S/MIME 957s Netscape Comment: 957s Test Organization Root CA trusted Certificate 957s X509v3 Subject Key Identifier: 957s 32:4D:11:24:1F:D3:F6:AF:91:26:DD:EB:7F:22:A5:C9:C8:73:69:0D 957s X509v3 Key Usage: critical 957s Digital Signature, Non Repudiation, Key Encipherment 957s X509v3 Extended Key Usage: 957s TLS Web Client Authentication, E-mail Protection 957s X509v3 Subject Alternative Name: 957s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 957s Signature Algorithm: sha256WithRSAEncryption 957s Signature Value: 957s 09:54:48:7c:b8:fb:3d:f3:b5:24:bf:e2:14:5f:f4:4e:1c:05: 957s 7e:f9:1c:17:e9:13:aa:69:76:fe:a4:13:62:21:90:58:aa:18: 957s 30:a3:c1:8c:3c:1a:84:90:16:f9:8a:fc:d1:cc:d8:5d:81:d5: 957s 4a:63:49:bc:c5:3f:56:66:55:f7:80:80:d2:33:d8:aa:ce:2b: 957s 58:a0:c9:97:a0:b0:12:7c:60:6a:e5:a4:fb:6f:7f:95:c3:e9: 957s 9a:9f:0d:3d:8c:82:b2:6e:f8:ba:56:4e:27:7d:38:51:64:09: 957s 97:e0:e9:1d:5a:a2:6b:50:64:28:b9:be:de:81:a8:b9:2e:13: 957s cb:48 957s + local found_md5 expected_md5 957s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-B0ev2A/test-root-CA-trusted-certificate-0001.pem 957s Certificate: 957s Data: 957s Version: 3 (0x2) 957s Serial Number: 3 (0x3) 957s Signature Algorithm: sha256WithRSAEncryption 957s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 957s Validity 957s Not Before: Mar 19 03:47:10 2024 GMT 957s Not After : Mar 19 03:47:10 2025 GMT 957s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 957s Subject Public Key Info: 957s Public Key Algorithm: rsaEncryption 957s Public-Key: (1024 bit) 957s Modulus: 957s 00:c6:9b:17:fe:69:bd:6e:67:e7:3f:c1:93:9a:a6: 957s 1d:f4:72:ef:51:55:47:7d:f9:f6:2e:f0:7e:af:0e: 957s 37:ef:3c:f0:9f:72:ae:b2:f1:8c:14:b7:ff:35:1c: 957s f4:eb:8a:6f:29:12:2a:7c:6d:d4:3c:77:6d:3b:ad: 957s aa:4e:00:fb:c8:01:42:52:55:a1:70:1f:db:75:ac: 957s 70:ef:c4:2d:d3:d3:e6:db:20:0b:7b:dd:47:d2:93: 957s e5:7b:82:dd:68:e9:fb:f1:17:64:86:0a:58:27:a2: 957s 6d:44:53:f8:fd:52:e8:28:67:b1:76:ff:18:1c:93: 957s 9a:02:a6:0b:ea:cc:ef:e4:17 957s Exponent: 65537 (0x10001) 957s X509v3 extensions: 957s X509v3 Authority Key Identifier: 957s 57:F2:E4:45:7F:23:3A:7C:85:E8:94:AC:83:03:F0:FC:EF:44:E0:7C 957s X509v3 Basic Constraints: 957s CA:FALSE 957s Netscape Cert Type: 957s SSL Client, S/MIME 957s Netscape Comment: 957s Test Organization Root CA trusted Certificate 957s X509v3 Subject Key Identifier: 957s 32:4D:11:24:1F:D3:F6:AF:91:26:DD:EB:7F:22:A5:C9:C8:73:69:0D 957s X509v3 Key Usage: critical 957s Digital Signature, Non Repudiation, Key Encipherment 957s X509v3 Extended Key Usage: 957s TLS Web Client Authentication, E-mail Protection 957s X509v3 Subject Alternative Name: 957s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 957s Signature Algorithm: sha256WithRSAEncryption 957s Signature Value: 957s 09:54:48:7c:b8:fb:3d:f3:b5:24:bf:e2:14:5f:f4:4e:1c:05: 957s 7e:f9:1c:17:e9:13:aa:69:76:fe:a4:13:62:21:90:58:aa:18: 957s 30:a3:c1:8c:3c:1a:84:90:16:f9:8a:fc:d1:cc:d8:5d:81:d5: 957s 4a:63:49:bc:c5:3f:56:66:55:f7:80:80:d2:33:d8:aa:ce:2b: 957s 58:a0:c9:97:a0:b0:12:7c:60:6a:e5:a4:fb:6f:7f:95:c3:e9: 957s 9a:9f:0d:3d:8c:82:b2:6e:f8:ba:56:4e:27:7d:38:51:64:09: 957s 97:e0:e9:1d:5a:a2:6b:50:64:28:b9:be:de:81:a8:b9:2e:13: 957s cb:48 957s + expected_md5=Modulus=C69B17FE69BD6E67E73FC1939AA61DF472EF5155477DF9F62EF07EAF0E37EF3CF09F72AEB2F18C14B7FF351CF4EB8A6F29122A7C6DD43C776D3BADAA4E00FBC801425255A1701FDB75AC70EFC42DD3D3E6DB200B7BDD47D293E57B82DD68E9FBF11764860A5827A26D4453F8FD52E82867B176FF181C939A02A60BEACCEFE417 957s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-B0ev2A/SSSD-child-32522.pem 957s + found_md5=Modulus=C69B17FE69BD6E67E73FC1939AA61DF472EF5155477DF9F62EF07EAF0E37EF3CF09F72AEB2F18C14B7FF351CF4EB8A6F29122A7C6DD43C776D3BADAA4E00FBC801425255A1701FDB75AC70EFC42DD3D3E6DB200B7BDD47D293E57B82DD68E9FBF11764860A5827A26D4453F8FD52E82867B176FF181C939A02A60BEACCEFE417 957s + '[' Modulus=C69B17FE69BD6E67E73FC1939AA61DF472EF5155477DF9F62EF07EAF0E37EF3CF09F72AEB2F18C14B7FF351CF4EB8A6F29122A7C6DD43C776D3BADAA4E00FBC801425255A1701FDB75AC70EFC42DD3D3E6DB200B7BDD47D293E57B82DD68E9FBF11764860A5827A26D4453F8FD52E82867B176FF181C939A02A60BEACCEFE417 '!=' Modulus=C69B17FE69BD6E67E73FC1939AA61DF472EF5155477DF9F62EF07EAF0E37EF3CF09F72AEB2F18C14B7FF351CF4EB8A6F29122A7C6DD43C776D3BADAA4E00FBC801425255A1701FDB75AC70EFC42DD3D3E6DB200B7BDD47D293E57B82DD68E9FBF11764860A5827A26D4453F8FD52E82867B176FF181C939A02A60BEACCEFE417 ']' 957s + output_file=/tmp/sssd-softhsm2-B0ev2A/SSSD-child-32522-auth.output 957s ++ basename /tmp/sssd-softhsm2-B0ev2A/SSSD-child-32522-auth.output .output 957s + output_cert_file=/tmp/sssd-softhsm2-B0ev2A/SSSD-child-32522-auth.pem 957s + echo -n 053350 957s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/dev/null --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=no_verification --token_name 'Test Organization Root Tr Token' --module_name /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so 957s [p11_child[2238]] [main] (0x0400): p11_child started. 957s [p11_child[2238]] [main] (0x2000): Running in [auth] mode. 957s [p11_child[2238]] [main] (0x2000): Running with effective IDs: [0][0]. 957s [p11_child[2238]] [main] (0x2000): Running with real IDs [0][0]. 957s [p11_child[2238]] [parse_cert_verify_opts] (0x0020): Found 'no_verification' option, disabling verification completely. This should not be used in production. 957s [p11_child[2238]] [do_card] (0x4000): Module List: 957s [p11_child[2238]] [do_card] (0x4000): common name: [softhsm2]. 957s [p11_child[2238]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 957s [p11_child[2238]] [do_card] (0x4000): Description [SoftHSM slot ID 0xf489a5c] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 957s [p11_child[2238]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 957s [p11_child[2238]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0xf489a5c][256416348] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 957s [p11_child[2238]] [do_card] (0x4000): Login required. 957s [p11_child[2238]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 957s [p11_child[2238]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so Test Organization Root Tr Token Test Organization Root Tr Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 957s [p11_child[2238]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200xf489a5c;slot-manufacturer=SoftHSM%20project;slot-id=256416348;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=ee9e99110f489a5c;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 957s [p11_child[2238]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 957s [p11_child[2238]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 957s [p11_child[2238]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 957s [p11_child[2238]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 957s [p11_child[2238]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 957s [p11_child[2238]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 957s [p11_child[2238]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 957s [p11_child[2238]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 957s [p11_child[2238]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 957s [p11_child[2238]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 957s [p11_child[2238]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 957s [p11_child[2238]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 957s [p11_child[2238]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 957s [p11_child[2238]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 957s [p11_child[2238]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 957s [p11_child[2238]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 957s [p11_child[2238]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 957s [p11_child[2238]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 957s [p11_child[2238]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 957s [p11_child[2238]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 957s [p11_child[2238]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 957s [p11_child[2238]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 957s [p11_child[2238]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 957s [p11_child[2238]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 957s [p11_child[2238]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 957s [p11_child[2238]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 957s [p11_child[2238]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 957s [p11_child[2238]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 957s [p11_child[2238]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 957s [p11_child[2238]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 957s [p11_child[2238]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 957s [p11_child[2238]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 957s [p11_child[2238]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 957s [p11_child[2238]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 957s [p11_child[2238]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 957s [p11_child[2238]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 957s [p11_child[2238]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 957s [p11_child[2238]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 957s [p11_child[2238]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 957s [p11_child[2238]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 957s [p11_child[2238]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 957s [p11_child[2238]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 957s [p11_child[2238]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 957s [p11_child[2238]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 957s [p11_child[2238]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 957s [p11_child[2238]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 957s [p11_child[2238]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 957s [p11_child[2238]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 957s [p11_child[2238]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 957s [p11_child[2238]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 957s [p11_child[2238]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 957s [p11_child[2238]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 957s [p11_child[2238]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 957s [p11_child[2238]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 957s [p11_child[2238]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 957s [p11_child[2238]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 957s [p11_child[2238]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 957s [p11_child[2238]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 957s [p11_child[2238]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 957s [p11_child[2238]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 957s [p11_child[2238]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 957s [p11_child[2238]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 957s [p11_child[2238]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 957s [p11_child[2238]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 957s [p11_child[2238]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 957s [p11_child[2238]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 957s [p11_child[2238]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 957s [p11_child[2238]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 957s [p11_child[2238]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 957s [p11_child[2238]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 957s [p11_child[2238]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 957s [p11_child[2238]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 957s [p11_child[2238]] [do_card] (0x4000): Certificate verified and validated. 957s [p11_child[2238]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 957s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-B0ev2A/SSSD-child-32522-auth.output 957s + echo '-----BEGIN CERTIFICATE-----' 957s + tail -n1 /tmp/sssd-softhsm2-B0ev2A/SSSD-child-32522-auth.output 957s + echo '-----END CERTIFICATE-----' 957s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-B0ev2A/SSSD-child-32522-auth.pem 957s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-B0ev2A/SSSD-child-32522-auth.pem 957s + found_md5=Modulus=C69B17FE69BD6E67E73FC1939AA61DF472EF5155477DF9F62EF07EAF0E37EF3CF09F72AEB2F18C14B7FF351CF4EB8A6F29122A7C6DD43C776D3BADAA4E00FBC801425255A1701FDB75AC70EFC42DD3D3E6DB200B7BDD47D293E57B82DD68E9FBF11764860A5827A26D4453F8FD52E82867B176FF181C939A02A60BEACCEFE417 957s + '[' Modulus=C69B17FE69BD6E67E73FC1939AA61DF472EF5155477DF9F62EF07EAF0E37EF3CF09F72AEB2F18C14B7FF351CF4EB8A6F29122A7C6DD43C776D3BADAA4E00FBC801425255A1701FDB75AC70EFC42DD3D3E6DB200B7BDD47D293E57B82DD68E9FBF11764860A5827A26D4453F8FD52E82867B176FF181C939A02A60BEACCEFE417 '!=' Modulus=C69B17FE69BD6E67E73FC1939AA61DF472EF5155477DF9F62EF07EAF0E37EF3CF09F72AEB2F18C14B7FF351CF4EB8A6F29122A7C6DD43C776D3BADAA4E00FBC801425255A1701FDB75AC70EFC42DD3D3E6DB200B7BDD47D293E57B82DD68E9FBF11764860A5827A26D4453F8FD52E82867B176FF181C939A02A60BEACCEFE417 ']' 957s + valid_certificate /tmp/sssd-softhsm2-B0ev2A/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-9634 /tmp/sssd-softhsm2-B0ev2A/test-root-CA.pem 957s + check_certificate /tmp/sssd-softhsm2-B0ev2A/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-9634 /tmp/sssd-softhsm2-B0ev2A/test-root-CA.pem 957s + local certificate=/tmp/sssd-softhsm2-B0ev2A/test-root-CA-trusted-certificate-0001.pem 957s + local key_pass=pass:random-root-ca-trusted-cert-0001-9634 957s + local key_ring=/tmp/sssd-softhsm2-B0ev2A/test-root-CA.pem 957s + local verify_option= 957s + prepare_softhsm2_card /tmp/sssd-softhsm2-B0ev2A/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-9634 957s + local certificate=/tmp/sssd-softhsm2-B0ev2A/test-root-CA-trusted-certificate-0001.pem 957s + local key_pass=pass:random-root-ca-trusted-cert-0001-9634 957s + local key_cn 957s + local key_name 957s + local tokens_dir 957s + local output_cert_file 957s + token_name= 957s ++ basename /tmp/sssd-softhsm2-B0ev2A/test-root-CA-trusted-certificate-0001.pem .pem 957s + key_name=test-root-CA-trusted-certificate-0001 957s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-B0ev2A/test-root-CA-trusted-certificate-0001.pem 957s ++ sed -n 's/ *commonName *= //p' 957s + key_cn='Test Organization Root Trusted Certificate 0001' 957s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 957s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-B0ev2A/softhsm2-test-root-CA-trusted-certificate-0001.conf 957s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-B0ev2A/softhsm2-test-root-CA-trusted-certificate-0001.conf 957s ++ basename /tmp/sssd-softhsm2-B0ev2A/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 957s + tokens_dir=/tmp/sssd-softhsm2-B0ev2A/softhsm2-test-root-CA-trusted-certificate-0001 957s + token_name='Test Organization Root Tr Token' 957s + '[' '!' -e /tmp/sssd-softhsm2-B0ev2A/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 957s + '[' '!' -d /tmp/sssd-softhsm2-B0ev2A/softhsm2-test-root-CA-trusted-certificate-0001 ']' 957s + echo 'Test Organization Root Tr Token' 957s Test Organization Root Tr Token 957s + '[' -n '' ']' 957s + local output_base_name=SSSD-child-16247 957s + local output_file=/tmp/sssd-softhsm2-B0ev2A/SSSD-child-16247.output 957s + output_cert_file=/tmp/sssd-softhsm2-B0ev2A/SSSD-child-16247.pem 957s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-B0ev2A/test-root-CA.pem 957s [p11_child[2248]] [main] (0x0400): p11_child started. 957s [p11_child[2248]] [main] (0x2000): Running in [pre-auth] mode. 957s [p11_child[2248]] [main] (0x2000): Running with effective IDs: [0][0]. 957s [p11_child[2248]] [main] (0x2000): Running with real IDs [0][0]. 957s [p11_child[2248]] [do_card] (0x4000): Module List: 957s [p11_child[2248]] [do_card] (0x4000): common name: [softhsm2]. 957s [p11_child[2248]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 957s [p11_child[2248]] [do_card] (0x4000): Description [SoftHSM slot ID 0xf489a5c] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 957s [p11_child[2248]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 957s [p11_child[2248]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0xf489a5c][256416348] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 957s [p11_child[2248]] [do_card] (0x4000): Login NOT required. 957s [p11_child[2248]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 957s [p11_child[2248]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 957s [p11_child[2248]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Root Tr Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 957s [p11_child[2248]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200xf489a5c;slot-manufacturer=SoftHSM%20project;slot-id=256416348;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=ee9e99110f489a5c;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 957s [p11_child[2248]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 957s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-B0ev2A/SSSD-child-16247.output 957s + echo '-----BEGIN CERTIFICATE-----' 957s + tail -n1 /tmp/sssd-softhsm2-B0ev2A/SSSD-child-16247.output 957s + echo '-----END CERTIFICATE-----' 957s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-B0ev2A/SSSD-child-16247.pem 957s Certificate: 957s Data: 957s Version: 3 (0x2) 957s Serial Number: 3 (0x3) 957s Signature Algorithm: sha256WithRSAEncryption 957s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 957s Validity 957s Not Before: Mar 19 03:47:10 2024 GMT 957s Not After : Mar 19 03:47:10 2025 GMT 957s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 957s Subject Public Key Info: 957s Public Key Algorithm: rsaEncryption 957s Public-Key: (1024 bit) 957s Modulus: 957s 00:c6:9b:17:fe:69:bd:6e:67:e7:3f:c1:93:9a:a6: 957s 1d:f4:72:ef:51:55:47:7d:f9:f6:2e:f0:7e:af:0e: 957s 37:ef:3c:f0:9f:72:ae:b2:f1:8c:14:b7:ff:35:1c: 957s f4:eb:8a:6f:29:12:2a:7c:6d:d4:3c:77:6d:3b:ad: 957s aa:4e:00:fb:c8:01:42:52:55:a1:70:1f:db:75:ac: 957s 70:ef:c4:2d:d3:d3:e6:db:20:0b:7b:dd:47:d2:93: 957s e5:7b:82:dd:68:e9:fb:f1:17:64:86:0a:58:27:a2: 957s 6d:44:53:f8:fd:52:e8:28:67:b1:76:ff:18:1c:93: 957s 9a:02:a6:0b:ea:cc:ef:e4:17 957s Exponent: 65537 (0x10001) 957s X509v3 extensions: 957s X509v3 Authority Key Identifier: 957s 57:F2:E4:45:7F:23:3A:7C:85:E8:94:AC:83:03:F0:FC:EF:44:E0:7C 957s X509v3 Basic Constraints: 957s CA:FALSE 957s Netscape Cert Type: 957s SSL Client, S/MIME 957s Netscape Comment: 957s Test Organization Root CA trusted Certificate 957s X509v3 Subject Key Identifier: 957s 32:4D:11:24:1F:D3:F6:AF:91:26:DD:EB:7F:22:A5:C9:C8:73:69:0D 957s X509v3 Key Usage: critical 957s Digital Signature, Non Repudiation, Key Encipherment 957s X509v3 Extended Key Usage: 957s TLS Web Client Authentication, E-mail Protection 957s X509v3 Subject Alternative Name: 957s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 957s Signature Algorithm: sha256WithRSAEncryption 957s Signature Value: 957s 09:54:48:7c:b8:fb:3d:f3:b5:24:bf:e2:14:5f:f4:4e:1c:05: 957s 7e:f9:1c:17:e9:13:aa:69:76:fe:a4:13:62:21:90:58:aa:18: 957s 30:a3:c1:8c:3c:1a:84:90:16:f9:8a:fc:d1:cc:d8:5d:81:d5: 957s 4a:63:49:bc:c5:3f:56:66:55:f7:80:80:d2:33:d8:aa:ce:2b: 957s 58:a0:c9:97:a0:b0:12:7c:60:6a:e5:a4:fb:6f:7f:95:c3:e9: 957s 9a:9f:0d:3d:8c:82:b2:6e:f8:ba:56:4e:27:7d:38:51:64:09: 957s 97:e0:e9:1d:5a:a2:6b:50:64:28:b9:be:de:81:a8:b9:2e:13: 957s cb:48 957s + local found_md5 expected_md5 957s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-B0ev2A/test-root-CA-trusted-certificate-0001.pem 957s + expected_md5=Modulus=C69B17FE69BD6E67E73FC1939AA61DF472EF5155477DF9F62EF07EAF0E37EF3CF09F72AEB2F18C14B7FF351CF4EB8A6F29122A7C6DD43C776D3BADAA4E00FBC801425255A1701FDB75AC70EFC42DD3D3E6DB200B7BDD47D293E57B82DD68E9FBF11764860A5827A26D4453F8FD52E82867B176FF181C939A02A60BEACCEFE417 957s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-B0ev2A/SSSD-child-16247.pem 957s + found_md5=Modulus=C69B17FE69BD6E67E73FC1939AA61DF472EF5155477DF9F62EF07EAF0E37EF3CF09F72AEB2F18C14B7FF351CF4EB8A6F29122A7C6DD43C776D3BADAA4E00FBC801425255A1701FDB75AC70EFC42DD3D3E6DB200B7BDD47D293E57B82DD68E9FBF11764860A5827A26D4453F8FD52E82867B176FF181C939A02A60BEACCEFE417 957s + '[' Modulus=C69B17FE69BD6E67E73FC1939AA61DF472EF5155477DF9F62EF07EAF0E37EF3CF09F72AEB2F18C14B7FF351CF4EB8A6F29122A7C6DD43C776D3BADAA4E00FBC801425255A1701FDB75AC70EFC42DD3D3E6DB200B7BDD47D293E57B82DD68E9FBF11764860A5827A26D4453F8FD52E82867B176FF181C939A02A60BEACCEFE417 '!=' Modulus=C69B17FE69BD6E67E73FC1939AA61DF472EF5155477DF9F62EF07EAF0E37EF3CF09F72AEB2F18C14B7FF351CF4EB8A6F29122A7C6DD43C776D3BADAA4E00FBC801425255A1701FDB75AC70EFC42DD3D3E6DB200B7BDD47D293E57B82DD68E9FBF11764860A5827A26D4453F8FD52E82867B176FF181C939A02A60BEACCEFE417 ']' 957s + output_file=/tmp/sssd-softhsm2-B0ev2A/SSSD-child-16247-auth.output 957s ++ basename /tmp/sssd-softhsm2-B0ev2A/SSSD-child-16247-auth.output .output 957s + output_cert_file=/tmp/sssd-softhsm2-B0ev2A/SSSD-child-16247-auth.pem 957s + echo -n 053350 957s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-B0ev2A/test-root-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 '' --token_name 'Test Organization Root Tr Token' --module_name /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so 957s [p11_child[2256]] [main] (0x0400): p11_child started. 957s [p11_child[2256]] [main] (0x2000): Running in [auth] mode. 957s [p11_child[2256]] [main] (0x2000): Running with effective IDs: [0][0]. 957s [p11_child[2256]] [main] (0x2000): Running with real IDs [0][0]. 957s [p11_child[2256]] [do_card] (0x4000): Module List: 957s [p11_child[2256]] [do_card] (0x4000): common name: [softhsm2]. 957s [p11_child[2256]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 957s [p11_child[2256]] [do_card] (0x4000): Description [SoftHSM slot ID 0xf489a5c] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 957s [p11_child[2256]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 957s [p11_child[2256]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0xf489a5c][256416348] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 957s [p11_child[2256]] [do_card] (0x4000): Login required. 957s [p11_child[2256]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 957s [p11_child[2256]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 957s [p11_child[2256]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so Test Organization Root Tr Token Test Organization Root Tr Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 957s [p11_child[2256]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200xf489a5c;slot-manufacturer=SoftHSM%20project;slot-id=256416348;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=ee9e99110f489a5c;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 957s [p11_child[2256]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 957s [p11_child[2256]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 957s [p11_child[2256]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 957s [p11_child[2256]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 957s [p11_child[2256]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 957s [p11_child[2256]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 957s [p11_child[2256]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 957s [p11_child[2256]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 957s [p11_child[2256]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 957s [p11_child[2256]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 957s [p11_child[2256]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 957s [p11_child[2256]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 957s [p11_child[2256]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 957s [p11_child[2256]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 957s [p11_child[2256]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 957s [p11_child[2256]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 957s [p11_child[2256]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 957s [p11_child[2256]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 957s [p11_child[2256]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 957s [p11_child[2256]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 957s [p11_child[2256]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 957s [p11_child[2256]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 957s [p11_child[2256]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 957s [p11_child[2256]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 957s [p11_child[2256]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 957s [p11_child[2256]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 957s [p11_child[2256]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 957s [p11_child[2256]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 957s [p11_child[2256]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 957s [p11_child[2256]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 957s [p11_child[2256]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 957s [p11_child[2256]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 957s [p11_child[2256]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 957s [p11_child[2256]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 957s [p11_child[2256]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 957s [p11_child[2256]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 957s [p11_child[2256]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 957s [p11_child[2256]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 957s [p11_child[2256]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 957s [p11_child[2256]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 957s [p11_child[2256]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 957s [p11_child[2256]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 957s [p11_child[2256]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 957s [p11_child[2256]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 957s [p11_child[2256]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 957s [p11_child[2256]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 957s [p11_child[2256]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 957s [p11_child[2256]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 957s [p11_child[2256]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 957s [p11_child[2256]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 957s [p11_child[2256]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 957s [p11_child[2256]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 957s [p11_child[2256]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 957s [p11_child[2256]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 957s [p11_child[2256]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 957s [p11_child[2256]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 957s [p11_child[2256]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 957s [p11_child[2256]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 957s [p11_child[2256]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 957s [p11_child[2256]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 957s [p11_child[2256]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 957s [p11_child[2256]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 957s [p11_child[2256]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 957s [p11_child[2256]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 957s [p11_child[2256]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 957s [p11_child[2256]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 957s [p11_child[2256]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 957s [p11_child[2256]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 957s [p11_child[2256]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 957s [p11_child[2256]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 957s [p11_child[2256]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 957s [p11_child[2256]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 957s [p11_child[2256]] [do_card] (0x4000): Certificate verified and validated. 957s [p11_child[2256]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 957s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-B0ev2A/SSSD-child-16247-auth.output 957s + echo '-----BEGIN CERTIFICATE-----' 957s + tail -n1 /tmp/sssd-softhsm2-B0ev2A/SSSD-child-16247-auth.output 957s + echo '-----END CERTIFICATE-----' 957s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-B0ev2A/SSSD-child-16247-auth.pem 957s Certificate: 957s Data: 957s Version: 3 (0x2) 957s Serial Number: 3 (0x3) 957s Signature Algorithm: sha256WithRSAEncryption 957s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 957s Validity 957s Not Before: Mar 19 03:47:10 2024 GMT 957s Not After : Mar 19 03:47:10 2025 GMT 957s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 957s Subject Public Key Info: 957s Public Key Algorithm: rsaEncryption 957s Public-Key: (1024 bit) 957s Modulus: 957s 00:c6:9b:17:fe:69:bd:6e:67:e7:3f:c1:93:9a:a6: 957s 1d:f4:72:ef:51:55:47:7d:f9:f6:2e:f0:7e:af:0e: 957s 37:ef:3c:f0:9f:72:ae:b2:f1:8c:14:b7:ff:35:1c: 957s f4:eb:8a:6f:29:12:2a:7c:6d:d4:3c:77:6d:3b:ad: 957s aa:4e:00:fb:c8:01:42:52:55:a1:70:1f:db:75:ac: 957s 70:ef:c4:2d:d3:d3:e6:db:20:0b:7b:dd:47:d2:93: 957s e5:7b:82:dd:68:e9:fb:f1:17:64:86:0a:58:27:a2: 957s 6d:44:53:f8:fd:52:e8:28:67:b1:76:ff:18:1c:93: 957s 9a:02:a6:0b:ea:cc:ef:e4:17 957s Exponent: 65537 (0x10001) 957s X509v3 extensions: 957s X509v3 Authority Key Identifier: 957s 57:F2:E4:45:7F:23:3A:7C:85:E8:94:AC:83:03:F0:FC:EF:44:E0:7C 957s X509v3 Basic Constraints: 957s CA:FALSE 957s Netscape Cert Type: 957s SSL Client, S/MIME 957s Netscape Comment: 957s Test Organization Root CA trusted Certificate 957s X509v3 Subject Key Identifier: 957s 32:4D:11:24:1F:D3:F6:AF:91:26:DD:EB:7F:22:A5:C9:C8:73:69:0D 957s X509v3 Key Usage: critical 957s Digital Signature, Non Repudiation, Key Encipherment 957s X509v3 Extended Key Usage: 957s TLS Web Client Authentication, E-mail Protection 957s X509v3 Subject Alternative Name: 957s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 957s Signature Algorithm: sha256WithRSAEncryption 957s Signature Value: 957s 09:54:48:7c:b8:fb:3d:f3:b5:24:bf:e2:14:5f:f4:4e:1c:05: 957s 7e:f9:1c:17:e9:13:aa:69:76:fe:a4:13:62:21:90:58:aa:18: 957s 30:a3:c1:8c:3c:1a:84:90:16:f9:8a:fc:d1:cc:d8:5d:81:d5: 957s 4a:63:49:bc:c5:3f:56:66:55:f7:80:80:d2:33:d8:aa:ce:2b: 957s 58:a0:c9:97:a0:b0:12:7c:60:6a:e5:a4:fb:6f:7f:95:c3:e9: 957s 9a:9f:0d:3d:8c:82:b2:6e:f8:ba:56:4e:27:7d:38:51:64:09: 957s 97:e0:e9:1d:5a:a2:6b:50:64:28:b9:be:de:81:a8:b9:2e:13: 957s cb:48 957s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-B0ev2A/SSSD-child-16247-auth.pem 957s + found_md5=Modulus=C69B17FE69BD6E67E73FC1939AA61DF472EF5155477DF9F62EF07EAF0E37EF3CF09F72AEB2F18C14B7FF351CF4EB8A6F29122A7C6DD43C776D3BADAA4E00FBC801425255A1701FDB75AC70EFC42DD3D3E6DB200B7BDD47D293E57B82DD68E9FBF11764860A5827A26D4453F8FD52E82867B176FF181C939A02A60BEACCEFE417 957s + '[' Modulus=C69B17FE69BD6E67E73FC1939AA61DF472EF5155477DF9F62EF07EAF0E37EF3CF09F72AEB2F18C14B7FF351CF4EB8A6F29122A7C6DD43C776D3BADAA4E00FBC801425255A1701FDB75AC70EFC42DD3D3E6DB200B7BDD47D293E57B82DD68E9FBF11764860A5827A26D4453F8FD52E82867B176FF181C939A02A60BEACCEFE417 '!=' Modulus=C69B17FE69BD6E67E73FC1939AA61DF472EF5155477DF9F62EF07EAF0E37EF3CF09F72AEB2F18C14B7FF351CF4EB8A6F29122A7C6DD43C776D3BADAA4E00FBC801425255A1701FDB75AC70EFC42DD3D3E6DB200B7BDD47D293E57B82DD68E9FBF11764860A5827A26D4453F8FD52E82867B176FF181C939A02A60BEACCEFE417 ']' 957s + valid_certificate /tmp/sssd-softhsm2-B0ev2A/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-9634 /tmp/sssd-softhsm2-B0ev2A/test-root-CA.pem partial_chain 957s + check_certificate /tmp/sssd-softhsm2-B0ev2A/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-9634 /tmp/sssd-softhsm2-B0ev2A/test-root-CA.pem partial_chain 957s + local certificate=/tmp/sssd-softhsm2-B0ev2A/test-root-CA-trusted-certificate-0001.pem 957s + local key_pass=pass:random-root-ca-trusted-cert-0001-9634 957s + local key_ring=/tmp/sssd-softhsm2-B0ev2A/test-root-CA.pem 957s + local verify_option=partial_chain 957s + prepare_softhsm2_card /tmp/sssd-softhsm2-B0ev2A/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-9634 957s + local certificate=/tmp/sssd-softhsm2-B0ev2A/test-root-CA-trusted-certificate-0001.pem 957s + local key_pass=pass:random-root-ca-trusted-cert-0001-9634 957s + local key_cn 957s + local key_name 957s + local tokens_dir 957s + local output_cert_file 957s + token_name= 957s ++ basename /tmp/sssd-softhsm2-B0ev2A/test-root-CA-trusted-certificate-0001.pem .pem 957s + key_name=test-root-CA-trusted-certificate-0001 957s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-B0ev2A/test-root-CA-trusted-certificate-0001.pem 957s ++ sed -n 's/ *commonName *= //p' 957s + key_cn='Test Organization Root Trusted Certificate 0001' 957s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 957s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-B0ev2A/softhsm2-test-root-CA-trusted-certificate-0001.conf 957s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-B0ev2A/softhsm2-test-root-CA-trusted-certificate-0001.conf 957s ++ basename /tmp/sssd-softhsm2-B0ev2A/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 957s + tokens_dir=/tmp/sssd-softhsm2-B0ev2A/softhsm2-test-root-CA-trusted-certificate-0001 957s + token_name='Test Organization Root Tr Token' 957s + '[' '!' -e /tmp/sssd-softhsm2-B0ev2A/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 957s + '[' '!' -d /tmp/sssd-softhsm2-B0ev2A/softhsm2-test-root-CA-trusted-certificate-0001 ']' 957s Test Organization Root Tr Token 957s + echo 'Test Organization Root Tr Token' 957s + '[' -n partial_chain ']' 957s + local verify_arg=--verify=partial_chain 957s + local output_base_name=SSSD-child-20088 957s + local output_file=/tmp/sssd-softhsm2-B0ev2A/SSSD-child-20088.output 957s + output_cert_file=/tmp/sssd-softhsm2-B0ev2A/SSSD-child-20088.pem 957s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-B0ev2A/test-root-CA.pem 957s [p11_child[2266]] [main] (0x0400): p11_child started. 957s [p11_child[2266]] [main] (0x2000): Running in [pre-auth] mode. 957s [p11_child[2266]] [main] (0x2000): Running with effective IDs: [0][0]. 957s [p11_child[2266]] [main] (0x2000): Running with real IDs [0][0]. 957s [p11_child[2266]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 957s [p11_child[2266]] [do_card] (0x4000): Module List: 957s [p11_child[2266]] [do_card] (0x4000): common name: [softhsm2]. 957s [p11_child[2266]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 957s [p11_child[2266]] [do_card] (0x4000): Description [SoftHSM slot ID 0xf489a5c] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 957s [p11_child[2266]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 957s [p11_child[2266]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0xf489a5c][256416348] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 957s [p11_child[2266]] [do_card] (0x4000): Login NOT required. 957s [p11_child[2266]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 957s [p11_child[2266]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 957s [p11_child[2266]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Root Tr Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 957s [p11_child[2266]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200xf489a5c;slot-manufacturer=SoftHSM%20project;slot-id=256416348;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=ee9e99110f489a5c;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 957s [p11_child[2266]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 957s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-B0ev2A/SSSD-child-20088.output 957s + echo '-----BEGIN CERTIFICATE-----' 957s + tail -n1 /tmp/sssd-softhsm2-B0ev2A/SSSD-child-20088.output 957s + echo '-----END CERTIFICATE-----' 957s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-B0ev2A/SSSD-child-20088.pem 957s Certificate: 957s Data: 957s Version: 3 (0x2) 957s Serial Number: 3 (0x3) 957s Signature Algorithm: sha256WithRSAEncryption 957s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 957s Validity 957s Not Before: Mar 19 03:47:10 2024 GMT 957s Not After : Mar 19 03:47:10 2025 GMT 957s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 957s Subject Public Key Info: 957s Public Key Algorithm: rsaEncryption 957s Public-Key: (1024 bit) 957s Modulus: 957s 00:c6:9b:17:fe:69:bd:6e:67:e7:3f:c1:93:9a:a6: 957s 1d:f4:72:ef:51:55:47:7d:f9:f6:2e:f0:7e:af:0e: 957s 37:ef:3c:f0:9f:72:ae:b2:f1:8c:14:b7:ff:35:1c: 957s f4:eb:8a:6f:29:12:2a:7c:6d:d4:3c:77:6d:3b:ad: 957s aa:4e:00:fb:c8:01:42:52:55:a1:70:1f:db:75:ac: 957s 70:ef:c4:2d:d3:d3:e6:db:20:0b:7b:dd:47:d2:93: 957s e5:7b:82:dd:68:e9:fb:f1:17:64:86:0a:58:27:a2: 957s 6d:44:53:f8:fd:52:e8:28:67:b1:76:ff:18:1c:93: 957s 9a:02:a6:0b:ea:cc:ef:e4:17 957s Exponent: 65537 (0x10001) 957s X509v3 extensions: 957s X509v3 Authority Key Identifier: 957s 57:F2:E4:45:7F:23:3A:7C:85:E8:94:AC:83:03:F0:FC:EF:44:E0:7C 957s X509v3 Basic Constraints: 957s CA:FALSE 957s Netscape Cert Type: 957s SSL Client, S/MIME 957s Netscape Comment: 957s Test Organization Root CA trusted Certificate 957s X509v3 Subject Key Identifier: 957s 32:4D:11:24:1F:D3:F6:AF:91:26:DD:EB:7F:22:A5:C9:C8:73:69:0D 957s X509v3 Key Usage: critical 957s Digital Signature, Non Repudiation, Key Encipherment 957s X509v3 Extended Key Usage: 957s TLS Web Client Authentication, E-mail Protection 957s X509v3 Subject Alternative Name: 957s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 957s Signature Algorithm: sha256WithRSAEncryption 957s Signature Value: 957s 09:54:48:7c:b8:fb:3d:f3:b5:24:bf:e2:14:5f:f4:4e:1c:05: 957s 7e:f9:1c:17:e9:13:aa:69:76:fe:a4:13:62:21:90:58:aa:18: 957s 30:a3:c1:8c:3c:1a:84:90:16:f9:8a:fc:d1:cc:d8:5d:81:d5: 957s 4a:63:49:bc:c5:3f:56:66:55:f7:80:80:d2:33:d8:aa:ce:2b: 957s 58:a0:c9:97:a0:b0:12:7c:60:6a:e5:a4:fb:6f:7f:95:c3:e9: 957s 9a:9f:0d:3d:8c:82:b2:6e:f8:ba:56:4e:27:7d:38:51:64:09: 957s 97:e0:e9:1d:5a:a2:6b:50:64:28:b9:be:de:81:a8:b9:2e:13: 957s cb:48 957s + local found_md5 expected_md5 957s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-B0ev2A/test-root-CA-trusted-certificate-0001.pem 957s + expected_md5=Modulus=C69B17FE69BD6E67E73FC1939AA61DF472EF5155477DF9F62EF07EAF0E37EF3CF09F72AEB2F18C14B7FF351CF4EB8A6F29122A7C6DD43C776D3BADAA4E00FBC801425255A1701FDB75AC70EFC42DD3D3E6DB200B7BDD47D293E57B82DD68E9FBF11764860A5827A26D4453F8FD52E82867B176FF181C939A02A60BEACCEFE417 957s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-B0ev2A/SSSD-child-20088.pem 957s + found_md5=Modulus=C69B17FE69BD6E67E73FC1939AA61DF472EF5155477DF9F62EF07EAF0E37EF3CF09F72AEB2F18C14B7FF351CF4EB8A6F29122A7C6DD43C776D3BADAA4E00FBC801425255A1701FDB75AC70EFC42DD3D3E6DB200B7BDD47D293E57B82DD68E9FBF11764860A5827A26D4453F8FD52E82867B176FF181C939A02A60BEACCEFE417 957s + '[' Modulus=C69B17FE69BD6E67E73FC1939AA61DF472EF5155477DF9F62EF07EAF0E37EF3CF09F72AEB2F18C14B7FF351CF4EB8A6F29122A7C6DD43C776D3BADAA4E00FBC801425255A1701FDB75AC70EFC42DD3D3E6DB200B7BDD47D293E57B82DD68E9FBF11764860A5827A26D4453F8FD52E82867B176FF181C939A02A60BEACCEFE417 '!=' Modulus=C69B17FE69BD6E67E73FC1939AA61DF472EF5155477DF9F62EF07EAF0E37EF3CF09F72AEB2F18C14B7FF351CF4EB8A6F29122A7C6DD43C776D3BADAA4E00FBC801425255A1701FDB75AC70EFC42DD3D3E6DB200B7BDD47D293E57B82DD68E9FBF11764860A5827A26D4453F8FD52E82867B176FF181C939A02A60BEACCEFE417 ']' 957s + output_file=/tmp/sssd-softhsm2-B0ev2A/SSSD-child-20088-auth.output 957s ++ basename /tmp/sssd-softhsm2-B0ev2A/SSSD-child-20088-auth.output .output 957s + output_cert_file=/tmp/sssd-softhsm2-B0ev2A/SSSD-child-20088-auth.pem 957s + echo -n 053350 957s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-B0ev2A/test-root-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Root Tr Token' --module_name /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so 957s [p11_child[2274]] [main] (0x0400): p11_child started. 957s [p11_child[2274]] [main] (0x2000): Running in [auth] mode. 957s [p11_child[2274]] [main] (0x2000): Running with effective IDs: [0][0]. 957s [p11_child[2274]] [main] (0x2000): Running with real IDs [0][0]. 957s [p11_child[2274]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 957s [p11_child[2274]] [do_card] (0x4000): Module List: 957s [p11_child[2274]] [do_card] (0x4000): common name: [softhsm2]. 957s [p11_child[2274]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 957s [p11_child[2274]] [do_card] (0x4000): Description [SoftHSM slot ID 0xf489a5c] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 957s [p11_child[2274]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 957s [p11_child[2274]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0xf489a5c][256416348] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 957s [p11_child[2274]] [do_card] (0x4000): Login required. 957s [p11_child[2274]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 957s [p11_child[2274]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 957s [p11_child[2274]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so Test Organization Root Tr Token Test Organization Root Tr Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 957s [p11_child[2274]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200xf489a5c;slot-manufacturer=SoftHSM%20project;slot-id=256416348;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=ee9e99110f489a5c;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 957s [p11_child[2274]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 957s [p11_child[2274]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 957s [p11_child[2274]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 957s [p11_child[2274]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 957s [p11_child[2274]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 957s [p11_child[2274]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 957s [p11_child[2274]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 957s [p11_child[2274]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 957s [p11_child[2274]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 957s [p11_child[2274]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 957s [p11_child[2274]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 957s [p11_child[2274]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 957s [p11_child[2274]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 957s [p11_child[2274]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 957s [p11_child[2274]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 957s [p11_child[2274]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 957s [p11_child[2274]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 957s [p11_child[2274]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 957s [p11_child[2274]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 957s [p11_child[2274]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 957s [p11_child[2274]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 957s [p11_child[2274]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 957s [p11_child[2274]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 957s [p11_child[2274]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 957s [p11_child[2274]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 957s [p11_child[2274]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 957s [p11_child[2274]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 957s [p11_child[2274]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 957s [p11_child[2274]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 957s [p11_child[2274]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 957s [p11_child[2274]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 957s [p11_child[2274]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 957s [p11_child[2274]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 957s [p11_child[2274]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 957s [p11_child[2274]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 957s [p11_child[2274]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 957s [p11_child[2274]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 957s [p11_child[2274]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 957s [p11_child[2274]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 957s [p11_child[2274]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 957s [p11_child[2274]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 957s [p11_child[2274]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 957s [p11_child[2274]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 957s [p11_child[2274]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 957s [p11_child[2274]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 957s [p11_child[2274]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 957s [p11_child[2274]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 957s [p11_child[2274]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 957s [p11_child[2274]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 957s [p11_child[2274]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 957s [p11_child[2274]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 957s [p11_child[2274]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 957s [p11_child[2274]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 957s [p11_child[2274]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 957s [p11_child[2274]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 957s [p11_child[2274]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 957s [p11_child[2274]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 957s [p11_child[2274]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 957s [p11_child[2274]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 957s [p11_child[2274]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 957s [p11_child[2274]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 957s [p11_child[2274]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 957s [p11_child[2274]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 957s [p11_child[2274]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 957s [p11_child[2274]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 957s [p11_child[2274]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 957s [p11_child[2274]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 957s [p11_child[2274]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 957s [p11_child[2274]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 957s [p11_child[2274]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 957s [p11_child[2274]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 957s [p11_child[2274]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 957s [p11_child[2274]] [do_card] (0x4000): Certificate verified and validated. 957s [p11_child[2274]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 957s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-B0ev2A/SSSD-child-20088-auth.output 957s + echo '-----BEGIN CERTIFICATE-----' 957s + tail -n1 /tmp/sssd-softhsm2-B0ev2A/SSSD-child-20088-auth.output 957s + echo '-----END CERTIFICATE-----' 957s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-B0ev2A/SSSD-child-20088-auth.pem 957s Certificate: 957s Data: 957s Version: 3 (0x2) 957s Serial Number: 3 (0x3) 957s Signature Algorithm: sha256WithRSAEncryption 957s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 957s Validity 957s Not Before: Mar 19 03:47:10 2024 GMT 957s Not After : Mar 19 03:47:10 2025 GMT 957s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 957s Subject Public Key Info: 957s Public Key Algorithm: rsaEncryption 957s Public-Key: (1024 bit) 957s Modulus: 957s 00:c6:9b:17:fe:69:bd:6e:67:e7:3f:c1:93:9a:a6: 957s 1d:f4:72:ef:51:55:47:7d:f9:f6:2e:f0:7e:af:0e: 957s 37:ef:3c:f0:9f:72:ae:b2:f1:8c:14:b7:ff:35:1c: 957s f4:eb:8a:6f:29:12:2a:7c:6d:d4:3c:77:6d:3b:ad: 957s aa:4e:00:fb:c8:01:42:52:55:a1:70:1f:db:75:ac: 957s 70:ef:c4:2d:d3:d3:e6:db:20:0b:7b:dd:47:d2:93: 957s e5:7b:82:dd:68:e9:fb:f1:17:64:86:0a:58:27:a2: 957s 6d:44:53:f8:fd:52:e8:28:67:b1:76:ff:18:1c:93: 957s 9a:02:a6:0b:ea:cc:ef:e4:17 957s Exponent: 65537 (0x10001) 957s X509v3 extensions: 957s X509v3 Authority Key Identifier: 957s 57:F2:E4:45:7F:23:3A:7C:85:E8:94:AC:83:03:F0:FC:EF:44:E0:7C 957s X509v3 Basic Constraints: 957s CA:FALSE 957s Netscape Cert Type: 957s SSL Client, S/MIME 957s Netscape Comment: 957s Test Organization Root CA trusted Certificate 957s X509v3 Subject Key Identifier: 957s 32:4D:11:24:1F:D3:F6:AF:91:26:DD:EB:7F:22:A5:C9:C8:73:69:0D 957s X509v3 Key Usage: critical 957s Digital Signature, Non Repudiation, Key Encipherment 957s X509v3 Extended Key Usage: 957s TLS Web Client Authentication, E-mail Protection 957s X509v3 Subject Alternative Name: 957s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 957s Signature Algorithm: sha256WithRSAEncryption 957s Signature Value: 957s 09:54:48:7c:b8:fb:3d:f3:b5:24:bf:e2:14:5f:f4:4e:1c:05: 957s 7e:f9:1c:17:e9:13:aa:69:76:fe:a4:13:62:21:90:58:aa:18: 957s 30:a3:c1:8c:3c:1a:84:90:16:f9:8a:fc:d1:cc:d8:5d:81:d5: 957s 4a:63:49:bc:c5:3f:56:66:55:f7:80:80:d2:33:d8:aa:ce:2b: 957s 58:a0:c9:97:a0:b0:12:7c:60:6a:e5:a4:fb:6f:7f:95:c3:e9: 957s 9a:9f:0d:3d:8c:82:b2:6e:f8:ba:56:4e:27:7d:38:51:64:09: 957s 97:e0:e9:1d:5a:a2:6b:50:64:28:b9:be:de:81:a8:b9:2e:13: 957s cb:48 957s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-B0ev2A/SSSD-child-20088-auth.pem 957s + found_md5=Modulus=C69B17FE69BD6E67E73FC1939AA61DF472EF5155477DF9F62EF07EAF0E37EF3CF09F72AEB2F18C14B7FF351CF4EB8A6F29122A7C6DD43C776D3BADAA4E00FBC801425255A1701FDB75AC70EFC42DD3D3E6DB200B7BDD47D293E57B82DD68E9FBF11764860A5827A26D4453F8FD52E82867B176FF181C939A02A60BEACCEFE417 957s + '[' Modulus=C69B17FE69BD6E67E73FC1939AA61DF472EF5155477DF9F62EF07EAF0E37EF3CF09F72AEB2F18C14B7FF351CF4EB8A6F29122A7C6DD43C776D3BADAA4E00FBC801425255A1701FDB75AC70EFC42DD3D3E6DB200B7BDD47D293E57B82DD68E9FBF11764860A5827A26D4453F8FD52E82867B176FF181C939A02A60BEACCEFE417 '!=' Modulus=C69B17FE69BD6E67E73FC1939AA61DF472EF5155477DF9F62EF07EAF0E37EF3CF09F72AEB2F18C14B7FF351CF4EB8A6F29122A7C6DD43C776D3BADAA4E00FBC801425255A1701FDB75AC70EFC42DD3D3E6DB200B7BDD47D293E57B82DD68E9FBF11764860A5827A26D4453F8FD52E82867B176FF181C939A02A60BEACCEFE417 ']' 957s + valid_certificate /tmp/sssd-softhsm2-B0ev2A/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-9634 /tmp/sssd-softhsm2-B0ev2A/test-full-chain-CA.pem 957s + check_certificate /tmp/sssd-softhsm2-B0ev2A/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-9634 /tmp/sssd-softhsm2-B0ev2A/test-full-chain-CA.pem 957s + local certificate=/tmp/sssd-softhsm2-B0ev2A/test-root-CA-trusted-certificate-0001.pem 957s + local key_pass=pass:random-root-ca-trusted-cert-0001-9634 957s + local key_ring=/tmp/sssd-softhsm2-B0ev2A/test-full-chain-CA.pem 957s + local verify_option= 957s + prepare_softhsm2_card /tmp/sssd-softhsm2-B0ev2A/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-9634 957s + local certificate=/tmp/sssd-softhsm2-B0ev2A/test-root-CA-trusted-certificate-0001.pem 957s + local key_pass=pass:random-root-ca-trusted-cert-0001-9634 957s + local key_cn 957s + local key_name 957s + local tokens_dir 957s + local output_cert_file 957s + token_name= 957s ++ basename /tmp/sssd-softhsm2-B0ev2A/test-root-CA-trusted-certificate-0001.pem .pem 957s + key_name=test-root-CA-trusted-certificate-0001 957s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-B0ev2A/test-root-CA-trusted-certificate-0001.pem 957s ++ sed -n 's/ *commonName *= //p' 957s + key_cn='Test Organization Root Trusted Certificate 0001' 957s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 957s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-B0ev2A/softhsm2-test-root-CA-trusted-certificate-0001.conf 957s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-B0ev2A/softhsm2-test-root-CA-trusted-certificate-0001.conf 957s ++ basename /tmp/sssd-softhsm2-B0ev2A/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 958s + tokens_dir=/tmp/sssd-softhsm2-B0ev2A/softhsm2-test-root-CA-trusted-certificate-0001 958s + token_name='Test Organization Root Tr Token' 958s + '[' '!' -e /tmp/sssd-softhsm2-B0ev2A/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 958s + '[' '!' -d /tmp/sssd-softhsm2-B0ev2A/softhsm2-test-root-CA-trusted-certificate-0001 ']' 958s Test Organization Root Tr Token 958s + echo 'Test Organization Root Tr Token' 958s + '[' -n '' ']' 958s + local output_base_name=SSSD-child-10699 958s + local output_file=/tmp/sssd-softhsm2-B0ev2A/SSSD-child-10699.output 958s + output_cert_file=/tmp/sssd-softhsm2-B0ev2A/SSSD-child-10699.pem 958s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-B0ev2A/test-full-chain-CA.pem 958s [p11_child[2284]] [main] (0x0400): p11_child started. 958s [p11_child[2284]] [main] (0x2000): Running in [pre-auth] mode. 958s [p11_child[2284]] [main] (0x2000): Running with effective IDs: [0][0]. 958s [p11_child[2284]] [main] (0x2000): Running with real IDs [0][0]. 958s [p11_child[2284]] [do_card] (0x4000): Module List: 958s [p11_child[2284]] [do_card] (0x4000): common name: [softhsm2]. 958s [p11_child[2284]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 958s [p11_child[2284]] [do_card] (0x4000): Description [SoftHSM slot ID 0xf489a5c] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 958s [p11_child[2284]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 958s [p11_child[2284]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0xf489a5c][256416348] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 958s [p11_child[2284]] [do_card] (0x4000): Login NOT required. 958s [p11_child[2284]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 958s [p11_child[2284]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 958s [p11_child[2284]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Root Tr Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 958s [p11_child[2284]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200xf489a5c;slot-manufacturer=SoftHSM%20project;slot-id=256416348;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=ee9e99110f489a5c;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 958s [p11_child[2284]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 958s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-B0ev2A/SSSD-child-10699.output 958s + echo '-----BEGIN CERTIFICATE-----' 958s + tail -n1 /tmp/sssd-softhsm2-B0ev2A/SSSD-child-10699.output 958s + echo '-----END CERTIFICATE-----' 958s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-B0ev2A/SSSD-child-10699.pem 958s Certificate: 958s Data: 958s Version: 3 (0x2) 958s Serial Number: 3 (0x3) 958s Signature Algorithm: sha256WithRSAEncryption 958s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 958s Validity 958s Not Before: Mar 19 03:47:10 2024 GMT 958s Not After : Mar 19 03:47:10 2025 GMT 958s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 958s Subject Public Key Info: 958s Public Key Algorithm: rsaEncryption 958s Public-Key: (1024 bit) 958s Modulus: 958s 00:c6:9b:17:fe:69:bd:6e:67:e7:3f:c1:93:9a:a6: 958s 1d:f4:72:ef:51:55:47:7d:f9:f6:2e:f0:7e:af:0e: 958s 37:ef:3c:f0:9f:72:ae:b2:f1:8c:14:b7:ff:35:1c: 958s f4:eb:8a:6f:29:12:2a:7c:6d:d4:3c:77:6d:3b:ad: 958s aa:4e:00:fb:c8:01:42:52:55:a1:70:1f:db:75:ac: 958s 70:ef:c4:2d:d3:d3:e6:db:20:0b:7b:dd:47:d2:93: 958s e5:7b:82:dd:68:e9:fb:f1:17:64:86:0a:58:27:a2: 958s 6d:44:53:f8:fd:52:e8:28:67:b1:76:ff:18:1c:93: 958s 9a:02:a6:0b:ea:cc:ef:e4:17 958s Exponent: 65537 (0x10001) 958s X509v3 extensions: 958s X509v3 Authority Key Identifier: 958s 57:F2:E4:45:7F:23:3A:7C:85:E8:94:AC:83:03:F0:FC:EF:44:E0:7C 958s X509v3 Basic Constraints: 958s CA:FALSE 958s Netscape Cert Type: 958s SSL Client, S/MIME 958s Netscape Comment: 958s Test Organization Root CA trusted Certificate 958s X509v3 Subject Key Identifier: 958s 32:4D:11:24:1F:D3:F6:AF:91:26:DD:EB:7F:22:A5:C9:C8:73:69:0D 958s X509v3 Key Usage: critical 958s Digital Signature, Non Repudiation, Key Encipherment 958s X509v3 Extended Key Usage: 958s TLS Web Client Authentication, E-mail Protection 958s X509v3 Subject Alternative Name: 958s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 958s Signature Algorithm: sha256WithRSAEncryption 958s Signature Value: 958s 09:54:48:7c:b8:fb:3d:f3:b5:24:bf:e2:14:5f:f4:4e:1c:05: 958s 7e:f9:1c:17:e9:13:aa:69:76:fe:a4:13:62:21:90:58:aa:18: 958s 30:a3:c1:8c:3c:1a:84:90:16:f9:8a:fc:d1:cc:d8:5d:81:d5: 958s 4a:63:49:bc:c5:3f:56:66:55:f7:80:80:d2:33:d8:aa:ce:2b: 958s 58:a0:c9:97:a0:b0:12:7c:60:6a:e5:a4:fb:6f:7f:95:c3:e9: 958s 9a:9f:0d:3d:8c:82:b2:6e:f8:ba:56:4e:27:7d:38:51:64:09: 958s 97:e0:e9:1d:5a:a2:6b:50:64:28:b9:be:de:81:a8:b9:2e:13: 958s cb:48 958s + local found_md5 expected_md5 958s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-B0ev2A/test-root-CA-trusted-certificate-0001.pem 958s + expected_md5=Modulus=C69B17FE69BD6E67E73FC1939AA61DF472EF5155477DF9F62EF07EAF0E37EF3CF09F72AEB2F18C14B7FF351CF4EB8A6F29122A7C6DD43C776D3BADAA4E00FBC801425255A1701FDB75AC70EFC42DD3D3E6DB200B7BDD47D293E57B82DD68E9FBF11764860A5827A26D4453F8FD52E82867B176FF181C939A02A60BEACCEFE417 958s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-B0ev2A/SSSD-child-10699.pem 958s + found_md5=Modulus=C69B17FE69BD6E67E73FC1939AA61DF472EF5155477DF9F62EF07EAF0E37EF3CF09F72AEB2F18C14B7FF351CF4EB8A6F29122A7C6DD43C776D3BADAA4E00FBC801425255A1701FDB75AC70EFC42DD3D3E6DB200B7BDD47D293E57B82DD68E9FBF11764860A5827A26D4453F8FD52E82867B176FF181C939A02A60BEACCEFE417 958s + '[' Modulus=C69B17FE69BD6E67E73FC1939AA61DF472EF5155477DF9F62EF07EAF0E37EF3CF09F72AEB2F18C14B7FF351CF4EB8A6F29122A7C6DD43C776D3BADAA4E00FBC801425255A1701FDB75AC70EFC42DD3D3E6DB200B7BDD47D293E57B82DD68E9FBF11764860A5827A26D4453F8FD52E82867B176FF181C939A02A60BEACCEFE417 '!=' Modulus=C69B17FE69BD6E67E73FC1939AA61DF472EF5155477DF9F62EF07EAF0E37EF3CF09F72AEB2F18C14B7FF351CF4EB8A6F29122A7C6DD43C776D3BADAA4E00FBC801425255A1701FDB75AC70EFC42DD3D3E6DB200B7BDD47D293E57B82DD68E9FBF11764860A5827A26D4453F8FD52E82867B176FF181C939A02A60BEACCEFE417 ']' 958s + output_file=/tmp/sssd-softhsm2-B0ev2A/SSSD-child-10699-auth.output 958s ++ basename /tmp/sssd-softhsm2-B0ev2A/SSSD-child-10699-auth.output .output 958s + output_cert_file=/tmp/sssd-softhsm2-B0ev2A/SSSD-child-10699-auth.pem 958s + echo -n 053350 958s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-B0ev2A/test-full-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 '' --token_name 'Test Organization Root Tr Token' --module_name /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so 958s [p11_child[2292]] [main] (0x0400): p11_child started. 958s [p11_child[2292]] [main] (0x2000): Running in [auth] mode. 958s [p11_child[2292]] [main] (0x2000): Running with effective IDs: [0][0]. 958s [p11_child[2292]] [main] (0x2000): Running with real IDs [0][0]. 958s [p11_child[2292]] [do_card] (0x4000): Module List: 958s [p11_child[2292]] [do_card] (0x4000): common name: [softhsm2]. 958s [p11_child[2292]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 958s [p11_child[2292]] [do_card] (0x4000): Description [SoftHSM slot ID 0xf489a5c] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 958s [p11_child[2292]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 958s [p11_child[2292]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0xf489a5c][256416348] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 958s [p11_child[2292]] [do_card] (0x4000): Login required. 958s [p11_child[2292]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 958s [p11_child[2292]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 958s [p11_child[2292]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so Test Organization Root Tr Token Test Organization Root Tr Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 958s [p11_child[2292]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200xf489a5c;slot-manufacturer=SoftHSM%20project;slot-id=256416348;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=ee9e99110f489a5c;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 958s [p11_child[2292]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 958s [p11_child[2292]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 958s [p11_child[2292]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 958s [p11_child[2292]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 958s [p11_child[2292]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 958s [p11_child[2292]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 958s [p11_child[2292]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 958s [p11_child[2292]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 958s [p11_child[2292]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 958s [p11_child[2292]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 958s [p11_child[2292]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 958s [p11_child[2292]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 958s [p11_child[2292]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 958s [p11_child[2292]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 958s [p11_child[2292]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 958s [p11_child[2292]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 958s [p11_child[2292]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 958s [p11_child[2292]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 958s [p11_child[2292]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 958s [p11_child[2292]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 958s [p11_child[2292]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 958s [p11_child[2292]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 958s [p11_child[2292]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 958s [p11_child[2292]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 958s [p11_child[2292]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 958s [p11_child[2292]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 958s [p11_child[2292]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 958s [p11_child[2292]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 958s [p11_child[2292]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 958s [p11_child[2292]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 958s [p11_child[2292]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 958s [p11_child[2292]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 958s [p11_child[2292]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 958s [p11_child[2292]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 958s [p11_child[2292]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 958s [p11_child[2292]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 958s [p11_child[2292]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 958s [p11_child[2292]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 958s [p11_child[2292]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 958s [p11_child[2292]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 958s [p11_child[2292]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 958s [p11_child[2292]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 958s [p11_child[2292]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 958s [p11_child[2292]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 958s [p11_child[2292]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 958s [p11_child[2292]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 958s [p11_child[2292]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 958s [p11_child[2292]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 958s [p11_child[2292]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 958s [p11_child[2292]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 958s [p11_child[2292]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 958s [p11_child[2292]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 958s [p11_child[2292]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 958s [p11_child[2292]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 958s [p11_child[2292]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 958s [p11_child[2292]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 958s [p11_child[2292]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 958s [p11_child[2292]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 958s [p11_child[2292]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 958s [p11_child[2292]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 958s [p11_child[2292]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 958s [p11_child[2292]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 958s [p11_child[2292]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 958s [p11_child[2292]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 958s [p11_child[2292]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 958s [p11_child[2292]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 958s [p11_child[2292]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 958s [p11_child[2292]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 958s [p11_child[2292]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 958s [p11_child[2292]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 958s [p11_child[2292]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 958s [p11_child[2292]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 958s [p11_child[2292]] [do_card] (0x4000): Certificate verified and validated. 958s [p11_child[2292]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 958s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-B0ev2A/SSSD-child-10699-auth.output 958s + echo '-----BEGIN CERTIFICATE-----' 958s + tail -n1 /tmp/sssd-softhsm2-B0ev2A/SSSD-child-10699-auth.output 958s + echo '-----END CERTIFICATE-----' 958s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-B0ev2A/SSSD-child-10699-auth.pem 958s Certificate: 958s Data: 958s Version: 3 (0x2) 958s Serial Number: 3 (0x3) 958s Signature Algorithm: sha256WithRSAEncryption 958s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 958s Validity 958s Not Before: Mar 19 03:47:10 2024 GMT 958s Not After : Mar 19 03:47:10 2025 GMT 958s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 958s Subject Public Key Info: 958s Public Key Algorithm: rsaEncryption 958s Public-Key: (1024 bit) 958s Modulus: 958s 00:c6:9b:17:fe:69:bd:6e:67:e7:3f:c1:93:9a:a6: 958s 1d:f4:72:ef:51:55:47:7d:f9:f6:2e:f0:7e:af:0e: 958s 37:ef:3c:f0:9f:72:ae:b2:f1:8c:14:b7:ff:35:1c: 958s f4:eb:8a:6f:29:12:2a:7c:6d:d4:3c:77:6d:3b:ad: 958s aa:4e:00:fb:c8:01:42:52:55:a1:70:1f:db:75:ac: 958s 70:ef:c4:2d:d3:d3:e6:db:20:0b:7b:dd:47:d2:93: 958s e5:7b:82:dd:68:e9:fb:f1:17:64:86:0a:58:27:a2: 958s 6d:44:53:f8:fd:52:e8:28:67:b1:76:ff:18:1c:93: 958s 9a:02:a6:0b:ea:cc:ef:e4:17 958s Exponent: 65537 (0x10001) 958s X509v3 extensions: 958s X509v3 Authority Key Identifier: 958s 57:F2:E4:45:7F:23:3A:7C:85:E8:94:AC:83:03:F0:FC:EF:44:E0:7C 958s X509v3 Basic Constraints: 958s CA:FALSE 958s Netscape Cert Type: 958s SSL Client, S/MIME 958s Netscape Comment: 958s Test Organization Root CA trusted Certificate 958s X509v3 Subject Key Identifier: 958s 32:4D:11:24:1F:D3:F6:AF:91:26:DD:EB:7F:22:A5:C9:C8:73:69:0D 958s X509v3 Key Usage: critical 958s Digital Signature, Non Repudiation, Key Encipherment 958s X509v3 Extended Key Usage: 958s TLS Web Client Authentication, E-mail Protection 958s X509v3 Subject Alternative Name: 958s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 958s Signature Algorithm: sha256WithRSAEncryption 958s Signature Value: 958s 09:54:48:7c:b8:fb:3d:f3:b5:24:bf:e2:14:5f:f4:4e:1c:05: 958s 7e:f9:1c:17:e9:13:aa:69:76:fe:a4:13:62:21:90:58:aa:18: 958s 30:a3:c1:8c:3c:1a:84:90:16:f9:8a:fc:d1:cc:d8:5d:81:d5: 958s 4a:63:49:bc:c5:3f:56:66:55:f7:80:80:d2:33:d8:aa:ce:2b: 958s 58:a0:c9:97:a0:b0:12:7c:60:6a:e5:a4:fb:6f:7f:95:c3:e9: 958s 9a:9f:0d:3d:8c:82:b2:6e:f8:ba:56:4e:27:7d:38:51:64:09: 958s 97:e0:e9:1d:5a:a2:6b:50:64:28:b9:be:de:81:a8:b9:2e:13: 958s cb:48 958s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-B0ev2A/SSSD-child-10699-auth.pem 958s + found_md5=Modulus=C69B17FE69BD6E67E73FC1939AA61DF472EF5155477DF9F62EF07EAF0E37EF3CF09F72AEB2F18C14B7FF351CF4EB8A6F29122A7C6DD43C776D3BADAA4E00FBC801425255A1701FDB75AC70EFC42DD3D3E6DB200B7BDD47D293E57B82DD68E9FBF11764860A5827A26D4453F8FD52E82867B176FF181C939A02A60BEACCEFE417 958s + '[' Modulus=C69B17FE69BD6E67E73FC1939AA61DF472EF5155477DF9F62EF07EAF0E37EF3CF09F72AEB2F18C14B7FF351CF4EB8A6F29122A7C6DD43C776D3BADAA4E00FBC801425255A1701FDB75AC70EFC42DD3D3E6DB200B7BDD47D293E57B82DD68E9FBF11764860A5827A26D4453F8FD52E82867B176FF181C939A02A60BEACCEFE417 '!=' Modulus=C69B17FE69BD6E67E73FC1939AA61DF472EF5155477DF9F62EF07EAF0E37EF3CF09F72AEB2F18C14B7FF351CF4EB8A6F29122A7C6DD43C776D3BADAA4E00FBC801425255A1701FDB75AC70EFC42DD3D3E6DB200B7BDD47D293E57B82DD68E9FBF11764860A5827A26D4453F8FD52E82867B176FF181C939A02A60BEACCEFE417 ']' 958s + valid_certificate /tmp/sssd-softhsm2-B0ev2A/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-9634 /tmp/sssd-softhsm2-B0ev2A/test-full-chain-CA.pem partial_chain 958s + check_certificate /tmp/sssd-softhsm2-B0ev2A/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-9634 /tmp/sssd-softhsm2-B0ev2A/test-full-chain-CA.pem partial_chain 958s + local certificate=/tmp/sssd-softhsm2-B0ev2A/test-root-CA-trusted-certificate-0001.pem 958s + local key_pass=pass:random-root-ca-trusted-cert-0001-9634 958s + local key_ring=/tmp/sssd-softhsm2-B0ev2A/test-full-chain-CA.pem 958s + local verify_option=partial_chain 958s + prepare_softhsm2_card /tmp/sssd-softhsm2-B0ev2A/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-9634 958s + local certificate=/tmp/sssd-softhsm2-B0ev2A/test-root-CA-trusted-certificate-0001.pem 958s + local key_pass=pass:random-root-ca-trusted-cert-0001-9634 958s + local key_cn 958s + local key_name 958s + local tokens_dir 958s + local output_cert_file 958s + token_name= 958s ++ basename /tmp/sssd-softhsm2-B0ev2A/test-root-CA-trusted-certificate-0001.pem .pem 958s + key_name=test-root-CA-trusted-certificate-0001 958s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-B0ev2A/test-root-CA-trusted-certificate-0001.pem 958s ++ sed -n 's/ *commonName *= //p' 958s + key_cn='Test Organization Root Trusted Certificate 0001' 958s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 958s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-B0ev2A/softhsm2-test-root-CA-trusted-certificate-0001.conf 958s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-B0ev2A/softhsm2-test-root-CA-trusted-certificate-0001.conf 958s ++ basename /tmp/sssd-softhsm2-B0ev2A/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 958s + tokens_dir=/tmp/sssd-softhsm2-B0ev2A/softhsm2-test-root-CA-trusted-certificate-0001 958s + token_name='Test Organization Root Tr Token' 958s + '[' '!' -e /tmp/sssd-softhsm2-B0ev2A/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 958s + '[' '!' -d /tmp/sssd-softhsm2-B0ev2A/softhsm2-test-root-CA-trusted-certificate-0001 ']' 958s + echo 'Test Organization Root Tr Token' 958s Test Organization Root Tr Token 958s + '[' -n partial_chain ']' 958s + local verify_arg=--verify=partial_chain 958s + local output_base_name=SSSD-child-15375 958s + local output_file=/tmp/sssd-softhsm2-B0ev2A/SSSD-child-15375.output 958s + output_cert_file=/tmp/sssd-softhsm2-B0ev2A/SSSD-child-15375.pem 958s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-B0ev2A/test-full-chain-CA.pem 958s [p11_child[2302]] [main] (0x0400): p11_child started. 958s [p11_child[2302]] [main] (0x2000): Running in [pre-auth] mode. 958s [p11_child[2302]] [main] (0x2000): Running with effective IDs: [0][0]. 958s [p11_child[2302]] [main] (0x2000): Running with real IDs [0][0]. 958s [p11_child[2302]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 958s [p11_child[2302]] [do_card] (0x4000): Module List: 958s [p11_child[2302]] [do_card] (0x4000): common name: [softhsm2]. 958s [p11_child[2302]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 958s [p11_child[2302]] [do_card] (0x4000): Description [SoftHSM slot ID 0xf489a5c] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 958s [p11_child[2302]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 958s [p11_child[2302]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0xf489a5c][256416348] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 958s [p11_child[2302]] [do_card] (0x4000): Login NOT required. 958s [p11_child[2302]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 958s [p11_child[2302]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 958s [p11_child[2302]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Root Tr Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 958s [p11_child[2302]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200xf489a5c;slot-manufacturer=SoftHSM%20project;slot-id=256416348;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=ee9e99110f489a5c;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 958s [p11_child[2302]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 958s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-B0ev2A/SSSD-child-15375.output 958s + echo '-----BEGIN CERTIFICATE-----' 958s + tail -n1 /tmp/sssd-softhsm2-B0ev2A/SSSD-child-15375.output 958s + echo '-----END CERTIFICATE-----' 958s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-B0ev2A/SSSD-child-15375.pem 958s Certificate: 958s Data: 958s Version: 3 (0x2) 958s Serial Number: 3 (0x3) 958s Signature Algorithm: sha256WithRSAEncryption 958s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 958s Validity 958s Not Before: Mar 19 03:47:10 2024 GMT 958s Not After : Mar 19 03:47:10 2025 GMT 958s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 958s Subject Public Key Info: 958s Public Key Algorithm: rsaEncryption 958s Public-Key: (1024 bit) 958s Modulus: 958s 00:c6:9b:17:fe:69:bd:6e:67:e7:3f:c1:93:9a:a6: 958s 1d:f4:72:ef:51:55:47:7d:f9:f6:2e:f0:7e:af:0e: 958s 37:ef:3c:f0:9f:72:ae:b2:f1:8c:14:b7:ff:35:1c: 958s f4:eb:8a:6f:29:12:2a:7c:6d:d4:3c:77:6d:3b:ad: 958s aa:4e:00:fb:c8:01:42:52:55:a1:70:1f:db:75:ac: 958s 70:ef:c4:2d:d3:d3:e6:db:20:0b:7b:dd:47:d2:93: 958s e5:7b:82:dd:68:e9:fb:f1:17:64:86:0a:58:27:a2: 958s 6d:44:53:f8:fd:52:e8:28:67:b1:76:ff:18:1c:93: 958s 9a:02:a6:0b:ea:cc:ef:e4:17 958s Exponent: 65537 (0x10001) 958s X509v3 extensions: 958s X509v3 Authority Key Identifier: 958s 57:F2:E4:45:7F:23:3A:7C:85:E8:94:AC:83:03:F0:FC:EF:44:E0:7C 958s X509v3 Basic Constraints: 958s CA:FALSE 958s Netscape Cert Type: 958s SSL Client, S/MIME 958s Netscape Comment: 958s Test Organization Root CA trusted Certificate 958s X509v3 Subject Key Identifier: 958s 32:4D:11:24:1F:D3:F6:AF:91:26:DD:EB:7F:22:A5:C9:C8:73:69:0D 958s X509v3 Key Usage: critical 958s Digital Signature, Non Repudiation, Key Encipherment 958s X509v3 Extended Key Usage: 958s TLS Web Client Authentication, E-mail Protection 958s X509v3 Subject Alternative Name: 958s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 958s Signature Algorithm: sha256WithRSAEncryption 958s Signature Value: 958s 09:54:48:7c:b8:fb:3d:f3:b5:24:bf:e2:14:5f:f4:4e:1c:05: 958s 7e:f9:1c:17:e9:13:aa:69:76:fe:a4:13:62:21:90:58:aa:18: 958s 30:a3:c1:8c:3c:1a:84:90:16:f9:8a:fc:d1:cc:d8:5d:81:d5: 958s 4a:63:49:bc:c5:3f:56:66:55:f7:80:80:d2:33:d8:aa:ce:2b: 958s 58:a0:c9:97:a0:b0:12:7c:60:6a:e5:a4:fb:6f:7f:95:c3:e9: 958s 9a:9f:0d:3d:8c:82:b2:6e:f8:ba:56:4e:27:7d:38:51:64:09: 958s 97:e0:e9:1d:5a:a2:6b:50:64:28:b9:be:de:81:a8:b9:2e:13: 958s cb:48 958s + local found_md5 expected_md5 958s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-B0ev2A/test-root-CA-trusted-certificate-0001.pem 958s + expected_md5=Modulus=C69B17FE69BD6E67E73FC1939AA61DF472EF5155477DF9F62EF07EAF0E37EF3CF09F72AEB2F18C14B7FF351CF4EB8A6F29122A7C6DD43C776D3BADAA4E00FBC801425255A1701FDB75AC70EFC42DD3D3E6DB200B7BDD47D293E57B82DD68E9FBF11764860A5827A26D4453F8FD52E82867B176FF181C939A02A60BEACCEFE417 958s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-B0ev2A/SSSD-child-15375.pem 958s + found_md5=Modulus=C69B17FE69BD6E67E73FC1939AA61DF472EF5155477DF9F62EF07EAF0E37EF3CF09F72AEB2F18C14B7FF351CF4EB8A6F29122A7C6DD43C776D3BADAA4E00FBC801425255A1701FDB75AC70EFC42DD3D3E6DB200B7BDD47D293E57B82DD68E9FBF11764860A5827A26D4453F8FD52E82867B176FF181C939A02A60BEACCEFE417 958s + '[' Modulus=C69B17FE69BD6E67E73FC1939AA61DF472EF5155477DF9F62EF07EAF0E37EF3CF09F72AEB2F18C14B7FF351CF4EB8A6F29122A7C6DD43C776D3BADAA4E00FBC801425255A1701FDB75AC70EFC42DD3D3E6DB200B7BDD47D293E57B82DD68E9FBF11764860A5827A26D4453F8FD52E82867B176FF181C939A02A60BEACCEFE417 '!=' Modulus=C69B17FE69BD6E67E73FC1939AA61DF472EF5155477DF9F62EF07EAF0E37EF3CF09F72AEB2F18C14B7FF351CF4EB8A6F29122A7C6DD43C776D3BADAA4E00FBC801425255A1701FDB75AC70EFC42DD3D3E6DB200B7BDD47D293E57B82DD68E9FBF11764860A5827A26D4453F8FD52E82867B176FF181C939A02A60BEACCEFE417 ']' 958s + output_file=/tmp/sssd-softhsm2-B0ev2A/SSSD-child-15375-auth.output 958s ++ basename /tmp/sssd-softhsm2-B0ev2A/SSSD-child-15375-auth.output .output 958s + output_cert_file=/tmp/sssd-softhsm2-B0ev2A/SSSD-child-15375-auth.pem 958s + echo -n 053350 958s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-B0ev2A/test-full-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Root Tr Token' --module_name /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so 958s [p11_child[2310]] [main] (0x0400): p11_child started. 958s [p11_child[2310]] [main] (0x2000): Running in [auth] mode. 958s [p11_child[2310]] [main] (0x2000): Running with effective IDs: [0][0]. 958s [p11_child[2310]] [main] (0x2000): Running with real IDs [0][0]. 958s [p11_child[2310]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 958s [p11_child[2310]] [do_card] (0x4000): Module List: 958s [p11_child[2310]] [do_card] (0x4000): common name: [softhsm2]. 958s [p11_child[2310]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 958s [p11_child[2310]] [do_card] (0x4000): Description [SoftHSM slot ID 0xf489a5c] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 958s [p11_child[2310]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 958s [p11_child[2310]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0xf489a5c][256416348] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 958s [p11_child[2310]] [do_card] (0x4000): Login required. 958s [p11_child[2310]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 958s [p11_child[2310]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 958s [p11_child[2310]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so Test Organization Root Tr Token Test Organization Root Tr Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 958s [p11_child[2310]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200xf489a5c;slot-manufacturer=SoftHSM%20project;slot-id=256416348;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=ee9e99110f489a5c;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 958s [p11_child[2310]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 958s [p11_child[2310]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 958s [p11_child[2310]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 958s [p11_child[2310]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 958s [p11_child[2310]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 958s [p11_child[2310]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 958s [p11_child[2310]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 958s [p11_child[2310]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 958s [p11_child[2310]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 958s [p11_child[2310]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 958s [p11_child[2310]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 958s [p11_child[2310]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 958s [p11_child[2310]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 958s [p11_child[2310]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 958s [p11_child[2310]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 958s [p11_child[2310]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 958s [p11_child[2310]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 958s [p11_child[2310]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 958s [p11_child[2310]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 958s [p11_child[2310]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 958s [p11_child[2310]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 958s [p11_child[2310]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 958s [p11_child[2310]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 958s [p11_child[2310]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 958s [p11_child[2310]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 958s [p11_child[2310]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 958s [p11_child[2310]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 958s [p11_child[2310]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 958s [p11_child[2310]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 958s [p11_child[2310]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 958s [p11_child[2310]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 958s [p11_child[2310]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 958s [p11_child[2310]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 958s [p11_child[2310]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 958s [p11_child[2310]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 958s [p11_child[2310]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 958s [p11_child[2310]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 958s [p11_child[2310]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 958s [p11_child[2310]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 958s [p11_child[2310]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 958s [p11_child[2310]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 958s [p11_child[2310]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 958s [p11_child[2310]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 958s [p11_child[2310]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 958s [p11_child[2310]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 958s [p11_child[2310]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 958s [p11_child[2310]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 958s [p11_child[2310]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 958s [p11_child[2310]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 958s [p11_child[2310]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 958s [p11_child[2310]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 958s [p11_child[2310]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 958s [p11_child[2310]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 958s [p11_child[2310]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 958s [p11_child[2310]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 958s [p11_child[2310]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 958s [p11_child[2310]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 958s [p11_child[2310]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 958s [p11_child[2310]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 958s [p11_child[2310]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 958s [p11_child[2310]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 958s [p11_child[2310]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 958s [p11_child[2310]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 958s [p11_child[2310]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 958s [p11_child[2310]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 958s [p11_child[2310]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 958s [p11_child[2310]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 958s [p11_child[2310]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 958s [p11_child[2310]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 958s [p11_child[2310]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 958s [p11_child[2310]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 958s [p11_child[2310]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 958s [p11_child[2310]] [do_card] (0x4000): Certificate verified and validated. 958s [p11_child[2310]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 958s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-B0ev2A/SSSD-child-15375-auth.output 958s + echo '-----BEGIN CERTIFICATE-----' 958s + tail -n1 /tmp/sssd-softhsm2-B0ev2A/SSSD-child-15375-auth.output 958s + echo '-----END CERTIFICATE-----' 958s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-B0ev2A/SSSD-child-15375-auth.pem 958s Certificate: 958s Data: 958s Version: 3 (0x2) 958s Serial Number: 3 (0x3) 958s Signature Algorithm: sha256WithRSAEncryption 958s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 958s Validity 958s Not Before: Mar 19 03:47:10 2024 GMT 958s Not After : Mar 19 03:47:10 2025 GMT 958s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 958s Subject Public Key Info: 958s Public Key Algorithm: rsaEncryption 958s Public-Key: (1024 bit) 958s Modulus: 958s 00:c6:9b:17:fe:69:bd:6e:67:e7:3f:c1:93:9a:a6: 958s 1d:f4:72:ef:51:55:47:7d:f9:f6:2e:f0:7e:af:0e: 958s 37:ef:3c:f0:9f:72:ae:b2:f1:8c:14:b7:ff:35:1c: 958s f4:eb:8a:6f:29:12:2a:7c:6d:d4:3c:77:6d:3b:ad: 958s aa:4e:00:fb:c8:01:42:52:55:a1:70:1f:db:75:ac: 958s 70:ef:c4:2d:d3:d3:e6:db:20:0b:7b:dd:47:d2:93: 958s e5:7b:82:dd:68:e9:fb:f1:17:64:86:0a:58:27:a2: 958s 6d:44:53:f8:fd:52:e8:28:67:b1:76:ff:18:1c:93: 958s 9a:02:a6:0b:ea:cc:ef:e4:17 958s Exponent: 65537 (0x10001) 958s X509v3 extensions: 958s X509v3 Authority Key Identifier: 958s 57:F2:E4:45:7F:23:3A:7C:85:E8:94:AC:83:03:F0:FC:EF:44:E0:7C 958s X509v3 Basic Constraints: 958s CA:FALSE 958s Netscape Cert Type: 958s SSL Client, S/MIME 958s Netscape Comment: 958s Test Organization Root CA trusted Certificate 958s X509v3 Subject Key Identifier: 958s 32:4D:11:24:1F:D3:F6:AF:91:26:DD:EB:7F:22:A5:C9:C8:73:69:0D 958s X509v3 Key Usage: critical 958s Digital Signature, Non Repudiation, Key Encipherment 958s X509v3 Extended Key Usage: 958s TLS Web Client Authentication, E-mail Protection 958s X509v3 Subject Alternative Name: 958s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 958s Signature Algorithm: sha256WithRSAEncryption 958s Signature Value: 958s 09:54:48:7c:b8:fb:3d:f3:b5:24:bf:e2:14:5f:f4:4e:1c:05: 958s 7e:f9:1c:17:e9:13:aa:69:76:fe:a4:13:62:21:90:58:aa:18: 958s 30:a3:c1:8c:3c:1a:84:90:16:f9:8a:fc:d1:cc:d8:5d:81:d5: 958s 4a:63:49:bc:c5:3f:56:66:55:f7:80:80:d2:33:d8:aa:ce:2b: 958s 58:a0:c9:97:a0:b0:12:7c:60:6a:e5:a4:fb:6f:7f:95:c3:e9: 958s 9a:9f:0d:3d:8c:82:b2:6e:f8:ba:56:4e:27:7d:38:51:64:09: 958s 97:e0:e9:1d:5a:a2:6b:50:64:28:b9:be:de:81:a8:b9:2e:13: 958s cb:48 958s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-B0ev2A/SSSD-child-15375-auth.pem 958s + found_md5=Modulus=C69B17FE69BD6E67E73FC1939AA61DF472EF5155477DF9F62EF07EAF0E37EF3CF09F72AEB2F18C14B7FF351CF4EB8A6F29122A7C6DD43C776D3BADAA4E00FBC801425255A1701FDB75AC70EFC42DD3D3E6DB200B7BDD47D293E57B82DD68E9FBF11764860A5827A26D4453F8FD52E82867B176FF181C939A02A60BEACCEFE417 958s + '[' Modulus=C69B17FE69BD6E67E73FC1939AA61DF472EF5155477DF9F62EF07EAF0E37EF3CF09F72AEB2F18C14B7FF351CF4EB8A6F29122A7C6DD43C776D3BADAA4E00FBC801425255A1701FDB75AC70EFC42DD3D3E6DB200B7BDD47D293E57B82DD68E9FBF11764860A5827A26D4453F8FD52E82867B176FF181C939A02A60BEACCEFE417 '!=' Modulus=C69B17FE69BD6E67E73FC1939AA61DF472EF5155477DF9F62EF07EAF0E37EF3CF09F72AEB2F18C14B7FF351CF4EB8A6F29122A7C6DD43C776D3BADAA4E00FBC801425255A1701FDB75AC70EFC42DD3D3E6DB200B7BDD47D293E57B82DD68E9FBF11764860A5827A26D4453F8FD52E82867B176FF181C939A02A60BEACCEFE417 ']' 958s + invalid_certificate /tmp/sssd-softhsm2-B0ev2A/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-9634 /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA.pem 958s + check_certificate /tmp/sssd-softhsm2-B0ev2A/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-9634 /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA.pem 958s + local certificate=/tmp/sssd-softhsm2-B0ev2A/test-root-CA-trusted-certificate-0001.pem 958s + local key_pass=pass:random-root-ca-trusted-cert-0001-9634 958s + local key_ring=/tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA.pem 958s + local verify_option= 958s + prepare_softhsm2_card /tmp/sssd-softhsm2-B0ev2A/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-9634 958s + local certificate=/tmp/sssd-softhsm2-B0ev2A/test-root-CA-trusted-certificate-0001.pem 958s + local key_pass=pass:random-root-ca-trusted-cert-0001-9634 958s + local key_cn 958s + local key_name 958s + local tokens_dir 958s + local output_cert_file 958s + token_name= 958s ++ basename /tmp/sssd-softhsm2-B0ev2A/test-root-CA-trusted-certificate-0001.pem .pem 958s + key_name=test-root-CA-trusted-certificate-0001 958s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-B0ev2A/test-root-CA-trusted-certificate-0001.pem 958s ++ sed -n 's/ *commonName *= //p' 958s + key_cn='Test Organization Root Trusted Certificate 0001' 958s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 958s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-B0ev2A/softhsm2-test-root-CA-trusted-certificate-0001.conf 958s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-B0ev2A/softhsm2-test-root-CA-trusted-certificate-0001.conf 958s ++ basename /tmp/sssd-softhsm2-B0ev2A/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 958s + tokens_dir=/tmp/sssd-softhsm2-B0ev2A/softhsm2-test-root-CA-trusted-certificate-0001 958s + token_name='Test Organization Root Tr Token' 958s Test Organization Root Tr Token 958s + '[' '!' -e /tmp/sssd-softhsm2-B0ev2A/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 958s + '[' '!' -d /tmp/sssd-softhsm2-B0ev2A/softhsm2-test-root-CA-trusted-certificate-0001 ']' 958s + echo 'Test Organization Root Tr Token' 958s + '[' -n '' ']' 958s + local output_base_name=SSSD-child-11261 958s + local output_file=/tmp/sssd-softhsm2-B0ev2A/SSSD-child-11261.output 958s + output_cert_file=/tmp/sssd-softhsm2-B0ev2A/SSSD-child-11261.pem 958s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA.pem 958s [p11_child[2320]] [main] (0x0400): p11_child started. 958s [p11_child[2320]] [main] (0x2000): Running in [pre-auth] mode. 958s [p11_child[2320]] [main] (0x2000): Running with effective IDs: [0][0]. 958s [p11_child[2320]] [main] (0x2000): Running with real IDs [0][0]. 958s [p11_child[2320]] [do_card] (0x4000): Module List: 958s [p11_child[2320]] [do_card] (0x4000): common name: [softhsm2]. 958s [p11_child[2320]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 958s [p11_child[2320]] [do_card] (0x4000): Description [SoftHSM slot ID 0xf489a5c] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 958s [p11_child[2320]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 958s [p11_child[2320]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0xf489a5c][256416348] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 958s [p11_child[2320]] [do_card] (0x4000): Login NOT required. 958s [p11_child[2320]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 958s [p11_child[2320]] [do_verification] (0x0040): X509_verify_cert failed [0]. 958s [p11_child[2320]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 958s [p11_child[2320]] [read_certs] (0x0040): Certificate [Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] not valid, skipping. 958s [p11_child[2320]] [do_card] (0x4000): No certificate found. 958s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-B0ev2A/SSSD-child-11261.output 958s + return 2 958s + invalid_certificate /tmp/sssd-softhsm2-B0ev2A/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-9634 /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA.pem partial_chain 958s + check_certificate /tmp/sssd-softhsm2-B0ev2A/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-9634 /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA.pem partial_chain 958s + local certificate=/tmp/sssd-softhsm2-B0ev2A/test-root-CA-trusted-certificate-0001.pem 958s + local key_pass=pass:random-root-ca-trusted-cert-0001-9634 958s + local key_ring=/tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA.pem 958s + local verify_option=partial_chain 958s + prepare_softhsm2_card /tmp/sssd-softhsm2-B0ev2A/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-9634 958s + local certificate=/tmp/sssd-softhsm2-B0ev2A/test-root-CA-trusted-certificate-0001.pem 958s + local key_pass=pass:random-root-ca-trusted-cert-0001-9634 958s + local key_cn 958s + local key_name 958s + local tokens_dir 958s + local output_cert_file 958s + token_name= 958s ++ basename /tmp/sssd-softhsm2-B0ev2A/test-root-CA-trusted-certificate-0001.pem .pem 958s + key_name=test-root-CA-trusted-certificate-0001 958s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-B0ev2A/test-root-CA-trusted-certificate-0001.pem 958s ++ sed -n 's/ *commonName *= //p' 958s + key_cn='Test Organization Root Trusted Certificate 0001' 958s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 958s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-B0ev2A/softhsm2-test-root-CA-trusted-certificate-0001.conf 958s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-B0ev2A/softhsm2-test-root-CA-trusted-certificate-0001.conf 958s ++ basename /tmp/sssd-softhsm2-B0ev2A/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 958s + tokens_dir=/tmp/sssd-softhsm2-B0ev2A/softhsm2-test-root-CA-trusted-certificate-0001 958s + token_name='Test Organization Root Tr Token' 958s + '[' '!' -e /tmp/sssd-softhsm2-B0ev2A/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 958s + '[' '!' -d /tmp/sssd-softhsm2-B0ev2A/softhsm2-test-root-CA-trusted-certificate-0001 ']' 958s + echo 'Test Organization Root Tr Token' 958s Test Organization Root Tr Token 958s + '[' -n partial_chain ']' 958s + local verify_arg=--verify=partial_chain 958s + local output_base_name=SSSD-child-23498 958s + local output_file=/tmp/sssd-softhsm2-B0ev2A/SSSD-child-23498.output 958s + output_cert_file=/tmp/sssd-softhsm2-B0ev2A/SSSD-child-23498.pem 958s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA.pem 958s [p11_child[2327]] [main] (0x0400): p11_child started. 958s [p11_child[2327]] [main] (0x2000): Running in [pre-auth] mode. 958s [p11_child[2327]] [main] (0x2000): Running with effective IDs: [0][0]. 958s [p11_child[2327]] [main] (0x2000): Running with real IDs [0][0]. 958s [p11_child[2327]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 958s [p11_child[2327]] [do_card] (0x4000): Module List: 958s [p11_child[2327]] [do_card] (0x4000): common name: [softhsm2]. 958s [p11_child[2327]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 958s [p11_child[2327]] [do_card] (0x4000): Description [SoftHSM slot ID 0xf489a5c] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 958s [p11_child[2327]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 958s [p11_child[2327]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0xf489a5c][256416348] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 958s [p11_child[2327]] [do_card] (0x4000): Login NOT required. 958s [p11_child[2327]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 958s [p11_child[2327]] [do_verification] (0x0040): X509_verify_cert failed [0]. 958s [p11_child[2327]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 958s [p11_child[2327]] [read_certs] (0x0040): Certificate [Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] not valid, skipping. 958s [p11_child[2327]] [do_card] (0x4000): No certificate found. 958s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-B0ev2A/SSSD-child-23498.output 958s + return 2 958s + invalid_certificate /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-30933 /dev/null 958s + check_certificate /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-30933 /dev/null 958s + local certificate=/tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA-trusted-certificate-0001.pem 958s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-30933 958s + local key_ring=/dev/null 958s + local verify_option= 958s + prepare_softhsm2_card /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-30933 958s + local certificate=/tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA-trusted-certificate-0001.pem 958s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-30933 958s + local key_cn 958s + local key_name 958s + local tokens_dir 958s + local output_cert_file 958s + token_name= 958s ++ basename /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA-trusted-certificate-0001.pem .pem 958s + key_name=test-intermediate-CA-trusted-certificate-0001 958s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA-trusted-certificate-0001.pem 958s ++ sed -n 's/ *commonName *= //p' 958s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 958s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 958s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-B0ev2A/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 958s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-B0ev2A/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 958s ++ basename /tmp/sssd-softhsm2-B0ev2A/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 958s + tokens_dir=/tmp/sssd-softhsm2-B0ev2A/softhsm2-test-intermediate-CA-trusted-certificate-0001 958s + token_name='Test Organization Interme Token' 958s + '[' '!' -e /tmp/sssd-softhsm2-B0ev2A/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 958s + local key_file 958s + local decrypted_key 958s + mkdir -p /tmp/sssd-softhsm2-B0ev2A/softhsm2-test-intermediate-CA-trusted-certificate-0001 958s + key_file=/tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA-trusted-certificate-0001-key.pem 958s + decrypted_key=/tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 958s + cat 958s + softhsm2-util --init-token --label 'Test Organization Interme Token' --pin 053350 --so-pin 053350 --free 958s Slot 0 has a free/uninitialized token. 958s The token has been initialized and is reassigned to slot 1190518114 958s Available slots: 958s Slot 1190518114 958s Slot info: 958s Description: SoftHSM slot ID 0x46f5dd62 958s Manufacturer ID: SoftHSM project 958s Hardware version: 2.6 958s Firmware version: 2.6 958s Token present: yes 958s Token info: 958s Manufacturer ID: SoftHSM project 958s Model: SoftHSM v2 958s Hardware version: 2.6 958s Firmware version: 2.6 958s Serial number: 68d2912846f5dd62 958s Initialized: yes 958s User PIN init.: yes 958s Label: Test Organization Interme Token 958s Slot 1 958s Slot info: 958s Description: SoftHSM slot ID 0x1 958s Manufacturer ID: SoftHSM project 958s Hardware version: 2.6 958s Firmware version: 2.6 958s Token present: yes 958s Token info: 958s Manufacturer ID: SoftHSM project 958s Model: SoftHSM v2 958s Hardware version: 2.6 958s Firmware version: 2.6 958s Serial number: 958s Initialized: no 958s User PIN init.: no 958s Label: 958s + softhsm2-util --show-slots 958s + p11tool --provider=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --write --no-mark-private --load-certificate=/tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA-trusted-certificate-0001.pem --login --set-pin=053350 --label 'Test Organization Intermediate Trusted Certificate 0001' --id 00112233445566778899FFAABBCCDDEEFF012345 958s + openssl rsa -passin pass:random-intermediate-ca-trusted-cert-0001-30933 -in /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA-trusted-certificate-0001-key.pem -out /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 958s writing RSA key 958s + p11tool --provider=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --write --load-privkey=/tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem --login --set-pin=053350 --label 'Test Organization Intermediate Trusted Certificate 0001 Key' --id 00112233445566778899FFAABBCCDDEEFF012345 958s + rm /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 958s + p11tool --provider=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --list-all 958s Object 0: 958s URL: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=68d2912846f5dd62;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert 958s Type: X.509 Certificate (RSA-1024) 958s Expires: Wed Mar 19 03:47:10 2025 958s Label: Test Organization Intermediate Trusted Certificate 0001 958s ID: 00:11:22:33:44:55:66:77:88:99:ff:aa:bb:cc:dd:ee:ff:01:23:45 958s 958s Test Organization Interme Token 958s + echo 'Test Organization Interme Token' 958s + '[' -n '' ']' 958s + local output_base_name=SSSD-child-16378 958s + local output_file=/tmp/sssd-softhsm2-B0ev2A/SSSD-child-16378.output 958s + output_cert_file=/tmp/sssd-softhsm2-B0ev2A/SSSD-child-16378.pem 958s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/dev/null 958s [p11_child[2343]] [main] (0x0400): p11_child started. 958s [p11_child[2343]] [main] (0x2000): Running in [pre-auth] mode. 958s [p11_child[2343]] [main] (0x2000): Running with effective IDs: [0][0]. 958s [p11_child[2343]] [main] (0x2000): Running with real IDs [0][0]. 958s [p11_child[2343]] [init_verification] (0x0040): X509_LOOKUP_load_file [/dev/null] failed [92274824][error:05800088:x509 certificate routines::no certificate or crl found]. 958s [p11_child[2343]] [do_work] (0x0040): init_verification failed. 958s [p11_child[2343]] [main] (0x0020): p11_child failed (5) 958s + return 2 958s + valid_certificate /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-30933 /dev/null no_verification 958s + check_certificate /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-30933 /dev/null no_verification 958s + local certificate=/tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA-trusted-certificate-0001.pem 958s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-30933 958s + local key_ring=/dev/null 958s + local verify_option=no_verification 958s + prepare_softhsm2_card /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-30933 958s + local certificate=/tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA-trusted-certificate-0001.pem 958s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-30933 958s + local key_cn 958s + local key_name 958s + local tokens_dir 958s + local output_cert_file 958s + token_name= 958s ++ basename /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA-trusted-certificate-0001.pem .pem 958s + key_name=test-intermediate-CA-trusted-certificate-0001 958s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA-trusted-certificate-0001.pem 958s ++ sed -n 's/ *commonName *= //p' 958s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 958s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 958s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-B0ev2A/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 958s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-B0ev2A/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 958s ++ basename /tmp/sssd-softhsm2-B0ev2A/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 958s + tokens_dir=/tmp/sssd-softhsm2-B0ev2A/softhsm2-test-intermediate-CA-trusted-certificate-0001 958s + token_name='Test Organization Interme Token' 958s Test Organization Interme Token 958s + '[' '!' -e /tmp/sssd-softhsm2-B0ev2A/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 958s + '[' '!' -d /tmp/sssd-softhsm2-B0ev2A/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 958s + echo 'Test Organization Interme Token' 958s + '[' -n no_verification ']' 958s + local verify_arg=--verify=no_verification 958s + local output_base_name=SSSD-child-24245 958s + local output_file=/tmp/sssd-softhsm2-B0ev2A/SSSD-child-24245.output 958s + output_cert_file=/tmp/sssd-softhsm2-B0ev2A/SSSD-child-24245.pem 958s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --verify=no_verification --ca_db=/dev/null 958s [p11_child[2349]] [main] (0x0400): p11_child started. 958s [p11_child[2349]] [main] (0x2000): Running in [pre-auth] mode. 958s [p11_child[2349]] [main] (0x2000): Running with effective IDs: [0][0]. 958s [p11_child[2349]] [main] (0x2000): Running with real IDs [0][0]. 958s [p11_child[2349]] [parse_cert_verify_opts] (0x0020): Found 'no_verification' option, disabling verification completely. This should not be used in production. 958s [p11_child[2349]] [do_card] (0x4000): Module List: 958s [p11_child[2349]] [do_card] (0x4000): common name: [softhsm2]. 958s [p11_child[2349]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 958s [p11_child[2349]] [do_card] (0x4000): Description [SoftHSM slot ID 0x46f5dd62] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 958s [p11_child[2349]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 958s [p11_child[2349]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x46f5dd62][1190518114] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 958s [p11_child[2349]] [do_card] (0x4000): Login NOT required. 958s [p11_child[2349]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 958s [p11_child[2349]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Interme Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 958s [p11_child[2349]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x46f5dd62;slot-manufacturer=SoftHSM%20project;slot-id=1190518114;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=68d2912846f5dd62;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 958s [p11_child[2349]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 958s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-B0ev2A/SSSD-child-24245.output 958s + echo '-----BEGIN CERTIFICATE-----' 958s + tail -n1 /tmp/sssd-softhsm2-B0ev2A/SSSD-child-24245.output 958s + echo '-----END CERTIFICATE-----' 958s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-B0ev2A/SSSD-child-24245.pem 959s Certificate: 959s Data: 959s Version: 3 (0x2) 959s Serial Number: 4 (0x4) 959s Signature Algorithm: sha256WithRSAEncryption 959s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 959s Validity 959s Not Before: Mar 19 03:47:10 2024 GMT 959s Not After : Mar 19 03:47:10 2025 GMT 959s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 959s Subject Public Key Info: 959s Public Key Algorithm: rsaEncryption 959s Public-Key: (1024 bit) 959s Modulus: 959s 00:c6:9d:d7:67:87:f7:25:d3:a2:77:a4:cf:c2:9b: 959s 31:96:18:4d:70:4c:60:11:31:ef:e6:b6:01:06:47: 959s 17:0e:d0:32:fb:4f:11:47:1d:41:72:a7:84:ba:70: 959s e3:3f:a5:2e:1c:ea:ea:1f:fa:d8:d4:6a:2d:3f:d2: 959s 1a:ab:73:bc:bb:5c:bf:5b:57:df:67:03:0c:1c:bf: 959s 02:0f:74:83:78:14:c6:e0:ee:10:6f:58:be:3a:5a: 959s 0d:f1:a2:a1:d2:12:e9:65:f0:73:25:39:52:d8:3e: 959s dc:35:fe:64:46:5f:0b:44:d1:91:a7:84:b2:6b:cf: 959s dc:51:a6:b0:1e:67:b3:53:ff 959s Exponent: 65537 (0x10001) 959s X509v3 extensions: 959s X509v3 Authority Key Identifier: 959s 62:4F:49:22:11:B5:A7:07:13:13:BA:5B:1B:1D:C1:D8:59:4B:DD:A7 959s X509v3 Basic Constraints: 959s CA:FALSE 959s Netscape Cert Type: 959s SSL Client, S/MIME 959s Netscape Comment: 959s Test Organization Intermediate CA trusted Certificate 959s X509v3 Subject Key Identifier: 959s 41:F1:25:22:FC:6F:8A:D6:0D:8F:12:D6:CB:30:6B:76:69:F1:BC:42 959s X509v3 Key Usage: critical 959s Digital Signature, Non Repudiation, Key Encipherment 959s X509v3 Extended Key Usage: 959s TLS Web Client Authentication, E-mail Protection 959s X509v3 Subject Alternative Name: 959s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 959s Signature Algorithm: sha256WithRSAEncryption 959s Signature Value: 959s 47:00:04:db:94:63:d3:cb:6a:69:14:1a:37:b9:f6:e4:1d:b0: 959s c9:35:58:77:4c:62:b8:4b:ea:fc:6f:9f:46:00:0a:28:f3:00: 959s 3a:a0:a7:54:15:7e:ad:98:e6:33:0b:24:62:e4:eb:b5:02:d7: 959s c5:8c:cb:6b:37:06:ef:58:ab:e2:94:cc:21:d6:9f:3f:db:e8: 959s 2f:30:e8:7a:53:cf:0d:d0:08:ea:29:18:f8:8c:d4:17:d8:c4: 959s 1f:1f:c5:9e:7e:52:95:db:70:de:bf:1a:8d:5d:21:c6:58:e4: 959s ee:bf:fc:46:9c:be:dc:56:52:27:76:64:b9:c7:d4:67:07:43: 959s 65:c7 959s + local found_md5 expected_md5 959s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA-trusted-certificate-0001.pem 959s + expected_md5=Modulus=C69DD76787F725D3A277A4CFC29B3196184D704C601131EFE6B6010647170ED032FB4F11471D4172A784BA70E33FA52E1CEAEA1FFAD8D46A2D3FD21AAB73BCBB5CBF5B57DF67030C1CBF020F74837814C6E0EE106F58BE3A5A0DF1A2A1D212E965F073253952D83EDC35FE64465F0B44D191A784B26BCFDC51A6B01E67B353FF 959s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-B0ev2A/SSSD-child-24245.pem 959s + found_md5=Modulus=C69DD76787F725D3A277A4CFC29B3196184D704C601131EFE6B6010647170ED032FB4F11471D4172A784BA70E33FA52E1CEAEA1FFAD8D46A2D3FD21AAB73BCBB5CBF5B57DF67030C1CBF020F74837814C6E0EE106F58BE3A5A0DF1A2A1D212E965F073253952D83EDC35FE64465F0B44D191A784B26BCFDC51A6B01E67B353FF 959s + '[' Modulus=C69DD76787F725D3A277A4CFC29B3196184D704C601131EFE6B6010647170ED032FB4F11471D4172A784BA70E33FA52E1CEAEA1FFAD8D46A2D3FD21AAB73BCBB5CBF5B57DF67030C1CBF020F74837814C6E0EE106F58BE3A5A0DF1A2A1D212E965F073253952D83EDC35FE64465F0B44D191A784B26BCFDC51A6B01E67B353FF '!=' Modulus=C69DD76787F725D3A277A4CFC29B3196184D704C601131EFE6B6010647170ED032FB4F11471D4172A784BA70E33FA52E1CEAEA1FFAD8D46A2D3FD21AAB73BCBB5CBF5B57DF67030C1CBF020F74837814C6E0EE106F58BE3A5A0DF1A2A1D212E965F073253952D83EDC35FE64465F0B44D191A784B26BCFDC51A6B01E67B353FF ']' 959s + output_file=/tmp/sssd-softhsm2-B0ev2A/SSSD-child-24245-auth.output 959s ++ basename /tmp/sssd-softhsm2-B0ev2A/SSSD-child-24245-auth.output .output 959s + output_cert_file=/tmp/sssd-softhsm2-B0ev2A/SSSD-child-24245-auth.pem 959s + echo -n 053350 959s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/dev/null --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=no_verification --token_name 'Test Organization Interme Token' --module_name /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so 959s [p11_child[2357]] [main] (0x0400): p11_child started. 959s [p11_child[2357]] [main] (0x2000): Running in [auth] mode. 959s [p11_child[2357]] [main] (0x2000): Running with effective IDs: [0][0]. 959s [p11_child[2357]] [main] (0x2000): Running with real IDs [0][0]. 959s [p11_child[2357]] [parse_cert_verify_opts] (0x0020): Found 'no_verification' option, disabling verification completely. This should not be used in production. 959s [p11_child[2357]] [do_card] (0x4000): Module List: 959s [p11_child[2357]] [do_card] (0x4000): common name: [softhsm2]. 959s [p11_child[2357]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 959s [p11_child[2357]] [do_card] (0x4000): Description [SoftHSM slot ID 0x46f5dd62] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 959s [p11_child[2357]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 959s [p11_child[2357]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x46f5dd62][1190518114] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 959s [p11_child[2357]] [do_card] (0x4000): Login required. 959s [p11_child[2357]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 959s [p11_child[2357]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so Test Organization Interme Token Test Organization Interme Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 959s [p11_child[2357]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x46f5dd62;slot-manufacturer=SoftHSM%20project;slot-id=1190518114;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=68d2912846f5dd62;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 959s [p11_child[2357]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 959s [p11_child[2357]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 959s [p11_child[2357]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 959s [p11_child[2357]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 959s [p11_child[2357]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 959s [p11_child[2357]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 959s [p11_child[2357]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 959s [p11_child[2357]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 959s [p11_child[2357]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 959s [p11_child[2357]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 959s [p11_child[2357]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 959s [p11_child[2357]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 959s [p11_child[2357]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 959s [p11_child[2357]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 959s [p11_child[2357]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 959s [p11_child[2357]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 959s [p11_child[2357]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 959s [p11_child[2357]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 959s [p11_child[2357]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 959s [p11_child[2357]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 959s [p11_child[2357]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 959s [p11_child[2357]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 959s [p11_child[2357]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 959s [p11_child[2357]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 959s [p11_child[2357]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 959s [p11_child[2357]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 959s [p11_child[2357]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 959s [p11_child[2357]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 959s [p11_child[2357]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 959s [p11_child[2357]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 959s [p11_child[2357]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 959s [p11_child[2357]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 959s [p11_child[2357]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 959s [p11_child[2357]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 959s [p11_child[2357]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 959s [p11_child[2357]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 959s [p11_child[2357]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 959s [p11_child[2357]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 959s [p11_child[2357]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 959s [p11_child[2357]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 959s [p11_child[2357]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 959s [p11_child[2357]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 959s [p11_child[2357]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 959s [p11_child[2357]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 959s [p11_child[2357]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 959s [p11_child[2357]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 959s [p11_child[2357]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 959s [p11_child[2357]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 959s [p11_child[2357]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 959s [p11_child[2357]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 959s [p11_child[2357]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 959s [p11_child[2357]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 959s [p11_child[2357]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 959s [p11_child[2357]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 959s [p11_child[2357]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 959s [p11_child[2357]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 959s [p11_child[2357]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 959s [p11_child[2357]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 959s [p11_child[2357]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 959s [p11_child[2357]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 959s [p11_child[2357]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 959s [p11_child[2357]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 959s [p11_child[2357]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 959s [p11_child[2357]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 959s [p11_child[2357]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 959s [p11_child[2357]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 959s [p11_child[2357]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 959s [p11_child[2357]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 959s [p11_child[2357]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 959s [p11_child[2357]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 959s [p11_child[2357]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 959s [p11_child[2357]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 959s [p11_child[2357]] [do_card] (0x4000): Certificate verified and validated. 959s [p11_child[2357]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 959s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-B0ev2A/SSSD-child-24245-auth.output 959s + echo '-----BEGIN CERTIFICATE-----' 959s + tail -n1 /tmp/sssd-softhsm2-B0ev2A/SSSD-child-24245-auth.output 959s + echo '-----END CERTIFICATE-----' 959s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-B0ev2A/SSSD-child-24245-auth.pem 959s Certificate: 959s Data: 959s Version: 3 (0x2) 959s Serial Number: 4 (0x4) 959s Signature Algorithm: sha256WithRSAEncryption 959s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 959s Validity 959s Not Before: Mar 19 03:47:10 2024 GMT 959s Not After : Mar 19 03:47:10 2025 GMT 959s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 959s Subject Public Key Info: 959s Public Key Algorithm: rsaEncryption 959s Public-Key: (1024 bit) 959s Modulus: 959s 00:c6:9d:d7:67:87:f7:25:d3:a2:77:a4:cf:c2:9b: 959s 31:96:18:4d:70:4c:60:11:31:ef:e6:b6:01:06:47: 959s 17:0e:d0:32:fb:4f:11:47:1d:41:72:a7:84:ba:70: 959s e3:3f:a5:2e:1c:ea:ea:1f:fa:d8:d4:6a:2d:3f:d2: 959s 1a:ab:73:bc:bb:5c:bf:5b:57:df:67:03:0c:1c:bf: 959s 02:0f:74:83:78:14:c6:e0:ee:10:6f:58:be:3a:5a: 959s 0d:f1:a2:a1:d2:12:e9:65:f0:73:25:39:52:d8:3e: 959s dc:35:fe:64:46:5f:0b:44:d1:91:a7:84:b2:6b:cf: 959s dc:51:a6:b0:1e:67:b3:53:ff 959s Exponent: 65537 (0x10001) 959s X509v3 extensions: 959s X509v3 Authority Key Identifier: 959s 62:4F:49:22:11:B5:A7:07:13:13:BA:5B:1B:1D:C1:D8:59:4B:DD:A7 959s X509v3 Basic Constraints: 959s CA:FALSE 959s Netscape Cert Type: 959s SSL Client, S/MIME 959s Netscape Comment: 959s Test Organization Intermediate CA trusted Certificate 959s X509v3 Subject Key Identifier: 959s 41:F1:25:22:FC:6F:8A:D6:0D:8F:12:D6:CB:30:6B:76:69:F1:BC:42 959s X509v3 Key Usage: critical 959s Digital Signature, Non Repudiation, Key Encipherment 959s X509v3 Extended Key Usage: 959s TLS Web Client Authentication, E-mail Protection 959s X509v3 Subject Alternative Name: 959s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 959s Signature Algorithm: sha256WithRSAEncryption 959s Signature Value: 959s 47:00:04:db:94:63:d3:cb:6a:69:14:1a:37:b9:f6:e4:1d:b0: 959s c9:35:58:77:4c:62:b8:4b:ea:fc:6f:9f:46:00:0a:28:f3:00: 959s 3a:a0:a7:54:15:7e:ad:98:e6:33:0b:24:62:e4:eb:b5:02:d7: 959s c5:8c:cb:6b:37:06:ef:58:ab:e2:94:cc:21:d6:9f:3f:db:e8: 959s 2f:30:e8:7a:53:cf:0d:d0:08:ea:29:18:f8:8c:d4:17:d8:c4: 959s 1f:1f:c5:9e:7e:52:95:db:70:de:bf:1a:8d:5d:21:c6:58:e4: 959s ee:bf:fc:46:9c:be:dc:56:52:27:76:64:b9:c7:d4:67:07:43: 959s 65:c7 959s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-B0ev2A/SSSD-child-24245-auth.pem 959s + found_md5=Modulus=C69DD76787F725D3A277A4CFC29B3196184D704C601131EFE6B6010647170ED032FB4F11471D4172A784BA70E33FA52E1CEAEA1FFAD8D46A2D3FD21AAB73BCBB5CBF5B57DF67030C1CBF020F74837814C6E0EE106F58BE3A5A0DF1A2A1D212E965F073253952D83EDC35FE64465F0B44D191A784B26BCFDC51A6B01E67B353FF 959s + '[' Modulus=C69DD76787F725D3A277A4CFC29B3196184D704C601131EFE6B6010647170ED032FB4F11471D4172A784BA70E33FA52E1CEAEA1FFAD8D46A2D3FD21AAB73BCBB5CBF5B57DF67030C1CBF020F74837814C6E0EE106F58BE3A5A0DF1A2A1D212E965F073253952D83EDC35FE64465F0B44D191A784B26BCFDC51A6B01E67B353FF '!=' Modulus=C69DD76787F725D3A277A4CFC29B3196184D704C601131EFE6B6010647170ED032FB4F11471D4172A784BA70E33FA52E1CEAEA1FFAD8D46A2D3FD21AAB73BCBB5CBF5B57DF67030C1CBF020F74837814C6E0EE106F58BE3A5A0DF1A2A1D212E965F073253952D83EDC35FE64465F0B44D191A784B26BCFDC51A6B01E67B353FF ']' 959s + invalid_certificate /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-30933 /tmp/sssd-softhsm2-B0ev2A/test-root-CA.pem 959s + check_certificate /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-30933 /tmp/sssd-softhsm2-B0ev2A/test-root-CA.pem 959s + local certificate=/tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA-trusted-certificate-0001.pem 959s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-30933 959s + local key_ring=/tmp/sssd-softhsm2-B0ev2A/test-root-CA.pem 959s + local verify_option= 959s + prepare_softhsm2_card /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-30933 959s + local certificate=/tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA-trusted-certificate-0001.pem 959s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-30933 959s + local key_cn 959s + local key_name 959s + local tokens_dir 959s + local output_cert_file 959s + token_name= 959s ++ basename /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA-trusted-certificate-0001.pem .pem 959s + key_name=test-intermediate-CA-trusted-certificate-0001 959s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA-trusted-certificate-0001.pem 959s Test Organization Interme Token 959s Test Organization Interme Token 959s ++ sed -n 's/ *commonName *= //p' 959s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 959s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 959s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-B0ev2A/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 959s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-B0ev2A/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 959s ++ basename /tmp/sssd-softhsm2-B0ev2A/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 959s + tokens_dir=/tmp/sssd-softhsm2-B0ev2A/softhsm2-test-intermediate-CA-trusted-certificate-0001 959s + token_name='Test Organization Interme Token' 959s + '[' '!' -e /tmp/sssd-softhsm2-B0ev2A/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 959s + '[' '!' -d /tmp/sssd-softhsm2-B0ev2A/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 959s + echo 'Test Organization Interme Token' 959s + '[' -n '' ']' 959s + local output_base_name=SSSD-child-2772 959s + local output_file=/tmp/sssd-softhsm2-B0ev2A/SSSD-child-2772.output 959s + output_cert_file=/tmp/sssd-softhsm2-B0ev2A/SSSD-child-2772.pem 959s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-B0ev2A/test-root-CA.pem 959s [p11_child[2367]] [main] (0x0400): p11_child started. 959s [p11_child[2367]] [main] (0x2000): Running in [pre-auth] mode. 959s [p11_child[2367]] [main] (0x2000): Running with effective IDs: [0][0]. 959s [p11_child[2367]] [main] (0x2000): Running with real IDs [0][0]. 959s [p11_child[2367]] [do_card] (0x4000): Module List: 959s [p11_child[2367]] [do_card] (0x4000): common name: [softhsm2]. 959s [p11_child[2367]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 959s [p11_child[2367]] [do_card] (0x4000): Description [SoftHSM slot ID 0x46f5dd62] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 959s [p11_child[2367]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 959s [p11_child[2367]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x46f5dd62][1190518114] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 959s [p11_child[2367]] [do_card] (0x4000): Login NOT required. 959s [p11_child[2367]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 959s [p11_child[2367]] [do_verification] (0x0040): X509_verify_cert failed [0]. 959s [p11_child[2367]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 959s [p11_child[2367]] [read_certs] (0x0040): Certificate [Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] not valid, skipping. 959s [p11_child[2367]] [do_card] (0x4000): No certificate found. 959s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-B0ev2A/SSSD-child-2772.output 959s + return 2 959s + invalid_certificate /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-30933 /tmp/sssd-softhsm2-B0ev2A/test-root-CA.pem partial_chain 959s + check_certificate /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-30933 /tmp/sssd-softhsm2-B0ev2A/test-root-CA.pem partial_chain 959s + local certificate=/tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA-trusted-certificate-0001.pem 959s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-30933 959s + local key_ring=/tmp/sssd-softhsm2-B0ev2A/test-root-CA.pem 959s + local verify_option=partial_chain 959s + prepare_softhsm2_card /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-30933 959s + local certificate=/tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA-trusted-certificate-0001.pem 959s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-30933 959s + local key_cn 959s + local key_name 959s + local tokens_dir 959s + local output_cert_file 959s + token_name= 959s ++ basename /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA-trusted-certificate-0001.pem .pem 959s + key_name=test-intermediate-CA-trusted-certificate-0001 959s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA-trusted-certificate-0001.pem 959s ++ sed -n 's/ *commonName *= //p' 959s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 959s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 959s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-B0ev2A/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 959s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-B0ev2A/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 959s ++ basename /tmp/sssd-softhsm2-B0ev2A/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 959s + tokens_dir=/tmp/sssd-softhsm2-B0ev2A/softhsm2-test-intermediate-CA-trusted-certificate-0001 959s + token_name='Test Organization Interme Token' 959s + '[' '!' -e /tmp/sssd-softhsm2-B0ev2A/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 959s + '[' '!' -d /tmp/sssd-softhsm2-B0ev2A/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 959s + echo 'Test Organization Interme Token' 959s + '[' -n partial_chain ']' 959s + local verify_arg=--verify=partial_chain 959s + local output_base_name=SSSD-child-17986 959s + local output_file=/tmp/sssd-softhsm2-B0ev2A/SSSD-child-17986.output 959s + output_cert_file=/tmp/sssd-softhsm2-B0ev2A/SSSD-child-17986.pem 959s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-B0ev2A/test-root-CA.pem 959s [p11_child[2374]] [main] (0x0400): p11_child started. 959s [p11_child[2374]] [main] (0x2000): Running in [pre-auth] mode. 959s [p11_child[2374]] [main] (0x2000): Running with effective IDs: [0][0]. 959s [p11_child[2374]] [main] (0x2000): Running with real IDs [0][0]. 959s [p11_child[2374]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 959s [p11_child[2374]] [do_card] (0x4000): Module List: 959s [p11_child[2374]] [do_card] (0x4000): common name: [softhsm2]. 959s [p11_child[2374]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 959s [p11_child[2374]] [do_card] (0x4000): Description [SoftHSM slot ID 0x46f5dd62] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 959s [p11_child[2374]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 959s [p11_child[2374]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x46f5dd62][1190518114] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 959s [p11_child[2374]] [do_card] (0x4000): Login NOT required. 959s [p11_child[2374]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 959s [p11_child[2374]] [do_verification] (0x0040): X509_verify_cert failed [0]. 959s [p11_child[2374]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 959s [p11_child[2374]] [read_certs] (0x0040): Certificate [Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] not valid, skipping. 959s [p11_child[2374]] [do_card] (0x4000): No certificate found. 959s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-B0ev2A/SSSD-child-17986.output 959s + return 2 959s + valid_certificate /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-30933 /tmp/sssd-softhsm2-B0ev2A/test-full-chain-CA.pem 959s + check_certificate /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-30933 /tmp/sssd-softhsm2-B0ev2A/test-full-chain-CA.pem 959s + local certificate=/tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA-trusted-certificate-0001.pem 959s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-30933 959s + local key_ring=/tmp/sssd-softhsm2-B0ev2A/test-full-chain-CA.pem 959s + local verify_option= 959s + prepare_softhsm2_card /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-30933 959s + local certificate=/tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA-trusted-certificate-0001.pem 959s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-30933 959s + local key_cn 959s + local key_name 959s + local tokens_dir 959s + local output_cert_file 959s + token_name= 959s ++ basename /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA-trusted-certificate-0001.pem .pem 959s + key_name=test-intermediate-CA-trusted-certificate-0001 959s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA-trusted-certificate-0001.pem 959s ++ sed -n 's/ *commonName *= //p' 959s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 959s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 959s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-B0ev2A/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 959s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-B0ev2A/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 959s ++ basename /tmp/sssd-softhsm2-B0ev2A/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 959s + tokens_dir=/tmp/sssd-softhsm2-B0ev2A/softhsm2-test-intermediate-CA-trusted-certificate-0001 959s + token_name='Test Organization Interme Token' 959s + '[' '!' -e /tmp/sssd-softhsm2-B0ev2A/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 959s + '[' '!' -d /tmp/sssd-softhsm2-B0ev2A/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 959s + echo 'Test Organization Interme Token' 959s Test Organization Interme Token 959s + '[' -n '' ']' 959s + local output_base_name=SSSD-child-17819 959s + local output_file=/tmp/sssd-softhsm2-B0ev2A/SSSD-child-17819.output 959s + output_cert_file=/tmp/sssd-softhsm2-B0ev2A/SSSD-child-17819.pem 959s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-B0ev2A/test-full-chain-CA.pem 959s [p11_child[2381]] [main] (0x0400): p11_child started. 959s [p11_child[2381]] [main] (0x2000): Running in [pre-auth] mode. 959s [p11_child[2381]] [main] (0x2000): Running with effective IDs: [0][0]. 959s [p11_child[2381]] [main] (0x2000): Running with real IDs [0][0]. 959s [p11_child[2381]] [do_card] (0x4000): Module List: 959s [p11_child[2381]] [do_card] (0x4000): common name: [softhsm2]. 959s [p11_child[2381]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 959s [p11_child[2381]] [do_card] (0x4000): Description [SoftHSM slot ID 0x46f5dd62] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 959s [p11_child[2381]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 959s [p11_child[2381]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x46f5dd62][1190518114] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 959s [p11_child[2381]] [do_card] (0x4000): Login NOT required. 959s [p11_child[2381]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 959s [p11_child[2381]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 959s [p11_child[2381]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Interme Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 959s [p11_child[2381]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x46f5dd62;slot-manufacturer=SoftHSM%20project;slot-id=1190518114;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=68d2912846f5dd62;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 959s [p11_child[2381]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 959s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-B0ev2A/SSSD-child-17819.output 959s + echo '-----BEGIN CERTIFICATE-----' 959s + tail -n1 /tmp/sssd-softhsm2-B0ev2A/SSSD-child-17819.output 959s + echo '-----END CERTIFICATE-----' 959s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-B0ev2A/SSSD-child-17819.pem 959s Certificate: 959s Data: 959s Version: 3 (0x2) 959s Serial Number: 4 (0x4) 959s Signature Algorithm: sha256WithRSAEncryption 959s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 959s Validity 959s Not Before: Mar 19 03:47:10 2024 GMT 959s Not After : Mar 19 03:47:10 2025 GMT 959s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 959s Subject Public Key Info: 959s Public Key Algorithm: rsaEncryption 959s Public-Key: (1024 bit) 959s Modulus: 959s 00:c6:9d:d7:67:87:f7:25:d3:a2:77:a4:cf:c2:9b: 959s 31:96:18:4d:70:4c:60:11:31:ef:e6:b6:01:06:47: 959s 17:0e:d0:32:fb:4f:11:47:1d:41:72:a7:84:ba:70: 959s e3:3f:a5:2e:1c:ea:ea:1f:fa:d8:d4:6a:2d:3f:d2: 959s 1a:ab:73:bc:bb:5c:bf:5b:57:df:67:03:0c:1c:bf: 959s 02:0f:74:83:78:14:c6:e0:ee:10:6f:58:be:3a:5a: 959s 0d:f1:a2:a1:d2:12:e9:65:f0:73:25:39:52:d8:3e: 959s dc:35:fe:64:46:5f:0b:44:d1:91:a7:84:b2:6b:cf: 959s dc:51:a6:b0:1e:67:b3:53:ff 959s Exponent: 65537 (0x10001) 959s X509v3 extensions: 959s X509v3 Authority Key Identifier: 959s 62:4F:49:22:11:B5:A7:07:13:13:BA:5B:1B:1D:C1:D8:59:4B:DD:A7 959s X509v3 Basic Constraints: 959s CA:FALSE 959s Netscape Cert Type: 959s SSL Client, S/MIME 959s Netscape Comment: 959s Test Organization Intermediate CA trusted Certificate 959s X509v3 Subject Key Identifier: 959s 41:F1:25:22:FC:6F:8A:D6:0D:8F:12:D6:CB:30:6B:76:69:F1:BC:42 959s X509v3 Key Usage: critical 959s Digital Signature, Non Repudiation, Key Encipherment 959s X509v3 Extended Key Usage: 959s TLS Web Client Authentication, E-mail Protection 959s X509v3 Subject Alternative Name: 959s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 959s Signature Algorithm: sha256WithRSAEncryption 959s Signature Value: 959s 47:00:04:db:94:63:d3:cb:6a:69:14:1a:37:b9:f6:e4:1d:b0: 959s c9:35:58:77:4c:62:b8:4b:ea:fc:6f:9f:46:00:0a:28:f3:00: 959s 3a:a0:a7:54:15:7e:ad:98:e6:33:0b:24:62:e4:eb:b5:02:d7: 959s c5:8c:cb:6b:37:06:ef:58:ab:e2:94:cc:21:d6:9f:3f:db:e8: 959s 2f:30:e8:7a:53:cf:0d:d0:08:ea:29:18:f8:8c:d4:17:d8:c4: 959s 1f:1f:c5:9e:7e:52:95:db:70:de:bf:1a:8d:5d:21:c6:58:e4: 959s ee:bf:fc:46:9c:be:dc:56:52:27:76:64:b9:c7:d4:67:07:43: 959s 65:c7 959s + local found_md5 expected_md5 959s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA-trusted-certificate-0001.pem 959s + expected_md5=Modulus=C69DD76787F725D3A277A4CFC29B3196184D704C601131EFE6B6010647170ED032FB4F11471D4172A784BA70E33FA52E1CEAEA1FFAD8D46A2D3FD21AAB73BCBB5CBF5B57DF67030C1CBF020F74837814C6E0EE106F58BE3A5A0DF1A2A1D212E965F073253952D83EDC35FE64465F0B44D191A784B26BCFDC51A6B01E67B353FF 959s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-B0ev2A/SSSD-child-17819.pem 959s + found_md5=Modulus=C69DD76787F725D3A277A4CFC29B3196184D704C601131EFE6B6010647170ED032FB4F11471D4172A784BA70E33FA52E1CEAEA1FFAD8D46A2D3FD21AAB73BCBB5CBF5B57DF67030C1CBF020F74837814C6E0EE106F58BE3A5A0DF1A2A1D212E965F073253952D83EDC35FE64465F0B44D191A784B26BCFDC51A6B01E67B353FF 959s + '[' Modulus=C69DD76787F725D3A277A4CFC29B3196184D704C601131EFE6B6010647170ED032FB4F11471D4172A784BA70E33FA52E1CEAEA1FFAD8D46A2D3FD21AAB73BCBB5CBF5B57DF67030C1CBF020F74837814C6E0EE106F58BE3A5A0DF1A2A1D212E965F073253952D83EDC35FE64465F0B44D191A784B26BCFDC51A6B01E67B353FF '!=' Modulus=C69DD76787F725D3A277A4CFC29B3196184D704C601131EFE6B6010647170ED032FB4F11471D4172A784BA70E33FA52E1CEAEA1FFAD8D46A2D3FD21AAB73BCBB5CBF5B57DF67030C1CBF020F74837814C6E0EE106F58BE3A5A0DF1A2A1D212E965F073253952D83EDC35FE64465F0B44D191A784B26BCFDC51A6B01E67B353FF ']' 959s + output_file=/tmp/sssd-softhsm2-B0ev2A/SSSD-child-17819-auth.output 959s ++ basename /tmp/sssd-softhsm2-B0ev2A/SSSD-child-17819-auth.output .output 959s + output_cert_file=/tmp/sssd-softhsm2-B0ev2A/SSSD-child-17819-auth.pem 959s + echo -n 053350 959s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-B0ev2A/test-full-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 '' --token_name 'Test Organization Interme Token' --module_name /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so 959s [p11_child[2389]] [main] (0x0400): p11_child started. 959s [p11_child[2389]] [main] (0x2000): Running in [auth] mode. 959s [p11_child[2389]] [main] (0x2000): Running with effective IDs: [0][0]. 959s [p11_child[2389]] [main] (0x2000): Running with real IDs [0][0]. 959s [p11_child[2389]] [do_card] (0x4000): Module List: 959s [p11_child[2389]] [do_card] (0x4000): common name: [softhsm2]. 959s [p11_child[2389]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 959s [p11_child[2389]] [do_card] (0x4000): Description [SoftHSM slot ID 0x46f5dd62] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 959s [p11_child[2389]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 959s [p11_child[2389]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x46f5dd62][1190518114] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 959s [p11_child[2389]] [do_card] (0x4000): Login required. 959s [p11_child[2389]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 959s [p11_child[2389]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 959s [p11_child[2389]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so Test Organization Interme Token Test Organization Interme Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 959s [p11_child[2389]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x46f5dd62;slot-manufacturer=SoftHSM%20project;slot-id=1190518114;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=68d2912846f5dd62;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 959s [p11_child[2389]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 959s [p11_child[2389]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 959s [p11_child[2389]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 959s [p11_child[2389]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 959s [p11_child[2389]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 959s [p11_child[2389]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 959s [p11_child[2389]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 959s [p11_child[2389]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 959s [p11_child[2389]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 959s [p11_child[2389]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 959s [p11_child[2389]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 959s [p11_child[2389]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 959s [p11_child[2389]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 959s [p11_child[2389]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 959s [p11_child[2389]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 959s [p11_child[2389]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 959s [p11_child[2389]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 959s [p11_child[2389]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 959s [p11_child[2389]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 959s [p11_child[2389]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 959s [p11_child[2389]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 959s [p11_child[2389]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 959s [p11_child[2389]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 959s [p11_child[2389]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 959s [p11_child[2389]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 959s [p11_child[2389]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 959s [p11_child[2389]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 959s [p11_child[2389]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 959s [p11_child[2389]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 959s [p11_child[2389]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 959s [p11_child[2389]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 959s [p11_child[2389]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 959s [p11_child[2389]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 959s [p11_child[2389]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 959s [p11_child[2389]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 959s [p11_child[2389]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 959s [p11_child[2389]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 959s [p11_child[2389]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 959s [p11_child[2389]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 959s [p11_child[2389]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 959s [p11_child[2389]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 959s [p11_child[2389]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 959s [p11_child[2389]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 959s [p11_child[2389]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 959s [p11_child[2389]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 959s [p11_child[2389]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 959s [p11_child[2389]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 959s [p11_child[2389]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 959s [p11_child[2389]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 959s [p11_child[2389]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 959s [p11_child[2389]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 959s [p11_child[2389]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 959s [p11_child[2389]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 959s [p11_child[2389]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 959s [p11_child[2389]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 959s [p11_child[2389]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 959s [p11_child[2389]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 959s [p11_child[2389]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 959s [p11_child[2389]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 959s [p11_child[2389]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 959s [p11_child[2389]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 959s [p11_child[2389]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 959s [p11_child[2389]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 959s [p11_child[2389]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 959s [p11_child[2389]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 959s [p11_child[2389]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 959s [p11_child[2389]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 959s [p11_child[2389]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 959s [p11_child[2389]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 959s [p11_child[2389]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 959s [p11_child[2389]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 959s [p11_child[2389]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 959s [p11_child[2389]] [do_card] (0x4000): Certificate verified and validated. 959s [p11_child[2389]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 959s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-B0ev2A/SSSD-child-17819-auth.output 959s + echo '-----BEGIN CERTIFICATE-----' 959s + tail -n1 /tmp/sssd-softhsm2-B0ev2A/SSSD-child-17819-auth.output 959s + echo '-----END CERTIFICATE-----' 959s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-B0ev2A/SSSD-child-17819-auth.pem 959s Certificate: 959s Data: 959s Version: 3 (0x2) 959s Serial Number: 4 (0x4) 959s Signature Algorithm: sha256WithRSAEncryption 959s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 959s Validity 959s Not Before: Mar 19 03:47:10 2024 GMT 959s Not After : Mar 19 03:47:10 2025 GMT 959s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 959s Subject Public Key Info: 959s Public Key Algorithm: rsaEncryption 959s Public-Key: (1024 bit) 959s Modulus: 959s 00:c6:9d:d7:67:87:f7:25:d3:a2:77:a4:cf:c2:9b: 959s 31:96:18:4d:70:4c:60:11:31:ef:e6:b6:01:06:47: 959s 17:0e:d0:32:fb:4f:11:47:1d:41:72:a7:84:ba:70: 959s e3:3f:a5:2e:1c:ea:ea:1f:fa:d8:d4:6a:2d:3f:d2: 959s 1a:ab:73:bc:bb:5c:bf:5b:57:df:67:03:0c:1c:bf: 959s 02:0f:74:83:78:14:c6:e0:ee:10:6f:58:be:3a:5a: 959s 0d:f1:a2:a1:d2:12:e9:65:f0:73:25:39:52:d8:3e: 959s dc:35:fe:64:46:5f:0b:44:d1:91:a7:84:b2:6b:cf: 959s dc:51:a6:b0:1e:67:b3:53:ff 959s Exponent: 65537 (0x10001) 959s X509v3 extensions: 959s X509v3 Authority Key Identifier: 959s 62:4F:49:22:11:B5:A7:07:13:13:BA:5B:1B:1D:C1:D8:59:4B:DD:A7 959s X509v3 Basic Constraints: 959s CA:FALSE 959s Netscape Cert Type: 959s SSL Client, S/MIME 959s Netscape Comment: 959s Test Organization Intermediate CA trusted Certificate 959s X509v3 Subject Key Identifier: 959s 41:F1:25:22:FC:6F:8A:D6:0D:8F:12:D6:CB:30:6B:76:69:F1:BC:42 959s X509v3 Key Usage: critical 959s Digital Signature, Non Repudiation, Key Encipherment 959s X509v3 Extended Key Usage: 959s TLS Web Client Authentication, E-mail Protection 959s X509v3 Subject Alternative Name: 959s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 959s Signature Algorithm: sha256WithRSAEncryption 959s Signature Value: 959s 47:00:04:db:94:63:d3:cb:6a:69:14:1a:37:b9:f6:e4:1d:b0: 959s c9:35:58:77:4c:62:b8:4b:ea:fc:6f:9f:46:00:0a:28:f3:00: 959s 3a:a0:a7:54:15:7e:ad:98:e6:33:0b:24:62:e4:eb:b5:02:d7: 959s c5:8c:cb:6b:37:06:ef:58:ab:e2:94:cc:21:d6:9f:3f:db:e8: 959s 2f:30:e8:7a:53:cf:0d:d0:08:ea:29:18:f8:8c:d4:17:d8:c4: 959s 1f:1f:c5:9e:7e:52:95:db:70:de:bf:1a:8d:5d:21:c6:58:e4: 959s ee:bf:fc:46:9c:be:dc:56:52:27:76:64:b9:c7:d4:67:07:43: 959s 65:c7 959s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-B0ev2A/SSSD-child-17819-auth.pem 959s + found_md5=Modulus=C69DD76787F725D3A277A4CFC29B3196184D704C601131EFE6B6010647170ED032FB4F11471D4172A784BA70E33FA52E1CEAEA1FFAD8D46A2D3FD21AAB73BCBB5CBF5B57DF67030C1CBF020F74837814C6E0EE106F58BE3A5A0DF1A2A1D212E965F073253952D83EDC35FE64465F0B44D191A784B26BCFDC51A6B01E67B353FF 959s + '[' Modulus=C69DD76787F725D3A277A4CFC29B3196184D704C601131EFE6B6010647170ED032FB4F11471D4172A784BA70E33FA52E1CEAEA1FFAD8D46A2D3FD21AAB73BCBB5CBF5B57DF67030C1CBF020F74837814C6E0EE106F58BE3A5A0DF1A2A1D212E965F073253952D83EDC35FE64465F0B44D191A784B26BCFDC51A6B01E67B353FF '!=' Modulus=C69DD76787F725D3A277A4CFC29B3196184D704C601131EFE6B6010647170ED032FB4F11471D4172A784BA70E33FA52E1CEAEA1FFAD8D46A2D3FD21AAB73BCBB5CBF5B57DF67030C1CBF020F74837814C6E0EE106F58BE3A5A0DF1A2A1D212E965F073253952D83EDC35FE64465F0B44D191A784B26BCFDC51A6B01E67B353FF ']' 959s + valid_certificate /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-30933 /tmp/sssd-softhsm2-B0ev2A/test-full-chain-CA.pem partial_chain 959s + check_certificate /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-30933 /tmp/sssd-softhsm2-B0ev2A/test-full-chain-CA.pem partial_chain 959s + local certificate=/tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA-trusted-certificate-0001.pem 959s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-30933 959s + local key_ring=/tmp/sssd-softhsm2-B0ev2A/test-full-chain-CA.pem 959s + local verify_option=partial_chain 959s + prepare_softhsm2_card /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-30933 959s + local certificate=/tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA-trusted-certificate-0001.pem 959s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-30933 959s + local key_cn 959s + local key_name 959s + local tokens_dir 959s + local output_cert_file 959s + token_name= 959s ++ basename /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA-trusted-certificate-0001.pem .pem 959s + key_name=test-intermediate-CA-trusted-certificate-0001 959s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA-trusted-certificate-0001.pem 959s ++ sed -n 's/ *commonName *= //p' 959s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 959s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 959s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-B0ev2A/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 959s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-B0ev2A/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 959s ++ basename /tmp/sssd-softhsm2-B0ev2A/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 959s + tokens_dir=/tmp/sssd-softhsm2-B0ev2A/softhsm2-test-intermediate-CA-trusted-certificate-0001 959s + token_name='Test Organization Interme Token' 959s + '[' '!' -e /tmp/sssd-softhsm2-B0ev2A/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 959s + '[' '!' -d /tmp/sssd-softhsm2-B0ev2A/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 959s + echo 'Test Organization Interme Token' 959s + '[' -n partial_chain ']' 959s Test Organization Interme Token 959s + local verify_arg=--verify=partial_chain 959s + local output_base_name=SSSD-child-11298 959s + local output_file=/tmp/sssd-softhsm2-B0ev2A/SSSD-child-11298.output 959s + output_cert_file=/tmp/sssd-softhsm2-B0ev2A/SSSD-child-11298.pem 959s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-B0ev2A/test-full-chain-CA.pem 959s [p11_child[2399]] [main] (0x0400): p11_child started. 959s [p11_child[2399]] [main] (0x2000): Running in [pre-auth] mode. 959s [p11_child[2399]] [main] (0x2000): Running with effective IDs: [0][0]. 959s [p11_child[2399]] [main] (0x2000): Running with real IDs [0][0]. 959s [p11_child[2399]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 959s [p11_child[2399]] [do_card] (0x4000): Module List: 959s [p11_child[2399]] [do_card] (0x4000): common name: [softhsm2]. 959s [p11_child[2399]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 959s [p11_child[2399]] [do_card] (0x4000): Description [SoftHSM slot ID 0x46f5dd62] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 959s [p11_child[2399]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 959s [p11_child[2399]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x46f5dd62][1190518114] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 959s [p11_child[2399]] [do_card] (0x4000): Login NOT required. 959s [p11_child[2399]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 959s [p11_child[2399]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 959s [p11_child[2399]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Interme Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 959s [p11_child[2399]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x46f5dd62;slot-manufacturer=SoftHSM%20project;slot-id=1190518114;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=68d2912846f5dd62;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 959s [p11_child[2399]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 959s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-B0ev2A/SSSD-child-11298.output 959s + echo '-----BEGIN CERTIFICATE-----' 959s + tail -n1 /tmp/sssd-softhsm2-B0ev2A/SSSD-child-11298.output 959s + echo '-----END CERTIFICATE-----' 959s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-B0ev2A/SSSD-child-11298.pem 959s + local found_md5 expected_md5 959s Certificate: 959s Data: 959s Version: 3 (0x2) 959s Serial Number: 4 (0x4) 959s Signature Algorithm: sha256WithRSAEncryption 959s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 959s Validity 959s Not Before: Mar 19 03:47:10 2024 GMT 959s Not After : Mar 19 03:47:10 2025 GMT 959s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 959s Subject Public Key Info: 959s Public Key Algorithm: rsaEncryption 959s Public-Key: (1024 bit) 959s Modulus: 959s 00:c6:9d:d7:67:87:f7:25:d3:a2:77:a4:cf:c2:9b: 959s 31:96:18:4d:70:4c:60:11:31:ef:e6:b6:01:06:47: 959s 17:0e:d0:32:fb:4f:11:47:1d:41:72:a7:84:ba:70: 959s e3:3f:a5:2e:1c:ea:ea:1f:fa:d8:d4:6a:2d:3f:d2: 959s 1a:ab:73:bc:bb:5c:bf:5b:57:df:67:03:0c:1c:bf: 959s 02:0f:74:83:78:14:c6:e0:ee:10:6f:58:be:3a:5a: 959s 0d:f1:a2:a1:d2:12:e9:65:f0:73:25:39:52:d8:3e: 959s dc:35:fe:64:46:5f:0b:44:d1:91:a7:84:b2:6b:cf: 959s dc:51:a6:b0:1e:67:b3:53:ff 959s Exponent: 65537 (0x10001) 959s X509v3 extensions: 959s X509v3 Authority Key Identifier: 959s 62:4F:49:22:11:B5:A7:07:13:13:BA:5B:1B:1D:C1:D8:59:4B:DD:A7 959s X509v3 Basic Constraints: 959s CA:FALSE 959s Netscape Cert Type: 959s SSL Client, S/MIME 959s Netscape Comment: 959s Test Organization Intermediate CA trusted Certificate 959s X509v3 Subject Key Identifier: 959s 41:F1:25:22:FC:6F:8A:D6:0D:8F:12:D6:CB:30:6B:76:69:F1:BC:42 959s X509v3 Key Usage: critical 959s Digital Signature, Non Repudiation, Key Encipherment 959s X509v3 Extended Key Usage: 959s TLS Web Client Authentication, E-mail Protection 959s X509v3 Subject Alternative Name: 959s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 959s Signature Algorithm: sha256WithRSAEncryption 959s Signature Value: 959s 47:00:04:db:94:63:d3:cb:6a:69:14:1a:37:b9:f6:e4:1d:b0: 959s c9:35:58:77:4c:62:b8:4b:ea:fc:6f:9f:46:00:0a:28:f3:00: 959s 3a:a0:a7:54:15:7e:ad:98:e6:33:0b:24:62:e4:eb:b5:02:d7: 959s c5:8c:cb:6b:37:06:ef:58:ab:e2:94:cc:21:d6:9f:3f:db:e8: 959s 2f:30:e8:7a:53:cf:0d:d0:08:ea:29:18:f8:8c:d4:17:d8:c4: 959s 1f:1f:c5:9e:7e:52:95:db:70:de:bf:1a:8d:5d:21:c6:58:e4: 959s ee:bf:fc:46:9c:be:dc:56:52:27:76:64:b9:c7:d4:67:07:43: 959s 65:c7 959s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA-trusted-certificate-0001.pem 959s + expected_md5=Modulus=C69DD76787F725D3A277A4CFC29B3196184D704C601131EFE6B6010647170ED032FB4F11471D4172A784BA70E33FA52E1CEAEA1FFAD8D46A2D3FD21AAB73BCBB5CBF5B57DF67030C1CBF020F74837814C6E0EE106F58BE3A5A0DF1A2A1D212E965F073253952D83EDC35FE64465F0B44D191A784B26BCFDC51A6B01E67B353FF 959s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-B0ev2A/SSSD-child-11298.pem 959s + found_md5=Modulus=C69DD76787F725D3A277A4CFC29B3196184D704C601131EFE6B6010647170ED032FB4F11471D4172A784BA70E33FA52E1CEAEA1FFAD8D46A2D3FD21AAB73BCBB5CBF5B57DF67030C1CBF020F74837814C6E0EE106F58BE3A5A0DF1A2A1D212E965F073253952D83EDC35FE64465F0B44D191A784B26BCFDC51A6B01E67B353FF 959s + '[' Modulus=C69DD76787F725D3A277A4CFC29B3196184D704C601131EFE6B6010647170ED032FB4F11471D4172A784BA70E33FA52E1CEAEA1FFAD8D46A2D3FD21AAB73BCBB5CBF5B57DF67030C1CBF020F74837814C6E0EE106F58BE3A5A0DF1A2A1D212E965F073253952D83EDC35FE64465F0B44D191A784B26BCFDC51A6B01E67B353FF '!=' Modulus=C69DD76787F725D3A277A4CFC29B3196184D704C601131EFE6B6010647170ED032FB4F11471D4172A784BA70E33FA52E1CEAEA1FFAD8D46A2D3FD21AAB73BCBB5CBF5B57DF67030C1CBF020F74837814C6E0EE106F58BE3A5A0DF1A2A1D212E965F073253952D83EDC35FE64465F0B44D191A784B26BCFDC51A6B01E67B353FF ']' 959s + output_file=/tmp/sssd-softhsm2-B0ev2A/SSSD-child-11298-auth.output 959s ++ basename /tmp/sssd-softhsm2-B0ev2A/SSSD-child-11298-auth.output .output 959s + output_cert_file=/tmp/sssd-softhsm2-B0ev2A/SSSD-child-11298-auth.pem 959s + echo -n 053350 959s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-B0ev2A/test-full-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Interme Token' --module_name /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so 959s [p11_child[2407]] [main] (0x0400): p11_child started. 959s [p11_child[2407]] [main] (0x2000): Running in [auth] mode. 959s [p11_child[2407]] [main] (0x2000): Running with effective IDs: [0][0]. 959s [p11_child[2407]] [main] (0x2000): Running with real IDs [0][0]. 959s [p11_child[2407]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 959s [p11_child[2407]] [do_card] (0x4000): Module List: 959s [p11_child[2407]] [do_card] (0x4000): common name: [softhsm2]. 959s [p11_child[2407]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 959s [p11_child[2407]] [do_card] (0x4000): Description [SoftHSM slot ID 0x46f5dd62] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 960s [p11_child[2407]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 960s [p11_child[2407]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x46f5dd62][1190518114] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 960s [p11_child[2407]] [do_card] (0x4000): Login required. 960s [p11_child[2407]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 960s [p11_child[2407]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 960s [p11_child[2407]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so Test Organization Interme Token Test Organization Interme Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 960s [p11_child[2407]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x46f5dd62;slot-manufacturer=SoftHSM%20project;slot-id=1190518114;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=68d2912846f5dd62;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 960s [p11_child[2407]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 960s [p11_child[2407]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 960s [p11_child[2407]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 960s [p11_child[2407]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 960s [p11_child[2407]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 960s [p11_child[2407]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 960s [p11_child[2407]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 960s [p11_child[2407]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 960s [p11_child[2407]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 960s [p11_child[2407]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 960s [p11_child[2407]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 960s [p11_child[2407]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 960s [p11_child[2407]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 960s [p11_child[2407]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 960s [p11_child[2407]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 960s [p11_child[2407]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 960s Certificate: 960s Data: 960s Version: 3 (0x2) 960s Serial Number: 4 (0x4) 960s Signature Algorithm: sha256WithRSAEncryption 960s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 960s Validity 960s Not Before: Mar 19 03:47:10 2024 GMT 960s Not After : Mar 19 03:47:10 2025 GMT 960s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 960s Subject Public Key Info: 960s Public Key Algorithm: rsaEncryption 960s Public-Key: (1024 bit) 960s Modulus: 960s 00:c6:9d:d7:67:87:f7:25:d3:a2:77:a4:cf:c2:9b: 960s 31:96:18:4d:70:4c:60:11:31:ef:e6:b6:01:06:47: 960s 17:0e:d0:32:fb:4f:11:47:1d:41:72:a7:84:ba:70: 960s e3:3f:a5:2e:1c:ea:ea:1f:fa:d8:d4:6a:2d:3f:d2: 960s 1a:ab:73:bc:bb:5c:bf:5b:57:df:67:03:0c:1c:bf: 960s 02:0f:74:83:78:14:c6:e0:ee:10:6f:58:be:3a:5a: 960s 0d:f1:a2:a1:d2:12:e9:65:f0:73:25:39:52:d8:3e: 960s dc:35:fe:64:46:5f:0b:44:d1:91:a7:84:b2:6b:cf: 960s dc:51:a6:b0:1e:67:b3:53:ff 960s Exponent: 65537 (0x10001) 960s X509v3 extensions: 960s X509v3 Authority Key Identifier: 960s 62:4F:49:22:11:B5:A7:07:13:13:BA:5B:1B:1D:C1:D8:59:4B:DD:A7 960s X509v3 Basic Constraints: 960s CA:FALSE 960s Netscape Cert Type: 960s SSL Client, S/MIME 960s Netscape Comment: 960s Test Organization Intermediate CA trusted Certificate 960s X509v3 Subject Key Identifier: 960s 41:F1:25:22:FC:6F:8A:D6:0D:8F:12:D6:CB:30:6B:76:69:F1:BC:42 960s X509v3 Key Usage: critical 960s Digital Signature, Non Repudiation, Key Encipherment 960s X509v3 Extended Key Usage: 960s TLS Web Client Authentication, E-mail Protection 960s X509v3 Subject Alternative Name: 960s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 960s Signature Algorithm: sha256WithRSAEncryption 960s Signature Value: 960s 47:00:04:db:94:63:d3:cb:6a:69:14:1a:37:b9:f6:e4:1d:b0: 960s c9:35:58:77:4c:62:b8:4b:ea:fc:6f:9f:46:00:0a:28:f3:00: 960s 3a:a0:a7:54:15:7e:ad:98:e6:33:0b:24:62:e4:eb:b5:02:d7: 960s c5:8c:cb:6b:37:06:ef:58:ab:e2:94:cc:21:d6:9f:3f:db:e8: 960s 2f:30:e8:7a:53:cf:0d:d0:08:ea:29:18:f8:8c:d4:17:d8:c4: 960s 1f:1f:c5:9e:7e:52:95:db:70:de:bf:1a:8d:5d:21:c6:58:e4: 960s ee:bf:fc:46:9c:be:dc:56:52:27:76:64:b9:c7:d4:67:07:43: 960s 65:c7 960s [p11_child[2407]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 960s [p11_child[2407]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 960s [p11_child[2407]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 960s [p11_child[2407]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 960s [p11_child[2407]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 960s [p11_child[2407]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 960s [p11_child[2407]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 960s [p11_child[2407]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 960s [p11_child[2407]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 960s [p11_child[2407]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 960s [p11_child[2407]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 960s [p11_child[2407]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 960s [p11_child[2407]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 960s [p11_child[2407]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 960s [p11_child[2407]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 960s [p11_child[2407]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 960s [p11_child[2407]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 960s [p11_child[2407]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 960s [p11_child[2407]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 960s [p11_child[2407]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 960s [p11_child[2407]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 960s [p11_child[2407]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 960s [p11_child[2407]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 960s [p11_child[2407]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 960s [p11_child[2407]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 960s [p11_child[2407]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 960s [p11_child[2407]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 960s [p11_child[2407]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 960s [p11_child[2407]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 960s [p11_child[2407]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 960s [p11_child[2407]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 960s [p11_child[2407]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 960s [p11_child[2407]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 960s [p11_child[2407]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 960s [p11_child[2407]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 960s [p11_child[2407]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 960s [p11_child[2407]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 960s [p11_child[2407]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 960s [p11_child[2407]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 960s [p11_child[2407]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 960s [p11_child[2407]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 960s [p11_child[2407]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 960s [p11_child[2407]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 960s [p11_child[2407]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 960s [p11_child[2407]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 960s [p11_child[2407]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 960s [p11_child[2407]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 960s [p11_child[2407]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 960s [p11_child[2407]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 960s [p11_child[2407]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 960s [p11_child[2407]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 960s [p11_child[2407]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 960s [p11_child[2407]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 960s [p11_child[2407]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 960s [p11_child[2407]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 960s [p11_child[2407]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 960s [p11_child[2407]] [do_card] (0x4000): Certificate verified and validated. 960s [p11_child[2407]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 960s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-B0ev2A/SSSD-child-11298-auth.output 960s + echo '-----BEGIN CERTIFICATE-----' 960s + tail -n1 /tmp/sssd-softhsm2-B0ev2A/SSSD-child-11298-auth.output 960s + echo '-----END CERTIFICATE-----' 960s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-B0ev2A/SSSD-child-11298-auth.pem 960s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-B0ev2A/SSSD-child-11298-auth.pem 960s + found_md5=Modulus=C69DD76787F725D3A277A4CFC29B3196184D704C601131EFE6B6010647170ED032FB4F11471D4172A784BA70E33FA52E1CEAEA1FFAD8D46A2D3FD21AAB73BCBB5CBF5B57DF67030C1CBF020F74837814C6E0EE106F58BE3A5A0DF1A2A1D212E965F073253952D83EDC35FE64465F0B44D191A784B26BCFDC51A6B01E67B353FF 960s + '[' Modulus=C69DD76787F725D3A277A4CFC29B3196184D704C601131EFE6B6010647170ED032FB4F11471D4172A784BA70E33FA52E1CEAEA1FFAD8D46A2D3FD21AAB73BCBB5CBF5B57DF67030C1CBF020F74837814C6E0EE106F58BE3A5A0DF1A2A1D212E965F073253952D83EDC35FE64465F0B44D191A784B26BCFDC51A6B01E67B353FF '!=' Modulus=C69DD76787F725D3A277A4CFC29B3196184D704C601131EFE6B6010647170ED032FB4F11471D4172A784BA70E33FA52E1CEAEA1FFAD8D46A2D3FD21AAB73BCBB5CBF5B57DF67030C1CBF020F74837814C6E0EE106F58BE3A5A0DF1A2A1D212E965F073253952D83EDC35FE64465F0B44D191A784B26BCFDC51A6B01E67B353FF ']' 960s + invalid_certificate /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-30933 /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA.pem 960s + check_certificate /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-30933 /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA.pem 960s + local certificate=/tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA-trusted-certificate-0001.pem 960s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-30933 960s + local key_ring=/tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA.pem 960s + local verify_option= 960s + prepare_softhsm2_card /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-30933 960s + local certificate=/tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA-trusted-certificate-0001.pem 960s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-30933 960s + local key_cn 960s + local key_name 960s + local tokens_dir 960s + local output_cert_file 960s + token_name= 960s ++ basename /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA-trusted-certificate-0001.pem .pem 960s + key_name=test-intermediate-CA-trusted-certificate-0001 960s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA-trusted-certificate-0001.pem 960s ++ sed -n 's/ *commonName *= //p' 960s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 960s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 960s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-B0ev2A/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 960s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-B0ev2A/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 960s ++ basename /tmp/sssd-softhsm2-B0ev2A/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 960s + tokens_dir=/tmp/sssd-softhsm2-B0ev2A/softhsm2-test-intermediate-CA-trusted-certificate-0001 960s + token_name='Test Organization Interme Token' 960s + '[' '!' -e /tmp/sssd-softhsm2-B0ev2A/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 960s + '[' '!' -d /tmp/sssd-softhsm2-B0ev2A/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 960s + echo 'Test Organization Interme Token' 960s Test Organization Interme Token 960s + '[' -n '' ']' 960s + local output_base_name=SSSD-child-30797 960s + local output_file=/tmp/sssd-softhsm2-B0ev2A/SSSD-child-30797.output 960s + output_cert_file=/tmp/sssd-softhsm2-B0ev2A/SSSD-child-30797.pem 960s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA.pem 960s [p11_child[2417]] [main] (0x0400): p11_child started. 960s [p11_child[2417]] [main] (0x2000): Running in [pre-auth] mode. 960s [p11_child[2417]] [main] (0x2000): Running with effective IDs: [0][0]. 960s [p11_child[2417]] [main] (0x2000): Running with real IDs [0][0]. 960s [p11_child[2417]] [do_card] (0x4000): Module List: 960s [p11_child[2417]] [do_card] (0x4000): common name: [softhsm2]. 960s [p11_child[2417]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 960s [p11_child[2417]] [do_card] (0x4000): Description [SoftHSM slot ID 0x46f5dd62] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 960s [p11_child[2417]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 960s [p11_child[2417]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x46f5dd62][1190518114] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 960s [p11_child[2417]] [do_card] (0x4000): Login NOT required. 960s [p11_child[2417]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 960s [p11_child[2417]] [do_verification] (0x0040): X509_verify_cert failed [0]. 960s [p11_child[2417]] [do_verification] (0x0040): X509_verify_cert failed [2][unable to get issuer certificate]. 960s [p11_child[2417]] [read_certs] (0x0040): Certificate [Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] not valid, skipping. 960s [p11_child[2417]] [do_card] (0x4000): No certificate found. 960s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-B0ev2A/SSSD-child-30797.output 960s + return 2 960s + valid_certificate /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-30933 /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA.pem partial_chain 960s + check_certificate /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-30933 /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA.pem partial_chain 960s + local certificate=/tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA-trusted-certificate-0001.pem 960s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-30933 960s + local key_ring=/tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA.pem 960s + local verify_option=partial_chain 960s + prepare_softhsm2_card /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-30933 960s + local certificate=/tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA-trusted-certificate-0001.pem 960s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-30933 960s + local key_cn 960s + local key_name 960s + local tokens_dir 960s + local output_cert_file 960s + token_name= 960s ++ basename /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA-trusted-certificate-0001.pem .pem 960s + key_name=test-intermediate-CA-trusted-certificate-0001 960s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA-trusted-certificate-0001.pem 960s ++ sed -n 's/ *commonName *= //p' 960s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 960s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 960s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-B0ev2A/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 960s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-B0ev2A/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 960s ++ basename /tmp/sssd-softhsm2-B0ev2A/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 960s + tokens_dir=/tmp/sssd-softhsm2-B0ev2A/softhsm2-test-intermediate-CA-trusted-certificate-0001 960s + token_name='Test Organization Interme Token' 960s + '[' '!' -e /tmp/sssd-softhsm2-B0ev2A/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 960s + '[' '!' -d /tmp/sssd-softhsm2-B0ev2A/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 960s + echo 'Test Organization Interme Token' 960s + '[' -n partial_chain ']' 960s + local verify_arg=--verify=partial_chain 960s + local output_base_name=SSSD-child-32267 960s + local output_file=/tmp/sssd-softhsm2-B0ev2A/SSSD-child-32267.output 960s + output_cert_file=/tmp/sssd-softhsm2-B0ev2A/SSSD-child-32267.pem 960s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA.pem 960s [p11_child[2424]] [main] (0x0400): p11_child started. 960s Test Organization Interme Token 960s [p11_child[2424]] [main] (0x2000): Running in [pre-auth] mode. 960s [p11_child[2424]] [main] (0x2000): Running with effective IDs: [0][0]. 960s [p11_child[2424]] [main] (0x2000): Running with real IDs [0][0]. 960s [p11_child[2424]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 960s [p11_child[2424]] [do_card] (0x4000): Module List: 960s [p11_child[2424]] [do_card] (0x4000): common name: [softhsm2]. 960s [p11_child[2424]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 960s [p11_child[2424]] [do_card] (0x4000): Description [SoftHSM slot ID 0x46f5dd62] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 960s [p11_child[2424]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 960s [p11_child[2424]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x46f5dd62][1190518114] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 960s [p11_child[2424]] [do_card] (0x4000): Login NOT required. 960s [p11_child[2424]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 960s [p11_child[2424]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 960s [p11_child[2424]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Interme Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 960s [p11_child[2424]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x46f5dd62;slot-manufacturer=SoftHSM%20project;slot-id=1190518114;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=68d2912846f5dd62;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 960s [p11_child[2424]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 960s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-B0ev2A/SSSD-child-32267.output 960s + echo '-----BEGIN CERTIFICATE-----' 960s + tail -n1 /tmp/sssd-softhsm2-B0ev2A/SSSD-child-32267.output 960s + echo '-----END CERTIFICATE-----' 960s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-B0ev2A/SSSD-child-32267.pem 960s + local found_md5 expected_md5 960s Certificate: 960s Data: 960s Version: 3 (0x2) 960s Serial Number: 4 (0x4) 960s Signature Algorithm: sha256WithRSAEncryption 960s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 960s Validity 960s Not Before: Mar 19 03:47:10 2024 GMT 960s Not After : Mar 19 03:47:10 2025 GMT 960s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 960s Subject Public Key Info: 960s Public Key Algorithm: rsaEncryption 960s Public-Key: (1024 bit) 960s Modulus: 960s 00:c6:9d:d7:67:87:f7:25:d3:a2:77:a4:cf:c2:9b: 960s 31:96:18:4d:70:4c:60:11:31:ef:e6:b6:01:06:47: 960s 17:0e:d0:32:fb:4f:11:47:1d:41:72:a7:84:ba:70: 960s e3:3f:a5:2e:1c:ea:ea:1f:fa:d8:d4:6a:2d:3f:d2: 960s 1a:ab:73:bc:bb:5c:bf:5b:57:df:67:03:0c:1c:bf: 960s 02:0f:74:83:78:14:c6:e0:ee:10:6f:58:be:3a:5a: 960s 0d:f1:a2:a1:d2:12:e9:65:f0:73:25:39:52:d8:3e: 960s dc:35:fe:64:46:5f:0b:44:d1:91:a7:84:b2:6b:cf: 960s dc:51:a6:b0:1e:67:b3:53:ff 960s Exponent: 65537 (0x10001) 960s X509v3 extensions: 960s X509v3 Authority Key Identifier: 960s 62:4F:49:22:11:B5:A7:07:13:13:BA:5B:1B:1D:C1:D8:59:4B:DD:A7 960s X509v3 Basic Constraints: 960s CA:FALSE 960s Netscape Cert Type: 960s SSL Client, S/MIME 960s Netscape Comment: 960s Test Organization Intermediate CA trusted Certificate 960s X509v3 Subject Key Identifier: 960s 41:F1:25:22:FC:6F:8A:D6:0D:8F:12:D6:CB:30:6B:76:69:F1:BC:42 960s X509v3 Key Usage: critical 960s Digital Signature, Non Repudiation, Key Encipherment 960s X509v3 Extended Key Usage: 960s TLS Web Client Authentication, E-mail Protection 960s X509v3 Subject Alternative Name: 960s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 960s Signature Algorithm: sha256WithRSAEncryption 960s Signature Value: 960s 47:00:04:db:94:63:d3:cb:6a:69:14:1a:37:b9:f6:e4:1d:b0: 960s c9:35:58:77:4c:62:b8:4b:ea:fc:6f:9f:46:00:0a:28:f3:00: 960s 3a:a0:a7:54:15:7e:ad:98:e6:33:0b:24:62:e4:eb:b5:02:d7: 960s c5:8c:cb:6b:37:06:ef:58:ab:e2:94:cc:21:d6:9f:3f:db:e8: 960s 2f:30:e8:7a:53:cf:0d:d0:08:ea:29:18:f8:8c:d4:17:d8:c4: 960s 1f:1f:c5:9e:7e:52:95:db:70:de:bf:1a:8d:5d:21:c6:58:e4: 960s ee:bf:fc:46:9c:be:dc:56:52:27:76:64:b9:c7:d4:67:07:43: 960s 65:c7 960s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA-trusted-certificate-0001.pem 960s + expected_md5=Modulus=C69DD76787F725D3A277A4CFC29B3196184D704C601131EFE6B6010647170ED032FB4F11471D4172A784BA70E33FA52E1CEAEA1FFAD8D46A2D3FD21AAB73BCBB5CBF5B57DF67030C1CBF020F74837814C6E0EE106F58BE3A5A0DF1A2A1D212E965F073253952D83EDC35FE64465F0B44D191A784B26BCFDC51A6B01E67B353FF 960s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-B0ev2A/SSSD-child-32267.pem 960s + found_md5=Modulus=C69DD76787F725D3A277A4CFC29B3196184D704C601131EFE6B6010647170ED032FB4F11471D4172A784BA70E33FA52E1CEAEA1FFAD8D46A2D3FD21AAB73BCBB5CBF5B57DF67030C1CBF020F74837814C6E0EE106F58BE3A5A0DF1A2A1D212E965F073253952D83EDC35FE64465F0B44D191A784B26BCFDC51A6B01E67B353FF 960s + '[' Modulus=C69DD76787F725D3A277A4CFC29B3196184D704C601131EFE6B6010647170ED032FB4F11471D4172A784BA70E33FA52E1CEAEA1FFAD8D46A2D3FD21AAB73BCBB5CBF5B57DF67030C1CBF020F74837814C6E0EE106F58BE3A5A0DF1A2A1D212E965F073253952D83EDC35FE64465F0B44D191A784B26BCFDC51A6B01E67B353FF '!=' Modulus=C69DD76787F725D3A277A4CFC29B3196184D704C601131EFE6B6010647170ED032FB4F11471D4172A784BA70E33FA52E1CEAEA1FFAD8D46A2D3FD21AAB73BCBB5CBF5B57DF67030C1CBF020F74837814C6E0EE106F58BE3A5A0DF1A2A1D212E965F073253952D83EDC35FE64465F0B44D191A784B26BCFDC51A6B01E67B353FF ']' 960s + output_file=/tmp/sssd-softhsm2-B0ev2A/SSSD-child-32267-auth.output 960s ++ basename /tmp/sssd-softhsm2-B0ev2A/SSSD-child-32267-auth.output .output 960s + output_cert_file=/tmp/sssd-softhsm2-B0ev2A/SSSD-child-32267-auth.pem 960s + echo -n 053350 960s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-B0ev2A/test-intermediate-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Interme Token' --module_name /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so 960s [p11_child[2432]] [main] (0x0400): p11_child started. 960s [p11_child[2432]] [main] (0x2000): Running in [auth] mode. 960s [p11_child[2432]] [main] (0x2000): Running with effective IDs: [0][0]. 960s [p11_child[2432]] [main] (0x2000): Running with real IDs [0][0]. 960s [p11_child[2432]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 960s [p11_child[2432]] [do_card] (0x4000): Module List: 960s [p11_child[2432]] [do_card] (0x4000): common name: [softhsm2]. 960s [p11_child[2432]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 960s [p11_child[2432]] [do_card] (0x4000): Description [SoftHSM slot ID 0x46f5dd62] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 960s [p11_child[2432]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 960s [p11_child[2432]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x46f5dd62][1190518114] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 960s [p11_child[2432]] [do_card] (0x4000): Login required. 960s [p11_child[2432]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 960s [p11_child[2432]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 960s [p11_child[2432]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so Test Organization Interme Token Test Organization Interme Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 960s [p11_child[2432]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x46f5dd62;slot-manufacturer=SoftHSM%20project;slot-id=1190518114;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=68d2912846f5dd62;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 960s [p11_child[2432]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 960s [p11_child[2432]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 960s [p11_child[2432]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 960s [p11_child[2432]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 960s [p11_child[2432]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 960s [p11_child[2432]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 960s [p11_child[2432]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 960s [p11_child[2432]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 960s [p11_child[2432]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 960s [p11_child[2432]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 960s [p11_child[2432]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 960s [p11_child[2432]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 960s [p11_child[2432]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 960s [p11_child[2432]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 960s [p11_child[2432]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 960s [p11_child[2432]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 960s [p11_child[2432]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 960s [p11_child[2432]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 960s [p11_child[2432]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 960s [p11_child[2432]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 960s [p11_child[2432]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 960s [p11_child[2432]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 960s [p11_child[2432]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 960s [p11_child[2432]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 960s [p11_child[2432]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 960s [p11_child[2432]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 960s [p11_child[2432]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 960s [p11_child[2432]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 960s [p11_child[2432]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 960s [p11_child[2432]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 960s [p11_child[2432]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 960s [p11_child[2432]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 960s [p11_child[2432]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 960s [p11_child[2432]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 960s [p11_child[2432]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 960s [p11_child[2432]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 960s [p11_child[2432]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 960s [p11_child[2432]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 960s [p11_child[2432]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 960s [p11_child[2432]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 960s [p11_child[2432]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 960s [p11_child[2432]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 960s [p11_child[2432]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 960s [p11_child[2432]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 960s [p11_child[2432]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 960s [p11_child[2432]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 960s [p11_child[2432]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 960s [p11_child[2432]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 960s [p11_child[2432]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 960s [p11_child[2432]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 960s [p11_child[2432]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 960s [p11_child[2432]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 960s [p11_child[2432]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 960s [p11_child[2432]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 960s [p11_child[2432]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 960s [p11_child[2432]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 960s [p11_child[2432]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 960s [p11_child[2432]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 960s [p11_child[2432]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 960s [p11_child[2432]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 960s [p11_child[2432]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 960s [p11_child[2432]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 960s [p11_child[2432]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 960s [p11_child[2432]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 960s [p11_child[2432]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 960s [p11_child[2432]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 960s [p11_child[2432]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 960s [p11_child[2432]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 960s [p11_child[2432]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 960s [p11_child[2432]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 960s [p11_child[2432]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 960s [p11_child[2432]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 960s [p11_child[2432]] [do_card] (0x4000): Certificate verified and validated. 960s [p11_child[2432]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 960s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-B0ev2A/SSSD-child-32267-auth.output 960s + echo '-----BEGIN CERTIFICATE-----' 960s + tail -n1 /tmp/sssd-softhsm2-B0ev2A/SSSD-child-32267-auth.output 960s + echo '-----END CERTIFICATE-----' 960s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-B0ev2A/SSSD-child-32267-auth.pem 960s Certificate: 960s Data: 960s Version: 3 (0x2) 960s Serial Number: 4 (0x4) 960s Signature Algorithm: sha256WithRSAEncryption 960s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 960s Validity 960s Not Before: Mar 19 03:47:10 2024 GMT 960s Not After : Mar 19 03:47:10 2025 GMT 960s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 960s Subject Public Key Info: 960s Public Key Algorithm: rsaEncryption 960s Public-Key: (1024 bit) 960s Modulus: 960s 00:c6:9d:d7:67:87:f7:25:d3:a2:77:a4:cf:c2:9b: 960s 31:96:18:4d:70:4c:60:11:31:ef:e6:b6:01:06:47: 960s 17:0e:d0:32:fb:4f:11:47:1d:41:72:a7:84:ba:70: 960s e3:3f:a5:2e:1c:ea:ea:1f:fa:d8:d4:6a:2d:3f:d2: 960s 1a:ab:73:bc:bb:5c:bf:5b:57:df:67:03:0c:1c:bf: 960s 02:0f:74:83:78:14:c6:e0:ee:10:6f:58:be:3a:5a: 960s 0d:f1:a2:a1:d2:12:e9:65:f0:73:25:39:52:d8:3e: 960s dc:35:fe:64:46:5f:0b:44:d1:91:a7:84:b2:6b:cf: 960s dc:51:a6:b0:1e:67:b3:53:ff 960s Exponent: 65537 (0x10001) 960s X509v3 extensions: 960s X509v3 Authority Key Identifier: 960s 62:4F:49:22:11:B5:A7:07:13:13:BA:5B:1B:1D:C1:D8:59:4B:DD:A7 960s X509v3 Basic Constraints: 960s CA:FALSE 960s Netscape Cert Type: 960s SSL Client, S/MIME 960s Netscape Comment: 960s Test Organization Intermediate CA trusted Certificate 960s X509v3 Subject Key Identifier: 960s 41:F1:25:22:FC:6F:8A:D6:0D:8F:12:D6:CB:30:6B:76:69:F1:BC:42 960s X509v3 Key Usage: critical 960s Digital Signature, Non Repudiation, Key Encipherment 960s X509v3 Extended Key Usage: 960s TLS Web Client Authentication, E-mail Protection 960s X509v3 Subject Alternative Name: 960s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 960s Signature Algorithm: sha256WithRSAEncryption 960s Signature Value: 960s 47:00:04:db:94:63:d3:cb:6a:69:14:1a:37:b9:f6:e4:1d:b0: 960s c9:35:58:77:4c:62:b8:4b:ea:fc:6f:9f:46:00:0a:28:f3:00: 960s 3a:a0:a7:54:15:7e:ad:98:e6:33:0b:24:62:e4:eb:b5:02:d7: 960s c5:8c:cb:6b:37:06:ef:58:ab:e2:94:cc:21:d6:9f:3f:db:e8: 960s 2f:30:e8:7a:53:cf:0d:d0:08:ea:29:18:f8:8c:d4:17:d8:c4: 960s 1f:1f:c5:9e:7e:52:95:db:70:de:bf:1a:8d:5d:21:c6:58:e4: 960s ee:bf:fc:46:9c:be:dc:56:52:27:76:64:b9:c7:d4:67:07:43: 960s 65:c7 960s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-B0ev2A/SSSD-child-32267-auth.pem 960s + found_md5=Modulus=C69DD76787F725D3A277A4CFC29B3196184D704C601131EFE6B6010647170ED032FB4F11471D4172A784BA70E33FA52E1CEAEA1FFAD8D46A2D3FD21AAB73BCBB5CBF5B57DF67030C1CBF020F74837814C6E0EE106F58BE3A5A0DF1A2A1D212E965F073253952D83EDC35FE64465F0B44D191A784B26BCFDC51A6B01E67B353FF 960s + '[' Modulus=C69DD76787F725D3A277A4CFC29B3196184D704C601131EFE6B6010647170ED032FB4F11471D4172A784BA70E33FA52E1CEAEA1FFAD8D46A2D3FD21AAB73BCBB5CBF5B57DF67030C1CBF020F74837814C6E0EE106F58BE3A5A0DF1A2A1D212E965F073253952D83EDC35FE64465F0B44D191A784B26BCFDC51A6B01E67B353FF '!=' Modulus=C69DD76787F725D3A277A4CFC29B3196184D704C601131EFE6B6010647170ED032FB4F11471D4172A784BA70E33FA52E1CEAEA1FFAD8D46A2D3FD21AAB73BCBB5CBF5B57DF67030C1CBF020F74837814C6E0EE106F58BE3A5A0DF1A2A1D212E965F073253952D83EDC35FE64465F0B44D191A784B26BCFDC51A6B01E67B353FF ']' 960s + invalid_certificate /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-8222 /tmp/sssd-softhsm2-B0ev2A/test-root-CA.pem 960s + check_certificate /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-8222 /tmp/sssd-softhsm2-B0ev2A/test-root-CA.pem 960s + local certificate=/tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-trusted-certificate-0001.pem 960s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-8222 960s + local key_ring=/tmp/sssd-softhsm2-B0ev2A/test-root-CA.pem 960s + local verify_option= 960s + prepare_softhsm2_card /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-8222 960s + local certificate=/tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-trusted-certificate-0001.pem 960s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-8222 960s + local key_cn 960s + local key_name 960s + local tokens_dir 960s + local output_cert_file 960s + token_name= 960s ++ basename /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 960s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 960s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-trusted-certificate-0001.pem 960s ++ sed -n 's/ *commonName *= //p' 960s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 960s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 960s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-B0ev2A/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 960s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-B0ev2A/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 960s ++ basename /tmp/sssd-softhsm2-B0ev2A/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 960s + tokens_dir=/tmp/sssd-softhsm2-B0ev2A/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 960s + token_name='Test Organization Sub Int Token' 960s + '[' '!' -e /tmp/sssd-softhsm2-B0ev2A/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 960s + local key_file 960s + local decrypted_key 960s + mkdir -p /tmp/sssd-softhsm2-B0ev2A/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 960s + key_file=/tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-trusted-certificate-0001-key.pem 960s + decrypted_key=/tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 960s + cat 960s + softhsm2-util --init-token --label 'Test Organization Sub Int Token' --pin 053350 --so-pin 053350 --free 960s Slot 0 has a free/uninitialized token. 960s The token has been initialized and is reassigned to slot 1024474605 960s + softhsm2-util --show-slots 960s Available slots: 960s Slot 1024474605 960s Slot info: 960s Description: SoftHSM slot ID 0x3d103ded 960s Manufacturer ID: SoftHSM project 960s Hardware version: 2.6 960s Firmware version: 2.6 960s Token present: yes 960s Token info: 960s Manufacturer ID: SoftHSM project 960s Model: SoftHSM v2 960s Hardware version: 2.6 960s Firmware version: 2.6 960s Serial number: 7d4ecbce3d103ded 960s Initialized: yes 960s User PIN init.: yes 960s Label: Test Organization Sub Int Token 960s Slot 1 960s Slot info: 960s Description: SoftHSM slot ID 0x1 960s Manufacturer ID: SoftHSM project 960s Hardware version: 2.6 960s Firmware version: 2.6 960s Token present: yes 960s Token info: 960s Manufacturer ID: SoftHSM project 960s Model: SoftHSM v2 960s Hardware version: 2.6 960s Firmware version: 2.6 960s Serial number: 960s Initialized: no 960s User PIN init.: no 960s Label: 960s + p11tool --provider=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --write --no-mark-private --load-certificate=/tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-trusted-certificate-0001.pem --login --set-pin=053350 --label 'Test Organization Sub Intermediate Trusted Certificate 0001' --id 00112233445566778899FFAABBCCDDEEFF012345 960s + openssl rsa -passin pass:random-sub-intermediate-ca-trusted-cert-0001-8222 -in /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-trusted-certificate-0001-key.pem -out /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 960s writing RSA key 960s + p11tool --provider=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --write --load-privkey=/tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem --login --set-pin=053350 --label 'Test Organization Sub Intermediate Trusted Certificate 0001 Key' --id 00112233445566778899FFAABBCCDDEEFF012345 960s + rm /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 960s + p11tool --provider=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --list-all 960s Object 0: 960s URL: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7d4ecbce3d103ded;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert 960s Type: X.509 Certificate (RSA-1024) 960s Expires: Wed Mar 19 03:47:10 2025 960s Label: Test Organization Sub Intermediate Trusted Certificate 0001 960s ID: 00:11:22:33:44:55:66:77:88:99:ff:aa:bb:cc:dd:ee:ff:01:23:45 960s 960s Test Organization Sub Int Token 960s + echo 'Test Organization Sub Int Token' 960s + '[' -n '' ']' 960s + local output_base_name=SSSD-child-10775 960s + local output_file=/tmp/sssd-softhsm2-B0ev2A/SSSD-child-10775.output 960s + output_cert_file=/tmp/sssd-softhsm2-B0ev2A/SSSD-child-10775.pem 960s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-B0ev2A/test-root-CA.pem 960s [p11_child[2451]] [main] (0x0400): p11_child started. 960s [p11_child[2451]] [main] (0x2000): Running in [pre-auth] mode. 960s [p11_child[2451]] [main] (0x2000): Running with effective IDs: [0][0]. 960s [p11_child[2451]] [main] (0x2000): Running with real IDs [0][0]. 960s [p11_child[2451]] [do_card] (0x4000): Module List: 960s [p11_child[2451]] [do_card] (0x4000): common name: [softhsm2]. 960s [p11_child[2451]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 960s [p11_child[2451]] [do_card] (0x4000): Description [SoftHSM slot ID 0x3d103ded] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 960s [p11_child[2451]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 960s [p11_child[2451]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x3d103ded][1024474605] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 960s [p11_child[2451]] [do_card] (0x4000): Login NOT required. 960s [p11_child[2451]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 960s [p11_child[2451]] [do_verification] (0x0040): X509_verify_cert failed [0]. 960s [p11_child[2451]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 960s [p11_child[2451]] [read_certs] (0x0040): Certificate [Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] not valid, skipping. 960s [p11_child[2451]] [do_card] (0x4000): No certificate found. 960s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-B0ev2A/SSSD-child-10775.output 960s + return 2 960s + invalid_certificate /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-8222 /tmp/sssd-softhsm2-B0ev2A/test-root-CA.pem partial_chain 960s + check_certificate /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-8222 /tmp/sssd-softhsm2-B0ev2A/test-root-CA.pem partial_chain 960s + local certificate=/tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-trusted-certificate-0001.pem 960s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-8222 960s + local key_ring=/tmp/sssd-softhsm2-B0ev2A/test-root-CA.pem 960s + local verify_option=partial_chain 960s + prepare_softhsm2_card /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-8222 960s + local certificate=/tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-trusted-certificate-0001.pem 960s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-8222 960s + local key_cn 960s + local key_name 960s + local tokens_dir 960s + local output_cert_file 960s + token_name= 960s ++ basename /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 960s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 960s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-trusted-certificate-0001.pem 960s ++ sed -n 's/ *commonName *= //p' 960s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 960s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 960s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-B0ev2A/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 960s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-B0ev2A/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 960s ++ basename /tmp/sssd-softhsm2-B0ev2A/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 960s + tokens_dir=/tmp/sssd-softhsm2-B0ev2A/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 960s + token_name='Test Organization Sub Int Token' 960s + '[' '!' -e /tmp/sssd-softhsm2-B0ev2A/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 960s + '[' '!' -d /tmp/sssd-softhsm2-B0ev2A/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 960s Test Organization Sub Int Token 960s + echo 'Test Organization Sub Int Token' 960s + '[' -n partial_chain ']' 960s + local verify_arg=--verify=partial_chain 960s + local output_base_name=SSSD-child-16178 960s + local output_file=/tmp/sssd-softhsm2-B0ev2A/SSSD-child-16178.output 960s + output_cert_file=/tmp/sssd-softhsm2-B0ev2A/SSSD-child-16178.pem 960s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-B0ev2A/test-root-CA.pem 960s [p11_child[2458]] [main] (0x0400): p11_child started. 960s [p11_child[2458]] [main] (0x2000): Running in [pre-auth] mode. 960s [p11_child[2458]] [main] (0x2000): Running with effective IDs: [0][0]. 960s [p11_child[2458]] [main] (0x2000): Running with real IDs [0][0]. 960s [p11_child[2458]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 960s [p11_child[2458]] [do_card] (0x4000): Module List: 960s [p11_child[2458]] [do_card] (0x4000): common name: [softhsm2]. 960s [p11_child[2458]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 960s [p11_child[2458]] [do_card] (0x4000): Description [SoftHSM slot ID 0x3d103ded] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 960s [p11_child[2458]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 960s [p11_child[2458]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x3d103ded][1024474605] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 960s [p11_child[2458]] [do_card] (0x4000): Login NOT required. 960s [p11_child[2458]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 960s [p11_child[2458]] [do_verification] (0x0040): X509_verify_cert failed [0]. 960s [p11_child[2458]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 960s [p11_child[2458]] [read_certs] (0x0040): Certificate [Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] not valid, skipping. 960s [p11_child[2458]] [do_card] (0x4000): No certificate found. 960s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-B0ev2A/SSSD-child-16178.output 960s + return 2 960s + valid_certificate /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-8222 /tmp/sssd-softhsm2-B0ev2A/test-full-chain-CA.pem 960s + check_certificate /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-8222 /tmp/sssd-softhsm2-B0ev2A/test-full-chain-CA.pem 960s + local certificate=/tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-trusted-certificate-0001.pem 960s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-8222 960s + local key_ring=/tmp/sssd-softhsm2-B0ev2A/test-full-chain-CA.pem 960s + local verify_option= 960s + prepare_softhsm2_card /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-8222 960s + local certificate=/tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-trusted-certificate-0001.pem 960s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-8222 960s + local key_cn 960s + local key_name 960s + local tokens_dir 960s + local output_cert_file 960s + token_name= 960s ++ basename /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 960s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 960s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-trusted-certificate-0001.pem 960s ++ sed -n 's/ *commonName *= //p' 960s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 960s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 960s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-B0ev2A/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 960s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-B0ev2A/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 960s ++ basename /tmp/sssd-softhsm2-B0ev2A/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 960s + tokens_dir=/tmp/sssd-softhsm2-B0ev2A/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 960s + token_name='Test Organization Sub Int Token' 960s + '[' '!' -e /tmp/sssd-softhsm2-B0ev2A/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 960s + '[' '!' -d /tmp/sssd-softhsm2-B0ev2A/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 960s + echo 'Test Organization Sub Int Token' 960s Test Organization Sub Int Token 960s + '[' -n '' ']' 960s + local output_base_name=SSSD-child-915 960s + local output_file=/tmp/sssd-softhsm2-B0ev2A/SSSD-child-915.output 960s + output_cert_file=/tmp/sssd-softhsm2-B0ev2A/SSSD-child-915.pem 960s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-B0ev2A/test-full-chain-CA.pem 960s [p11_child[2465]] [main] (0x0400): p11_child started. 960s [p11_child[2465]] [main] (0x2000): Running in [pre-auth] mode. 960s [p11_child[2465]] [main] (0x2000): Running with effective IDs: [0][0]. 960s [p11_child[2465]] [main] (0x2000): Running with real IDs [0][0]. 960s [p11_child[2465]] [do_card] (0x4000): Module List: 960s [p11_child[2465]] [do_card] (0x4000): common name: [softhsm2]. 960s [p11_child[2465]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 960s [p11_child[2465]] [do_card] (0x4000): Description [SoftHSM slot ID 0x3d103ded] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 960s [p11_child[2465]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 960s [p11_child[2465]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x3d103ded][1024474605] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 960s [p11_child[2465]] [do_card] (0x4000): Login NOT required. 960s [p11_child[2465]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 960s [p11_child[2465]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 960s [p11_child[2465]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Sub Int Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 960s [p11_child[2465]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x3d103ded;slot-manufacturer=SoftHSM%20project;slot-id=1024474605;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7d4ecbce3d103ded;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 960s [p11_child[2465]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 960s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-B0ev2A/SSSD-child-915.output 960s + echo '-----BEGIN CERTIFICATE-----' 960s + tail -n1 /tmp/sssd-softhsm2-B0ev2A/SSSD-child-915.output 960s + echo '-----END CERTIFICATE-----' 960s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-B0ev2A/SSSD-child-915.pem 960s Certificate: 960s Data: 960s Version: 3 (0x2) 960s Serial Number: 5 (0x5) 960s Signature Algorithm: sha256WithRSAEncryption 960s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 960s Validity 960s Not Before: Mar 19 03:47:10 2024 GMT 960s Not After : Mar 19 03:47:10 2025 GMT 960s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 960s Subject Public Key Info: 960s Public Key Algorithm: rsaEncryption 960s Public-Key: (1024 bit) 960s Modulus: 960s 00:f6:ed:4c:61:46:8f:37:83:a0:61:59:04:06:b8: 960s 15:46:47:bd:71:9a:0a:bd:50:44:11:69:7b:3d:22: 960s ee:af:51:4e:e8:45:cd:e9:da:4c:80:9c:0b:c2:09: 960s 34:38:2e:7c:86:89:f9:f5:79:58:58:ea:7e:85:19: 960s b2:32:b6:76:63:c3:0b:66:2d:1e:58:e3:5b:00:eb: 960s e3:78:69:1c:4c:ec:33:02:12:d8:82:14:d1:3b:dd: 960s 96:9b:ba:a9:c0:b2:98:89:51:dd:48:66:0d:de:63: 960s 9e:fb:26:48:7b:fd:d8:50:2f:1a:1d:47:db:d5:51: 960s d9:2b:08:84:d8:d3:20:a1:fd 960s Exponent: 65537 (0x10001) 960s X509v3 extensions: 960s X509v3 Authority Key Identifier: 960s 21:AE:84:EF:FC:52:0F:30:AB:5B:F0:FC:4F:D1:4B:26:86:97:9B:AF 960s X509v3 Basic Constraints: 960s CA:FALSE 960s Netscape Cert Type: 960s SSL Client, S/MIME 960s Netscape Comment: 960s Test Organization Sub Intermediate CA trusted Certificate 960s X509v3 Subject Key Identifier: 960s 18:F3:50:B5:A5:EE:AC:F4:7D:3A:3E:95:56:1E:7D:CB:E6:0B:CE:0C 960s X509v3 Key Usage: critical 960s Digital Signature, Non Repudiation, Key Encipherment 960s X509v3 Extended Key Usage: 960s TLS Web Client Authentication, E-mail Protection 960s X509v3 Subject Alternative Name: 960s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 960s Signature Algorithm: sha256WithRSAEncryption 960s Signature Value: 960s b9:38:80:ad:46:ba:d8:17:5e:10:20:56:7b:ae:f2:9b:36:9a: 960s 0c:c9:d8:33:0a:34:57:d3:51:b3:f4:b6:a1:2b:44:4d:6e:47: 960s a5:4d:c1:79:a0:77:76:88:61:13:a2:79:06:d2:bc:be:cc:1f: 960s 8d:84:74:52:ea:1b:ad:96:5a:33:c8:e9:8e:34:73:d7:05:86: 960s 36:b9:eb:21:8d:09:c2:e8:e2:b2:f9:08:97:92:d5:77:58:84: 960s e3:a6:39:7c:8d:55:e5:2b:6c:19:72:bf:c2:a7:ac:07:c0:72: 960s b2:e7:a4:d1:cd:4c:5e:77:8e:ec:08:1a:4a:48:7b:89:8a:ad: 960s ae:1d 960s + local found_md5 expected_md5 960s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-trusted-certificate-0001.pem 960s + expected_md5=Modulus=F6ED4C61468F3783A061590406B8154647BD719A0ABD504411697B3D22EEAF514EE845CDE9DA4C809C0BC20934382E7C8689F9F5795858EA7E8519B232B67663C30B662D1E58E35B00EBE378691C4CEC330212D88214D13BDD969BBAA9C0B2988951DD48660DDE639EFB26487BFDD8502F1A1D47DBD551D92B0884D8D320A1FD 960s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-B0ev2A/SSSD-child-915.pem 960s + found_md5=Modulus=F6ED4C61468F3783A061590406B8154647BD719A0ABD504411697B3D22EEAF514EE845CDE9DA4C809C0BC20934382E7C8689F9F5795858EA7E8519B232B67663C30B662D1E58E35B00EBE378691C4CEC330212D88214D13BDD969BBAA9C0B2988951DD48660DDE639EFB26487BFDD8502F1A1D47DBD551D92B0884D8D320A1FD 960s + '[' Modulus=F6ED4C61468F3783A061590406B8154647BD719A0ABD504411697B3D22EEAF514EE845CDE9DA4C809C0BC20934382E7C8689F9F5795858EA7E8519B232B67663C30B662D1E58E35B00EBE378691C4CEC330212D88214D13BDD969BBAA9C0B2988951DD48660DDE639EFB26487BFDD8502F1A1D47DBD551D92B0884D8D320A1FD '!=' Modulus=F6ED4C61468F3783A061590406B8154647BD719A0ABD504411697B3D22EEAF514EE845CDE9DA4C809C0BC20934382E7C8689F9F5795858EA7E8519B232B67663C30B662D1E58E35B00EBE378691C4CEC330212D88214D13BDD969BBAA9C0B2988951DD48660DDE639EFB26487BFDD8502F1A1D47DBD551D92B0884D8D320A1FD ']' 960s + output_file=/tmp/sssd-softhsm2-B0ev2A/SSSD-child-915-auth.output 960s ++ basename /tmp/sssd-softhsm2-B0ev2A/SSSD-child-915-auth.output .output 960s + output_cert_file=/tmp/sssd-softhsm2-B0ev2A/SSSD-child-915-auth.pem 960s + echo -n 053350 960s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-B0ev2A/test-full-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 '' --token_name 'Test Organization Sub Int Token' --module_name /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so 960s [p11_child[2473]] [main] (0x0400): p11_child started. 960s [p11_child[2473]] [main] (0x2000): Running in [auth] mode. 960s [p11_child[2473]] [main] (0x2000): Running with effective IDs: [0][0]. 960s [p11_child[2473]] [main] (0x2000): Running with real IDs [0][0]. 960s [p11_child[2473]] [do_card] (0x4000): Module List: 960s [p11_child[2473]] [do_card] (0x4000): common name: [softhsm2]. 960s [p11_child[2473]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 960s [p11_child[2473]] [do_card] (0x4000): Description [SoftHSM slot ID 0x3d103ded] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 960s [p11_child[2473]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 960s [p11_child[2473]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x3d103ded][1024474605] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 960s [p11_child[2473]] [do_card] (0x4000): Login required. 960s [p11_child[2473]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 960s [p11_child[2473]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 960s [p11_child[2473]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so Test Organization Sub Int Token Test Organization Sub Int Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 960s [p11_child[2473]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x3d103ded;slot-manufacturer=SoftHSM%20project;slot-id=1024474605;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7d4ecbce3d103ded;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 960s [p11_child[2473]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 960s [p11_child[2473]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 960s [p11_child[2473]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 960s [p11_child[2473]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 960s [p11_child[2473]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 960s [p11_child[2473]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 960s [p11_child[2473]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 960s [p11_child[2473]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 960s [p11_child[2473]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 960s [p11_child[2473]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 960s [p11_child[2473]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 960s [p11_child[2473]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 960s [p11_child[2473]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 960s [p11_child[2473]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 960s [p11_child[2473]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 960s [p11_child[2473]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 960s [p11_child[2473]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 960s [p11_child[2473]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 960s [p11_child[2473]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 960s [p11_child[2473]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 960s [p11_child[2473]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 960s [p11_child[2473]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 960s [p11_child[2473]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 960s [p11_child[2473]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 960s [p11_child[2473]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 960s [p11_child[2473]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 960s [p11_child[2473]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 960s [p11_child[2473]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 960s [p11_child[2473]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 960s [p11_child[2473]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 960s [p11_child[2473]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 960s [p11_child[2473]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 960s [p11_child[2473]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 960s [p11_child[2473]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 960s [p11_child[2473]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 960s [p11_child[2473]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 960s [p11_child[2473]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 960s [p11_child[2473]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 960s [p11_child[2473]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 960s [p11_child[2473]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 960s [p11_child[2473]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 960s [p11_child[2473]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 960s [p11_child[2473]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 960s [p11_child[2473]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 960s [p11_child[2473]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 960s [p11_child[2473]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 960s [p11_child[2473]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 960s [p11_child[2473]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 960s [p11_child[2473]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 960s [p11_child[2473]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 960s [p11_child[2473]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 960s [p11_child[2473]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 960s [p11_child[2473]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 960s [p11_child[2473]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 960s [p11_child[2473]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 960s [p11_child[2473]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 960s [p11_child[2473]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 960s [p11_child[2473]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 960s [p11_child[2473]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 960s [p11_child[2473]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 960s [p11_child[2473]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 960s [p11_child[2473]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 960s [p11_child[2473]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 960s [p11_child[2473]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 960s [p11_child[2473]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 960s [p11_child[2473]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 960s [p11_child[2473]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 960s [p11_child[2473]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 960s [p11_child[2473]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 960s [p11_child[2473]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 960s [p11_child[2473]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 960s [p11_child[2473]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 960s [p11_child[2473]] [do_card] (0x4000): Certificate verified and validated. 960s [p11_child[2473]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 960s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-B0ev2A/SSSD-child-915-auth.output 960s + echo '-----BEGIN CERTIFICATE-----' 960s + tail -n1 /tmp/sssd-softhsm2-B0ev2A/SSSD-child-915-auth.output 960s + echo '-----END CERTIFICATE-----' 960s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-B0ev2A/SSSD-child-915-auth.pem 960s Certificate: 960s Data: 960s Version: 3 (0x2) 960s Serial Number: 5 (0x5) 960s Signature Algorithm: sha256WithRSAEncryption 960s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 960s Validity 960s Not Before: Mar 19 03:47:10 2024 GMT 960s Not After : Mar 19 03:47:10 2025 GMT 960s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 960s Subject Public Key Info: 960s Public Key Algorithm: rsaEncryption 960s Public-Key: (1024 bit) 960s Modulus: 960s 00:f6:ed:4c:61:46:8f:37:83:a0:61:59:04:06:b8: 960s 15:46:47:bd:71:9a:0a:bd:50:44:11:69:7b:3d:22: 960s ee:af:51:4e:e8:45:cd:e9:da:4c:80:9c:0b:c2:09: 960s 34:38:2e:7c:86:89:f9:f5:79:58:58:ea:7e:85:19: 960s b2:32:b6:76:63:c3:0b:66:2d:1e:58:e3:5b:00:eb: 960s e3:78:69:1c:4c:ec:33:02:12:d8:82:14:d1:3b:dd: 960s 96:9b:ba:a9:c0:b2:98:89:51:dd:48:66:0d:de:63: 960s 9e:fb:26:48:7b:fd:d8:50:2f:1a:1d:47:db:d5:51: 960s d9:2b:08:84:d8:d3:20:a1:fd 960s Exponent: 65537 (0x10001) 960s X509v3 extensions: 960s X509v3 Authority Key Identifier: 960s 21:AE:84:EF:FC:52:0F:30:AB:5B:F0:FC:4F:D1:4B:26:86:97:9B:AF 960s X509v3 Basic Constraints: 960s CA:FALSE 960s Netscape Cert Type: 960s SSL Client, S/MIME 960s Netscape Comment: 960s Test Organization Sub Intermediate CA trusted Certificate 960s X509v3 Subject Key Identifier: 960s 18:F3:50:B5:A5:EE:AC:F4:7D:3A:3E:95:56:1E:7D:CB:E6:0B:CE:0C 960s X509v3 Key Usage: critical 960s Digital Signature, Non Repudiation, Key Encipherment 960s X509v3 Extended Key Usage: 960s TLS Web Client Authentication, E-mail Protection 960s X509v3 Subject Alternative Name: 960s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 960s Signature Algorithm: sha256WithRSAEncryption 960s Signature Value: 960s b9:38:80:ad:46:ba:d8:17:5e:10:20:56:7b:ae:f2:9b:36:9a: 960s 0c:c9:d8:33:0a:34:57:d3:51:b3:f4:b6:a1:2b:44:4d:6e:47: 960s a5:4d:c1:79:a0:77:76:88:61:13:a2:79:06:d2:bc:be:cc:1f: 960s 8d:84:74:52:ea:1b:ad:96:5a:33:c8:e9:8e:34:73:d7:05:86: 960s 36:b9:eb:21:8d:09:c2:e8:e2:b2:f9:08:97:92:d5:77:58:84: 960s e3:a6:39:7c:8d:55:e5:2b:6c:19:72:bf:c2:a7:ac:07:c0:72: 960s b2:e7:a4:d1:cd:4c:5e:77:8e:ec:08:1a:4a:48:7b:89:8a:ad: 960s ae:1d 960s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-B0ev2A/SSSD-child-915-auth.pem 961s + found_md5=Modulus=F6ED4C61468F3783A061590406B8154647BD719A0ABD504411697B3D22EEAF514EE845CDE9DA4C809C0BC20934382E7C8689F9F5795858EA7E8519B232B67663C30B662D1E58E35B00EBE378691C4CEC330212D88214D13BDD969BBAA9C0B2988951DD48660DDE639EFB26487BFDD8502F1A1D47DBD551D92B0884D8D320A1FD 961s + '[' Modulus=F6ED4C61468F3783A061590406B8154647BD719A0ABD504411697B3D22EEAF514EE845CDE9DA4C809C0BC20934382E7C8689F9F5795858EA7E8519B232B67663C30B662D1E58E35B00EBE378691C4CEC330212D88214D13BDD969BBAA9C0B2988951DD48660DDE639EFB26487BFDD8502F1A1D47DBD551D92B0884D8D320A1FD '!=' Modulus=F6ED4C61468F3783A061590406B8154647BD719A0ABD504411697B3D22EEAF514EE845CDE9DA4C809C0BC20934382E7C8689F9F5795858EA7E8519B232B67663C30B662D1E58E35B00EBE378691C4CEC330212D88214D13BDD969BBAA9C0B2988951DD48660DDE639EFB26487BFDD8502F1A1D47DBD551D92B0884D8D320A1FD ']' 961s + valid_certificate /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-8222 /tmp/sssd-softhsm2-B0ev2A/test-full-chain-CA.pem partial_chain 961s + check_certificate /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-8222 /tmp/sssd-softhsm2-B0ev2A/test-full-chain-CA.pem partial_chain 961s + local certificate=/tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-trusted-certificate-0001.pem 961s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-8222 961s + local key_ring=/tmp/sssd-softhsm2-B0ev2A/test-full-chain-CA.pem 961s + local verify_option=partial_chain 961s + prepare_softhsm2_card /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-8222 961s + local certificate=/tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-trusted-certificate-0001.pem 961s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-8222 961s + local key_cn 961s + local key_name 961s + local tokens_dir 961s + local output_cert_file 961s + token_name= 961s ++ basename /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 961s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 961s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-trusted-certificate-0001.pem 961s ++ sed -n 's/ *commonName *= //p' 961s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 961s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 961s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-B0ev2A/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 961s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-B0ev2A/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 961s ++ basename /tmp/sssd-softhsm2-B0ev2A/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 961s + tokens_dir=/tmp/sssd-softhsm2-B0ev2A/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 961s + token_name='Test Organization Sub Int Token' 961s Test Organization Sub Int Token 961s + '[' '!' -e /tmp/sssd-softhsm2-B0ev2A/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 961s + '[' '!' -d /tmp/sssd-softhsm2-B0ev2A/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 961s + echo 'Test Organization Sub Int Token' 961s + '[' -n partial_chain ']' 961s + local verify_arg=--verify=partial_chain 961s + local output_base_name=SSSD-child-18000 961s + local output_file=/tmp/sssd-softhsm2-B0ev2A/SSSD-child-18000.output 961s + output_cert_file=/tmp/sssd-softhsm2-B0ev2A/SSSD-child-18000.pem 961s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-B0ev2A/test-full-chain-CA.pem 961s [p11_child[2483]] [main] (0x0400): p11_child started. 961s [p11_child[2483]] [main] (0x2000): Running in [pre-auth] mode. 961s [p11_child[2483]] [main] (0x2000): Running with effective IDs: [0][0]. 961s [p11_child[2483]] [main] (0x2000): Running with real IDs [0][0]. 961s [p11_child[2483]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 961s [p11_child[2483]] [do_card] (0x4000): Module List: 961s [p11_child[2483]] [do_card] (0x4000): common name: [softhsm2]. 961s [p11_child[2483]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 961s [p11_child[2483]] [do_card] (0x4000): Description [SoftHSM slot ID 0x3d103ded] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 961s [p11_child[2483]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 961s [p11_child[2483]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x3d103ded][1024474605] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 961s [p11_child[2483]] [do_card] (0x4000): Login NOT required. 961s [p11_child[2483]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 961s [p11_child[2483]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 961s [p11_child[2483]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Sub Int Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 961s [p11_child[2483]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x3d103ded;slot-manufacturer=SoftHSM%20project;slot-id=1024474605;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7d4ecbce3d103ded;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 961s [p11_child[2483]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 961s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-B0ev2A/SSSD-child-18000.output 961s + echo '-----BEGIN CERTIFICATE-----' 961s + tail -n1 /tmp/sssd-softhsm2-B0ev2A/SSSD-child-18000.output 961s + echo '-----END CERTIFICATE-----' 961s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-B0ev2A/SSSD-child-18000.pem 961s Certificate: 961s Data: 961s Version: 3 (0x2) 961s Serial Number: 5 (0x5) 961s Signature Algorithm: sha256WithRSAEncryption 961s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 961s Validity 961s Not Before: Mar 19 03:47:10 2024 GMT 961s Not After : Mar 19 03:47:10 2025 GMT 961s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 961s Subject Public Key Info: 961s Public Key Algorithm: rsaEncryption 961s Public-Key: (1024 bit) 961s Modulus: 961s 00:f6:ed:4c:61:46:8f:37:83:a0:61:59:04:06:b8: 961s 15:46:47:bd:71:9a:0a:bd:50:44:11:69:7b:3d:22: 961s ee:af:51:4e:e8:45:cd:e9:da:4c:80:9c:0b:c2:09: 961s 34:38:2e:7c:86:89:f9:f5:79:58:58:ea:7e:85:19: 961s b2:32:b6:76:63:c3:0b:66:2d:1e:58:e3:5b:00:eb: 961s e3:78:69:1c:4c:ec:33:02:12:d8:82:14:d1:3b:dd: 961s 96:9b:ba:a9:c0:b2:98:89:51:dd:48:66:0d:de:63: 961s 9e:fb:26:48:7b:fd:d8:50:2f:1a:1d:47:db:d5:51: 961s d9:2b:08:84:d8:d3:20:a1:fd 961s Exponent: 65537 (0x10001) 961s X509v3 extensions: 961s X509v3 Authority Key Identifier: 961s 21:AE:84:EF:FC:52:0F:30:AB:5B:F0:FC:4F:D1:4B:26:86:97:9B:AF 961s X509v3 Basic Constraints: 961s CA:FALSE 961s Netscape Cert Type: 961s SSL Client, S/MIME 961s Netscape Comment: 961s Test Organization Sub Intermediate CA trusted Certificate 961s X509v3 Subject Key Identifier: 961s 18:F3:50:B5:A5:EE:AC:F4:7D:3A:3E:95:56:1E:7D:CB:E6:0B:CE:0C 961s X509v3 Key Usage: critical 961s Digital Signature, Non Repudiation, Key Encipherment 961s X509v3 Extended Key Usage: 961s TLS Web Client Authentication, E-mail Protection 961s X509v3 Subject Alternative Name: 961s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 961s Signature Algorithm: sha256WithRSAEncryption 961s Signature Value: 961s b9:38:80:ad:46:ba:d8:17:5e:10:20:56:7b:ae:f2:9b:36:9a: 961s 0c:c9:d8:33:0a:34:57:d3:51:b3:f4:b6:a1:2b:44:4d:6e:47: 961s a5:4d:c1:79:a0:77:76:88:61:13:a2:79:06:d2:bc:be:cc:1f: 961s 8d:84:74:52:ea:1b:ad:96:5a:33:c8:e9:8e:34:73:d7:05:86: 961s 36:b9:eb:21:8d:09:c2:e8:e2:b2:f9:08:97:92:d5:77:58:84: 961s e3:a6:39:7c:8d:55:e5:2b:6c:19:72:bf:c2:a7:ac:07:c0:72: 961s b2:e7:a4:d1:cd:4c:5e:77:8e:ec:08:1a:4a:48:7b:89:8a:ad: 961s ae:1d 961s + local found_md5 expected_md5 961s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-trusted-certificate-0001.pem 961s + expected_md5=Modulus=F6ED4C61468F3783A061590406B8154647BD719A0ABD504411697B3D22EEAF514EE845CDE9DA4C809C0BC20934382E7C8689F9F5795858EA7E8519B232B67663C30B662D1E58E35B00EBE378691C4CEC330212D88214D13BDD969BBAA9C0B2988951DD48660DDE639EFB26487BFDD8502F1A1D47DBD551D92B0884D8D320A1FD 961s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-B0ev2A/SSSD-child-18000.pem 961s + found_md5=Modulus=F6ED4C61468F3783A061590406B8154647BD719A0ABD504411697B3D22EEAF514EE845CDE9DA4C809C0BC20934382E7C8689F9F5795858EA7E8519B232B67663C30B662D1E58E35B00EBE378691C4CEC330212D88214D13BDD969BBAA9C0B2988951DD48660DDE639EFB26487BFDD8502F1A1D47DBD551D92B0884D8D320A1FD 961s + '[' Modulus=F6ED4C61468F3783A061590406B8154647BD719A0ABD504411697B3D22EEAF514EE845CDE9DA4C809C0BC20934382E7C8689F9F5795858EA7E8519B232B67663C30B662D1E58E35B00EBE378691C4CEC330212D88214D13BDD969BBAA9C0B2988951DD48660DDE639EFB26487BFDD8502F1A1D47DBD551D92B0884D8D320A1FD '!=' Modulus=F6ED4C61468F3783A061590406B8154647BD719A0ABD504411697B3D22EEAF514EE845CDE9DA4C809C0BC20934382E7C8689F9F5795858EA7E8519B232B67663C30B662D1E58E35B00EBE378691C4CEC330212D88214D13BDD969BBAA9C0B2988951DD48660DDE639EFB26487BFDD8502F1A1D47DBD551D92B0884D8D320A1FD ']' 961s + output_file=/tmp/sssd-softhsm2-B0ev2A/SSSD-child-18000-auth.output 961s ++ basename /tmp/sssd-softhsm2-B0ev2A/SSSD-child-18000-auth.output .output 961s + output_cert_file=/tmp/sssd-softhsm2-B0ev2A/SSSD-child-18000-auth.pem 961s + echo -n 053350 961s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-B0ev2A/test-full-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Sub Int Token' --module_name /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so 961s [p11_child[2491]] [main] (0x0400): p11_child started. 961s [p11_child[2491]] [main] (0x2000): Running in [auth] mode. 961s [p11_child[2491]] [main] (0x2000): Running with effective IDs: [0][0]. 961s [p11_child[2491]] [main] (0x2000): Running with real IDs [0][0]. 961s [p11_child[2491]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 961s [p11_child[2491]] [do_card] (0x4000): Module List: 961s [p11_child[2491]] [do_card] (0x4000): common name: [softhsm2]. 961s [p11_child[2491]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 961s [p11_child[2491]] [do_card] (0x4000): Description [SoftHSM slot ID 0x3d103ded] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 961s [p11_child[2491]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 961s [p11_child[2491]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x3d103ded][1024474605] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 961s [p11_child[2491]] [do_card] (0x4000): Login required. 961s [p11_child[2491]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 961s [p11_child[2491]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 961s [p11_child[2491]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so Test Organization Sub Int Token Test Organization Sub Int Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 961s [p11_child[2491]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x3d103ded;slot-manufacturer=SoftHSM%20project;slot-id=1024474605;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7d4ecbce3d103ded;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 961s [p11_child[2491]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 961s [p11_child[2491]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 961s [p11_child[2491]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 961s [p11_child[2491]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 961s [p11_child[2491]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 961s [p11_child[2491]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 961s [p11_child[2491]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 961s [p11_child[2491]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 961s [p11_child[2491]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 961s [p11_child[2491]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 961s [p11_child[2491]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 961s [p11_child[2491]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 961s [p11_child[2491]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 961s [p11_child[2491]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 961s [p11_child[2491]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 961s [p11_child[2491]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 961s [p11_child[2491]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 961s [p11_child[2491]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 961s [p11_child[2491]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 961s [p11_child[2491]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 961s [p11_child[2491]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 961s [p11_child[2491]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 961s [p11_child[2491]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 961s [p11_child[2491]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 961s [p11_child[2491]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 961s [p11_child[2491]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 961s [p11_child[2491]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 961s [p11_child[2491]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 961s [p11_child[2491]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 961s [p11_child[2491]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 961s [p11_child[2491]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 961s [p11_child[2491]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 961s [p11_child[2491]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 961s [p11_child[2491]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 961s [p11_child[2491]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 961s [p11_child[2491]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 961s [p11_child[2491]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 961s [p11_child[2491]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 961s [p11_child[2491]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 961s [p11_child[2491]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 961s [p11_child[2491]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 961s [p11_child[2491]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 961s [p11_child[2491]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 961s [p11_child[2491]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 961s [p11_child[2491]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 961s [p11_child[2491]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 961s [p11_child[2491]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 961s [p11_child[2491]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 961s [p11_child[2491]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 961s [p11_child[2491]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 961s [p11_child[2491]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 961s [p11_child[2491]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 961s [p11_child[2491]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 961s [p11_child[2491]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 961s [p11_child[2491]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 961s [p11_child[2491]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 961s [p11_child[2491]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 961s [p11_child[2491]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 961s [p11_child[2491]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 961s [p11_child[2491]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 961s [p11_child[2491]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 961s [p11_child[2491]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 961s [p11_child[2491]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 961s [p11_child[2491]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 961s [p11_child[2491]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 961s [p11_child[2491]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 961s [p11_child[2491]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 961s [p11_child[2491]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 961s [p11_child[2491]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 961s [p11_child[2491]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 961s [p11_child[2491]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 961s [p11_child[2491]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 961s [p11_child[2491]] [do_card] (0x4000): Certificate verified and validated. 961s [p11_child[2491]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 961s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-B0ev2A/SSSD-child-18000-auth.output 961s + echo '-----BEGIN CERTIFICATE-----' 961s + tail -n1 /tmp/sssd-softhsm2-B0ev2A/SSSD-child-18000-auth.output 961s + echo '-----END CERTIFICATE-----' 961s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-B0ev2A/SSSD-child-18000-auth.pem 961s Certificate: 961s Data: 961s Version: 3 (0x2) 961s Serial Number: 5 (0x5) 961s Signature Algorithm: sha256WithRSAEncryption 961s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 961s Validity 961s Not Before: Mar 19 03:47:10 2024 GMT 961s Not After : Mar 19 03:47:10 2025 GMT 961s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 961s Subject Public Key Info: 961s Public Key Algorithm: rsaEncryption 961s Public-Key: (1024 bit) 961s Modulus: 961s 00:f6:ed:4c:61:46:8f:37:83:a0:61:59:04:06:b8: 961s 15:46:47:bd:71:9a:0a:bd:50:44:11:69:7b:3d:22: 961s ee:af:51:4e:e8:45:cd:e9:da:4c:80:9c:0b:c2:09: 961s 34:38:2e:7c:86:89:f9:f5:79:58:58:ea:7e:85:19: 961s b2:32:b6:76:63:c3:0b:66:2d:1e:58:e3:5b:00:eb: 961s e3:78:69:1c:4c:ec:33:02:12:d8:82:14:d1:3b:dd: 961s 96:9b:ba:a9:c0:b2:98:89:51:dd:48:66:0d:de:63: 961s 9e:fb:26:48:7b:fd:d8:50:2f:1a:1d:47:db:d5:51: 961s d9:2b:08:84:d8:d3:20:a1:fd 961s Exponent: 65537 (0x10001) 961s X509v3 extensions: 961s X509v3 Authority Key Identifier: 961s 21:AE:84:EF:FC:52:0F:30:AB:5B:F0:FC:4F:D1:4B:26:86:97:9B:AF 961s X509v3 Basic Constraints: 961s CA:FALSE 961s Netscape Cert Type: 961s SSL Client, S/MIME 961s Netscape Comment: 961s Test Organization Sub Intermediate CA trusted Certificate 961s X509v3 Subject Key Identifier: 961s 18:F3:50:B5:A5:EE:AC:F4:7D:3A:3E:95:56:1E:7D:CB:E6:0B:CE:0C 961s X509v3 Key Usage: critical 961s Digital Signature, Non Repudiation, Key Encipherment 961s X509v3 Extended Key Usage: 961s TLS Web Client Authentication, E-mail Protection 961s X509v3 Subject Alternative Name: 961s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 961s Signature Algorithm: sha256WithRSAEncryption 961s Signature Value: 961s b9:38:80:ad:46:ba:d8:17:5e:10:20:56:7b:ae:f2:9b:36:9a: 961s 0c:c9:d8:33:0a:34:57:d3:51:b3:f4:b6:a1:2b:44:4d:6e:47: 961s a5:4d:c1:79:a0:77:76:88:61:13:a2:79:06:d2:bc:be:cc:1f: 961s 8d:84:74:52:ea:1b:ad:96:5a:33:c8:e9:8e:34:73:d7:05:86: 961s 36:b9:eb:21:8d:09:c2:e8:e2:b2:f9:08:97:92:d5:77:58:84: 961s e3:a6:39:7c:8d:55:e5:2b:6c:19:72:bf:c2:a7:ac:07:c0:72: 961s b2:e7:a4:d1:cd:4c:5e:77:8e:ec:08:1a:4a:48:7b:89:8a:ad: 961s ae:1d 961s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-B0ev2A/SSSD-child-18000-auth.pem 961s + found_md5=Modulus=F6ED4C61468F3783A061590406B8154647BD719A0ABD504411697B3D22EEAF514EE845CDE9DA4C809C0BC20934382E7C8689F9F5795858EA7E8519B232B67663C30B662D1E58E35B00EBE378691C4CEC330212D88214D13BDD969BBAA9C0B2988951DD48660DDE639EFB26487BFDD8502F1A1D47DBD551D92B0884D8D320A1FD 961s + '[' Modulus=F6ED4C61468F3783A061590406B8154647BD719A0ABD504411697B3D22EEAF514EE845CDE9DA4C809C0BC20934382E7C8689F9F5795858EA7E8519B232B67663C30B662D1E58E35B00EBE378691C4CEC330212D88214D13BDD969BBAA9C0B2988951DD48660DDE639EFB26487BFDD8502F1A1D47DBD551D92B0884D8D320A1FD '!=' Modulus=F6ED4C61468F3783A061590406B8154647BD719A0ABD504411697B3D22EEAF514EE845CDE9DA4C809C0BC20934382E7C8689F9F5795858EA7E8519B232B67663C30B662D1E58E35B00EBE378691C4CEC330212D88214D13BDD969BBAA9C0B2988951DD48660DDE639EFB26487BFDD8502F1A1D47DBD551D92B0884D8D320A1FD ']' 961s + invalid_certificate /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-8222 /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA.pem 961s + check_certificate /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-8222 /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA.pem 961s + local certificate=/tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-trusted-certificate-0001.pem 961s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-8222 961s + local key_ring=/tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA.pem 961s + local verify_option= 961s + prepare_softhsm2_card /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-8222 961s + local certificate=/tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-trusted-certificate-0001.pem 961s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-8222 961s + local key_cn 961s + local key_name 961s + local tokens_dir 961s + local output_cert_file 961s + token_name= 961s ++ basename /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 961s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 961s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-trusted-certificate-0001.pem 961s ++ sed -n 's/ *commonName *= //p' 961s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 961s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 961s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-B0ev2A/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 961s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-B0ev2A/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 961s ++ basename /tmp/sssd-softhsm2-B0ev2A/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 961s + tokens_dir=/tmp/sssd-softhsm2-B0ev2A/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 961s + token_name='Test Organization Sub Int Token' 961s + '[' '!' -e /tmp/sssd-softhsm2-B0ev2A/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 961s + '[' '!' -d /tmp/sssd-softhsm2-B0ev2A/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 961s + echo 'Test Organization Sub Int Token' 961s Test Organization Sub Int Token 961s + '[' -n '' ']' 961s + local output_base_name=SSSD-child-6167 961s + local output_file=/tmp/sssd-softhsm2-B0ev2A/SSSD-child-6167.output 961s + output_cert_file=/tmp/sssd-softhsm2-B0ev2A/SSSD-child-6167.pem 961s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA.pem 961s [p11_child[2501]] [main] (0x0400): p11_child started. 961s [p11_child[2501]] [main] (0x2000): Running in [pre-auth] mode. 961s [p11_child[2501]] [main] (0x2000): Running with effective IDs: [0][0]. 961s [p11_child[2501]] [main] (0x2000): Running with real IDs [0][0]. 961s [p11_child[2501]] [do_card] (0x4000): Module List: 961s [p11_child[2501]] [do_card] (0x4000): common name: [softhsm2]. 961s [p11_child[2501]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 961s [p11_child[2501]] [do_card] (0x4000): Description [SoftHSM slot ID 0x3d103ded] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 961s [p11_child[2501]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 961s [p11_child[2501]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x3d103ded][1024474605] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 961s [p11_child[2501]] [do_card] (0x4000): Login NOT required. 961s [p11_child[2501]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 961s [p11_child[2501]] [do_verification] (0x0040): X509_verify_cert failed [0]. 961s [p11_child[2501]] [do_verification] (0x0040): X509_verify_cert failed [2][unable to get issuer certificate]. 961s [p11_child[2501]] [read_certs] (0x0040): Certificate [Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] not valid, skipping. 961s [p11_child[2501]] [do_card] (0x4000): No certificate found. 961s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-B0ev2A/SSSD-child-6167.output 961s + return 2 961s + invalid_certificate /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-8222 /tmp/sssd-softhsm2-B0ev2A/test-root-intermediate-chain-CA.pem partial_chain 961s + check_certificate /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-8222 /tmp/sssd-softhsm2-B0ev2A/test-root-intermediate-chain-CA.pem partial_chain 961s + local certificate=/tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-trusted-certificate-0001.pem 961s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-8222 961s + local key_ring=/tmp/sssd-softhsm2-B0ev2A/test-root-intermediate-chain-CA.pem 961s + local verify_option=partial_chain 961s + prepare_softhsm2_card /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-8222 961s + local certificate=/tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-trusted-certificate-0001.pem 961s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-8222 961s + local key_cn 961s + local key_name 961s + local tokens_dir 961s + local output_cert_file 961s + token_name= 961s ++ basename /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 961s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 961s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-trusted-certificate-0001.pem 961s ++ sed -n 's/ *commonName *= //p' 961s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 961s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 961s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-B0ev2A/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 961s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-B0ev2A/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 961s ++ basename /tmp/sssd-softhsm2-B0ev2A/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 961s + tokens_dir=/tmp/sssd-softhsm2-B0ev2A/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 961s + token_name='Test Organization Sub Int Token' 961s + '[' '!' -e /tmp/sssd-softhsm2-B0ev2A/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 961s + '[' '!' -d /tmp/sssd-softhsm2-B0ev2A/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 961s + echo 'Test Organization Sub Int Token' 961s Test Organization Sub Int Token 961s + '[' -n partial_chain ']' 961s + local verify_arg=--verify=partial_chain 961s + local output_base_name=SSSD-child-32443 961s + local output_file=/tmp/sssd-softhsm2-B0ev2A/SSSD-child-32443.output 961s + output_cert_file=/tmp/sssd-softhsm2-B0ev2A/SSSD-child-32443.pem 961s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-B0ev2A/test-root-intermediate-chain-CA.pem 961s [p11_child[2508]] [main] (0x0400): p11_child started. 961s [p11_child[2508]] [main] (0x2000): Running in [pre-auth] mode. 961s [p11_child[2508]] [main] (0x2000): Running with effective IDs: [0][0]. 961s [p11_child[2508]] [main] (0x2000): Running with real IDs [0][0]. 961s [p11_child[2508]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 961s [p11_child[2508]] [do_card] (0x4000): Module List: 961s [p11_child[2508]] [do_card] (0x4000): common name: [softhsm2]. 961s [p11_child[2508]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 961s [p11_child[2508]] [do_card] (0x4000): Description [SoftHSM slot ID 0x3d103ded] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 961s [p11_child[2508]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 961s [p11_child[2508]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x3d103ded][1024474605] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 961s [p11_child[2508]] [do_card] (0x4000): Login NOT required. 961s [p11_child[2508]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 961s [p11_child[2508]] [do_verification] (0x0040): X509_verify_cert failed [0]. 961s [p11_child[2508]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 961s [p11_child[2508]] [read_certs] (0x0040): Certificate [Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] not valid, skipping. 961s [p11_child[2508]] [do_card] (0x4000): No certificate found. 961s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-B0ev2A/SSSD-child-32443.output 961s + return 2 961s + valid_certificate /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-8222 /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA.pem partial_chain 961s + check_certificate /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-8222 /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA.pem partial_chain 961s + local certificate=/tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-trusted-certificate-0001.pem 961s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-8222 961s + local key_ring=/tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA.pem 961s + local verify_option=partial_chain 961s + prepare_softhsm2_card /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-8222 961s + local certificate=/tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-trusted-certificate-0001.pem 961s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-8222 961s + local key_cn 961s + local key_name 961s + local tokens_dir 961s + local output_cert_file 961s + token_name= 961s ++ basename /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 961s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 961s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-trusted-certificate-0001.pem 961s ++ sed -n 's/ *commonName *= //p' 961s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 961s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 961s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-B0ev2A/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 961s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-B0ev2A/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 961s ++ basename /tmp/sssd-softhsm2-B0ev2A/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 961s + tokens_dir=/tmp/sssd-softhsm2-B0ev2A/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 961s + token_name='Test Organization Sub Int Token' 961s + '[' '!' -e /tmp/sssd-softhsm2-B0ev2A/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 961s + '[' '!' -d /tmp/sssd-softhsm2-B0ev2A/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 961s + echo 'Test Organization Sub Int Token' 961s Test Organization Sub Int Token 961s + '[' -n partial_chain ']' 961s + local verify_arg=--verify=partial_chain 961s + local output_base_name=SSSD-child-390 961s + local output_file=/tmp/sssd-softhsm2-B0ev2A/SSSD-child-390.output 961s + output_cert_file=/tmp/sssd-softhsm2-B0ev2A/SSSD-child-390.pem 961s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA.pem 961s [p11_child[2515]] [main] (0x0400): p11_child started. 961s [p11_child[2515]] [main] (0x2000): Running in [pre-auth] mode. 961s [p11_child[2515]] [main] (0x2000): Running with effective IDs: [0][0]. 961s [p11_child[2515]] [main] (0x2000): Running with real IDs [0][0]. 961s [p11_child[2515]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 961s [p11_child[2515]] [do_card] (0x4000): Module List: 961s [p11_child[2515]] [do_card] (0x4000): common name: [softhsm2]. 961s [p11_child[2515]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 961s [p11_child[2515]] [do_card] (0x4000): Description [SoftHSM slot ID 0x3d103ded] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 961s [p11_child[2515]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 961s [p11_child[2515]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x3d103ded][1024474605] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 961s [p11_child[2515]] [do_card] (0x4000): Login NOT required. 961s [p11_child[2515]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 961s [p11_child[2515]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 961s [p11_child[2515]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Sub Int Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 961s [p11_child[2515]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x3d103ded;slot-manufacturer=SoftHSM%20project;slot-id=1024474605;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7d4ecbce3d103ded;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 961s [p11_child[2515]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 961s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-B0ev2A/SSSD-child-390.output 961s + echo '-----BEGIN CERTIFICATE-----' 961s + tail -n1 /tmp/sssd-softhsm2-B0ev2A/SSSD-child-390.output 961s + echo '-----END CERTIFICATE-----' 961s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-B0ev2A/SSSD-child-390.pem 961s Certificate: 961s Data: 961s Version: 3 (0x2) 961s Serial Number: 5 (0x5) 961s Signature Algorithm: sha256WithRSAEncryption 961s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 961s Validity 961s Not Before: Mar 19 03:47:10 2024 GMT 961s Not After : Mar 19 03:47:10 2025 GMT 961s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 961s Subject Public Key Info: 961s Public Key Algorithm: rsaEncryption 961s Public-Key: (1024 bit) 961s Modulus: 961s 00:f6:ed:4c:61:46:8f:37:83:a0:61:59:04:06:b8: 961s 15:46:47:bd:71:9a:0a:bd:50:44:11:69:7b:3d:22: 961s ee:af:51:4e:e8:45:cd:e9:da:4c:80:9c:0b:c2:09: 961s 34:38:2e:7c:86:89:f9:f5:79:58:58:ea:7e:85:19: 961s b2:32:b6:76:63:c3:0b:66:2d:1e:58:e3:5b:00:eb: 961s e3:78:69:1c:4c:ec:33:02:12:d8:82:14:d1:3b:dd: 961s 96:9b:ba:a9:c0:b2:98:89:51:dd:48:66:0d:de:63: 961s 9e:fb:26:48:7b:fd:d8:50:2f:1a:1d:47:db:d5:51: 961s d9:2b:08:84:d8:d3:20:a1:fd 961s Exponent: 65537 (0x10001) 961s X509v3 extensions: 961s X509v3 Authority Key Identifier: 961s 21:AE:84:EF:FC:52:0F:30:AB:5B:F0:FC:4F:D1:4B:26:86:97:9B:AF 961s X509v3 Basic Constraints: 961s CA:FALSE 961s Netscape Cert Type: 961s SSL Client, S/MIME 961s Netscape Comment: 961s Test Organization Sub Intermediate CA trusted Certificate 961s X509v3 Subject Key Identifier: 961s 18:F3:50:B5:A5:EE:AC:F4:7D:3A:3E:95:56:1E:7D:CB:E6:0B:CE:0C 961s X509v3 Key Usage: critical 961s Digital Signature, Non Repudiation, Key Encipherment 961s X509v3 Extended Key Usage: 961s TLS Web Client Authentication, E-mail Protection 961s X509v3 Subject Alternative Name: 961s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 961s Signature Algorithm: sha256WithRSAEncryption 961s Signature Value: 961s b9:38:80:ad:46:ba:d8:17:5e:10:20:56:7b:ae:f2:9b:36:9a: 961s 0c:c9:d8:33:0a:34:57:d3:51:b3:f4:b6:a1:2b:44:4d:6e:47: 961s a5:4d:c1:79:a0:77:76:88:61:13:a2:79:06:d2:bc:be:cc:1f: 961s 8d:84:74:52:ea:1b:ad:96:5a:33:c8:e9:8e:34:73:d7:05:86: 961s 36:b9:eb:21:8d:09:c2:e8:e2:b2:f9:08:97:92:d5:77:58:84: 961s e3:a6:39:7c:8d:55:e5:2b:6c:19:72:bf:c2:a7:ac:07:c0:72: 961s b2:e7:a4:d1:cd:4c:5e:77:8e:ec:08:1a:4a:48:7b:89:8a:ad: 961s ae:1d 961s + local found_md5 expected_md5 961s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-trusted-certificate-0001.pem 961s + expected_md5=Modulus=F6ED4C61468F3783A061590406B8154647BD719A0ABD504411697B3D22EEAF514EE845CDE9DA4C809C0BC20934382E7C8689F9F5795858EA7E8519B232B67663C30B662D1E58E35B00EBE378691C4CEC330212D88214D13BDD969BBAA9C0B2988951DD48660DDE639EFB26487BFDD8502F1A1D47DBD551D92B0884D8D320A1FD 961s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-B0ev2A/SSSD-child-390.pem 961s + found_md5=Modulus=F6ED4C61468F3783A061590406B8154647BD719A0ABD504411697B3D22EEAF514EE845CDE9DA4C809C0BC20934382E7C8689F9F5795858EA7E8519B232B67663C30B662D1E58E35B00EBE378691C4CEC330212D88214D13BDD969BBAA9C0B2988951DD48660DDE639EFB26487BFDD8502F1A1D47DBD551D92B0884D8D320A1FD 961s + '[' Modulus=F6ED4C61468F3783A061590406B8154647BD719A0ABD504411697B3D22EEAF514EE845CDE9DA4C809C0BC20934382E7C8689F9F5795858EA7E8519B232B67663C30B662D1E58E35B00EBE378691C4CEC330212D88214D13BDD969BBAA9C0B2988951DD48660DDE639EFB26487BFDD8502F1A1D47DBD551D92B0884D8D320A1FD '!=' Modulus=F6ED4C61468F3783A061590406B8154647BD719A0ABD504411697B3D22EEAF514EE845CDE9DA4C809C0BC20934382E7C8689F9F5795858EA7E8519B232B67663C30B662D1E58E35B00EBE378691C4CEC330212D88214D13BDD969BBAA9C0B2988951DD48660DDE639EFB26487BFDD8502F1A1D47DBD551D92B0884D8D320A1FD ']' 961s + output_file=/tmp/sssd-softhsm2-B0ev2A/SSSD-child-390-auth.output 961s ++ basename /tmp/sssd-softhsm2-B0ev2A/SSSD-child-390-auth.output .output 961s + output_cert_file=/tmp/sssd-softhsm2-B0ev2A/SSSD-child-390-auth.pem 961s + echo -n 053350 961s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Sub Int Token' --module_name /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so 961s [p11_child[2523]] [main] (0x0400): p11_child started. 961s [p11_child[2523]] [main] (0x2000): Running in [auth] mode. 961s [p11_child[2523]] [main] (0x2000): Running with effective IDs: [0][0]. 961s [p11_child[2523]] [main] (0x2000): Running with real IDs [0][0]. 961s [p11_child[2523]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 961s [p11_child[2523]] [do_card] (0x4000): Module List: 961s [p11_child[2523]] [do_card] (0x4000): common name: [softhsm2]. 961s [p11_child[2523]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 961s [p11_child[2523]] [do_card] (0x4000): Description [SoftHSM slot ID 0x3d103ded] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 961s [p11_child[2523]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 961s [p11_child[2523]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x3d103ded][1024474605] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 961s [p11_child[2523]] [do_card] (0x4000): Login required. 961s [p11_child[2523]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 961s [p11_child[2523]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 961s [p11_child[2523]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so Test Organization Sub Int Token Test Organization Sub Int Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 961s [p11_child[2523]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x3d103ded;slot-manufacturer=SoftHSM%20project;slot-id=1024474605;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7d4ecbce3d103ded;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 961s [p11_child[2523]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 961s [p11_child[2523]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 961s [p11_child[2523]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 961s [p11_child[2523]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 961s [p11_child[2523]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 961s [p11_child[2523]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 961s [p11_child[2523]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 961s [p11_child[2523]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 961s [p11_child[2523]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 961s [p11_child[2523]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 961s [p11_child[2523]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 961s [p11_child[2523]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 961s [p11_child[2523]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 961s [p11_child[2523]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 961s [p11_child[2523]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 961s [p11_child[2523]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 961s [p11_child[2523]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 961s [p11_child[2523]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 961s [p11_child[2523]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 961s [p11_child[2523]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 961s [p11_child[2523]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 961s [p11_child[2523]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 961s [p11_child[2523]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 961s [p11_child[2523]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 961s [p11_child[2523]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 961s [p11_child[2523]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 961s [p11_child[2523]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 961s [p11_child[2523]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 961s [p11_child[2523]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 961s [p11_child[2523]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 961s [p11_child[2523]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 961s [p11_child[2523]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 961s [p11_child[2523]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 961s [p11_child[2523]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 961s [p11_child[2523]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 961s [p11_child[2523]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 961s [p11_child[2523]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 961s [p11_child[2523]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 961s [p11_child[2523]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 961s [p11_child[2523]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 961s [p11_child[2523]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 961s [p11_child[2523]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 961s [p11_child[2523]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 961s [p11_child[2523]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 961s [p11_child[2523]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 961s [p11_child[2523]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 961s [p11_child[2523]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 961s [p11_child[2523]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 961s [p11_child[2523]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 961s [p11_child[2523]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 961s [p11_child[2523]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 961s [p11_child[2523]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 961s [p11_child[2523]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 961s [p11_child[2523]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 961s [p11_child[2523]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 961s [p11_child[2523]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 961s [p11_child[2523]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 961s [p11_child[2523]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 961s [p11_child[2523]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 961s [p11_child[2523]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 961s [p11_child[2523]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 961s [p11_child[2523]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 961s [p11_child[2523]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 961s [p11_child[2523]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 961s [p11_child[2523]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 961s [p11_child[2523]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 961s [p11_child[2523]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 961s [p11_child[2523]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 961s [p11_child[2523]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 961s [p11_child[2523]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 961s [p11_child[2523]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 961s [p11_child[2523]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 961s [p11_child[2523]] [do_card] (0x4000): Certificate verified and validated. 961s [p11_child[2523]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 961s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-B0ev2A/SSSD-child-390-auth.output 961s + echo '-----BEGIN CERTIFICATE-----' 961s + tail -n1 /tmp/sssd-softhsm2-B0ev2A/SSSD-child-390-auth.output 961s + echo '-----END CERTIFICATE-----' 961s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-B0ev2A/SSSD-child-390-auth.pem 961s Certificate: 961s Data: 961s Version: 3 (0x2) 961s Serial Number: 5 (0x5) 961s Signature Algorithm: sha256WithRSAEncryption 961s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 961s Validity 961s Not Before: Mar 19 03:47:10 2024 GMT 961s Not After : Mar 19 03:47:10 2025 GMT 961s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 961s Subject Public Key Info: 961s Public Key Algorithm: rsaEncryption 961s Public-Key: (1024 bit) 961s Modulus: 961s 00:f6:ed:4c:61:46:8f:37:83:a0:61:59:04:06:b8: 961s 15:46:47:bd:71:9a:0a:bd:50:44:11:69:7b:3d:22: 961s ee:af:51:4e:e8:45:cd:e9:da:4c:80:9c:0b:c2:09: 961s 34:38:2e:7c:86:89:f9:f5:79:58:58:ea:7e:85:19: 961s b2:32:b6:76:63:c3:0b:66:2d:1e:58:e3:5b:00:eb: 961s e3:78:69:1c:4c:ec:33:02:12:d8:82:14:d1:3b:dd: 961s 96:9b:ba:a9:c0:b2:98:89:51:dd:48:66:0d:de:63: 961s 9e:fb:26:48:7b:fd:d8:50:2f:1a:1d:47:db:d5:51: 961s d9:2b:08:84:d8:d3:20:a1:fd 961s Exponent: 65537 (0x10001) 961s X509v3 extensions: 961s X509v3 Authority Key Identifier: 961s 21:AE:84:EF:FC:52:0F:30:AB:5B:F0:FC:4F:D1:4B:26:86:97:9B:AF 961s X509v3 Basic Constraints: 961s CA:FALSE 961s Netscape Cert Type: 961s SSL Client, S/MIME 961s Netscape Comment: 961s Test Organization Sub Intermediate CA trusted Certificate 961s X509v3 Subject Key Identifier: 961s 18:F3:50:B5:A5:EE:AC:F4:7D:3A:3E:95:56:1E:7D:CB:E6:0B:CE:0C 961s X509v3 Key Usage: critical 961s Digital Signature, Non Repudiation, Key Encipherment 961s X509v3 Extended Key Usage: 961s TLS Web Client Authentication, E-mail Protection 961s X509v3 Subject Alternative Name: 961s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 961s Signature Algorithm: sha256WithRSAEncryption 961s Signature Value: 961s b9:38:80:ad:46:ba:d8:17:5e:10:20:56:7b:ae:f2:9b:36:9a: 961s 0c:c9:d8:33:0a:34:57:d3:51:b3:f4:b6:a1:2b:44:4d:6e:47: 961s a5:4d:c1:79:a0:77:76:88:61:13:a2:79:06:d2:bc:be:cc:1f: 961s 8d:84:74:52:ea:1b:ad:96:5a:33:c8:e9:8e:34:73:d7:05:86: 961s 36:b9:eb:21:8d:09:c2:e8:e2:b2:f9:08:97:92:d5:77:58:84: 961s e3:a6:39:7c:8d:55:e5:2b:6c:19:72:bf:c2:a7:ac:07:c0:72: 961s b2:e7:a4:d1:cd:4c:5e:77:8e:ec:08:1a:4a:48:7b:89:8a:ad: 961s ae:1d 961s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-B0ev2A/SSSD-child-390-auth.pem 961s + found_md5=Modulus=F6ED4C61468F3783A061590406B8154647BD719A0ABD504411697B3D22EEAF514EE845CDE9DA4C809C0BC20934382E7C8689F9F5795858EA7E8519B232B67663C30B662D1E58E35B00EBE378691C4CEC330212D88214D13BDD969BBAA9C0B2988951DD48660DDE639EFB26487BFDD8502F1A1D47DBD551D92B0884D8D320A1FD 961s + '[' Modulus=F6ED4C61468F3783A061590406B8154647BD719A0ABD504411697B3D22EEAF514EE845CDE9DA4C809C0BC20934382E7C8689F9F5795858EA7E8519B232B67663C30B662D1E58E35B00EBE378691C4CEC330212D88214D13BDD969BBAA9C0B2988951DD48660DDE639EFB26487BFDD8502F1A1D47DBD551D92B0884D8D320A1FD '!=' Modulus=F6ED4C61468F3783A061590406B8154647BD719A0ABD504411697B3D22EEAF514EE845CDE9DA4C809C0BC20934382E7C8689F9F5795858EA7E8519B232B67663C30B662D1E58E35B00EBE378691C4CEC330212D88214D13BDD969BBAA9C0B2988951DD48660DDE639EFB26487BFDD8502F1A1D47DBD551D92B0884D8D320A1FD ']' 961s + valid_certificate /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-8222 /tmp/sssd-softhsm2-B0ev2A/test-intermediate-sub-chain-CA.pem partial_chain 961s + check_certificate /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-8222 /tmp/sssd-softhsm2-B0ev2A/test-intermediate-sub-chain-CA.pem partial_chain 961s + local certificate=/tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-trusted-certificate-0001.pem 961s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-8222 961s + local key_ring=/tmp/sssd-softhsm2-B0ev2A/test-intermediate-sub-chain-CA.pem 961s + local verify_option=partial_chain 961s + prepare_softhsm2_card /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-8222 961s + local certificate=/tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-trusted-certificate-0001.pem 961s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-8222 961s + local key_cn 961s + local key_name 961s + local tokens_dir 961s + local output_cert_file 961s + token_name= 961s ++ basename /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 961s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 961s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-trusted-certificate-0001.pem 961s ++ sed -n 's/ *commonName *= //p' 961s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 961s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 961s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-B0ev2A/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 961s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-B0ev2A/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 961s ++ basename /tmp/sssd-softhsm2-B0ev2A/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 961s + tokens_dir=/tmp/sssd-softhsm2-B0ev2A/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 961s + token_name='Test Organization Sub Int Token' 961s + '[' '!' -e /tmp/sssd-softhsm2-B0ev2A/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 961s + '[' '!' -d /tmp/sssd-softhsm2-B0ev2A/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 961s + echo 'Test Organization Sub Int Token' 961s Test Organization Sub Int Token 961s + '[' -n partial_chain ']' 961s + local verify_arg=--verify=partial_chain 961s + local output_base_name=SSSD-child-12765 961s + local output_file=/tmp/sssd-softhsm2-B0ev2A/SSSD-child-12765.output 961s + output_cert_file=/tmp/sssd-softhsm2-B0ev2A/SSSD-child-12765.pem 961s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-B0ev2A/test-intermediate-sub-chain-CA.pem 961s [p11_child[2533]] [main] (0x0400): p11_child started. 961s [p11_child[2533]] [main] (0x2000): Running in [pre-auth] mode. 961s [p11_child[2533]] [main] (0x2000): Running with effective IDs: [0][0]. 961s [p11_child[2533]] [main] (0x2000): Running with real IDs [0][0]. 961s [p11_child[2533]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 961s [p11_child[2533]] [do_card] (0x4000): Module List: 961s [p11_child[2533]] [do_card] (0x4000): common name: [softhsm2]. 961s [p11_child[2533]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 961s [p11_child[2533]] [do_card] (0x4000): Description [SoftHSM slot ID 0x3d103ded] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 961s [p11_child[2533]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 961s [p11_child[2533]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x3d103ded][1024474605] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 961s [p11_child[2533]] [do_card] (0x4000): Login NOT required. 961s [p11_child[2533]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 961s [p11_child[2533]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 961s [p11_child[2533]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Sub Int Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 961s [p11_child[2533]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x3d103ded;slot-manufacturer=SoftHSM%20project;slot-id=1024474605;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7d4ecbce3d103ded;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 961s [p11_child[2533]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 961s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-B0ev2A/SSSD-child-12765.output 961s + echo '-----BEGIN CERTIFICATE-----' 961s + tail -n1 /tmp/sssd-softhsm2-B0ev2A/SSSD-child-12765.output 961s + echo '-----END CERTIFICATE-----' 961s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-B0ev2A/SSSD-child-12765.pem 961s Certificate: 961s Data: 961s Version: 3 (0x2) 961s Serial Number: 5 (0x5) 961s Signature Algorithm: sha256WithRSAEncryption 961s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 961s Validity 961s Not Before: Mar 19 03:47:10 2024 GMT 961s Not After : Mar 19 03:47:10 2025 GMT 961s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 961s Subject Public Key Info: 961s Public Key Algorithm: rsaEncryption 961s Public-Key: (1024 bit) 961s Modulus: 961s 00:f6:ed:4c:61:46:8f:37:83:a0:61:59:04:06:b8: 961s 15:46:47:bd:71:9a:0a:bd:50:44:11:69:7b:3d:22: 961s ee:af:51:4e:e8:45:cd:e9:da:4c:80:9c:0b:c2:09: 961s 34:38:2e:7c:86:89:f9:f5:79:58:58:ea:7e:85:19: 961s b2:32:b6:76:63:c3:0b:66:2d:1e:58:e3:5b:00:eb: 961s e3:78:69:1c:4c:ec:33:02:12:d8:82:14:d1:3b:dd: 961s 96:9b:ba:a9:c0:b2:98:89:51:dd:48:66:0d:de:63: 961s 9e:fb:26:48:7b:fd:d8:50:2f:1a:1d:47:db:d5:51: 961s d9:2b:08:84:d8:d3:20:a1:fd 961s Exponent: 65537 (0x10001) 961s X509v3 extensions: 961s X509v3 Authority Key Identifier: 961s 21:AE:84:EF:FC:52:0F:30:AB:5B:F0:FC:4F:D1:4B:26:86:97:9B:AF 961s X509v3 Basic Constraints: 961s CA:FALSE 961s Netscape Cert Type: 961s SSL Client, S/MIME 961s Netscape Comment: 961s Test Organization Sub Intermediate CA trusted Certificate 961s X509v3 Subject Key Identifier: 961s 18:F3:50:B5:A5:EE:AC:F4:7D:3A:3E:95:56:1E:7D:CB:E6:0B:CE:0C 961s X509v3 Key Usage: critical 961s Digital Signature, Non Repudiation, Key Encipherment 961s X509v3 Extended Key Usage: 961s TLS Web Client Authentication, E-mail Protection 961s X509v3 Subject Alternative Name: 961s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 961s Signature Algorithm: sha256WithRSAEncryption 961s Signature Value: 961s b9:38:80:ad:46:ba:d8:17:5e:10:20:56:7b:ae:f2:9b:36:9a: 961s 0c:c9:d8:33:0a:34:57:d3:51:b3:f4:b6:a1:2b:44:4d:6e:47: 961s a5:4d:c1:79:a0:77:76:88:61:13:a2:79:06:d2:bc:be:cc:1f: 961s 8d:84:74:52:ea:1b:ad:96:5a:33:c8:e9:8e:34:73:d7:05:86: 961s 36:b9:eb:21:8d:09:c2:e8:e2:b2:f9:08:97:92:d5:77:58:84: 961s e3:a6:39:7c:8d:55:e5:2b:6c:19:72:bf:c2:a7:ac:07:c0:72: 961s b2:e7:a4:d1:cd:4c:5e:77:8e:ec:08:1a:4a:48:7b:89:8a:ad: 961s ae:1d 961s + local found_md5 expected_md5 961s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-B0ev2A/test-sub-intermediate-CA-trusted-certificate-0001.pem 962s + expected_md5=Modulus=F6ED4C61468F3783A061590406B8154647BD719A0ABD504411697B3D22EEAF514EE845CDE9DA4C809C0BC20934382E7C8689F9F5795858EA7E8519B232B67663C30B662D1E58E35B00EBE378691C4CEC330212D88214D13BDD969BBAA9C0B2988951DD48660DDE639EFB26487BFDD8502F1A1D47DBD551D92B0884D8D320A1FD 962s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-B0ev2A/SSSD-child-12765.pem 962s + found_md5=Modulus=F6ED4C61468F3783A061590406B8154647BD719A0ABD504411697B3D22EEAF514EE845CDE9DA4C809C0BC20934382E7C8689F9F5795858EA7E8519B232B67663C30B662D1E58E35B00EBE378691C4CEC330212D88214D13BDD969BBAA9C0B2988951DD48660DDE639EFB26487BFDD8502F1A1D47DBD551D92B0884D8D320A1FD 962s + '[' Modulus=F6ED4C61468F3783A061590406B8154647BD719A0ABD504411697B3D22EEAF514EE845CDE9DA4C809C0BC20934382E7C8689F9F5795858EA7E8519B232B67663C30B662D1E58E35B00EBE378691C4CEC330212D88214D13BDD969BBAA9C0B2988951DD48660DDE639EFB26487BFDD8502F1A1D47DBD551D92B0884D8D320A1FD '!=' Modulus=F6ED4C61468F3783A061590406B8154647BD719A0ABD504411697B3D22EEAF514EE845CDE9DA4C809C0BC20934382E7C8689F9F5795858EA7E8519B232B67663C30B662D1E58E35B00EBE378691C4CEC330212D88214D13BDD969BBAA9C0B2988951DD48660DDE639EFB26487BFDD8502F1A1D47DBD551D92B0884D8D320A1FD ']' 962s + output_file=/tmp/sssd-softhsm2-B0ev2A/SSSD-child-12765-auth.output 962s ++ basename /tmp/sssd-softhsm2-B0ev2A/SSSD-child-12765-auth.output .output 962s + output_cert_file=/tmp/sssd-softhsm2-B0ev2A/SSSD-child-12765-auth.pem 962s + echo -n 053350 962s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-B0ev2A/test-intermediate-sub-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Sub Int Token' --module_name /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so 962s [p11_child[2541]] [main] (0x0400): p11_child started. 962s [p11_child[2541]] [main] (0x2000): Running in [auth] mode. 962s [p11_child[2541]] [main] (0x2000): Running with effective IDs: [0][0]. 962s [p11_child[2541]] [main] (0x2000): Running with real IDs [0][0]. 962s [p11_child[2541]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 962s [p11_child[2541]] [do_card] (0x4000): Module List: 962s [p11_child[2541]] [do_card] (0x4000): common name: [softhsm2]. 962s [p11_child[2541]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 962s [p11_child[2541]] [do_card] (0x4000): Description [SoftHSM slot ID 0x3d103ded] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 962s [p11_child[2541]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 962s [p11_child[2541]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x3d103ded][1024474605] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 962s [p11_child[2541]] [do_card] (0x4000): Login required. 962s [p11_child[2541]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 962s [p11_child[2541]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 962s [p11_child[2541]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so Test Organization Sub Int Token Test Organization Sub Int Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 962s [p11_child[2541]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x3d103ded;slot-manufacturer=SoftHSM%20project;slot-id=1024474605;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7d4ecbce3d103ded;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 962s [p11_child[2541]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 962s [p11_child[2541]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 962s [p11_child[2541]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 962s [p11_child[2541]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 962s [p11_child[2541]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 962s [p11_child[2541]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 962s [p11_child[2541]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 962s [p11_child[2541]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 962s [p11_child[2541]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 962s [p11_child[2541]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 962s [p11_child[2541]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 962s [p11_child[2541]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 962s [p11_child[2541]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 962s [p11_child[2541]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 962s [p11_child[2541]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 962s [p11_child[2541]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 962s [p11_child[2541]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 962s [p11_child[2541]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 962s [p11_child[2541]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 962s [p11_child[2541]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 962s [p11_child[2541]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 962s [p11_child[2541]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 962s [p11_child[2541]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 962s [p11_child[2541]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 962s [p11_child[2541]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 962s [p11_child[2541]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 962s [p11_child[2541]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 962s [p11_child[2541]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 962s [p11_child[2541]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 962s [p11_child[2541]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 962s [p11_child[2541]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 962s [p11_child[2541]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 962s [p11_child[2541]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 962s [p11_child[2541]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 962s [p11_child[2541]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 962s [p11_child[2541]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 962s [p11_child[2541]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 962s [p11_child[2541]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 962s [p11_child[2541]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 962s [p11_child[2541]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 962s [p11_child[2541]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 962s [p11_child[2541]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 962s [p11_child[2541]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 962s [p11_child[2541]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 962s [p11_child[2541]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 962s [p11_child[2541]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 962s [p11_child[2541]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 962s [p11_child[2541]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 962s [p11_child[2541]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 962s [p11_child[2541]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 962s [p11_child[2541]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 962s [p11_child[2541]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 962s [p11_child[2541]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 962s [p11_child[2541]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 962s [p11_child[2541]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 962s [p11_child[2541]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 962s [p11_child[2541]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 962s [p11_child[2541]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 962s [p11_child[2541]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 962s [p11_child[2541]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 962s [p11_child[2541]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 962s [p11_child[2541]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 962s [p11_child[2541]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 962s [p11_child[2541]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 962s [p11_child[2541]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 962s [p11_child[2541]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 962s [p11_child[2541]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 962s [p11_child[2541]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 962s [p11_child[2541]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 962s [p11_child[2541]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 962s [p11_child[2541]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 962s [p11_child[2541]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 962s [p11_child[2541]] [do_card] (0x4000): Certificate verified and validated. 962s [p11_child[2541]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 962s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-B0ev2A/SSSD-child-12765-auth.output 962s + echo '-----BEGIN CERTIFICATE-----' 962s + tail -n1 /tmp/sssd-softhsm2-B0ev2A/SSSD-child-12765-auth.output 962s + echo '-----END CERTIFICATE-----' 962s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-B0ev2A/SSSD-child-12765-auth.pem 962s Certificate: 962s Data: 962s Version: 3 (0x2) 962s Serial Number: 5 (0x5) 962s Signature Algorithm: sha256WithRSAEncryption 962s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 962s Validity 962s Not Before: Mar 19 03:47:10 2024 GMT 962s Not After : Mar 19 03:47:10 2025 GMT 962s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 962s Subject Public Key Info: 962s Public Key Algorithm: rsaEncryption 962s Public-Key: (1024 bit) 962s Modulus: 962s 00:f6:ed:4c:61:46:8f:37:83:a0:61:59:04:06:b8: 962s 15:46:47:bd:71:9a:0a:bd:50:44:11:69:7b:3d:22: 962s ee:af:51:4e:e8:45:cd:e9:da:4c:80:9c:0b:c2:09: 962s 34:38:2e:7c:86:89:f9:f5:79:58:58:ea:7e:85:19: 962s b2:32:b6:76:63:c3:0b:66:2d:1e:58:e3:5b:00:eb: 962s e3:78:69:1c:4c:ec:33:02:12:d8:82:14:d1:3b:dd: 962s 96:9b:ba:a9:c0:b2:98:89:51:dd:48:66:0d:de:63: 962s 9e:fb:26:48:7b:fd:d8:50:2f:1a:1d:47:db:d5:51: 962s d9:2b:08:84:d8:d3:20:a1:fd 962s Exponent: 65537 (0x10001) 962s X509v3 extensions: 962s X509v3 Authority Key Identifier: 962s 21:AE:84:EF:FC:52:0F:30:AB:5B:F0:FC:4F:D1:4B:26:86:97:9B:AF 962s X509v3 Basic Constraints: 962s CA:FALSE 962s Netscape Cert Type: 962s SSL Client, S/MIME 962s Netscape Comment: 962s Test Organization Sub Intermediate CA trusted Certificate 962s X509v3 Subject Key Identifier: 962s 18:F3:50:B5:A5:EE:AC:F4:7D:3A:3E:95:56:1E:7D:CB:E6:0B:CE:0C 962s X509v3 Key Usage: critical 962s Digital Signature, Non Repudiation, Key Encipherment 962s X509v3 Extended Key Usage: 962s TLS Web Client Authentication, E-mail Protection 962s X509v3 Subject Alternative Name: 962s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 962s Signature Algorithm: sha256WithRSAEncryption 962s Signature Value: 962s b9:38:80:ad:46:ba:d8:17:5e:10:20:56:7b:ae:f2:9b:36:9a: 962s 0c:c9:d8:33:0a:34:57:d3:51:b3:f4:b6:a1:2b:44:4d:6e:47: 962s a5:4d:c1:79:a0:77:76:88:61:13:a2:79:06:d2:bc:be:cc:1f: 962s 8d:84:74:52:ea:1b:ad:96:5a:33:c8:e9:8e:34:73:d7:05:86: 962s 36:b9:eb:21:8d:09:c2:e8:e2:b2:f9:08:97:92:d5:77:58:84: 962s e3:a6:39:7c:8d:55:e5:2b:6c:19:72:bf:c2:a7:ac:07:c0:72: 962s b2:e7:a4:d1:cd:4c:5e:77:8e:ec:08:1a:4a:48:7b:89:8a:ad: 962s ae:1d 962s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-B0ev2A/SSSD-child-12765-auth.pem 962s + found_md5=Modulus=F6ED4C61468F3783A061590406B8154647BD719A0ABD504411697B3D22EEAF514EE845CDE9DA4C809C0BC20934382E7C8689F9F5795858EA7E8519B232B67663C30B662D1E58E35B00EBE378691C4CEC330212D88214D13BDD969BBAA9C0B2988951DD48660DDE639EFB26487BFDD8502F1A1D47DBD551D92B0884D8D320A1FD 962s + '[' Modulus=F6ED4C61468F3783A061590406B8154647BD719A0ABD504411697B3D22EEAF514EE845CDE9DA4C809C0BC20934382E7C8689F9F5795858EA7E8519B232B67663C30B662D1E58E35B00EBE378691C4CEC330212D88214D13BDD969BBAA9C0B2988951DD48660DDE639EFB26487BFDD8502F1A1D47DBD551D92B0884D8D320A1FD '!=' Modulus=F6ED4C61468F3783A061590406B8154647BD719A0ABD504411697B3D22EEAF514EE845CDE9DA4C809C0BC20934382E7C8689F9F5795858EA7E8519B232B67663C30B662D1E58E35B00EBE378691C4CEC330212D88214D13BDD969BBAA9C0B2988951DD48660DDE639EFB26487BFDD8502F1A1D47DBD551D92B0884D8D320A1FD ']' 962s + set +x 962s 962s Test completed, Root CA and intermediate issued certificates verified! 962s autopkgtest [03:47:16]: test sssd-softhism2-certificates-tests.sh: -----------------------] 963s autopkgtest [03:47:17]: test sssd-softhism2-certificates-tests.sh: - - - - - - - - - - results - - - - - - - - - - 963s sssd-softhism2-certificates-tests.sh PASS 963s autopkgtest [03:47:17]: test sssd-smart-card-pam-auth-configs: preparing testbed 966s Reading package lists... 966s Building dependency tree... 966s Reading state information... 967s Starting pkgProblemResolver with broken count: 0 967s Starting 2 pkgProblemResolver with broken count: 0 967s Done 967s The following additional packages will be installed: 967s pamtester 967s The following NEW packages will be installed: 967s autopkgtest-satdep pamtester 967s 0 upgraded, 2 newly installed, 0 to remove and 0 not upgraded. 967s Need to get 14.6 kB/15.4 kB of archives. 967s After this operation, 86.0 kB of additional disk space will be used. 967s Get:1 /tmp/autopkgtest.8eyYB7/4-autopkgtest-satdep.deb autopkgtest-satdep ppc64el 0 [760 B] 967s Get:2 http://ftpmaster.internal/ubuntu noble/universe ppc64el pamtester ppc64el 0.1.2-4 [14.6 kB] 967s Fetched 14.6 kB in 0s (56.2 kB/s) 967s Selecting previously unselected package pamtester. 968s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 70686 files and directories currently installed.) 968s Preparing to unpack .../pamtester_0.1.2-4_ppc64el.deb ... 968s Unpacking pamtester (0.1.2-4) ... 968s Selecting previously unselected package autopkgtest-satdep. 968s Preparing to unpack .../4-autopkgtest-satdep.deb ... 968s Unpacking autopkgtest-satdep (0) ... 968s Setting up pamtester (0.1.2-4) ... 968s Setting up autopkgtest-satdep (0) ... 968s Processing triggers for man-db (2.12.0-3) ... 970s (Reading database ... 70692 files and directories currently installed.) 970s Removing autopkgtest-satdep (0) ... 971s autopkgtest [03:47:25]: test sssd-smart-card-pam-auth-configs: env OFFLINE_MODE=1 bash debian/tests/sssd-smart-card-pam-auth-configs-tester.sh 971s autopkgtest [03:47:25]: test sssd-smart-card-pam-auth-configs: [----------------------- 971s + '[' -z ubuntu ']' 971s + export DEBIAN_FRONTEND=noninteractive 971s + DEBIAN_FRONTEND=noninteractive 971s + required_tools=(pamtester softhsm2-util sssd) 971s + [[ ! -v OFFLINE_MODE ]] 971s + for cmd in "${required_tools[@]}" 971s + command -v pamtester 971s + for cmd in "${required_tools[@]}" 971s + command -v softhsm2-util 971s + for cmd in "${required_tools[@]}" 971s + command -v sssd 971s + PIN=123456 971s ++ mktemp -d -t sssd-softhsm2-certs-XXXXXX 971s + tmpdir=/tmp/sssd-softhsm2-certs-Zegskb 971s + backupsdir= 971s + alternative_pam_configs=(sss-smart-card-optional sss-smart-card-required) 971s + declare -a restore_paths 971s + declare -a delete_paths 971s + trap handle_exit EXIT 971s ++ dirname debian/tests/sssd-smart-card-pam-auth-configs-tester.sh 971s + tester=debian/tests/sssd-softhism2-certificates-tests.sh 971s + '[' '!' -e debian/tests/sssd-softhism2-certificates-tests.sh ']' 971s + '[' '!' -e debian/tests/sssd-softhism2-certificates-tests.sh ']' 971s + export PIN TEST_TMPDIR=/tmp/sssd-softhsm2-certs-Zegskb GENERATE_SMART_CARDS=1 KEEP_TEMPORARY_FILES=1 NO_SSSD_TESTS=1 971s + TEST_TMPDIR=/tmp/sssd-softhsm2-certs-Zegskb 971s + GENERATE_SMART_CARDS=1 971s + KEEP_TEMPORARY_FILES=1 971s + NO_SSSD_TESTS=1 971s + bash debian/tests/sssd-softhism2-certificates-tests.sh 971s + '[' -z ubuntu ']' 971s + required_tools=(p11tool openssl softhsm2-util) 971s + for cmd in "${required_tools[@]}" 971s + command -v p11tool 971s + for cmd in "${required_tools[@]}" 971s + command -v openssl 971s + for cmd in "${required_tools[@]}" 971s + command -v softhsm2-util 971s + PIN=123456 971s +++ find /usr/lib/softhsm/libsofthsm2.so 971s +++ head -n 1 971s ++ realpath /usr/lib/softhsm/libsofthsm2.so 971s + SOFTHSM2_MODULE=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so 971s + SSSD_P11_CHILD=/usr/libexec/sssd/p11_child 971s + TOKEN_ID=00112233445566778899FFAABBCCDDEEFF012345 971s + '[' '!' -v NO_SSSD_TESTS ']' 971s + '[' '!' -e /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so ']' 971s + tmpdir=/tmp/sssd-softhsm2-certs-Zegskb 971s + keys_size=1024 971s + [[ ! -v KEEP_TEMPORARY_FILES ]] 971s + trap 'set +x; echo -e "\nUnexpected failure!!!"' ERR 971s + echo -n 01 971s + touch /tmp/sssd-softhsm2-certs-Zegskb/index.txt 971s + mkdir -p /tmp/sssd-softhsm2-certs-Zegskb/new_certs 971s + cat 971s + root_ca_key_pass=pass:random-root-CA-password-23180 971s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-certs-Zegskb/test-root-CA-key.pem -passout pass:random-root-CA-password-23180 1024 971s + openssl req -passin pass:random-root-CA-password-23180 -batch -config /tmp/sssd-softhsm2-certs-Zegskb/test-root-CA.config -x509 -new -nodes -key /tmp/sssd-softhsm2-certs-Zegskb/test-root-CA-key.pem -sha256 -days 1024 -set_serial 0 -extensions v3_ca -out /tmp/sssd-softhsm2-certs-Zegskb/test-root-CA.pem 971s + openssl x509 -noout -in /tmp/sssd-softhsm2-certs-Zegskb/test-root-CA.pem 971s + cat 971s + intermediate_ca_key_pass=pass:random-intermediate-CA-password-15432 971s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-certs-Zegskb/test-intermediate-CA-key.pem -passout pass:random-intermediate-CA-password-15432 1024 971s + openssl req -batch -new -nodes -passin pass:random-intermediate-CA-password-15432 -config /tmp/sssd-softhsm2-certs-Zegskb/test-intermediate-CA.config -key /tmp/sssd-softhsm2-certs-Zegskb/test-intermediate-CA-key.pem -passout pass:random-root-CA-password-23180 -sha256 -extensions v3_ca -out /tmp/sssd-softhsm2-certs-Zegskb/test-intermediate-CA-certificate-request.pem 971s + openssl req -text -noout -in /tmp/sssd-softhsm2-certs-Zegskb/test-intermediate-CA-certificate-request.pem 971s Certificate Request: 971s Data: 971s Version: 1 (0x0) 971s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 971s Subject Public Key Info: 971s Public Key Algorithm: rsaEncryption 971s Public-Key: (1024 bit) 971s Modulus: 971s 00:de:69:af:61:93:77:8c:e5:4b:70:4b:8f:4f:d8: 971s ca:2b:6c:6c:6e:e9:22:9d:bd:d2:f8:6c:f4:30:47: 971s 08:72:e1:a5:d0:69:97:60:ed:8e:ea:b1:3a:fd:3f: 971s cb:fb:65:eb:c1:1f:a2:4f:dd:63:3d:1b:80:fa:66: 971s 79:f5:13:94:9d:63:5d:f2:e9:a2:83:d1:6f:9a:a2: 971s 17:4f:4f:09:8a:c4:82:36:e9:7c:02:78:c6:80:8f: 971s 42:74:0e:04:25:40:f3:fc:0c:30:4b:86:83:f6:3d: 971s 82:7f:eb:69:86:eb:47:d5:13:82:a8:d5:55:c7:18: 971s f7:52:ac:71:97:90:2b:33:25 971s Exponent: 65537 (0x10001) 971s Attributes: 971s (none) 971s Requested Extensions: 971s Signature Algorithm: sha256WithRSAEncryption 971s Signature Value: 971s 07:d1:38:70:51:4e:de:28:40:b5:43:e4:9c:3e:f4:c7:af:f2: 971s 7a:0f:a2:a0:cf:51:f7:89:b2:27:6a:ee:c6:e5:13:d5:38:9e: 971s 01:ab:59:f9:54:56:27:5d:75:43:fe:23:92:ad:4b:58:73:13: 971s 28:97:5c:d3:e0:8a:94:42:4c:03:5f:63:74:15:52:8d:2d:fd: 971s 63:00:44:b9:8b:33:f8:ae:b6:2a:2b:e6:dc:52:17:ac:ce:35: 971s 17:05:98:16:a1:b4:d7:54:bf:ad:cd:c8:02:59:21:68:03:f9: 971s 47:96:b5:97:cd:71:d1:45:df:22:eb:ec:13:3d:39:4b:c2:87: 971s f6:46 971s + openssl ca -batch -notext -config /tmp/sssd-softhsm2-certs-Zegskb/test-root-CA.config -passin pass:random-root-CA-password-23180 -keyfile /tmp/sssd-softhsm2-certs-Zegskb/test-root-CA-key.pem -in /tmp/sssd-softhsm2-certs-Zegskb/test-intermediate-CA-certificate-request.pem -days 365 -extensions v3_intermediate_ca -out /tmp/sssd-softhsm2-certs-Zegskb/test-intermediate-CA.pem 971s Using configuration from /tmp/sssd-softhsm2-certs-Zegskb/test-root-CA.config 971s Check that the request matches the signature 971s Signature ok 971s Certificate Details: 971s Serial Number: 1 (0x1) 971s Validity 971s Not Before: Mar 19 03:47:25 2024 GMT 971s Not After : Mar 19 03:47:25 2025 GMT 971s Subject: 971s organizationName = Test Organization 971s organizationalUnitName = Test Organization Unit 971s commonName = Test Organization Intermediate CA 971s X509v3 extensions: 971s X509v3 Subject Key Identifier: 971s CC:C6:45:A3:EF:12:9F:AE:AD:7F:DC:B1:BF:8F:25:7A:A8:C1:9E:13 971s X509v3 Authority Key Identifier: 971s keyid:BD:7D:B9:56:4E:85:8F:F5:59:9C:E1:97:09:D0:13:89:98:EE:EC:59 971s DirName:/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root CA 971s serial:00 971s X509v3 Basic Constraints: 971s CA:TRUE 971s X509v3 Key Usage: critical 971s Digital Signature, Certificate Sign, CRL Sign 971s Certificate is to be certified until Mar 19 03:47:25 2025 GMT (365 days) 971s 971s Write out database with 1 new entries 971s Database updated 971s + openssl x509 -noout -in /tmp/sssd-softhsm2-certs-Zegskb/test-intermediate-CA.pem 971s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-Zegskb/test-root-CA.pem /tmp/sssd-softhsm2-certs-Zegskb/test-intermediate-CA.pem 971s /tmp/sssd-softhsm2-certs-Zegskb/test-intermediate-CA.pem: OK 971s + cat 971s + sub_intermediate_ca_key_pass=pass:random-sub-intermediate-CA-password-11090 971s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-certs-Zegskb/test-sub-intermediate-CA-key.pem -passout pass:random-sub-intermediate-CA-password-11090 1024 971s + openssl req -batch -new -nodes -passin pass:random-sub-intermediate-CA-password-11090 -config /tmp/sssd-softhsm2-certs-Zegskb/test-sub-intermediate-CA.config -key /tmp/sssd-softhsm2-certs-Zegskb/test-sub-intermediate-CA-key.pem -passout pass:random-intermediate-CA-password-15432 -sha256 -extensions v3_ca -out /tmp/sssd-softhsm2-certs-Zegskb/test-sub-intermediate-CA-certificate-request.pem 971s + openssl req -text -noout -in /tmp/sssd-softhsm2-certs-Zegskb/test-sub-intermediate-CA-certificate-request.pem 971s Certificate Request: 971s Data: 971s Version: 1 (0x0) 971s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 971s Subject Public Key Info: 971s Public Key Algorithm: rsaEncryption 971s Public-Key: (1024 bit) 971s Modulus: 971s 00:cf:6c:e5:8a:81:bd:a7:b8:7d:70:df:14:63:ae: 971s 9d:51:b0:e5:eb:8b:21:c4:58:14:01:e7:ea:db:b2: 971s 29:e4:1f:e9:94:55:f5:3e:b3:8b:d6:e6:c2:37:fe: 971s 37:01:57:41:38:55:2b:5b:7a:00:de:31:eb:a1:fc: 971s 5f:1b:ad:ae:b9:bc:1f:2e:d0:05:98:91:0e:b0:5d: 971s af:c7:1a:2c:5c:64:d5:72:84:33:aa:14:73:41:67: 971s fb:73:66:83:88:bd:44:46:eb:12:09:5f:2b:67:eb: 971s 40:e0:3f:0d:36:0d:35:5a:c8:d0:c6:99:f8:db:69: 971s ee:fd:84:96:d1:b1:7b:e3:31 971s Exponent: 65537 (0x10001) 971s Attributes: 971s (none) 971s Requested Extensions: 971s Signature Algorithm: sha256WithRSAEncryption 971s Signature Value: 971s 9f:d8:ae:36:44:eb:0a:9a:00:61:e5:42:5f:a8:3c:55:66:a9: 971s 5d:48:73:03:b1:70:7d:9c:f6:9e:a9:46:3d:1a:2b:4a:9b:d0: 971s ab:68:6f:92:6a:6e:5a:92:ed:73:2e:bf:62:9e:8b:89:dd:92: 971s 2b:59:85:2c:78:22:68:1b:ef:35:b4:44:45:45:24:fb:c3:6d: 971s a8:35:33:1c:68:56:6b:7b:e8:bb:39:8d:e0:5d:63:b3:8d:1f: 971s 90:ce:a9:60:c2:69:b0:bc:75:91:0f:d2:59:85:5f:7a:08:c3: 971s c9:8c:2c:9f:08:fa:c5:64:a1:46:b8:8c:4a:c9:67:dc:99:43: 971s 88:61 971s + openssl ca -batch -notext -config /tmp/sssd-softhsm2-certs-Zegskb/test-intermediate-CA.config -passin pass:random-intermediate-CA-password-15432 -keyfile /tmp/sssd-softhsm2-certs-Zegskb/test-intermediate-CA-key.pem -in /tmp/sssd-softhsm2-certs-Zegskb/test-sub-intermediate-CA-certificate-request.pem -days 365 -extensions v3_intermediate_ca -out /tmp/sssd-softhsm2-certs-Zegskb/test-sub-intermediate-CA.pem 971s Using configuration from /tmp/sssd-softhsm2-certs-Zegskb/test-intermediate-CA.config 971s Check that the request matches the signature 971s Signature ok 971s Certificate Details: 971s Serial Number: 2 (0x2) 971s Validity 971s Not Before: Mar 19 03:47:25 2024 GMT 971s Not After : Mar 19 03:47:25 2025 GMT 971s Subject: 971s organizationName = Test Organization 971s organizationalUnitName = Test Organization Unit 971s commonName = Test Organization Sub Intermediate CA 971s X509v3 extensions: 971s X509v3 Subject Key Identifier: 971s 05:D7:85:CA:56:C2:9D:43:99:90:88:36:20:CB:58:10:7D:05:3F:C3 971s X509v3 Authority Key Identifier: 971s keyid:CC:C6:45:A3:EF:12:9F:AE:AD:7F:DC:B1:BF:8F:25:7A:A8:C1:9E:13 971s DirName:/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root CA 971s serial:01 971s X509v3 Basic Constraints: 971s CA:TRUE 971s X509v3 Key Usage: critical 971s Digital Signature, Certificate Sign, CRL Sign 971s Certificate is to be certified until Mar 19 03:47:25 2025 GMT (365 days) 971s 971s Write out database with 1 new entries 971s Database updated 971s + openssl x509 -noout -in /tmp/sssd-softhsm2-certs-Zegskb/test-sub-intermediate-CA.pem 971s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-certs-Zegskb/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-Zegskb/test-sub-intermediate-CA.pem 971s /tmp/sssd-softhsm2-certs-Zegskb/test-sub-intermediate-CA.pem: OK 971s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-certs-Zegskb/test-root-CA.pem /tmp/sssd-softhsm2-certs-Zegskb/test-sub-intermediate-CA.pem 971s + local cmd=openssl 971s + shift 971s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-Zegskb/test-root-CA.pem /tmp/sssd-softhsm2-certs-Zegskb/test-sub-intermediate-CA.pem 971s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 971s error 20 at 0 depth lookup: unable to get local issuer certificate 971s error /tmp/sssd-softhsm2-certs-Zegskb/test-sub-intermediate-CA.pem: verification failed 971s + cat 971s + root_ca_trusted_cert_0001_key_pass=pass:random-root-ca-trusted-cert-0001-31502 971s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-certs-Zegskb/test-root-CA-trusted-certificate-0001-key.pem -passout pass:random-root-ca-trusted-cert-0001-31502 1024 971s + openssl req -new -nodes -reqexts req_exts -passin pass:random-root-ca-trusted-cert-0001-31502 -key /tmp/sssd-softhsm2-certs-Zegskb/test-root-CA-trusted-certificate-0001-key.pem -config /tmp/sssd-softhsm2-certs-Zegskb/test-root-CA-trusted-certificate-0001.config -out /tmp/sssd-softhsm2-certs-Zegskb/test-root-CA-trusted-certificate-0001-request.pem 971s + openssl req -text -noout -in /tmp/sssd-softhsm2-certs-Zegskb/test-root-CA-trusted-certificate-0001-request.pem 971s Certificate Request: 971s Data: 971s Version: 1 (0x0) 971s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 971s Subject Public Key Info: 971s Public Key Algorithm: rsaEncryption 971s Public-Key: (1024 bit) 971s Modulus: 971s 00:e2:48:9e:f1:b4:e6:96:0b:3b:b8:40:c1:6a:b5: 971s 6d:08:ed:08:e7:02:e3:bb:00:92:56:6a:f7:d8:6f: 971s b9:6f:20:e1:02:8c:2f:9b:43:06:d7:56:f2:47:f8: 971s c5:d2:17:db:b9:f0:5a:4f:ca:24:a0:b4:e6:7e:ba: 971s 1b:99:4d:99:b1:b6:0f:3d:a4:7d:fd:15:d9:01:e5: 971s 6b:48:8a:9b:42:98:c5:19:ba:84:ab:9e:e8:11:ec: 971s 2d:df:b8:b5:7a:6d:05:0b:06:55:79:bb:1d:e9:b1: 971s fa:12:30:69:13:0e:fc:aa:10:92:b6:4c:53:e9:73: 971s 37:ab:6b:0c:e1:61:16:1f:8f 971s Exponent: 65537 (0x10001) 971s Attributes: 971s Requested Extensions: 971s X509v3 Basic Constraints: 971s CA:FALSE 971s Netscape Cert Type: 971s SSL Client, S/MIME 971s Netscape Comment: 971s Test Organization Root CA trusted Certificate 971s X509v3 Subject Key Identifier: 971s B5:E4:70:AF:69:15:2A:E6:66:01:B9:72:87:1D:41:E4:16:D6:76:F2 971s X509v3 Key Usage: critical 971s Digital Signature, Non Repudiation, Key Encipherment 971s X509v3 Extended Key Usage: 971s TLS Web Client Authentication, E-mail Protection 971s X509v3 Subject Alternative Name: 971s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 971s Signature Algorithm: sha256WithRSAEncryption 971s Signature Value: 971s 63:8e:b8:80:ff:f8:ce:38:55:fc:5b:20:a7:18:b8:8f:0b:01: 971s 13:bf:d4:95:f7:2c:7f:2f:c9:d7:9f:7e:c5:2c:a2:e3:94:69: 971s 93:08:d8:07:1d:fd:95:37:8c:06:a3:0d:44:58:0f:fe:74:a9: 971s c6:17:f3:8e:1a:63:31:a9:f8:16:8a:c4:9b:29:09:29:a4:d9: 971s e0:09:d9:88:80:4c:28:69:1d:d2:6a:f7:f7:62:aa:ab:7d:8c: 971s 2a:c9:a8:7a:90:04:2e:1f:93:55:e4:19:82:bd:47:67:b6:ae: 971s 1f:50:f7:23:27:d4:bb:de:49:6f:5f:14:ef:7a:8c:55:3f:f8: 971s 7e:84 971s + openssl ca -batch -notext -config /tmp/sssd-softhsm2-certs-Zegskb/test-root-CA.config -passin pass:random-root-CA-password-23180 -keyfile /tmp/sssd-softhsm2-certs-Zegskb/test-root-CA-key.pem -in /tmp/sssd-softhsm2-certs-Zegskb/test-root-CA-trusted-certificate-0001-request.pem -days 365 -extensions usr_cert -out /tmp/sssd-softhsm2-certs-Zegskb/test-root-CA-trusted-certificate-0001.pem 971s Using configuration from /tmp/sssd-softhsm2-certs-Zegskb/test-root-CA.config 971s Check that the request matches the signature 971s Signature ok 971s Certificate Details: 971s Serial Number: 3 (0x3) 971s Validity 971s Not Before: Mar 19 03:47:25 2024 GMT 971s Not After : Mar 19 03:47:25 2025 GMT 971s Subject: 971s organizationName = Test Organization 971s organizationalUnitName = Test Organization Unit 971s commonName = Test Organization Root Trusted Certificate 0001 971s X509v3 extensions: 971s X509v3 Authority Key Identifier: 971s BD:7D:B9:56:4E:85:8F:F5:59:9C:E1:97:09:D0:13:89:98:EE:EC:59 971s X509v3 Basic Constraints: 971s CA:FALSE 971s Netscape Cert Type: 971s SSL Client, S/MIME 971s Netscape Comment: 971s Test Organization Root CA trusted Certificate 971s X509v3 Subject Key Identifier: 971s B5:E4:70:AF:69:15:2A:E6:66:01:B9:72:87:1D:41:E4:16:D6:76:F2 971s X509v3 Key Usage: critical 971s Digital Signature, Non Repudiation, Key Encipherment 971s X509v3 Extended Key Usage: 971s TLS Web Client Authentication, E-mail Protection 971s X509v3 Subject Alternative Name: 971s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 971s Certificate is to be certified until Mar 19 03:47:25 2025 GMT (365 days) 971s 971s Write out database with 1 new entries 971s Database updated 971s + openssl x509 -noout -in /tmp/sssd-softhsm2-certs-Zegskb/test-root-CA-trusted-certificate-0001.pem 971s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-Zegskb/test-root-CA.pem /tmp/sssd-softhsm2-certs-Zegskb/test-root-CA-trusted-certificate-0001.pem 971s /tmp/sssd-softhsm2-certs-Zegskb/test-root-CA-trusted-certificate-0001.pem: OK 971s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-certs-Zegskb/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-Zegskb/test-root-CA-trusted-certificate-0001.pem 971s + local cmd=openssl 971s + shift 971s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-Zegskb/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-Zegskb/test-root-CA-trusted-certificate-0001.pem 971s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 971s error 20 at 0 depth lookup: unable to get local issuer certificate 971s error /tmp/sssd-softhsm2-certs-Zegskb/test-root-CA-trusted-certificate-0001.pem: verification failed 971s + cat 971s + intermediate_ca_trusted_cert_0001_key_pass=pass:random-intermediate-ca-trusted-cert-0001-24005 971s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-certs-Zegskb/test-intermediate-CA-trusted-certificate-0001-key.pem -passout pass:random-intermediate-ca-trusted-cert-0001-24005 1024 971s + openssl req -new -nodes -reqexts req_exts -passin pass:random-intermediate-ca-trusted-cert-0001-24005 -key /tmp/sssd-softhsm2-certs-Zegskb/test-intermediate-CA-trusted-certificate-0001-key.pem -config /tmp/sssd-softhsm2-certs-Zegskb/test-intermediate-CA-trusted-certificate-0001.config -out /tmp/sssd-softhsm2-certs-Zegskb/test-intermediate-CA-trusted-certificate-0001-request.pem 971s + openssl req -text -noout -in /tmp/sssd-softhsm2-certs-Zegskb/test-intermediate-CA-trusted-certificate-0001-request.pem 971s Certificate Request: 971s Data: 971s Version: 1 (0x0) 971s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 971s Subject Public Key Info: 971s Public Key Algorithm: rsaEncryption 971s Public-Key: (1024 bit) 971s Modulus: 971s 00:ac:67:0c:6b:8a:ee:32:9e:65:3c:6a:3a:32:41: 971s 74:9e:f3:d4:77:ca:da:b5:e5:6b:39:c9:93:24:9e: 971s d1:2c:81:46:ad:95:85:44:3e:85:90:c5:76:28:4c: 971s 8d:cc:86:05:af:f8:50:f3:d7:7b:15:1f:5b:ce:18: 971s 4c:34:e6:d8:d0:f7:69:eb:46:bd:c9:4a:90:b2:08: 971s e2:cd:02:a5:1f:7a:a1:19:86:17:2b:e9:00:67:79: 971s 8e:5e:28:9a:b9:e7:b1:1a:37:d7:cb:29:39:f3:8b: 971s c4:9e:a4:ed:c5:63:e3:7a:85:38:4b:8e:25:bc:39: 971s 25:6d:ce:83:09:a7:7f:cc:f7 971s Exponent: 65537 (0x10001) 971s Attributes: 971s Requested Extensions: 971s X509v3 Basic Constraints: 971s CA:FALSE 971s Netscape Cert Type: 971s SSL Client, S/MIME 971s Netscape Comment: 971s Test Organization Intermediate CA trusted Certificate 971s X509v3 Subject Key Identifier: 971s E3:73:52:B1:71:D7:05:EB:BE:40:53:8E:F1:F6:9D:47:19:18:0B:0C 971s X509v3 Key Usage: critical 971s Digital Signature, Non Repudiation, Key Encipherment 971s X509v3 Extended Key Usage: 971s TLS Web Client Authentication, E-mail Protection 971s X509v3 Subject Alternative Name: 971s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 971s Signature Algorithm: sha256WithRSAEncryption 971s Signature Value: 971s 7d:06:43:cf:57:f6:e0:23:ad:40:1a:56:cd:09:0b:2b:d7:31: 971s 4c:95:8a:b1:92:79:bf:a0:21:87:38:ae:62:4f:d8:3b:c6:a9: 971s 55:b5:79:15:7b:53:50:3e:5a:22:08:0c:32:7c:3b:be:ec:71: 971s 27:31:48:34:b5:36:cd:25:3a:72:98:7c:69:fa:59:eb:3d:8f: 971s 93:03:33:94:a4:09:93:34:00:da:3f:98:ee:4d:d5:54:9c:dd: 971s e3:4d:0f:5f:28:49:fb:04:69:c2:d0:3d:66:17:d1:7e:2b:5f: 971s e1:75:01:63:71:22:84:82:c5:88:f8:50:5f:96:21:66:81:fc: 971s 98:7b 971s + openssl ca -passin pass:random-intermediate-CA-password-15432 -config /tmp/sssd-softhsm2-certs-Zegskb/test-intermediate-CA.config -batch -notext -keyfile /tmp/sssd-softhsm2-certs-Zegskb/test-intermediate-CA-key.pem -in /tmp/sssd-softhsm2-certs-Zegskb/test-intermediate-CA-trusted-certificate-0001-request.pem -days 365 -extensions usr_cert -out /tmp/sssd-softhsm2-certs-Zegskb/test-intermediate-CA-trusted-certificate-0001.pem 971s Using configuration from /tmp/sssd-softhsm2-certs-Zegskb/test-intermediate-CA.config 971s Check that the request matches the signature 971s Signature ok 971s Certificate Details: 971s Serial Number: 4 (0x4) 971s Validity 971s Not Before: Mar 19 03:47:25 2024 GMT 971s Not After : Mar 19 03:47:25 2025 GMT 971s Subject: 971s organizationName = Test Organization 971s organizationalUnitName = Test Organization Unit 971s commonName = Test Organization Intermediate Trusted Certificate 0001 971s X509v3 extensions: 971s X509v3 Authority Key Identifier: 971s CC:C6:45:A3:EF:12:9F:AE:AD:7F:DC:B1:BF:8F:25:7A:A8:C1:9E:13 971s X509v3 Basic Constraints: 971s CA:FALSE 971s Netscape Cert Type: 971s SSL Client, S/MIME 971s Netscape Comment: 971s Test Organization Intermediate CA trusted Certificate 971s X509v3 Subject Key Identifier: 971s E3:73:52:B1:71:D7:05:EB:BE:40:53:8E:F1:F6:9D:47:19:18:0B:0C 971s X509v3 Key Usage: critical 971s Digital Signature, Non Repudiation, Key Encipherment 971s X509v3 Extended Key Usage: 971s TLS Web Client Authentication, E-mail Protection 971s X509v3 Subject Alternative Name: 971s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 971s Certificate is to be certified until Mar 19 03:47:25 2025 GMT (365 days) 971s 971s Write out database with 1 new entries 971s Database updated 971s + openssl x509 -noout -in /tmp/sssd-softhsm2-certs-Zegskb/test-intermediate-CA-trusted-certificate-0001.pem 972s This certificate should not be trusted fully 972s + echo 'This certificate should not be trusted fully' 972s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-certs-Zegskb/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-Zegskb/test-intermediate-CA-trusted-certificate-0001.pem 972s + local cmd=openssl 972s + shift 972s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-Zegskb/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-Zegskb/test-intermediate-CA-trusted-certificate-0001.pem 972s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 972s error 2 at 1 depth lookup: unable to get issuer certificate 972s error /tmp/sssd-softhsm2-certs-Zegskb/test-intermediate-CA-trusted-certificate-0001.pem: verification failed 972s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-certs-Zegskb/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-Zegskb/test-intermediate-CA-trusted-certificate-0001.pem 972s /tmp/sssd-softhsm2-certs-Zegskb/test-intermediate-CA-trusted-certificate-0001.pem: OK 972s + cat 972s + sub_intermediate_ca_trusted_cert_0001_key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-19902 972s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-certs-Zegskb/test-sub-intermediate-CA-trusted-certificate-0001-key.pem -passout pass:random-sub-intermediate-ca-trusted-cert-0001-19902 1024 972s + openssl req -new -nodes -reqexts req_exts -passin pass:random-sub-intermediate-ca-trusted-cert-0001-19902 -key /tmp/sssd-softhsm2-certs-Zegskb/test-sub-intermediate-CA-trusted-certificate-0001-key.pem -config /tmp/sssd-softhsm2-certs-Zegskb/test-sub-intermediate-CA-trusted-certificate-0001.config -out /tmp/sssd-softhsm2-certs-Zegskb/test-sub-intermediate-CA-trusted-certificate-0001-request.pem 972s + openssl req -text -noout -in /tmp/sssd-softhsm2-certs-Zegskb/test-sub-intermediate-CA-trusted-certificate-0001-request.pem 972s Certificate Request: 972s Data: 972s Version: 1 (0x0) 972s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 972s Subject Public Key Info: 972s Public Key Algorithm: rsaEncryption 972s Public-Key: (1024 bit) 972s Modulus: 972s 00:c6:79:b6:8a:89:a3:57:c9:2a:10:a4:90:4b:3d: 972s 8e:ec:de:e4:d9:43:f9:9b:97:cb:e0:c0:46:e3:1f: 972s 3f:0f:67:34:74:66:fd:cf:cc:b3:1e:84:ab:aa:b3: 972s b0:0a:f0:65:2b:2a:29:af:fb:9d:49:4e:1a:0d:da: 972s b7:c3:0e:6c:4f:4e:f4:73:94:ff:56:73:f1:f6:7c: 972s c4:82:41:3c:3b:c0:e6:ad:84:e8:40:b7:79:17:44: 972s 56:bb:e8:6f:b9:ec:fd:37:73:c8:be:7d:fd:d1:01: 972s e6:08:5b:b1:ba:df:d9:1f:1c:c8:55:00:91:f7:0e: 972s 65:94:d1:b8:c6:12:50:e8:9b 972s Exponent: 65537 (0x10001) 972s Attributes: 972s Requested Extensions: 972s X509v3 Basic Constraints: 972s CA:FALSE 972s Netscape Cert Type: 972s SSL Client, S/MIME 972s Netscape Comment: 972s Test Organization Sub Intermediate CA trusted Certificate 972s X509v3 Subject Key Identifier: 972s C5:46:E4:D2:BA:2A:C7:2F:B0:80:3A:F8:2F:68:E5:BA:83:7C:71:97 972s X509v3 Key Usage: critical 972s Digital Signature, Non Repudiation, Key Encipherment 972s X509v3 Extended Key Usage: 972s TLS Web Client Authentication, E-mail Protection 972s X509v3 Subject Alternative Name: 972s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 972s Signature Algorithm: sha256WithRSAEncryption 972s Signature Value: 972s 04:26:2d:3a:a2:cc:16:a8:33:95:4a:91:e1:27:9f:b3:34:e0: 972s 78:b1:83:9b:59:b3:a1:96:db:e0:49:1f:bb:5b:8e:8e:f5:fb: 972s b2:1e:ae:45:2d:9d:37:f0:28:8a:23:bd:5c:98:67:6a:fa:97: 972s 87:05:c8:ae:d6:ae:47:20:b7:17:c4:6e:b7:e5:a8:99:3e:a4: 972s 2e:be:f1:ae:45:0a:e9:ef:e5:4c:49:33:78:7b:99:49:bd:13: 972s 1a:af:2e:6f:b6:bc:06:86:b9:63:b7:3d:6c:40:08:13:e9:8b: 972s e7:06:72:cf:13:93:38:8c:45:3a:a5:41:6b:f5:31:62:3f:67: 972s 15:d2 972s + openssl ca -passin pass:random-sub-intermediate-CA-password-11090 -config /tmp/sssd-softhsm2-certs-Zegskb/test-sub-intermediate-CA.config -batch -notext -keyfile /tmp/sssd-softhsm2-certs-Zegskb/test-sub-intermediate-CA-key.pem -in /tmp/sssd-softhsm2-certs-Zegskb/test-sub-intermediate-CA-trusted-certificate-0001-request.pem -days 365 -extensions usr_cert -out /tmp/sssd-softhsm2-certs-Zegskb/test-sub-intermediate-CA-trusted-certificate-0001.pem 972s Using configuration from /tmp/sssd-softhsm2-certs-Zegskb/test-sub-intermediate-CA.config 972s Check that the request matches the signature 972s Signature ok 972s Certificate Details: 972s Serial Number: 5 (0x5) 972s Validity 972s Not Before: Mar 19 03:47:26 2024 GMT 972s Not After : Mar 19 03:47:26 2025 GMT 972s Subject: 972s organizationName = Test Organization 972s organizationalUnitName = Test Organization Unit 972s commonName = Test Organization Sub Intermediate Trusted Certificate 0001 972s X509v3 extensions: 972s X509v3 Authority Key Identifier: 972s 05:D7:85:CA:56:C2:9D:43:99:90:88:36:20:CB:58:10:7D:05:3F:C3 972s X509v3 Basic Constraints: 972s CA:FALSE 972s Netscape Cert Type: 972s SSL Client, S/MIME 972s Netscape Comment: 972s Test Organization Sub Intermediate CA trusted Certificate 972s X509v3 Subject Key Identifier: 972s C5:46:E4:D2:BA:2A:C7:2F:B0:80:3A:F8:2F:68:E5:BA:83:7C:71:97 972s X509v3 Key Usage: critical 972s Digital Signature, Non Repudiation, Key Encipherment 972s X509v3 Extended Key Usage: 972s TLS Web Client Authentication, E-mail Protection 972s X509v3 Subject Alternative Name: 972s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 972s Certificate is to be certified until Mar 19 03:47:26 2025 GMT (365 days) 972s 972s Write out database with 1 new entries 972s Database updated 972s + openssl x509 -noout -in /tmp/sssd-softhsm2-certs-Zegskb/test-sub-intermediate-CA-trusted-certificate-0001.pem 972s + echo 'This certificate should not be trusted fully' 972s This certificate should not be trusted fully 972s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-certs-Zegskb/test-sub-intermediate-CA.pem /tmp/sssd-softhsm2-certs-Zegskb/test-sub-intermediate-CA-trusted-certificate-0001.pem 972s + local cmd=openssl 972s + shift 972s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-Zegskb/test-sub-intermediate-CA.pem /tmp/sssd-softhsm2-certs-Zegskb/test-sub-intermediate-CA-trusted-certificate-0001.pem 972s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 972s error 2 at 1 depth lookup: unable to get issuer certificate 972s error /tmp/sssd-softhsm2-certs-Zegskb/test-sub-intermediate-CA-trusted-certificate-0001.pem: verification failed 972s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-certs-Zegskb/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-Zegskb/test-sub-intermediate-CA-trusted-certificate-0001.pem 972s + local cmd=openssl 972s + shift 972s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-Zegskb/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-Zegskb/test-sub-intermediate-CA-trusted-certificate-0001.pem 972s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 972s error 20 at 0 depth lookup: unable to get local issuer certificate 972s error /tmp/sssd-softhsm2-certs-Zegskb/test-sub-intermediate-CA-trusted-certificate-0001.pem: verification failed 972s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-certs-Zegskb/test-sub-intermediate-CA.pem /tmp/sssd-softhsm2-certs-Zegskb/test-sub-intermediate-CA-trusted-certificate-0001.pem 972s /tmp/sssd-softhsm2-certs-Zegskb/test-sub-intermediate-CA-trusted-certificate-0001.pem: OK 972s + expect_fail openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-certs-Zegskb/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-Zegskb/test-sub-intermediate-CA-trusted-certificate-0001.pem 972s + local cmd=openssl 972s + shift 972s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-certs-Zegskb/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-Zegskb/test-sub-intermediate-CA-trusted-certificate-0001.pem 972s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 972s error 20 at 0 depth lookup: unable to get local issuer certificate 972s error /tmp/sssd-softhsm2-certs-Zegskb/test-sub-intermediate-CA-trusted-certificate-0001.pem: verification failed 972s + echo 'Building a the full-chain CA file...' 972s Building a the full-chain CA file... 972s + cat /tmp/sssd-softhsm2-certs-Zegskb/test-root-CA.pem /tmp/sssd-softhsm2-certs-Zegskb/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-Zegskb/test-sub-intermediate-CA.pem 972s + cat /tmp/sssd-softhsm2-certs-Zegskb/test-root-CA.pem /tmp/sssd-softhsm2-certs-Zegskb/test-intermediate-CA.pem 972s + cat /tmp/sssd-softhsm2-certs-Zegskb/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-Zegskb/test-sub-intermediate-CA.pem 972s + openssl crl2pkcs7 -nocrl -certfile /tmp/sssd-softhsm2-certs-Zegskb/test-full-chain-CA.pem 972s + openssl pkcs7 -print_certs -noout 972s subject=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 972s issuer=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 972s 972s subject=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 972s issuer=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 972s 972s subject=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 972s issuer=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 972s 972s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-Zegskb/test-full-chain-CA.pem /tmp/sssd-softhsm2-certs-Zegskb/test-intermediate-CA.pem 972s /tmp/sssd-softhsm2-certs-Zegskb/test-intermediate-CA.pem: OK 972s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-Zegskb/test-full-chain-CA.pem /tmp/sssd-softhsm2-certs-Zegskb/test-root-CA-trusted-certificate-0001.pem 972s /tmp/sssd-softhsm2-certs-Zegskb/test-root-CA-trusted-certificate-0001.pem: OK 972s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-Zegskb/test-full-chain-CA.pem /tmp/sssd-softhsm2-certs-Zegskb/test-intermediate-CA-trusted-certificate-0001.pem 972s /tmp/sssd-softhsm2-certs-Zegskb/test-intermediate-CA-trusted-certificate-0001.pem: OK 972s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-Zegskb/test-full-chain-CA.pem /tmp/sssd-softhsm2-certs-Zegskb/test-root-intermediate-chain-CA.pem 972s /tmp/sssd-softhsm2-certs-Zegskb/test-root-intermediate-chain-CA.pem: OK 972s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-Zegskb/test-full-chain-CA.pem /tmp/sssd-softhsm2-certs-Zegskb/test-sub-intermediate-CA-trusted-certificate-0001.pem 972s /tmp/sssd-softhsm2-certs-Zegskb/test-sub-intermediate-CA-trusted-certificate-0001.pem: OK 972s + echo 'Certificates generation completed!' 972s Certificates generation completed! 972s + [[ -v NO_SSSD_TESTS ]] 972s + [[ -v GENERATE_SMART_CARDS ]] 972s + prepare_softhsm2_card /tmp/sssd-softhsm2-certs-Zegskb/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-31502 972s + local certificate=/tmp/sssd-softhsm2-certs-Zegskb/test-root-CA-trusted-certificate-0001.pem 972s + local key_pass=pass:random-root-ca-trusted-cert-0001-31502 972s + local key_cn 972s + local key_name 972s + local tokens_dir 972s + local output_cert_file 972s + token_name= 972s ++ basename /tmp/sssd-softhsm2-certs-Zegskb/test-root-CA-trusted-certificate-0001.pem .pem 972s + key_name=test-root-CA-trusted-certificate-0001 972s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-certs-Zegskb/test-root-CA-trusted-certificate-0001.pem 972s ++ sed -n 's/ *commonName *= //p' 972s + key_cn='Test Organization Root Trusted Certificate 0001' 972s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 972s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-certs-Zegskb/softhsm2-test-root-CA-trusted-certificate-0001.conf 972s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-certs-Zegskb/softhsm2-test-root-CA-trusted-certificate-0001.conf 972s ++ basename /tmp/sssd-softhsm2-certs-Zegskb/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 972s + tokens_dir=/tmp/sssd-softhsm2-certs-Zegskb/softhsm2-test-root-CA-trusted-certificate-0001 972s + token_name='Test Organization Root Tr Token' 972s + '[' '!' -e /tmp/sssd-softhsm2-certs-Zegskb/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 972s + local key_file 972s + local decrypted_key 972s + mkdir -p /tmp/sssd-softhsm2-certs-Zegskb/softhsm2-test-root-CA-trusted-certificate-0001 972s + key_file=/tmp/sssd-softhsm2-certs-Zegskb/test-root-CA-trusted-certificate-0001-key.pem 972s + decrypted_key=/tmp/sssd-softhsm2-certs-Zegskb/test-root-CA-trusted-certificate-0001-key-decrypted.pem 972s + cat 972s + softhsm2-util --init-token --label 'Test Organization Root Tr Token' --pin 123456 --so-pin 123456 --free 972s Slot 0 has a free/uninitialized token. 972s The token has been initialized and is reassigned to slot 1630618252 972s + softhsm2-util --show-slots 972s Available slots: 972s Slot 1630618252 972s Slot info: 972s Description: SoftHSM slot ID 0x6131428c 972s Manufacturer ID: SoftHSM project 972s Hardware version: 2.6 972s Firmware version: 2.6 972s Token present: yes 972s Token info: 972s Manufacturer ID: SoftHSM project 972s Model: SoftHSM v2 972s Hardware version: 2.6 972s Firmware version: 2.6 972s Serial number: 292226ffe131428c 972s Initialized: yes 972s User PIN init.: yes 972s Label: Test Organization Root Tr Token 972s Slot 1 972s Slot info: 972s Description: SoftHSM slot ID 0x1 972s Manufacturer ID: SoftHSM project 972s Hardware version: 2.6 972s Firmware version: 2.6 972s Token present: yes 972s Token info: 972s Manufacturer ID: SoftHSM project 972s Model: SoftHSM v2 972s Hardware version: 2.6 972s Firmware version: 2.6 972s Serial number: 972s Initialized: no 972s User PIN init.: no 972s Label: 972s + p11tool --provider=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --write --no-mark-private --load-certificate=/tmp/sssd-softhsm2-certs-Zegskb/test-root-CA-trusted-certificate-0001.pem --login --set-pin=123456 --label 'Test Organization Root Trusted Certificate 0001' --id 00112233445566778899FFAABBCCDDEEFF012345 972s + openssl rsa -passin pass:random-root-ca-trusted-cert-0001-31502 -in /tmp/sssd-softhsm2-certs-Zegskb/test-root-CA-trusted-certificate-0001-key.pem -out /tmp/sssd-softhsm2-certs-Zegskb/test-root-CA-trusted-certificate-0001-key-decrypted.pem 972s writing RSA key 972s + p11tool --provider=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --write --load-privkey=/tmp/sssd-softhsm2-certs-Zegskb/test-root-CA-trusted-certificate-0001-key-decrypted.pem --login --set-pin=123456 --label 'Test Organization Root Trusted Certificate 0001 Key' --id 00112233445566778899FFAABBCCDDEEFF012345 972s + rm /tmp/sssd-softhsm2-certs-Zegskb/test-root-CA-trusted-certificate-0001-key-decrypted.pem 972s + p11tool --provider=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --list-all 972s Object 0: 972s URL: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=292226ffe131428c;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert 972s Type: X.509 Certificate (RSA-1024) 972s Expires: Wed Mar 19 03:47:25 2025 972s Label: Test Organization Root Trusted Certificate 0001 972s ID: 00:11:22:33:44:55:66:77:88:99:ff:aa:bb:cc:dd:ee:ff:01:23:45 972s 972s Test Organization Root Tr Token 972s + echo 'Test Organization Root Tr Token' 972s + prepare_softhsm2_card /tmp/sssd-softhsm2-certs-Zegskb/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-24005 972s + local certificate=/tmp/sssd-softhsm2-certs-Zegskb/test-intermediate-CA-trusted-certificate-0001.pem 972s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-24005 972s + local key_cn 972s + local key_name 972s + local tokens_dir 972s + local output_cert_file 972s + token_name= 972s ++ basename /tmp/sssd-softhsm2-certs-Zegskb/test-intermediate-CA-trusted-certificate-0001.pem .pem 972s + key_name=test-intermediate-CA-trusted-certificate-0001 972s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-certs-Zegskb/test-intermediate-CA-trusted-certificate-0001.pem 972s ++ sed -n 's/ *commonName *= //p' 972s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 972s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 972s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-certs-Zegskb/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 972s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-certs-Zegskb/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 972s ++ basename /tmp/sssd-softhsm2-certs-Zegskb/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 972s + tokens_dir=/tmp/sssd-softhsm2-certs-Zegskb/softhsm2-test-intermediate-CA-trusted-certificate-0001 972s + token_name='Test Organization Interme Token' 972s + '[' '!' -e /tmp/sssd-softhsm2-certs-Zegskb/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 972s + local key_file 972s + local decrypted_key 972s + mkdir -p /tmp/sssd-softhsm2-certs-Zegskb/softhsm2-test-intermediate-CA-trusted-certificate-0001 972s + key_file=/tmp/sssd-softhsm2-certs-Zegskb/test-intermediate-CA-trusted-certificate-0001-key.pem 972s + decrypted_key=/tmp/sssd-softhsm2-certs-Zegskb/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 972s + cat 972s + softhsm2-util --init-token --label 'Test Organization Interme Token' --pin 123456 --so-pin 123456 --free 972s Slot 0 has a free/uninitialized token. 972s The token has been initialized and is reassigned to slot 2122279658 972s + softhsm2-util --show-slots 972s Available slots: 972s Slot 2122279658 972s Slot info: 972s Description: SoftHSM slot ID 0x7e7f6aea 972s Manufacturer ID: SoftHSM project 972s Hardware version: 2.6 972s Firmware version: 2.6 972s Token present: yes 972s Token info: 972s Manufacturer ID: SoftHSM project 972s Model: SoftHSM v2 972s Hardware version: 2.6 972s Firmware version: 2.6 972s Serial number: 48cf24257e7f6aea 972s Initialized: yes 972s User PIN init.: yes 972s Label: Test Organization Interme Token 972s Slot 1 972s Slot info: 972s Description: SoftHSM slot ID 0x1 972s Manufacturer ID: SoftHSM project 972s Hardware version: 2.6 972s Firmware version: 2.6 972s Token present: yes 972s Token info: 972s Manufacturer ID: SoftHSM project 972s Model: SoftHSM v2 972s Hardware version: 2.6 972s Firmware version: 2.6 972s Serial number: 972s Initialized: no 972s User PIN init.: no 972s Label: 972s + p11tool --provider=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --write --no-mark-private --load-certificate=/tmp/sssd-softhsm2-certs-Zegskb/test-intermediate-CA-trusted-certificate-0001.pem --login --set-pin=123456 --label 'Test Organization Intermediate Trusted Certificate 0001' --id 00112233445566778899FFAABBCCDDEEFF012345 972s + openssl rsa -passin pass:random-intermediate-ca-trusted-cert-0001-24005 -in /tmp/sssd-softhsm2-certs-Zegskb/test-intermediate-CA-trusted-certificate-0001-key.pem -out /tmp/sssd-softhsm2-certs-Zegskb/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 972s writing RSA key 972s + p11tool --provider=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --write --load-privkey=/tmp/sssd-softhsm2-certs-Zegskb/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem --login --set-pin=123456 --label 'Test Organization Intermediate Trusted Certificate 0001 Key' --id 00112233445566778899FFAABBCCDDEEFF012345 972s + rm /tmp/sssd-softhsm2-certs-Zegskb/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 972s + p11tool --provider=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --list-all 972s Object 0: 972s URL: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=48cf24257e7f6aea;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert 972s Type: X.509 Certificate (RSA-1024) 972s Expires: Wed Mar 19 03:47:25 2025 972s Label: Test Organization Intermediate Trusted Certificate 0001 972s ID: 00:11:22:33:44:55:66:77:88:99:ff:aa:bb:cc:dd:ee:ff:01:23:45 972s 972s Test Organization Interme Token 972s + echo 'Test Organization Interme Token' 972s + prepare_softhsm2_card /tmp/sssd-softhsm2-certs-Zegskb/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-19902 972s + local certificate=/tmp/sssd-softhsm2-certs-Zegskb/test-sub-intermediate-CA-trusted-certificate-0001.pem 972s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-19902 972s + local key_cn 972s + local key_name 972s + local tokens_dir 972s + local output_cert_file 972s + token_name= 972s ++ basename /tmp/sssd-softhsm2-certs-Zegskb/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 972s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 972s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-certs-Zegskb/test-sub-intermediate-CA-trusted-certificate-0001.pem 972s ++ sed -n 's/ *commonName *= //p' 972s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 972s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 972s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-certs-Zegskb/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 972s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-certs-Zegskb/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 972s ++ basename /tmp/sssd-softhsm2-certs-Zegskb/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 972s + tokens_dir=/tmp/sssd-softhsm2-certs-Zegskb/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 972s + token_name='Test Organization Sub Int Token' 972s + '[' '!' -e /tmp/sssd-softhsm2-certs-Zegskb/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 972s + local key_file 972s + local decrypted_key 972s + mkdir -p /tmp/sssd-softhsm2-certs-Zegskb/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 972s + key_file=/tmp/sssd-softhsm2-certs-Zegskb/test-sub-intermediate-CA-trusted-certificate-0001-key.pem 972s + decrypted_key=/tmp/sssd-softhsm2-certs-Zegskb/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 972s + cat 972s + softhsm2-util --init-token --label 'Test Organization Sub Int Token' --pin 123456 --so-pin 123456 --free 972s Slot 0 has a free/uninitialized token. 972s The token has been initialized and is reassigned to slot 1659195264 972s + softhsm2-util --show-slots 972s Available slots: 972s Slot 1659195264 972s Slot info: 972s Description: SoftHSM slot ID 0x62e54f80 972s Manufacturer ID: SoftHSM project 972s Hardware version: 2.6 972s Firmware version: 2.6 972s Token present: yes 972s Token info: 972s Manufacturer ID: SoftHSM project 972s Model: SoftHSM v2 972s Hardware version: 2.6 972s Firmware version: 2.6 972s Serial number: 6d3f5e3862e54f80 972s Initialized: yes 972s User PIN init.: yes 972s Label: Test Organization Sub Int Token 972s Slot 1 972s Slot info: 972s Description: SoftHSM slot ID 0x1 972s Manufacturer ID: SoftHSM project 972s Hardware version: 2.6 972s Firmware version: 2.6 972s Token present: yes 972s Token info: 972s Manufacturer ID: SoftHSM project 972s Model: SoftHSM v2 972s Hardware version: 2.6 972s Firmware version: 2.6 972s Serial number: 972s Initialized: no 972s User PIN init.: no 972s Label: 972s + p11tool --provider=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --write --no-mark-private --load-certificate=/tmp/sssd-softhsm2-certs-Zegskb/test-sub-intermediate-CA-trusted-certificate-0001.pem --login --set-pin=123456 --label 'Test Organization Sub Intermediate Trusted Certificate 0001' --id 00112233445566778899FFAABBCCDDEEFF012345 972s + openssl rsa -passin pass:random-sub-intermediate-ca-trusted-cert-0001-19902 -in /tmp/sssd-softhsm2-certs-Zegskb/test-sub-intermediate-CA-trusted-certificate-0001-key.pem -out /tmp/sssd-softhsm2-certs-Zegskb/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 972s writing RSA key 972s + p11tool --provider=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --write --load-privkey=/tmp/sssd-softhsm2-certs-Zegskb/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem --login --set-pin=123456 --label 'Test Organization Sub Intermediate Trusted Certificate 0001 Key' --id 00112233445566778899FFAABBCCDDEEFF012345 972s + rm /tmp/sssd-softhsm2-certs-Zegskb/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 972s + p11tool --provider=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --list-all 972s Object 0: 972s URL: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=6d3f5e3862e54f80;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert 972s Type: X.509 Certificate (RSA-1024) 972s Expires: Wed Mar 19 03:47:26 2025 972s Label: Test Organization Sub Intermediate Trusted Certificate 0001 972s ID: 00:11:22:33:44:55:66:77:88:99:ff:aa:bb:cc:dd:ee:ff:01:23:45 972s 972s Test Organization Sub Int Token 972s Certificates generation completed! 972s + echo 'Test Organization Sub Int Token' 972s + echo 'Certificates generation completed!' 972s + exit 0 972s + find /tmp/sssd-softhsm2-certs-Zegskb -type d -exec chmod 777 '{}' ';' 972s + find /tmp/sssd-softhsm2-certs-Zegskb -type f -exec chmod 666 '{}' ';' 972s + backup_file /etc/sssd/sssd.conf 972s + '[' -z '' ']' 972s ++ mktemp -d -t sssd-softhsm2-backups-XXXXXX 972s + backupsdir=/tmp/sssd-softhsm2-backups-mizXYG 972s + '[' -e /etc/sssd/sssd.conf ']' 972s + delete_paths+=("$1") 972s + rm -f /etc/sssd/sssd.conf 972s ++ runuser -u ubuntu -- sh -c 'echo ~' 972s + user_home=/home/ubuntu 972s + mkdir -p /home/ubuntu 972s + chown ubuntu:ubuntu /home/ubuntu 972s ++ runuser -u ubuntu -- sh -c 'echo ${XDG_CONFIG_HOME:-~/.config}' 972s + user_config=/home/ubuntu/.config 972s + system_config=/etc 972s + softhsm2_conf_paths=("${AUTOPKGTEST_NORMAL_USER}:$user_config/softhsm2/softhsm2.conf" "root:$system_config/softhsm/softhsm2.conf") 972s + for path_pair in "${softhsm2_conf_paths[@]}" 972s + IFS=: 972s + read -r -a path 972s + path=/home/ubuntu/.config/softhsm2/softhsm2.conf 972s + backup_file /home/ubuntu/.config/softhsm2/softhsm2.conf 972s + '[' -z /tmp/sssd-softhsm2-backups-mizXYG ']' 972s + '[' -e /home/ubuntu/.config/softhsm2/softhsm2.conf ']' 972s + delete_paths+=("$1") 972s + rm -f /home/ubuntu/.config/softhsm2/softhsm2.conf 972s + for path_pair in "${softhsm2_conf_paths[@]}" 972s + IFS=: 972s + read -r -a path 972s + path=/etc/softhsm/softhsm2.conf 972s + backup_file /etc/softhsm/softhsm2.conf 972s + '[' -z /tmp/sssd-softhsm2-backups-mizXYG ']' 972s + '[' -e /etc/softhsm/softhsm2.conf ']' 972s ++ dirname /etc/softhsm/softhsm2.conf 972s + local back_dir=/tmp/sssd-softhsm2-backups-mizXYG//etc/softhsm 972s ++ basename /etc/softhsm/softhsm2.conf 972s + local back_path=/tmp/sssd-softhsm2-backups-mizXYG//etc/softhsm/softhsm2.conf 972s + '[' '!' -e /tmp/sssd-softhsm2-backups-mizXYG//etc/softhsm/softhsm2.conf ']' 972s + mkdir -p /tmp/sssd-softhsm2-backups-mizXYG//etc/softhsm 972s + cp -a /etc/softhsm/softhsm2.conf /tmp/sssd-softhsm2-backups-mizXYG//etc/softhsm/softhsm2.conf 972s + restore_paths+=("$back_path") 972s + rm -f /etc/softhsm/softhsm2.conf 972s + test_authentication login /tmp/sssd-softhsm2-certs-Zegskb/softhsm2-test-root-CA-trusted-certificate-0001.conf /tmp/sssd-softhsm2-certs-Zegskb/test-full-chain-CA.pem 972s + pam_service=login 972s + certificate_config=/tmp/sssd-softhsm2-certs-Zegskb/softhsm2-test-root-CA-trusted-certificate-0001.conf 972s + ca_db=/tmp/sssd-softhsm2-certs-Zegskb/test-full-chain-CA.pem 972s + verification_options= 972s + mkdir -p -m 700 /etc/sssd 972s Using CA DB '/tmp/sssd-softhsm2-certs-Zegskb/test-full-chain-CA.pem' with verification options: '' 972s + echo 'Using CA DB '\''/tmp/sssd-softhsm2-certs-Zegskb/test-full-chain-CA.pem'\'' with verification options: '\'''\''' 972s + cat 972s + chmod 600 /etc/sssd/sssd.conf 972s + for path_pair in "${softhsm2_conf_paths[@]}" 972s + IFS=: 972s + read -r -a path 972s + user=ubuntu 972s + path=/home/ubuntu/.config/softhsm2/softhsm2.conf 972s ++ dirname /home/ubuntu/.config/softhsm2/softhsm2.conf 972s + runuser -u ubuntu -- mkdir -p /home/ubuntu/.config/softhsm2 972s + runuser -u ubuntu -- ln -sf /tmp/sssd-softhsm2-certs-Zegskb/softhsm2-test-root-CA-trusted-certificate-0001.conf /home/ubuntu/.config/softhsm2/softhsm2.conf 972s + runuser -u ubuntu -- softhsm2-util --show-slots 972s + grep 'Test Organization' 972s Label: Test Organization Root Tr Token 972s + for path_pair in "${softhsm2_conf_paths[@]}" 972s + IFS=: 972s + read -r -a path 972s + user=root 972s + path=/etc/softhsm/softhsm2.conf 972s ++ dirname /etc/softhsm/softhsm2.conf 972s + runuser -u root -- mkdir -p /etc/softhsm 972s + runuser -u root -- ln -sf /tmp/sssd-softhsm2-certs-Zegskb/softhsm2-test-root-CA-trusted-certificate-0001.conf /etc/softhsm/softhsm2.conf 972s + runuser -u root -- softhsm2-util --show-slots 972s + grep 'Test Organization' 972s + systemctl restart sssd 972s Label: Test Organization Root Tr Token 972s + pam-auth-update --disable sss-smart-card-optional sss-smart-card-required 973s + for alternative in "${alternative_pam_configs[@]}" 973s + pam-auth-update --enable sss-smart-card-optional 973s + cat /etc/pam.d/common-auth 973s # 973s # /etc/pam.d/common-auth - authentication settings common to all services 973s # 973s # This file is included from other service-specific PAM config files, 973s # and should contain a list of the authentication modules that define 973s # the central authentication scheme for use on the system 973s # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the 973s # traditional Unix authentication mechanisms. 973s # 973s # As of pam 1.0.1-6, this file is managed by pam-auth-update by default. 973s # To take advantage of this, it is recommended that you configure any 973s # local modules either before or after the default block, and use 973s # pam-auth-update to manage selection of other modules. See 973s # pam-auth-update(8) for details. 973s 973s # here are the per-package modules (the "Primary" block) 973s auth [success=3 default=ignore] pam_sss.so allow_missing_name try_cert_auth 973s auth [success=2 default=ignore] pam_unix.so nullok try_first_pass 973s auth [success=1 default=ignore] pam_sss.so use_first_pass 973s # here's the fallback if no module succeeds 973s auth requisite pam_deny.so 973s # prime the stack with a positive return value if there isn't one already; 973s # this avoids us returning an error just because nothing sets a success code 973s # since the modules above will each just jump around 973s auth required pam_permit.so 973s # and here are more per-package modules (the "Additional" block) 973s auth optional pam_cap.so 973s # end of pam-auth-update config 973s + echo -n -e 123456 973s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 973s pamtester: invoking pam_start(login, ubuntu, ...) 973s pamtester: performing operation - authenticate 973s PIN for Test Organization Root Tr Token: pamtester: successfully authenticated 973s + echo -n -e 123456 973s + runuser -u ubuntu -- pamtester -v login '' authenticate 973s pamtester: invoking pam_start(login, , ...) 973s pamtester: performing operation - authenticate 973s PIN for Test Organization Root Tr Token: pamtester: successfully authenticated 973s + echo -n -e wrong123456 973s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 973s pamtester: invoking pam_start(login, ubuntu, ...) 973s pamtester: performing operation - authenticate 977s PIN for Test Organization Root Tr Token: Password: pamtester: Authentication failure 977s + echo -n -e wrong123456 977s + runuser -u ubuntu -- pamtester -v login '' authenticate 977s pamtester: invoking pam_start(login, , ...) 977s pamtester: performing operation - authenticate 979s PIN for Test Organization Root Tr Token: Password: pamtester: Authentication failure 979s + echo -n -e 123456 979s + pamtester -v login root authenticate 979s pamtester: invoking pam_start(login, root, ...) 979s pamtester: performing operation - authenticate 983s Password: pamtester: Authentication failure 983s + for alternative in "${alternative_pam_configs[@]}" 983s + pam-auth-update --enable sss-smart-card-required 983s PAM configuration 983s ----------------- 983s 983s Incompatible PAM profiles selected. 983s 983s The following PAM profiles cannot be used together: 983s 983s SSS required smart card authentication, SSS optional smart card 983s authentication 983s 983s Please select a different set of modules to enable. 983s 983s + cat /etc/pam.d/common-auth 983s # 983s # /etc/pam.d/common-auth - authentication settings common to all services 983s # 983s # This file is included from other service-specific PAM config files, 983s # and should contain a list of the authentication modules that define 983s # the central authentication scheme for use on the system 983s # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the 983s # traditional Unix authentication mechanisms. 983s # 983s # As of pam 1.0.1-6, this file is managed by pam-auth-update by default. 983s # To take advantage of this, it is recommended that you configure any 983s # local modules either before or after the default block, and use 983s # pam-auth-update to manage selection of other modules. See 983s # pam-auth-update(8) for details. 983s 983s # here are the per-package modules (the "Primary" block) 983s auth [success=3 ignore=ignore default=die] pam_sss.so allow_missing_name require_cert_auth 983s auth [success=2 default=ignore] pam_unix.so nullok try_first_pass 983s auth [success=1 default=ignore] pam_sss.so use_first_pass 983s # here's the fallback if no module succeeds 983s auth requisite pam_deny.so 983s # prime the stack with a positive return value if there isn't one already; 983s # this avoids us returning an error just because nothing sets a success code 983s # since the modules above will each just jump around 983s auth required pam_permit.so 983s # and here are more per-package modules (the "Additional" block) 983s auth optional pam_cap.so 983s # end of pam-auth-update config 983s + echo -n -e 123456 983s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 983s pamtester: invoking pam_start(login, ubuntu, ...) 983s pamtester: performing operation - authenticate 983s PIN for Test Organization Root Tr Token: pamtester: successfully authenticated 983s + echo -n -e 123456 983s + runuser -u ubuntu -- pamtester -v login '' authenticate 983s pamtester: invoking pam_start(login, , ...) 983s pamtester: performing operation - authenticate 983s PIN for Test Organization Root Tr Token: pamtester: successfully authenticated 983s + echo -n -e wrong123456 983s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 983s pamtester: invoking pam_start(login, ubuntu, ...) 983s pamtester: performing operation - authenticate 987s PIN for Test Organization Root Tr Token: pamtester: Authentication failure 987s + echo -n -e wrong123456 987s + runuser -u ubuntu -- pamtester -v login '' authenticate 987s pamtester: invoking pam_start(login, , ...) 987s pamtester: performing operation - authenticate 991s PIN for Test Organization Root Tr Token: pamtester: Authentication failure 991s + echo -n -e 123456 991s + pamtester -v login root authenticate 991s pamtester: invoking pam_start(login, root, ...) 991s pamtester: performing operation - authenticate 994s pamtester: Authentication service cannot retrieve authentication info 994s + test_authentication login /tmp/sssd-softhsm2-certs-Zegskb/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf /tmp/sssd-softhsm2-certs-Zegskb/test-full-chain-CA.pem 994s + pam_service=login 994s + certificate_config=/tmp/sssd-softhsm2-certs-Zegskb/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 994s + ca_db=/tmp/sssd-softhsm2-certs-Zegskb/test-full-chain-CA.pem 994s + verification_options= 994s + mkdir -p -m 700 /etc/sssd 994s + echo 'Using CA DB '\''/tmp/sssd-softhsm2-certs-Zegskb/test-full-chain-CA.pem'\'' with verification options: '\'''\''' 994s + cat 994s Using CA DB '/tmp/sssd-softhsm2-certs-Zegskb/test-full-chain-CA.pem' with verification options: '' 994s + chmod 600 /etc/sssd/sssd.conf 994s + for path_pair in "${softhsm2_conf_paths[@]}" 994s + IFS=: 994s + read -r -a path 994s + user=ubuntu 994s + path=/home/ubuntu/.config/softhsm2/softhsm2.conf 994s ++ dirname /home/ubuntu/.config/softhsm2/softhsm2.conf 994s + runuser -u ubuntu -- mkdir -p /home/ubuntu/.config/softhsm2 994s + runuser -u ubuntu -- ln -sf /tmp/sssd-softhsm2-certs-Zegskb/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf /home/ubuntu/.config/softhsm2/softhsm2.conf 994s + runuser -u ubuntu -- softhsm2-util --show-slots 994s Label: Test Organization Sub Int Token 994s Label: Test Organization Sub Int Token 994s + grep 'Test Organization' 994s + for path_pair in "${softhsm2_conf_paths[@]}" 994s + IFS=: 994s + read -r -a path 994s + user=root 994s + path=/etc/softhsm/softhsm2.conf 994s ++ dirname /etc/softhsm/softhsm2.conf 994s + runuser -u root -- mkdir -p /etc/softhsm 994s + runuser -u root -- ln -sf /tmp/sssd-softhsm2-certs-Zegskb/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf /etc/softhsm/softhsm2.conf 994s + runuser -u root -- softhsm2-util --show-slots 994s + grep 'Test Organization' 994s + systemctl restart sssd 995s + pam-auth-update --disable sss-smart-card-optional sss-smart-card-required 995s + for alternative in "${alternative_pam_configs[@]}" 995s + pam-auth-update --enable sss-smart-card-optional 995s + cat /etc/pam.d/common-auth 995s # 995s # /etc/pam.d/common-auth - authentication settings common to all services 995s # 995s # This file is included from other service-specific PAM config files, 995s # and should contain a list of the authentication modules that define 995s # the central authentication scheme for use on the system 995s # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the 995s # traditional Unix authentication mechanisms. 995s # 995s # As of pam 1.0.1-6, this file is managed by pam-auth-update by default. 995s # To take advantage of this, it is recommended that you configure any 995s # local modules either before or after the default block, and use 995s # pam-auth-update to manage selection of other modules. See 995s # pam-auth-update(8) for details. 995s 995s # here are the per-package modules (the "Primary" block) 995s auth [success=3 default=ignore] pam_sss.so allow_missing_name try_cert_auth 995s auth [success=2 default=ignore] pam_unix.so nullok try_first_pass 995s auth [success=1 default=ignore] pam_sss.so use_first_pass 995s # here's the fallback if no module succeeds 995s auth requisite pam_deny.so 995s # prime the stack with a positive return value if there isn't one already; 995s # this avoids us returning an error just because nothing sets a success code 995s # since the modules above will each just jump around 995s auth required pam_permit.so 995s # and here are more per-package modules (the "Additional" block) 995s auth optional pam_cap.so 995s # end of pam-auth-update config 995s + echo -n -e 123456 995s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 995s pamtester: invoking pam_start(login, ubuntu, ...) 995s pamtester: performing operation - authenticate 995s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 995s + echo -n -e 123456 995s + runuser -u ubuntu -- pamtester -v login '' authenticate 995s pamtester: invoking pam_start(login, , ...) 995s pamtester: performing operation - authenticate 995s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 995s + echo -n -e wrong123456 995s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 995s pamtester: invoking pam_start(login, ubuntu, ...) 995s pamtester: performing operation - authenticate 998s PIN for Test Organization Sub Int Token: Password: pamtester: Authentication failure 998s + echo -n -e wrong123456 998s + runuser -u ubuntu -- pamtester -v login '' authenticate 998s pamtester: invoking pam_start(login, , ...) 998s pamtester: performing operation - authenticate 1002s PIN for Test Organization Sub Int Token: Password: pamtester: Authentication failure 1002s + echo -n -e 123456 1002s + pamtester -v login root authenticate 1002s pamtester: invoking pam_start(login, root, ...) 1002s pamtester: performing operation - authenticate 1005s Password: pamtester: Authentication failure 1005s + for alternative in "${alternative_pam_configs[@]}" 1005s + pam-auth-update --enable sss-smart-card-required 1006s + cat /etc/pam.d/common-auth 1006s + echo -n -e 123456 1006s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 1006s PAM configuration 1006s ----------------- 1006s 1006s Incompatible PAM profiles selected. 1006s 1006s The following PAM profiles cannot be used together: 1006s 1006s SSS required smart card authentication, SSS optional smart card 1006s authentication 1006s 1006s Please select a different set of modules to enable. 1006s 1006s # 1006s # /etc/pam.d/common-auth - authentication settings common to all services 1006s # 1006s # This file is included from other service-specific PAM config files, 1006s # and should contain a list of the authentication modules that define 1006s # the central authentication scheme for use on the system 1006s # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the 1006s # traditional Unix authentication mechanisms. 1006s # 1006s # As of pam 1.0.1-6, this file is managed by pam-auth-update by default. 1006s # To take advantage of this, it is recommended that you configure any 1006s # local modules either before or after the default block, and use 1006s # pam-auth-update to manage selection of other modules. See 1006s # pam-auth-update(8) for details. 1006s 1006s # here are the per-package modules (the "Primary" block) 1006s auth [success=3 ignore=ignore default=die] pam_sss.so allow_missing_name require_cert_auth 1006s auth [success=2 default=ignore] pam_unix.so nullok try_first_pass 1006s auth [success=1 default=ignore] pam_sss.so use_first_pass 1006s # here's the fallback if no module succeeds 1006s auth requisite pam_deny.so 1006s # prime the stack with a positive return value if there isn't one already; 1006s # this avoids us returning an error just because nothing sets a success code 1006s # since the modules above will each just jump around 1006s auth required pam_permit.so 1006s # and here are more per-package modules (the "Additional" block) 1006s auth optional pam_cap.so 1006s # end of pam-auth-update config 1006s pamtester: invoking pam_start(login, ubuntu, ...) 1006s pamtester: performing operation - authenticate 1006s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 1006s + echo -n -e 123456 1006s + runuser -u ubuntu -- pamtester -v login '' authenticate 1006s pamtester: invoking pam_start(login, , ...) 1006s pamtester: performing operation - authenticate 1006s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 1006s + echo -n -e wrong123456 1006s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 1006s pamtester: invoking pam_start(login, ubuntu, ...) 1006s pamtester: performing operation - authenticate 1008s PIN for Test Organization Sub Int Token: pamtester: Authentication failure 1008s + echo -n -e wrong123456 1008s + runuser -u ubuntu -- pamtester -v login '' authenticate 1008s pamtester: invoking pam_start(login, , ...) 1008s pamtester: performing operation - authenticate 1011s PIN for Test Organization Sub Int Token: pamtester: Authentication failure 1011s + echo -n -e 123456 1011s + pamtester -v login root authenticate 1011s pamtester: invoking pam_start(login, root, ...) 1011s pamtester: performing operation - authenticate 1015s pamtester: Authentication service cannot retrieve authentication info 1015s + test_authentication login /tmp/sssd-softhsm2-certs-Zegskb/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf /tmp/sssd-softhsm2-certs-Zegskb/test-sub-intermediate-CA.pem partial_chain 1015s + pam_service=login 1015s + certificate_config=/tmp/sssd-softhsm2-certs-Zegskb/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 1015s + ca_db=/tmp/sssd-softhsm2-certs-Zegskb/test-sub-intermediate-CA.pem 1015s + verification_options=partial_chain 1015s + mkdir -p -m 700 /etc/sssd 1015s Using CA DB '/tmp/sssd-softhsm2-certs-Zegskb/test-sub-intermediate-CA.pem' with verification options: 'partial_chain' 1015s + echo 'Using CA DB '\''/tmp/sssd-softhsm2-certs-Zegskb/test-sub-intermediate-CA.pem'\'' with verification options: '\''partial_chain'\''' 1015s + cat 1015s + chmod 600 /etc/sssd/sssd.conf 1015s + for path_pair in "${softhsm2_conf_paths[@]}" 1015s + IFS=: 1015s Label: Test Organization Sub Int Token 1015s Label: Test Organization Sub Int Token 1015s + read -r -a path 1015s + user=ubuntu 1015s + path=/home/ubuntu/.config/softhsm2/softhsm2.conf 1015s ++ dirname /home/ubuntu/.config/softhsm2/softhsm2.conf 1015s + runuser -u ubuntu -- mkdir -p /home/ubuntu/.config/softhsm2 1015s + runuser -u ubuntu -- ln -sf /tmp/sssd-softhsm2-certs-Zegskb/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf /home/ubuntu/.config/softhsm2/softhsm2.conf 1015s + runuser -u ubuntu -- softhsm2-util --show-slots 1015s + grep 'Test Organization' 1015s + for path_pair in "${softhsm2_conf_paths[@]}" 1015s + IFS=: 1015s + read -r -a path 1015s + user=root 1015s + path=/etc/softhsm/softhsm2.conf 1015s ++ dirname /etc/softhsm/softhsm2.conf 1015s + runuser -u root -- mkdir -p /etc/softhsm 1015s + runuser -u root -- ln -sf /tmp/sssd-softhsm2-certs-Zegskb/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf /etc/softhsm/softhsm2.conf 1015s + runuser -u root -- softhsm2-util --show-slots 1015s + grep 'Test Organization' 1015s + systemctl restart sssd 1015s + pam-auth-update --disable sss-smart-card-optional sss-smart-card-required 1016s + for alternative in "${alternative_pam_configs[@]}" 1016s + pam-auth-update --enable sss-smart-card-optional 1016s + cat /etc/pam.d/common-auth 1016s # 1016s # /etc/pam.d/common-auth - authentication settings common to all services 1016s # 1016s # This file is included from other service-specific PAM config files, 1016s # and should contain a list of the authentication modules that define 1016s # the central authentication scheme for use on the system 1016s # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the 1016s # traditional Unix authentication mechanisms. 1016s # 1016s # As of pam 1.0.1-6, this file is managed by pam-auth-update by default. 1016s # To take advantage of this, it is recommended that you configure any 1016s # local modules either before or after the default block, and use 1016s # pam-auth-update to manage selection of other modules. See 1016s # pam-auth-update(8) for details. 1016s 1016s # here are the per-package modules (the "Primary" block) 1016s auth [success=3 default=ignore] pam_sss.so allow_missing_name try_cert_auth 1016s auth [success=2 default=ignore] pam_unix.so nullok try_first_pass 1016s auth [success=1 default=ignore] pam_sss.so use_first_pass 1016s # here's the fallback if no module succeeds 1016s auth requisite pam_deny.so 1016s # prime the stack with a positive return value if there isn't one already; 1016s # this avoids us returning an error just because nothing sets a success code 1016s # since the modules above will each just jump around 1016s auth required pam_permit.so 1016s # and here are more per-package modules (the "Additional" block) 1016s auth optional pam_cap.so 1016s # end of pam-auth-update config 1016s + echo -n -e 123456 1016s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 1016s pamtester: invoking pam_start(login, ubuntu, ...) 1016s pamtester: performing operation - authenticate 1016s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 1016s + echo -n -e 123456 1016s + runuser -u ubuntu -- pamtester -v login '' authenticate 1016s pamtester: invoking pam_start(login, , ...) 1016s pamtester: performing operation - authenticate 1016s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 1016s + echo -n -e wrong123456 1016s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 1016s pamtester: invoking pam_start(login, ubuntu, ...) 1016s pamtester: performing operation - authenticate 1019s PIN for Test Organization Sub Int Token: Password: pamtester: Authentication failure 1019s + echo -n -e wrong123456 1019s + runuser -u ubuntu -- pamtester -v login '' authenticate 1019s pamtester: invoking pam_start(login, , ...) 1019s pamtester: performing operation - authenticate 1022s PIN for Test Organization Sub Int Token: Password: pamtester: Authentication failure 1022s + echo -n -e 123456 1022s + pamtester -v login root authenticate 1022s pamtester: invoking pam_start(login, root, ...) 1022s pamtester: performing operation - authenticate 1025s Password: pamtester: Authentication failure 1025s + for alternative in "${alternative_pam_configs[@]}" 1025s + pam-auth-update --enable sss-smart-card-required 1026s PAM configuration 1026s ----------------- 1026s 1026s Incompatible PAM profiles selected. 1026s 1026s The following PAM profiles cannot be used together: 1026s 1026s SSS required smart card authentication, SSS optional smart card 1026s authentication 1026s 1026s Please select a different set of modules to enable. 1026s 1026s + cat /etc/pam.d/common-auth 1026s # 1026s # /etc/pam.d/common-auth - authentication settings common to all services 1026s # 1026s # This file is included from other service-specific PAM config files, 1026s # and should contain a list of the authentication modules that define 1026s # the central authentication scheme for use on the system 1026s # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the 1026s # traditional Unix authentication mechanisms. 1026s # 1026s # As of pam 1.0.1-6, this file is managed by pam-auth-update by default. 1026s # To take advantage of this, it is recommended that you configure any 1026s # local modules either before or after the default block, and use 1026s # pam-auth-update to manage selection of other modules. See 1026s # pam-auth-update(8) for details. 1026s 1026s # here are the per-package modules (the "Primary" block) 1026s auth [success=3 ignore=ignore default=die] pam_sss.so allow_missing_name require_cert_auth 1026s auth [success=2 default=ignore] pam_unix.so nullok try_first_pass 1026s auth [success=1 default=ignore] pam_sss.so use_first_pass 1026s # here's the fallback if no module succeeds 1026s auth requisite pam_deny.so 1026s # prime the stack with a positive return value if there isn't one already; 1026s # this avoids us returning an error just because nothing sets a success code 1026s # since the modules above will each just jump around 1026s auth required pam_permit.so 1026s # and here are more per-package modules (the "Additional" block) 1026s auth optional pam_cap.so 1026s # end of pam-auth-update config 1026s + echo -n -e 123456 1026s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 1026s pamtester: invoking pam_start(login, ubuntu, ...) 1026s pamtester: performing operation - authenticate 1026s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 1026s + echo -n -e 123456 1026s + runuser -u ubuntu -- pamtester -v login '' authenticate 1026s pamtester: invoking pam_start(login, , ...) 1026s pamtester: performing operation - authenticate 1026s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 1026s + echo -n -e wrong123456 1026s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 1026s pamtester: invoking pam_start(login, ubuntu, ...) 1026s pamtester: performing operation - authenticate 1029s PIN for Test Organization Sub Int Token: pamtester: Authentication failure 1029s + echo -n -e wrong123456 1029s + runuser -u ubuntu -- pamtester -v login '' authenticate 1029s pamtester: invoking pam_start(login, , ...) 1029s pamtester: performing operation - authenticate 1033s PIN for Test Organization Sub Int Token: pamtester: Authentication failure 1033s + echo -n -e 123456 1033s + pamtester -v login root authenticate 1033s pamtester: invoking pam_start(login, root, ...) 1033s pamtester: performing operation - authenticate 1036s pamtester: Authentication service cannot retrieve authentication info 1036s + handle_exit 1036s + exit_code=0 1036s + restore_changes 1036s + for path in "${restore_paths[@]}" 1036s + local original_path 1036s ++ realpath --strip --relative-base=/tmp/sssd-softhsm2-backups-mizXYG /tmp/sssd-softhsm2-backups-mizXYG//etc/softhsm/softhsm2.conf 1036s + original_path=/etc/softhsm/softhsm2.conf 1036s + rm /etc/softhsm/softhsm2.conf 1036s + mv /tmp/sssd-softhsm2-backups-mizXYG//etc/softhsm/softhsm2.conf /etc/softhsm/softhsm2.conf 1037s + for path in "${delete_paths[@]}" 1037s + rm -f /etc/sssd/sssd.conf 1037s + for path in "${delete_paths[@]}" 1037s + rm -f /home/ubuntu/.config/softhsm2/softhsm2.conf 1037s + pam-auth-update --disable sss-smart-card-optional sss-smart-card-required 1037s + '[' -e /etc/sssd/sssd.conf ']' 1037s + systemctl stop sssd 1037s + '[' -e /etc/softhsm/softhsm2.conf ']' 1037s + chmod 600 /etc/softhsm/softhsm2.conf 1037s + rm -rf /tmp/sssd-softhsm2-certs-Zegskb 1037s + '[' 0 = 0 ']' 1037s + rm -rf /tmp/sssd-softhsm2-backups-mizXYG 1037s + set +x 1037s Script completed successfully! 1037s autopkgtest [03:48:31]: test sssd-smart-card-pam-auth-configs: -----------------------] 1038s sssd-smart-card-pam-auth-configs PASS 1038s autopkgtest [03:48:32]: test sssd-smart-card-pam-auth-configs: - - - - - - - - - - results - - - - - - - - - - 1038s autopkgtest [03:48:32]: @@@@@@@@@@@@@@@@@@@@ summary 1038s ldap-user-group-ldap-auth PASS 1038s ldap-user-group-krb5-auth PASS 1038s sssd-softhism2-certificates-tests.sh PASS 1038s sssd-smart-card-pam-auth-configs PASS 1049s Creating nova instance adt-noble-ppc64el-sssd-20240319-033114-juju-7f2275-prod-proposed-migration-environment-2 from image adt/ubuntu-noble-ppc64el-server-20240319.img (UUID 6e7a6c13-d651-45a1-a24f-48d9d59effd9)... 1049s Creating nova instance adt-noble-ppc64el-sssd-20240319-033114-juju-7f2275-prod-proposed-migration-environment-2 from image adt/ubuntu-noble-ppc64el-server-20240319.img (UUID 6e7a6c13-d651-45a1-a24f-48d9d59effd9)...