0s autopkgtest [04:07:34]: starting date and time: 2024-03-20 04:07:34+0000 0s autopkgtest [04:07:34]: git checkout: 4a1cd702 l/adt_testbed: don't blame the testbed for unsolvable build deps 0s autopkgtest [04:07:34]: host juju-7f2275-prod-proposed-migration-environment-2; command line: /home/ubuntu/autopkgtest/runner/autopkgtest --output-dir /tmp/autopkgtest-work.a1kmzy2r/out --timeout-copy=6000 --setup-commands /home/ubuntu/autopkgtest-cloud/worker-config-production/setup-canonical.sh --apt-pocket=proposed=src:samba,src:cups,src:db5.3,src:gnutls28,src:gpgme1.0,src:libarchive,src:libtirpc,src:nettle,src:openssl,src:python3.12,src:readline,src:sssd,src:tevent --apt-upgrade sssd --timeout-short=300 --timeout-copy=20000 --timeout-build=20000 '--env=ADT_TEST_TRIGGERS=samba/2:4.19.5+dfsg-4ubuntu4 cups/2.4.7-1.2ubuntu1 db5.3/5.3.28+dfsg2-5build1 gnutls28/3.8.3-1.1ubuntu2 gpgme1.0/1.18.0-4.1ubuntu3 libarchive/3.7.2-1.1ubuntu1 libtirpc/1.3.4+ds-1.1 nettle/3.9.1-2.2 openssl/3.0.13-0ubuntu2 python3.12/3.12.2-4build3 readline/8.2-3.1 sssd/2.9.4-1.1ubuntu3 tevent/0.16.1-2' -- ssh -s /home/ubuntu/autopkgtest/ssh-setup/nova -- --flavor autopkgtest --security-groups autopkgtest-juju-7f2275-prod-proposed-migration-environment-2@bos02-ppc64el-1.secgroup --name adt-noble-ppc64el-sssd-20240320-040733-juju-7f2275-prod-proposed-migration-environment-2 --image adt/ubuntu-noble-ppc64el-server --keyname testbed-juju-7f2275-prod-proposed-migration-environment-2 --net-id=net_prod-proposed-migration -e TERM=linux -e ''"'"'http_proxy=http://squid.internal:3128'"'"'' -e ''"'"'https_proxy=http://squid.internal:3128'"'"'' -e ''"'"'no_proxy=127.0.0.1,127.0.1.1,login.ubuntu.com,localhost,localdomain,novalocal,internal,archive.ubuntu.com,ports.ubuntu.com,security.ubuntu.com,ddebs.ubuntu.com,changelogs.ubuntu.com,launchpadlibrarian.net,launchpadcontent.net,launchpad.net,10.24.0.0/24,keystone.ps5.canonical.com,objectstorage.prodstack5.canonical.com'"'"'' --mirror=http://ftpmaster.internal/ubuntu/ 120s autopkgtest [04:09:34]: testbed dpkg architecture: ppc64el 120s autopkgtest [04:09:34]: testbed apt version: 2.7.12 120s autopkgtest [04:09:34]: @@@@@@@@@@@@@@@@@@@@ test bed setup 121s Get:1 http://ftpmaster.internal/ubuntu noble-proposed InRelease [117 kB] 121s Get:2 http://ftpmaster.internal/ubuntu noble-proposed/main Sources [497 kB] 122s Get:3 http://ftpmaster.internal/ubuntu noble-proposed/universe Sources [3767 kB] 122s Get:4 http://ftpmaster.internal/ubuntu noble-proposed/restricted Sources [6540 B] 122s Get:5 http://ftpmaster.internal/ubuntu noble-proposed/multiverse Sources [52.7 kB] 122s Get:6 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el Packages [660 kB] 122s Get:7 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el c-n-f Metadata [3116 B] 122s Get:8 http://ftpmaster.internal/ubuntu noble-proposed/restricted ppc64el Packages [1372 B] 122s Get:9 http://ftpmaster.internal/ubuntu noble-proposed/restricted ppc64el c-n-f Metadata [116 B] 122s Get:10 http://ftpmaster.internal/ubuntu noble-proposed/universe ppc64el Packages [4127 kB] 122s Get:11 http://ftpmaster.internal/ubuntu noble-proposed/universe ppc64el c-n-f Metadata [8652 B] 122s Get:12 http://ftpmaster.internal/ubuntu noble-proposed/multiverse ppc64el Packages [47.7 kB] 122s Get:13 http://ftpmaster.internal/ubuntu noble-proposed/multiverse ppc64el c-n-f Metadata [116 B] 126s Fetched 9288 kB in 2s (3820 kB/s) 126s Reading package lists... 128s Reading package lists... 129s Building dependency tree... 129s Reading state information... 129s Calculating upgrade... 129s The following packages will be REMOVED: 129s libreadline8 libssl3 129s The following NEW packages will be installed: 129s libreadline8t64 libssl3t64 129s The following packages have been kept back: 129s libpython3.12-minimal libpython3.12-stdlib python3.12 python3.12-minimal 129s The following packages will be upgraded: 129s libtirpc-common openssl readline-common 129s 3 upgraded, 2 newly installed, 2 to remove and 4 not upgraded. 129s Need to get 3397 kB of archives. 129s After this operation, 75.8 kB of additional disk space will be used. 129s Get:1 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el readline-common all 8.2-3.1 [56.4 kB] 129s Get:2 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libreadline8t64 ppc64el 8.2-3.1 [182 kB] 129s Get:3 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el openssl ppc64el 3.0.13-0ubuntu2 [1026 kB] 130s Get:4 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libssl3t64 ppc64el 3.0.13-0ubuntu2 [2125 kB] 130s Get:5 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libtirpc-common all 1.3.4+ds-1.1 [8018 B] 130s Fetched 3397 kB in 1s (4814 kB/s) 130s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 70095 files and directories currently installed.) 130s Preparing to unpack .../readline-common_8.2-3.1_all.deb ... 130s Unpacking readline-common (8.2-3.1) over (8.2-3) ... 130s dpkg: libreadline8:ppc64el: dependency problems, but removing anyway as you requested: 130s parted depends on libreadline8 (>= 6.0). 130s libpython3.12-stdlib:ppc64el depends on libreadline8 (>= 7.0~beta). 130s libpython3.11-stdlib:ppc64el depends on libreadline8 (>= 7.0~beta). 130s gpgsm depends on libreadline8 (>= 6.0). 130s gpgconf depends on libreadline8 (>= 6.0). 130s gpg depends on libreadline8 (>= 6.0). 130s gawk depends on libreadline8 (>= 6.0). 130s fdisk depends on libreadline8 (>= 6.0). 130s bc depends on libreadline8 (>= 6.0). 130s 130s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 70095 files and directories currently installed.) 130s Removing libreadline8:ppc64el (8.2-3) ... 130s Selecting previously unselected package libreadline8t64:ppc64el. 130s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 70083 files and directories currently installed.) 130s Preparing to unpack .../libreadline8t64_8.2-3.1_ppc64el.deb ... 130s Adding 'diversion of /lib/powerpc64le-linux-gnu/libhistory.so.8 to /lib/powerpc64le-linux-gnu/libhistory.so.8.usr-is-merged by libreadline8t64' 130s Adding 'diversion of /lib/powerpc64le-linux-gnu/libhistory.so.8.2 to /lib/powerpc64le-linux-gnu/libhistory.so.8.2.usr-is-merged by libreadline8t64' 130s Adding 'diversion of /lib/powerpc64le-linux-gnu/libreadline.so.8 to /lib/powerpc64le-linux-gnu/libreadline.so.8.usr-is-merged by libreadline8t64' 130s Adding 'diversion of /lib/powerpc64le-linux-gnu/libreadline.so.8.2 to /lib/powerpc64le-linux-gnu/libreadline.so.8.2.usr-is-merged by libreadline8t64' 130s Unpacking libreadline8t64:ppc64el (8.2-3.1) ... 130s Preparing to unpack .../openssl_3.0.13-0ubuntu2_ppc64el.deb ... 130s Unpacking openssl (3.0.13-0ubuntu2) over (3.0.10-1ubuntu4) ... 130s dpkg: libssl3:ppc64el: dependency problems, but removing anyway as you requested: 130s wget depends on libssl3 (>= 3.0.0). 130s tnftp depends on libssl3 (>= 3.0.0). 130s tcpdump depends on libssl3 (>= 3.0.0). 130s systemd-resolved depends on libssl3 (>= 3.0.0). 130s systemd depends on libssl3 (>= 3.0.0). 130s sudo depends on libssl3 (>= 3.0.0). 130s rsync depends on libssl3 (>= 3.0.0). 130s python3-cryptography depends on libssl3 (>= 3.0.0). 130s openssh-server depends on libssl3 (>= 3.0.10). 130s openssh-client depends on libssl3 (>= 3.0.10). 130s linux-headers-6.8.0-11-generic depends on libssl3 (>= 3.0.0). 130s libsystemd-shared:ppc64el depends on libssl3 (>= 3.0.0). 130s libssh-4:ppc64el depends on libssl3 (>= 3.0.0). 130s libsasl2-modules:ppc64el depends on libssl3 (>= 3.0.0). 130s libsasl2-2:ppc64el depends on libssl3 (>= 3.0.0). 130s libpython3.12-minimal:ppc64el depends on libssl3 (>= 3.0.0). 130s libpython3.11-minimal:ppc64el depends on libssl3 (>= 3.0.0). 130s libnvme1 depends on libssl3 (>= 3.0.0). 130s libkrb5-3:ppc64el depends on libssl3 (>= 3.0.0). 130s libkmod2:ppc64el depends on libssl3 (>= 3.0.0). 130s libfido2-1:ppc64el depends on libssl3 (>= 3.0.0). 130s libcurl4:ppc64el depends on libssl3 (>= 3.0.0). 130s libcryptsetup12:ppc64el depends on libssl3 (>= 3.0.0). 130s kmod depends on libssl3 (>= 3.0.0). 130s dhcpcd-base depends on libssl3 (>= 3.0.0). 130s bind9-libs:ppc64el depends on libssl3 (>= 3.0.0). 130s 130s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 70103 files and directories currently installed.) 130s Removing libssl3:ppc64el (3.0.10-1ubuntu4) ... 130s Selecting previously unselected package libssl3t64:ppc64el. 130s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 70092 files and directories currently installed.) 130s Preparing to unpack .../libssl3t64_3.0.13-0ubuntu2_ppc64el.deb ... 130s Unpacking libssl3t64:ppc64el (3.0.13-0ubuntu2) ... 131s Preparing to unpack .../libtirpc-common_1.3.4+ds-1.1_all.deb ... 131s Unpacking libtirpc-common (1.3.4+ds-1.1) over (1.3.4+ds-1build1) ... 131s Setting up libssl3t64:ppc64el (3.0.13-0ubuntu2) ... 131s Setting up libtirpc-common (1.3.4+ds-1.1) ... 131s Setting up openssl (3.0.13-0ubuntu2) ... 131s Setting up readline-common (8.2-3.1) ... 131s Setting up libreadline8t64:ppc64el (8.2-3.1) ... 131s Processing triggers for libc-bin (2.39-0ubuntu2) ... 131s Processing triggers for man-db (2.12.0-3) ... 131s Processing triggers for install-info (7.1-3) ... 131s Reading package lists... 132s Building dependency tree... 132s Reading state information... 132s 0 upgraded, 0 newly installed, 0 to remove and 4 not upgraded. 132s Hit:1 http://ftpmaster.internal/ubuntu noble-proposed InRelease 132s Hit:2 http://ftpmaster.internal/ubuntu noble InRelease 132s Hit:3 http://ftpmaster.internal/ubuntu noble-updates InRelease 132s Hit:4 http://ftpmaster.internal/ubuntu noble-security InRelease 134s Reading package lists... 134s Reading package lists... 134s Building dependency tree... 134s Reading state information... 134s Calculating upgrade... 134s The following packages have been kept back: 134s libpython3.12-minimal libpython3.12-stdlib python3.12 python3.12-minimal 135s 0 upgraded, 0 newly installed, 0 to remove and 4 not upgraded. 135s Reading package lists... 135s Building dependency tree... 135s Reading state information... 135s 0 upgraded, 0 newly installed, 0 to remove and 4 not upgraded. 138s autopkgtest [04:09:52]: testbed running kernel: Linux 6.8.0-11-generic #11-Ubuntu SMP Wed Feb 14 00:33:03 UTC 2024 138s autopkgtest [04:09:52]: @@@@@@@@@@@@@@@@@@@@ apt-source sssd 152s Get:1 http://ftpmaster.internal/ubuntu noble-proposed/main sssd 2.9.4-1.1ubuntu3 (dsc) [5319 B] 152s Get:2 http://ftpmaster.internal/ubuntu noble-proposed/main sssd 2.9.4-1.1ubuntu3 (tar) [7983 kB] 152s Get:3 http://ftpmaster.internal/ubuntu noble-proposed/main sssd 2.9.4-1.1ubuntu3 (asc) [833 B] 152s Get:4 http://ftpmaster.internal/ubuntu noble-proposed/main sssd 2.9.4-1.1ubuntu3 (diff) [48.6 kB] 152s gpgv: Signature made Sat Mar 16 07:03:28 2024 UTC 152s gpgv: using RSA key AC483F68DE728F43F2202FCA568D30F321B2133D 152s gpgv: issuer "steve.langasek@ubuntu.com" 152s gpgv: Can't check signature: No public key 152s dpkg-source: warning: cannot verify inline signature for ./sssd_2.9.4-1.1ubuntu3.dsc: no acceptable signature found 153s autopkgtest [04:10:06]: testing package sssd version 2.9.4-1.1ubuntu3 153s autopkgtest [04:10:07]: build not needed 156s autopkgtest [04:10:10]: test ldap-user-group-ldap-auth: preparing testbed 158s Reading package lists... 158s Building dependency tree... 158s Reading state information... 158s Starting pkgProblemResolver with broken count: 2 158s Starting 2 pkgProblemResolver with broken count: 2 158s Investigating (0) sssd-common:ppc64el < none -> 2.9.4-1.1ubuntu3 @un puN Ib > 158s Broken sssd-common:ppc64el Depends on libc-ares2:ppc64el < none | 1.27.0-1 @un uH > (>= 1.7.0) 158s Considering libc-ares2:ppc64el 0 as a solution to sssd-common:ppc64el 18 158s Re-Instated libc-ares2:ppc64el 158s Broken sssd-common:ppc64el Depends on libnfsidmap1:ppc64el < none | 1:2.6.3-3ubuntu1 @un uH > (>= 1:2.6.4) 158s Considering libnfsidmap1:ppc64el 0 as a solution to sssd-common:ppc64el 18 158s Re-Instated libnfsidmap1:ppc64el 158s Investigating (0) curl:ppc64el < 8.5.0-2ubuntu2 @ii mK Ib > 158s Broken curl:ppc64el Depends on libcurl4:ppc64el < 8.5.0-2ubuntu2 @ii pmR > (= 8.5.0-2ubuntu2) 158s Considering libcurl4:ppc64el 0 as a solution to curl:ppc64el 1 158s Added libcurl4:ppc64el to the remove list 158s Investigating (1) sssd-common:ppc64el < none -> 2.9.4-1.1ubuntu3 @un puN Ib > 158s Broken sssd-common:ppc64el Depends on libnfsidmap1:ppc64el < none -> 1:2.6.3-3ubuntu1 @un uN > (>= 1:2.6.4) 158s Considering libnfsidmap1:ppc64el 0 as a solution to sssd-common:ppc64el 18 158s Investigating (1) curl:ppc64el < 8.5.0-2ubuntu2 @ii mK Ib > 158s Broken curl:ppc64el Depends on libcurl4:ppc64el < 8.5.0-2ubuntu2 @ii pmR > (= 8.5.0-2ubuntu2) 158s Considering libcurl4:ppc64el 1 as a solution to curl:ppc64el 1 158s Removing curl:ppc64el rather than change libcurl4:ppc64el 158s Investigating (1) pollinate:ppc64el < 4.33-3.1ubuntu1 @ii mK Ib > 158s Broken pollinate:ppc64el Depends on curl:ppc64el < 8.5.0-2ubuntu2 @ii mR > 158s Considering curl:ppc64el 1 as a solution to pollinate:ppc64el 0 158s Removing pollinate:ppc64el rather than change curl:ppc64el 158s Investigating (2) sssd-common:ppc64el < none -> 2.9.4-1.1ubuntu3 @un puN Ib > 158s Broken sssd-common:ppc64el Depends on libnfsidmap1:ppc64el < none -> 1:2.6.3-3ubuntu1 @un uN > (>= 1:2.6.4) 158s Considering libnfsidmap1:ppc64el 0 as a solution to sssd-common:ppc64el 18 158s Done 158s Some packages could not be installed. This may mean that you have 158s requested an impossible situation or if you are using the unstable 158s distribution that some required packages have not yet been created 158s or been moved out of Incoming. 158s The following information may help to resolve the situation: 158s 158s The following packages have unmet dependencies: 158s sssd-common : Depends: libnfsidmap1 (>= 1:2.6.4) but 1:2.6.3-3ubuntu1 is to be installed 158s E: Unable to correct problems, you have held broken packages. 158s autopkgtest: WARNING: Test dependencies are unsatisfiable with using apt pinning. Retrying with using all packages from noble-proposed 159s Reading package lists... 159s Building dependency tree... 159s Reading state information... 159s Starting pkgProblemResolver with broken count: 0 159s Starting 2 pkgProblemResolver with broken count: 0 159s Done 160s The following additional packages will be installed: 160s curl expect krb5-locales ldap-utils libavahi-client3 libavahi-common-data 160s libavahi-common3 libbasicobjects0t64 libc-ares2 libcollection4t64 libcrack2 160s libcurl4t64 libdb5.3t64 libdhash1t64 libevent-2.1-7 libevent-core-2.1-7 160s libgdbm-compat4t64 libgdbm6t64 libgnutls30t64 libgssapi-krb5-2 160s libhogweed6t64 libini-config5t64 libipa-hbac-dev libipa-hbac0t64 libjose0 160s libk5crypto3 libkrad0 libkrb5-3 libkrb5support0 libldap-common libldap2 160s libldb2 libltdl7 libnettle8t64 libnfsidmap1 libnss-sss libnss-sudo libodbc2 160s libpam-pwquality libpam-sss libpath-utils1t64 libperl5.38t64 libpsl5t64 160s libpwquality-common libpwquality1 libref-array1t64 libsmbclient0 160s libsss-certmap-dev libsss-certmap0 libsss-idmap-dev libsss-idmap0 160s libsss-nss-idmap-dev libsss-nss-idmap0 libsss-sudo libtalloc2 libtcl8.6 160s libtdb1 libtevent0t64 libtirpc3t64 libverto-libevent1t64 libverto1t64 160s libwbclient0 perl perl-base perl-modules-5.38 python3-libipa-hbac 160s python3-libsss-nss-idmap python3-sss samba-libs slapd sssd sssd-ad 160s sssd-ad-common sssd-common sssd-dbus sssd-idp sssd-ipa sssd-kcm sssd-krb5 160s sssd-krb5-common sssd-ldap sssd-passkey sssd-proxy sssd-tools sudo 160s tcl-expect tcl8.6 160s Suggested packages: 160s tk8.6 libsasl2-modules-gssapi-mit | libsasl2-modules-gssapi-heimdal 160s gdbm-l10n gnutls-bin krb5-doc krb5-user odbc-postgresql tdsodbc perl-doc 160s libterm-readline-gnu-perl | libterm-readline-perl-perl 160s libtap-harness-archive-perl adcli libsasl2-modules-ldap tcl-tclreadline 160s Recommended packages: 160s cracklib-runtime libsasl2-modules-gssapi-mit 160s | libsasl2-modules-gssapi-heimdal 160s The following packages will be REMOVED: 160s libcurl4 libdb5.3 libgdbm-compat4 libgdbm6 libgnutls30 libhogweed6 160s libnettle8 libperl5.38 libpsl5 libtirpc3 160s The following NEW packages will be installed: 160s autopkgtest-satdep expect ldap-utils libavahi-client3 libavahi-common-data 160s libavahi-common3 libbasicobjects0t64 libc-ares2 libcollection4t64 libcrack2 160s libcurl4t64 libdb5.3t64 libdhash1t64 libevent-2.1-7 libgdbm-compat4t64 160s libgdbm6t64 libgnutls30t64 libhogweed6t64 libini-config5t64 libipa-hbac-dev 160s libipa-hbac0t64 libjose0 libkrad0 libldb2 libltdl7 libnettle8t64 160s libnfsidmap1 libnss-sss libnss-sudo libodbc2 libpam-pwquality libpam-sss 160s libpath-utils1t64 libperl5.38t64 libpsl5t64 libpwquality-common 160s libpwquality1 libref-array1t64 libsmbclient0 libsss-certmap-dev 160s libsss-certmap0 libsss-idmap-dev libsss-idmap0 libsss-nss-idmap-dev 160s libsss-nss-idmap0 libsss-sudo libtalloc2 libtcl8.6 libtdb1 libtevent0t64 160s libtirpc3t64 libverto-libevent1t64 libverto1t64 libwbclient0 160s python3-libipa-hbac python3-libsss-nss-idmap python3-sss samba-libs slapd 160s sssd sssd-ad sssd-ad-common sssd-common sssd-dbus sssd-idp sssd-ipa sssd-kcm 160s sssd-krb5 sssd-krb5-common sssd-ldap sssd-passkey sssd-proxy sssd-tools 160s tcl-expect tcl8.6 160s The following packages will be upgraded: 160s curl krb5-locales libevent-core-2.1-7 libgssapi-krb5-2 libk5crypto3 160s libkrb5-3 libkrb5support0 libldap-common libldap2 perl perl-base 160s perl-modules-5.38 sudo 160s 13 upgraded, 75 newly installed, 10 to remove and 225 not upgraded. 160s Need to get 30.0 MB/30.0 MB of archives. 160s After this operation, 71.0 MB of additional disk space will be used. 160s Get:1 /tmp/autopkgtest.wAitdz/1-autopkgtest-satdep.deb autopkgtest-satdep ppc64el 0 [876 B] 160s Get:2 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libdb5.3t64 ppc64el 5.3.28+dfsg2-5build1 [868 kB] 160s Get:3 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libgdbm6t64 ppc64el 1.23-5.1 [41.9 kB] 160s Get:4 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libgdbm-compat4t64 ppc64el 1.23-5.1 [6972 B] 160s Get:5 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libperl5.38t64 ppc64el 5.38.2-3.2 [4957 kB] 161s Get:6 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el perl ppc64el 5.38.2-3.2 [231 kB] 161s Get:7 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el perl-base ppc64el 5.38.2-3.2 [1916 kB] 161s Get:8 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el perl-modules-5.38 all 5.38.2-3.2 [3110 kB] 161s Get:9 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libgssapi-krb5-2 ppc64el 1.20.1-5.1build3 [185 kB] 161s Get:10 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libkrb5-3 ppc64el 1.20.1-5.1build3 [432 kB] 161s Get:11 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libkrb5support0 ppc64el 1.20.1-5.1build3 [38.5 kB] 161s Get:12 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libk5crypto3 ppc64el 1.20.1-5.1build3 [108 kB] 161s Get:13 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libnettle8t64 ppc64el 3.9.1-2.2 [226 kB] 161s Get:14 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libhogweed6t64 ppc64el 3.9.1-2.2 [208 kB] 161s Get:15 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libgnutls30t64 ppc64el 3.8.3-1.1ubuntu2 [1154 kB] 161s Get:16 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libldap2 ppc64el 2.6.7+dfsg-1~exp1ubuntu6 [233 kB] 161s Get:17 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libpsl5t64 ppc64el 0.21.2-1.1 [59.0 kB] 161s Get:18 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el curl ppc64el 8.5.0-2ubuntu7 [234 kB] 161s Get:19 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libcurl4t64 ppc64el 8.5.0-2ubuntu7 [428 kB] 161s Get:20 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libtirpc3t64 ppc64el 1.3.4+ds-1.1 [102 kB] 161s Get:21 http://ftpmaster.internal/ubuntu noble/main ppc64el libltdl7 ppc64el 2.4.7-7 [48.0 kB] 161s Get:22 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libodbc2 ppc64el 2.3.12-1build1 [188 kB] 161s Get:23 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el slapd ppc64el 2.6.7+dfsg-1~exp1ubuntu6 [1768 kB] 161s Get:24 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el krb5-locales all 1.20.1-5.1build3 [13.8 kB] 161s Get:25 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el sudo ppc64el 1.9.15p5-3ubuntu3 [1005 kB] 161s Get:26 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libtcl8.6 ppc64el 8.6.14+dfsg-1 [1204 kB] 161s Get:27 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el tcl8.6 ppc64el 8.6.14+dfsg-1 [14.8 kB] 161s Get:28 http://ftpmaster.internal/ubuntu noble/universe ppc64el tcl-expect ppc64el 5.45.4-2build1 [112 kB] 161s Get:29 http://ftpmaster.internal/ubuntu noble/universe ppc64el expect ppc64el 5.45.4-2build1 [137 kB] 161s Get:30 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el ldap-utils ppc64el 2.6.7+dfsg-1~exp1ubuntu6 [155 kB] 161s Get:31 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libavahi-common-data ppc64el 0.8-13ubuntu4 [29.6 kB] 161s Get:32 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libavahi-common3 ppc64el 0.8-13ubuntu4 [26.3 kB] 161s Get:33 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libavahi-client3 ppc64el 0.8-13ubuntu4 [30.8 kB] 161s Get:34 http://ftpmaster.internal/ubuntu noble/main ppc64el libbasicobjects0t64 ppc64el 0.6.2-2.1 [6118 B] 161s Get:35 http://ftpmaster.internal/ubuntu noble/main ppc64el libcollection4t64 ppc64el 0.6.2-2.1 [36.4 kB] 161s Get:36 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libcrack2 ppc64el 2.9.6-5.1build1 [31.1 kB] 161s Get:37 http://ftpmaster.internal/ubuntu noble/main ppc64el libdhash1t64 ppc64el 0.6.2-2.1 [10.4 kB] 161s Get:38 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libevent-2.1-7 ppc64el 2.1.12-stable-9build1 [174 kB] 161s Get:39 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libevent-core-2.1-7 ppc64el 2.1.12-stable-9build1 [110 kB] 161s Get:40 http://ftpmaster.internal/ubuntu noble/main ppc64el libpath-utils1t64 ppc64el 0.6.2-2.1 [10.6 kB] 161s Get:41 http://ftpmaster.internal/ubuntu noble/main ppc64el libref-array1t64 ppc64el 0.6.2-2.1 [8130 B] 161s Get:42 http://ftpmaster.internal/ubuntu noble/main ppc64el libini-config5t64 ppc64el 0.6.2-2.1 [55.2 kB] 161s Get:43 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libipa-hbac0t64 ppc64el 2.9.4-1.1ubuntu3 [17.8 kB] 161s Get:44 http://ftpmaster.internal/ubuntu noble-proposed/universe ppc64el libjose0 ppc64el 11-3build1 [51.3 kB] 161s Get:45 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libverto-libevent1t64 ppc64el 0.3.1-1.2ubuntu1 [6422 B] 161s Get:46 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libverto1t64 ppc64el 0.3.1-1.2ubuntu1 [12.1 kB] 161s Get:47 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libkrad0 ppc64el 1.20.1-5.1build3 [24.8 kB] 161s Get:48 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libldap-common all 2.6.7+dfsg-1~exp1ubuntu6 [31.3 kB] 161s Get:49 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libtalloc2 ppc64el 2.4.2-1build1 [36.7 kB] 161s Get:50 http://ftpmaster.internal/ubuntu noble/main ppc64el libtdb1 ppc64el 1.4.10-1 [62.7 kB] 161s Get:51 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libtevent0t64 ppc64el 0.16.1-2 [51.1 kB] 161s Get:52 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libldb2 ppc64el 2:2.8.0+samba4.19.5+dfsg-4ubuntu4 [220 kB] 161s Get:53 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libnfsidmap1 ppc64el 1:2.6.4-3ubuntu3 [54.5 kB] 161s Get:54 http://ftpmaster.internal/ubuntu noble-proposed/universe ppc64el libnss-sudo all 1.9.15p5-3ubuntu3 [15.1 kB] 161s Get:55 http://ftpmaster.internal/ubuntu noble/main ppc64el libpwquality-common all 1.4.5-3 [7658 B] 161s Get:56 http://ftpmaster.internal/ubuntu noble/main ppc64el libpwquality1 ppc64el 1.4.5-3 [16.9 kB] 161s Get:57 http://ftpmaster.internal/ubuntu noble/main ppc64el libpam-pwquality ppc64el 1.4.5-3 [12.5 kB] 161s Get:58 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libwbclient0 ppc64el 2:4.19.5+dfsg-4ubuntu4 [77.1 kB] 161s Get:59 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el samba-libs ppc64el 2:4.19.5+dfsg-4ubuntu4 [6674 kB] 162s Get:60 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libsmbclient0 ppc64el 2:4.19.5+dfsg-4ubuntu4 [70.3 kB] 162s Get:61 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libnss-sss ppc64el 2.9.4-1.1ubuntu3 [36.4 kB] 162s Get:62 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libpam-sss ppc64el 2.9.4-1.1ubuntu3 [56.6 kB] 162s Get:63 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el python3-sss ppc64el 2.9.4-1.1ubuntu3 [48.2 kB] 162s Get:64 http://ftpmaster.internal/ubuntu noble/main ppc64el libc-ares2 ppc64el 1.27.0-1 [99.0 kB] 162s Get:65 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libsss-certmap0 ppc64el 2.9.4-1.1ubuntu3 [53.9 kB] 162s Get:66 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libsss-idmap0 ppc64el 2.9.4-1.1ubuntu3 [24.9 kB] 162s Get:67 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libsss-nss-idmap0 ppc64el 2.9.4-1.1ubuntu3 [37.5 kB] 162s Get:68 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el sssd-common ppc64el 2.9.4-1.1ubuntu3 [1280 kB] 162s Get:69 http://ftpmaster.internal/ubuntu noble-proposed/universe ppc64el sssd-idp ppc64el 2.9.4-1.1ubuntu3 [30.8 kB] 162s Get:70 http://ftpmaster.internal/ubuntu noble-proposed/universe ppc64el sssd-passkey ppc64el 2.9.4-1.1ubuntu3 [35.4 kB] 162s Get:71 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el sssd-ad-common ppc64el 2.9.4-1.1ubuntu3 [88.6 kB] 162s Get:72 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el sssd-krb5-common ppc64el 2.9.4-1.1ubuntu3 [103 kB] 162s Get:73 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el sssd-ad ppc64el 2.9.4-1.1ubuntu3 [147 kB] 162s Get:74 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el sssd-ipa ppc64el 2.9.4-1.1ubuntu3 [240 kB] 162s Get:75 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el sssd-krb5 ppc64el 2.9.4-1.1ubuntu3 [14.4 kB] 162s Get:76 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el sssd-ldap ppc64el 2.9.4-1.1ubuntu3 [31.6 kB] 162s Get:77 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el sssd-proxy ppc64el 2.9.4-1.1ubuntu3 [47.9 kB] 162s Get:78 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el sssd ppc64el 2.9.4-1.1ubuntu3 [4122 B] 162s Get:79 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el sssd-dbus ppc64el 2.9.4-1.1ubuntu3 [122 kB] 162s Get:80 http://ftpmaster.internal/ubuntu noble-proposed/universe ppc64el sssd-kcm ppc64el 2.9.4-1.1ubuntu3 [160 kB] 162s Get:81 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el sssd-tools ppc64el 2.9.4-1.1ubuntu3 [108 kB] 162s Get:82 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libipa-hbac-dev ppc64el 2.9.4-1.1ubuntu3 [6672 B] 162s Get:83 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libsss-certmap-dev ppc64el 2.9.4-1.1ubuntu3 [5742 B] 162s Get:84 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libsss-idmap-dev ppc64el 2.9.4-1.1ubuntu3 [8390 B] 162s Get:85 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libsss-nss-idmap-dev ppc64el 2.9.4-1.1ubuntu3 [6718 B] 162s Get:86 http://ftpmaster.internal/ubuntu noble-proposed/universe ppc64el libsss-sudo ppc64el 2.9.4-1.1ubuntu3 [22.6 kB] 162s Get:87 http://ftpmaster.internal/ubuntu noble-proposed/universe ppc64el python3-libipa-hbac ppc64el 2.9.4-1.1ubuntu3 [19.2 kB] 162s Get:88 http://ftpmaster.internal/ubuntu noble-proposed/universe ppc64el python3-libsss-nss-idmap ppc64el 2.9.4-1.1ubuntu3 [9542 B] 162s Preconfiguring packages ... 162s Fetched 30.0 MB in 2s (14.0 MB/s) 162s dpkg: libperl5.38:ppc64el: dependency problems, but removing anyway as you requested: 162s perl depends on libperl5.38 (= 5.38.2-3). 162s 162s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 70105 files and directories currently installed.) 162s Removing libperl5.38:ppc64el (5.38.2-3) ... 162s dpkg: libdb5.3:ppc64el: dependency problems, but removing anyway as you requested: 162s libsasl2-modules-db:ppc64el depends on libdb5.3. 162s libpython3.12-stdlib:ppc64el depends on libdb5.3. 162s libpython3.11-stdlib:ppc64el depends on libdb5.3. 162s libpam-modules:ppc64el depends on libdb5.3. 162s iproute2 depends on libdb5.3. 162s apt-utils depends on libdb5.3. 162s 162s Removing libdb5.3:ppc64el (5.3.28+dfsg2-4) ... 162s Selecting previously unselected package libdb5.3t64:ppc64el. 162s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 69576 files and directories currently installed.) 162s Preparing to unpack .../libdb5.3t64_5.3.28+dfsg2-5build1_ppc64el.deb ... 162s Unpacking libdb5.3t64:ppc64el (5.3.28+dfsg2-5build1) ... 162s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 69582 files and directories currently installed.) 162s Removing libgdbm-compat4:ppc64el (1.23-5) ... 162s dpkg: libgdbm6:ppc64el: dependency problems, but removing anyway as you requested: 162s python3-gdbm:ppc64el depends on libgdbm6 (>= 1.16). 162s man-db depends on libgdbm6 (>= 1.16). 162s 162s Removing libgdbm6:ppc64el (1.23-5) ... 162s Selecting previously unselected package libgdbm6t64:ppc64el. 162s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 69572 files and directories currently installed.) 162s Preparing to unpack .../libgdbm6t64_1.23-5.1_ppc64el.deb ... 162s Unpacking libgdbm6t64:ppc64el (1.23-5.1) ... 162s Selecting previously unselected package libgdbm-compat4t64:ppc64el. 163s Preparing to unpack .../libgdbm-compat4t64_1.23-5.1_ppc64el.deb ... 163s Unpacking libgdbm-compat4t64:ppc64el (1.23-5.1) ... 163s Selecting previously unselected package libperl5.38t64:ppc64el. 163s Preparing to unpack .../libperl5.38t64_5.38.2-3.2_ppc64el.deb ... 163s Unpacking libperl5.38t64:ppc64el (5.38.2-3.2) ... 163s Preparing to unpack .../perl_5.38.2-3.2_ppc64el.deb ... 163s Unpacking perl (5.38.2-3.2) over (5.38.2-3) ... 163s Preparing to unpack .../perl-base_5.38.2-3.2_ppc64el.deb ... 163s Unpacking perl-base (5.38.2-3.2) over (5.38.2-3) ... 163s Setting up perl-base (5.38.2-3.2) ... 163s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 70107 files and directories currently installed.) 163s Preparing to unpack .../perl-modules-5.38_5.38.2-3.2_all.deb ... 163s Unpacking perl-modules-5.38 (5.38.2-3.2) over (5.38.2-3) ... 164s Preparing to unpack .../libgssapi-krb5-2_1.20.1-5.1build3_ppc64el.deb ... 164s Unpacking libgssapi-krb5-2:ppc64el (1.20.1-5.1build3) over (1.20.1-5build1) ... 164s Preparing to unpack .../libkrb5-3_1.20.1-5.1build3_ppc64el.deb ... 164s Unpacking libkrb5-3:ppc64el (1.20.1-5.1build3) over (1.20.1-5build1) ... 164s Preparing to unpack .../libkrb5support0_1.20.1-5.1build3_ppc64el.deb ... 164s Unpacking libkrb5support0:ppc64el (1.20.1-5.1build3) over (1.20.1-5build1) ... 164s Preparing to unpack .../libk5crypto3_1.20.1-5.1build3_ppc64el.deb ... 164s Unpacking libk5crypto3:ppc64el (1.20.1-5.1build3) over (1.20.1-5build1) ... 164s dpkg: libhogweed6:ppc64el: dependency problems, but removing anyway as you requested: 164s librtmp1:ppc64el depends on libhogweed6. 164s libjcat1:ppc64el depends on libhogweed6. 164s libgnutls30:ppc64el depends on libhogweed6 (>= 3.6). 164s 164s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 70107 files and directories currently installed.) 164s Removing libhogweed6:ppc64el (3.9.1-2) ... 164s dpkg: libnettle8:ppc64el: dependency problems, but removing anyway as you requested: 164s librtmp1:ppc64el depends on libnettle8. 164s libgnutls30:ppc64el depends on libnettle8 (>= 3.9~). 164s libcurl3-gnutls:ppc64el depends on libnettle8. 164s libarchive13:ppc64el depends on libnettle8. 164s 164s Removing libnettle8:ppc64el (3.9.1-2) ... 164s Selecting previously unselected package libnettle8t64:ppc64el. 164s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 70095 files and directories currently installed.) 164s Preparing to unpack .../libnettle8t64_3.9.1-2.2_ppc64el.deb ... 164s Unpacking libnettle8t64:ppc64el (3.9.1-2.2) ... 164s Selecting previously unselected package libhogweed6t64:ppc64el. 164s Preparing to unpack .../libhogweed6t64_3.9.1-2.2_ppc64el.deb ... 164s Unpacking libhogweed6t64:ppc64el (3.9.1-2.2) ... 164s dpkg: libgnutls30:ppc64el: dependency problems, but removing anyway as you requested: 164s librtmp1:ppc64el depends on libgnutls30 (>= 3.7.2). 164s libldap2:ppc64el depends on libgnutls30 (>= 3.8.2). 164s libjcat1:ppc64el depends on libgnutls30 (>= 3.7.3). 164s libcurl3-gnutls:ppc64el depends on libgnutls30 (>= 3.8.2). 164s fwupd depends on libgnutls30 (>= 3.7.3). 164s dirmngr depends on libgnutls30 (>= 3.8.1). 164s apt depends on libgnutls30 (>= 3.8.1). 164s 164s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 70109 files and directories currently installed.) 164s Removing libgnutls30:ppc64el (3.8.3-1ubuntu1) ... 164s Selecting previously unselected package libgnutls30t64:ppc64el. 164s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 70100 files and directories currently installed.) 164s Preparing to unpack .../libgnutls30t64_3.8.3-1.1ubuntu2_ppc64el.deb ... 164s Unpacking libgnutls30t64:ppc64el (3.8.3-1.1ubuntu2) ... 164s Setting up libnettle8t64:ppc64el (3.9.1-2.2) ... 164s Setting up libhogweed6t64:ppc64el (3.9.1-2.2) ... 164s Setting up libgnutls30t64:ppc64el (3.8.3-1.1ubuntu2) ... 164s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 70128 files and directories currently installed.) 164s Preparing to unpack .../libldap2_2.6.7+dfsg-1~exp1ubuntu6_ppc64el.deb ... 164s Unpacking libldap2:ppc64el (2.6.7+dfsg-1~exp1ubuntu6) over (2.6.7+dfsg-1~exp1ubuntu1) ... 164s dpkg: libpsl5:ppc64el: dependency problems, but removing anyway as you requested: 164s wget depends on libpsl5 (>= 0.16.0). 164s libcurl4:ppc64el depends on libpsl5 (>= 0.16.0). 164s libcurl3-gnutls:ppc64el depends on libpsl5 (>= 0.16.0). 164s 164s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 70128 files and directories currently installed.) 164s Removing libpsl5:ppc64el (0.21.2-1build1) ... 164s Selecting previously unselected package libpsl5t64:ppc64el. 164s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 70123 files and directories currently installed.) 164s Preparing to unpack .../libpsl5t64_0.21.2-1.1_ppc64el.deb ... 164s Unpacking libpsl5t64:ppc64el (0.21.2-1.1) ... 164s Preparing to unpack .../curl_8.5.0-2ubuntu7_ppc64el.deb ... 164s Unpacking curl (8.5.0-2ubuntu7) over (8.5.0-2ubuntu2) ... 164s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 70129 files and directories currently installed.) 164s Removing libcurl4:ppc64el (8.5.0-2ubuntu2) ... 164s Selecting previously unselected package libcurl4t64:ppc64el. 164s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 70124 files and directories currently installed.) 164s Preparing to unpack .../libcurl4t64_8.5.0-2ubuntu7_ppc64el.deb ... 164s Unpacking libcurl4t64:ppc64el (8.5.0-2ubuntu7) ... 164s dpkg: libtirpc3:ppc64el: dependency problems, but removing anyway as you requested: 164s lsof depends on libtirpc3 (>= 1.0.2). 164s libpython3.12-stdlib:ppc64el depends on libtirpc3 (>= 1.0.2). 164s libpython3.11-stdlib:ppc64el depends on libtirpc3 (>= 1.0.2). 164s libnsl2:ppc64el depends on libtirpc3 (>= 1.0.2). 164s iproute2 depends on libtirpc3 (>= 1.0.2). 164s 164s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 70130 files and directories currently installed.) 164s Removing libtirpc3:ppc64el (1.3.4+ds-1build1) ... 164s Selecting previously unselected package libtirpc3t64:ppc64el. 164s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 70124 files and directories currently installed.) 164s Preparing to unpack .../00-libtirpc3t64_1.3.4+ds-1.1_ppc64el.deb ... 164s Adding 'diversion of /lib/powerpc64le-linux-gnu/libtirpc.so.3 to /lib/powerpc64le-linux-gnu/libtirpc.so.3.usr-is-merged by libtirpc3t64' 164s Adding 'diversion of /lib/powerpc64le-linux-gnu/libtirpc.so.3.0.0 to /lib/powerpc64le-linux-gnu/libtirpc.so.3.0.0.usr-is-merged by libtirpc3t64' 164s Unpacking libtirpc3t64:ppc64el (1.3.4+ds-1.1) ... 164s Selecting previously unselected package libltdl7:ppc64el. 164s Preparing to unpack .../01-libltdl7_2.4.7-7_ppc64el.deb ... 164s Unpacking libltdl7:ppc64el (2.4.7-7) ... 164s Selecting previously unselected package libodbc2:ppc64el. 164s Preparing to unpack .../02-libodbc2_2.3.12-1build1_ppc64el.deb ... 164s Unpacking libodbc2:ppc64el (2.3.12-1build1) ... 164s Selecting previously unselected package slapd. 164s Preparing to unpack .../03-slapd_2.6.7+dfsg-1~exp1ubuntu6_ppc64el.deb ... 165s Unpacking slapd (2.6.7+dfsg-1~exp1ubuntu6) ... 165s Preparing to unpack .../04-krb5-locales_1.20.1-5.1build3_all.deb ... 165s Unpacking krb5-locales (1.20.1-5.1build3) over (1.20.1-5build1) ... 165s Preparing to unpack .../05-sudo_1.9.15p5-3ubuntu3_ppc64el.deb ... 165s Unpacking sudo (1.9.15p5-3ubuntu3) over (1.9.15p5-3ubuntu1) ... 165s Selecting previously unselected package libtcl8.6:ppc64el. 165s Preparing to unpack .../06-libtcl8.6_8.6.14+dfsg-1_ppc64el.deb ... 165s Unpacking libtcl8.6:ppc64el (8.6.14+dfsg-1) ... 165s Selecting previously unselected package tcl8.6. 165s Preparing to unpack .../07-tcl8.6_8.6.14+dfsg-1_ppc64el.deb ... 165s Unpacking tcl8.6 (8.6.14+dfsg-1) ... 165s Selecting previously unselected package tcl-expect:ppc64el. 165s Preparing to unpack .../08-tcl-expect_5.45.4-2build1_ppc64el.deb ... 165s Unpacking tcl-expect:ppc64el (5.45.4-2build1) ... 165s Selecting previously unselected package expect. 165s Preparing to unpack .../09-expect_5.45.4-2build1_ppc64el.deb ... 165s Unpacking expect (5.45.4-2build1) ... 165s Selecting previously unselected package ldap-utils. 165s Preparing to unpack .../10-ldap-utils_2.6.7+dfsg-1~exp1ubuntu6_ppc64el.deb ... 165s Unpacking ldap-utils (2.6.7+dfsg-1~exp1ubuntu6) ... 165s Selecting previously unselected package libavahi-common-data:ppc64el. 165s Preparing to unpack .../11-libavahi-common-data_0.8-13ubuntu4_ppc64el.deb ... 165s Unpacking libavahi-common-data:ppc64el (0.8-13ubuntu4) ... 165s Selecting previously unselected package libavahi-common3:ppc64el. 165s Preparing to unpack .../12-libavahi-common3_0.8-13ubuntu4_ppc64el.deb ... 165s Unpacking libavahi-common3:ppc64el (0.8-13ubuntu4) ... 165s Selecting previously unselected package libavahi-client3:ppc64el. 165s Preparing to unpack .../13-libavahi-client3_0.8-13ubuntu4_ppc64el.deb ... 165s Unpacking libavahi-client3:ppc64el (0.8-13ubuntu4) ... 165s Selecting previously unselected package libbasicobjects0t64:ppc64el. 165s Preparing to unpack .../14-libbasicobjects0t64_0.6.2-2.1_ppc64el.deb ... 165s Unpacking libbasicobjects0t64:ppc64el (0.6.2-2.1) ... 165s Selecting previously unselected package libcollection4t64:ppc64el. 165s Preparing to unpack .../15-libcollection4t64_0.6.2-2.1_ppc64el.deb ... 165s Unpacking libcollection4t64:ppc64el (0.6.2-2.1) ... 165s Selecting previously unselected package libcrack2:ppc64el. 165s Preparing to unpack .../16-libcrack2_2.9.6-5.1build1_ppc64el.deb ... 165s Unpacking libcrack2:ppc64el (2.9.6-5.1build1) ... 165s Selecting previously unselected package libdhash1t64:ppc64el. 165s Preparing to unpack .../17-libdhash1t64_0.6.2-2.1_ppc64el.deb ... 165s Unpacking libdhash1t64:ppc64el (0.6.2-2.1) ... 165s Selecting previously unselected package libevent-2.1-7:ppc64el. 165s Preparing to unpack .../18-libevent-2.1-7_2.1.12-stable-9build1_ppc64el.deb ... 165s Unpacking libevent-2.1-7:ppc64el (2.1.12-stable-9build1) ... 165s Preparing to unpack .../19-libevent-core-2.1-7_2.1.12-stable-9build1_ppc64el.deb ... 165s Unpacking libevent-core-2.1-7:ppc64el (2.1.12-stable-9build1) over (2.1.12-stable-9) ... 165s Selecting previously unselected package libpath-utils1t64:ppc64el. 165s Preparing to unpack .../20-libpath-utils1t64_0.6.2-2.1_ppc64el.deb ... 165s Unpacking libpath-utils1t64:ppc64el (0.6.2-2.1) ... 165s Selecting previously unselected package libref-array1t64:ppc64el. 165s Preparing to unpack .../21-libref-array1t64_0.6.2-2.1_ppc64el.deb ... 165s Unpacking libref-array1t64:ppc64el (0.6.2-2.1) ... 165s Selecting previously unselected package libini-config5t64:ppc64el. 165s Preparing to unpack .../22-libini-config5t64_0.6.2-2.1_ppc64el.deb ... 165s Unpacking libini-config5t64:ppc64el (0.6.2-2.1) ... 165s Selecting previously unselected package libipa-hbac0t64. 165s Preparing to unpack .../23-libipa-hbac0t64_2.9.4-1.1ubuntu3_ppc64el.deb ... 165s Unpacking libipa-hbac0t64 (2.9.4-1.1ubuntu3) ... 165s Selecting previously unselected package libjose0:ppc64el. 165s Preparing to unpack .../24-libjose0_11-3build1_ppc64el.deb ... 165s Unpacking libjose0:ppc64el (11-3build1) ... 165s Selecting previously unselected package libverto-libevent1t64:ppc64el. 165s Preparing to unpack .../25-libverto-libevent1t64_0.3.1-1.2ubuntu1_ppc64el.deb ... 165s Unpacking libverto-libevent1t64:ppc64el (0.3.1-1.2ubuntu1) ... 165s Selecting previously unselected package libverto1t64:ppc64el. 165s Preparing to unpack .../26-libverto1t64_0.3.1-1.2ubuntu1_ppc64el.deb ... 165s Unpacking libverto1t64:ppc64el (0.3.1-1.2ubuntu1) ... 165s Selecting previously unselected package libkrad0:ppc64el. 165s Preparing to unpack .../27-libkrad0_1.20.1-5.1build3_ppc64el.deb ... 165s Unpacking libkrad0:ppc64el (1.20.1-5.1build3) ... 165s Preparing to unpack .../28-libldap-common_2.6.7+dfsg-1~exp1ubuntu6_all.deb ... 165s Unpacking libldap-common (2.6.7+dfsg-1~exp1ubuntu6) over (2.6.7+dfsg-1~exp1ubuntu1) ... 165s Selecting previously unselected package libtalloc2:ppc64el. 165s Preparing to unpack .../29-libtalloc2_2.4.2-1build1_ppc64el.deb ... 165s Unpacking libtalloc2:ppc64el (2.4.2-1build1) ... 165s Selecting previously unselected package libtdb1:ppc64el. 165s Preparing to unpack .../30-libtdb1_1.4.10-1_ppc64el.deb ... 165s Unpacking libtdb1:ppc64el (1.4.10-1) ... 165s Selecting previously unselected package libtevent0t64:ppc64el. 165s Preparing to unpack .../31-libtevent0t64_0.16.1-2_ppc64el.deb ... 165s Unpacking libtevent0t64:ppc64el (0.16.1-2) ... 165s Selecting previously unselected package libldb2:ppc64el. 165s Preparing to unpack .../32-libldb2_2%3a2.8.0+samba4.19.5+dfsg-4ubuntu4_ppc64el.deb ... 165s Unpacking libldb2:ppc64el (2:2.8.0+samba4.19.5+dfsg-4ubuntu4) ... 165s Selecting previously unselected package libnfsidmap1:ppc64el. 165s Preparing to unpack .../33-libnfsidmap1_1%3a2.6.4-3ubuntu3_ppc64el.deb ... 165s Unpacking libnfsidmap1:ppc64el (1:2.6.4-3ubuntu3) ... 165s Selecting previously unselected package libnss-sudo. 165s Preparing to unpack .../34-libnss-sudo_1.9.15p5-3ubuntu3_all.deb ... 165s Unpacking libnss-sudo (1.9.15p5-3ubuntu3) ... 165s Selecting previously unselected package libpwquality-common. 165s Preparing to unpack .../35-libpwquality-common_1.4.5-3_all.deb ... 165s Unpacking libpwquality-common (1.4.5-3) ... 165s Selecting previously unselected package libpwquality1:ppc64el. 165s Preparing to unpack .../36-libpwquality1_1.4.5-3_ppc64el.deb ... 165s Unpacking libpwquality1:ppc64el (1.4.5-3) ... 165s Selecting previously unselected package libpam-pwquality:ppc64el. 165s Preparing to unpack .../37-libpam-pwquality_1.4.5-3_ppc64el.deb ... 165s Unpacking libpam-pwquality:ppc64el (1.4.5-3) ... 165s Selecting previously unselected package libwbclient0:ppc64el. 165s Preparing to unpack .../38-libwbclient0_2%3a4.19.5+dfsg-4ubuntu4_ppc64el.deb ... 165s Unpacking libwbclient0:ppc64el (2:4.19.5+dfsg-4ubuntu4) ... 165s Selecting previously unselected package samba-libs:ppc64el. 165s Preparing to unpack .../39-samba-libs_2%3a4.19.5+dfsg-4ubuntu4_ppc64el.deb ... 165s Unpacking samba-libs:ppc64el (2:4.19.5+dfsg-4ubuntu4) ... 166s Selecting previously unselected package libsmbclient0:ppc64el. 166s Preparing to unpack .../40-libsmbclient0_2%3a4.19.5+dfsg-4ubuntu4_ppc64el.deb ... 166s Unpacking libsmbclient0:ppc64el (2:4.19.5+dfsg-4ubuntu4) ... 166s Selecting previously unselected package libnss-sss:ppc64el. 166s Preparing to unpack .../41-libnss-sss_2.9.4-1.1ubuntu3_ppc64el.deb ... 166s Unpacking libnss-sss:ppc64el (2.9.4-1.1ubuntu3) ... 166s Selecting previously unselected package libpam-sss:ppc64el. 166s Preparing to unpack .../42-libpam-sss_2.9.4-1.1ubuntu3_ppc64el.deb ... 166s Unpacking libpam-sss:ppc64el (2.9.4-1.1ubuntu3) ... 166s Selecting previously unselected package python3-sss. 166s Preparing to unpack .../43-python3-sss_2.9.4-1.1ubuntu3_ppc64el.deb ... 166s Unpacking python3-sss (2.9.4-1.1ubuntu3) ... 166s Selecting previously unselected package libc-ares2:ppc64el. 166s Preparing to unpack .../44-libc-ares2_1.27.0-1_ppc64el.deb ... 166s Unpacking libc-ares2:ppc64el (1.27.0-1) ... 166s Selecting previously unselected package libsss-certmap0. 166s Preparing to unpack .../45-libsss-certmap0_2.9.4-1.1ubuntu3_ppc64el.deb ... 166s Unpacking libsss-certmap0 (2.9.4-1.1ubuntu3) ... 166s Selecting previously unselected package libsss-idmap0. 166s Preparing to unpack .../46-libsss-idmap0_2.9.4-1.1ubuntu3_ppc64el.deb ... 166s Unpacking libsss-idmap0 (2.9.4-1.1ubuntu3) ... 166s Selecting previously unselected package libsss-nss-idmap0. 166s Preparing to unpack .../47-libsss-nss-idmap0_2.9.4-1.1ubuntu3_ppc64el.deb ... 166s Unpacking libsss-nss-idmap0 (2.9.4-1.1ubuntu3) ... 166s Selecting previously unselected package sssd-common. 166s Preparing to unpack .../48-sssd-common_2.9.4-1.1ubuntu3_ppc64el.deb ... 166s Unpacking sssd-common (2.9.4-1.1ubuntu3) ... 166s Selecting previously unselected package sssd-idp. 166s Preparing to unpack .../49-sssd-idp_2.9.4-1.1ubuntu3_ppc64el.deb ... 166s Unpacking sssd-idp (2.9.4-1.1ubuntu3) ... 166s Selecting previously unselected package sssd-passkey. 166s Preparing to unpack .../50-sssd-passkey_2.9.4-1.1ubuntu3_ppc64el.deb ... 166s Unpacking sssd-passkey (2.9.4-1.1ubuntu3) ... 166s Selecting previously unselected package sssd-ad-common. 166s Preparing to unpack .../51-sssd-ad-common_2.9.4-1.1ubuntu3_ppc64el.deb ... 166s Unpacking sssd-ad-common (2.9.4-1.1ubuntu3) ... 166s Selecting previously unselected package sssd-krb5-common. 166s Preparing to unpack .../52-sssd-krb5-common_2.9.4-1.1ubuntu3_ppc64el.deb ... 166s Unpacking sssd-krb5-common (2.9.4-1.1ubuntu3) ... 166s Selecting previously unselected package sssd-ad. 166s Preparing to unpack .../53-sssd-ad_2.9.4-1.1ubuntu3_ppc64el.deb ... 166s Unpacking sssd-ad (2.9.4-1.1ubuntu3) ... 166s Selecting previously unselected package sssd-ipa. 166s Preparing to unpack .../54-sssd-ipa_2.9.4-1.1ubuntu3_ppc64el.deb ... 166s Unpacking sssd-ipa (2.9.4-1.1ubuntu3) ... 166s Selecting previously unselected package sssd-krb5. 166s Preparing to unpack .../55-sssd-krb5_2.9.4-1.1ubuntu3_ppc64el.deb ... 166s Unpacking sssd-krb5 (2.9.4-1.1ubuntu3) ... 166s Selecting previously unselected package sssd-ldap. 166s Preparing to unpack .../56-sssd-ldap_2.9.4-1.1ubuntu3_ppc64el.deb ... 166s Unpacking sssd-ldap (2.9.4-1.1ubuntu3) ... 166s Selecting previously unselected package sssd-proxy. 166s Preparing to unpack .../57-sssd-proxy_2.9.4-1.1ubuntu3_ppc64el.deb ... 166s Unpacking sssd-proxy (2.9.4-1.1ubuntu3) ... 166s Selecting previously unselected package sssd. 166s Preparing to unpack .../58-sssd_2.9.4-1.1ubuntu3_ppc64el.deb ... 166s Unpacking sssd (2.9.4-1.1ubuntu3) ... 166s Selecting previously unselected package sssd-dbus. 166s Preparing to unpack .../59-sssd-dbus_2.9.4-1.1ubuntu3_ppc64el.deb ... 166s Unpacking sssd-dbus (2.9.4-1.1ubuntu3) ... 166s Selecting previously unselected package sssd-kcm. 166s Preparing to unpack .../60-sssd-kcm_2.9.4-1.1ubuntu3_ppc64el.deb ... 166s Unpacking sssd-kcm (2.9.4-1.1ubuntu3) ... 166s Selecting previously unselected package sssd-tools. 166s Preparing to unpack .../61-sssd-tools_2.9.4-1.1ubuntu3_ppc64el.deb ... 166s Unpacking sssd-tools (2.9.4-1.1ubuntu3) ... 166s Selecting previously unselected package libipa-hbac-dev. 166s Preparing to unpack .../62-libipa-hbac-dev_2.9.4-1.1ubuntu3_ppc64el.deb ... 166s Unpacking libipa-hbac-dev (2.9.4-1.1ubuntu3) ... 166s Selecting previously unselected package libsss-certmap-dev. 166s Preparing to unpack .../63-libsss-certmap-dev_2.9.4-1.1ubuntu3_ppc64el.deb ... 166s Unpacking libsss-certmap-dev (2.9.4-1.1ubuntu3) ... 166s Selecting previously unselected package libsss-idmap-dev. 166s Preparing to unpack .../64-libsss-idmap-dev_2.9.4-1.1ubuntu3_ppc64el.deb ... 166s Unpacking libsss-idmap-dev (2.9.4-1.1ubuntu3) ... 166s Selecting previously unselected package libsss-nss-idmap-dev. 166s Preparing to unpack .../65-libsss-nss-idmap-dev_2.9.4-1.1ubuntu3_ppc64el.deb ... 166s Unpacking libsss-nss-idmap-dev (2.9.4-1.1ubuntu3) ... 166s Selecting previously unselected package libsss-sudo. 166s Preparing to unpack .../66-libsss-sudo_2.9.4-1.1ubuntu3_ppc64el.deb ... 166s Unpacking libsss-sudo (2.9.4-1.1ubuntu3) ... 166s Selecting previously unselected package python3-libipa-hbac. 166s Preparing to unpack .../67-python3-libipa-hbac_2.9.4-1.1ubuntu3_ppc64el.deb ... 166s Unpacking python3-libipa-hbac (2.9.4-1.1ubuntu3) ... 166s Selecting previously unselected package python3-libsss-nss-idmap. 166s Preparing to unpack .../68-python3-libsss-nss-idmap_2.9.4-1.1ubuntu3_ppc64el.deb ... 166s Unpacking python3-libsss-nss-idmap (2.9.4-1.1ubuntu3) ... 166s Selecting previously unselected package autopkgtest-satdep. 166s Preparing to unpack .../69-1-autopkgtest-satdep.deb ... 166s Unpacking autopkgtest-satdep (0) ... 166s Setting up libpwquality-common (1.4.5-3) ... 166s Setting up libsss-idmap0 (2.9.4-1.1ubuntu3) ... 166s Setting up libgdbm6t64:ppc64el (1.23-5.1) ... 166s Setting up libgdbm-compat4t64:ppc64el (1.23-5.1) ... 166s Setting up libbasicobjects0t64:ppc64el (0.6.2-2.1) ... 166s Setting up libipa-hbac0t64 (2.9.4-1.1ubuntu3) ... 166s Setting up libsss-idmap-dev (2.9.4-1.1ubuntu3) ... 166s Setting up libref-array1t64:ppc64el (0.6.2-2.1) ... 166s Setting up libipa-hbac-dev (2.9.4-1.1ubuntu3) ... 166s Setting up libtdb1:ppc64el (1.4.10-1) ... 166s Setting up libcollection4t64:ppc64el (0.6.2-2.1) ... 166s Setting up libpsl5t64:ppc64el (0.21.2-1.1) ... 166s Setting up krb5-locales (1.20.1-5.1build3) ... 166s Setting up libc-ares2:ppc64el (1.27.0-1) ... 166s Setting up libldap-common (2.6.7+dfsg-1~exp1ubuntu6) ... 166s Setting up libjose0:ppc64el (11-3build1) ... 166s Setting up libwbclient0:ppc64el (2:4.19.5+dfsg-4ubuntu4) ... 166s Setting up libkrb5support0:ppc64el (1.20.1-5.1build3) ... 166s Setting up libtalloc2:ppc64el (2.4.2-1build1) ... 166s Setting up libpath-utils1t64:ppc64el (0.6.2-2.1) ... 166s Setting up libavahi-common-data:ppc64el (0.8-13ubuntu4) ... 166s Setting up perl-modules-5.38 (5.38.2-3.2) ... 166s Setting up libdhash1t64:ppc64el (0.6.2-2.1) ... 166s Setting up libevent-core-2.1-7:ppc64el (2.1.12-stable-9build1) ... 166s Setting up libevent-2.1-7:ppc64el (2.1.12-stable-9build1) ... 166s Setting up libtcl8.6:ppc64el (8.6.14+dfsg-1) ... 166s Setting up sudo (1.9.15p5-3ubuntu3) ... 166s Setting up libk5crypto3:ppc64el (1.20.1-5.1build3) ... 166s Setting up libltdl7:ppc64el (2.4.7-7) ... 166s Setting up libcrack2:ppc64el (2.9.6-5.1build1) ... 166s Setting up libdb5.3t64:ppc64el (5.3.28+dfsg2-5build1) ... 166s Setting up libodbc2:ppc64el (2.3.12-1build1) ... 166s Setting up python3-libipa-hbac (2.9.4-1.1ubuntu3) ... 166s Setting up libkrb5-3:ppc64el (1.20.1-5.1build3) ... 166s Setting up libperl5.38t64:ppc64el (5.38.2-3.2) ... 166s Setting up libnss-sudo (1.9.15p5-3ubuntu3) ... 166s Setting up libsss-nss-idmap0 (2.9.4-1.1ubuntu3) ... 166s Setting up libini-config5t64:ppc64el (0.6.2-2.1) ... 166s Setting up libldap2:ppc64el (2.6.7+dfsg-1~exp1ubuntu6) ... 166s Setting up libtevent0t64:ppc64el (0.16.1-2) ... 166s Setting up libnss-sss:ppc64el (2.9.4-1.1ubuntu3) ... 166s Setting up tcl8.6 (8.6.14+dfsg-1) ... 166s Setting up libnfsidmap1:ppc64el (1:2.6.4-3ubuntu3) ... 166s Setting up libsss-sudo (2.9.4-1.1ubuntu3) ... 166s Setting up libsss-nss-idmap-dev (2.9.4-1.1ubuntu3) ... 166s Setting up libavahi-common3:ppc64el (0.8-13ubuntu4) ... 166s Setting up tcl-expect:ppc64el (5.45.4-2build1) ... 166s Setting up ldap-utils (2.6.7+dfsg-1~exp1ubuntu6) ... 166s Setting up libsss-certmap0 (2.9.4-1.1ubuntu3) ... 166s Setting up perl (5.38.2-3.2) ... 166s Setting up libpwquality1:ppc64el (1.4.5-3) ... 166s Setting up libgssapi-krb5-2:ppc64el (1.20.1-5.1build3) ... 166s Setting up python3-libsss-nss-idmap (2.9.4-1.1ubuntu3) ... 166s Setting up libldb2:ppc64el (2:2.8.0+samba4.19.5+dfsg-4ubuntu4) ... 166s Setting up libavahi-client3:ppc64el (0.8-13ubuntu4) ... 166s Setting up slapd (2.6.7+dfsg-1~exp1ubuntu6) ... 167s Creating new user openldap... done. 167s Creating initial configuration... done. 167s Creating LDAP directory... done. 167s Setting up libcurl4t64:ppc64el (8.5.0-2ubuntu7) ... 167s Setting up libtirpc3t64:ppc64el (1.3.4+ds-1.1) ... 167s Setting up expect (5.45.4-2build1) ... 167s Setting up libpam-pwquality:ppc64el (1.4.5-3) ... 168s Setting up samba-libs:ppc64el (2:4.19.5+dfsg-4ubuntu4) ... 168s Setting up libsss-certmap-dev (2.9.4-1.1ubuntu3) ... 168s Setting up python3-sss (2.9.4-1.1ubuntu3) ... 168s Setting up curl (8.5.0-2ubuntu7) ... 168s Setting up libsmbclient0:ppc64el (2:4.19.5+dfsg-4ubuntu4) ... 168s Setting up libpam-sss:ppc64el (2.9.4-1.1ubuntu3) ... 168s Setting up sssd-common (2.9.4-1.1ubuntu3) ... 168s Creating SSSD system user & group... 168s warn: The home directory `/var/lib/sss' already exists. Not touching this directory. 168s warn: Warning: The home directory `/var/lib/sss' does not belong to the user you are currently creating. 168s Warning: found usr.sbin.sssd in /etc/apparmor.d/force-complain, forcing complain mode 168s Warning from /etc/apparmor.d/usr.sbin.sssd (/etc/apparmor.d/usr.sbin.sssd line 63): Caching disabled for: 'usr.sbin.sssd' due to force complain 169s Created symlink /etc/systemd/system/sssd.service.wants/sssd-autofs.socket → /usr/lib/systemd/system/sssd-autofs.socket. 169s Created symlink /etc/systemd/system/sssd.service.wants/sssd-nss.socket → /usr/lib/systemd/system/sssd-nss.socket. 169s Created symlink /etc/systemd/system/sssd.service.wants/sssd-pam-priv.socket → /usr/lib/systemd/system/sssd-pam-priv.socket. 169s Created symlink /etc/systemd/system/sssd.service.wants/sssd-pam.socket → /usr/lib/systemd/system/sssd-pam.socket. 170s Created symlink /etc/systemd/system/sssd.service.wants/sssd-ssh.socket → /usr/lib/systemd/system/sssd-ssh.socket. 170s Created symlink /etc/systemd/system/sssd.service.wants/sssd-sudo.socket → /usr/lib/systemd/system/sssd-sudo.socket. 170s Created symlink /etc/systemd/system/multi-user.target.wants/sssd.service → /usr/lib/systemd/system/sssd.service. 171s sssd-autofs.service is a disabled or a static unit, not starting it. 171s sssd-nss.service is a disabled or a static unit, not starting it. 171s sssd-pam.service is a disabled or a static unit, not starting it. 171s sssd-ssh.service is a disabled or a static unit, not starting it. 171s sssd-sudo.service is a disabled or a static unit, not starting it. 171s Could not execute systemctl: at /usr/bin/deb-systemd-invoke line 148. 171s Setting up sssd-proxy (2.9.4-1.1ubuntu3) ... 171s Setting up sssd-kcm (2.9.4-1.1ubuntu3) ... 171s Created symlink /etc/systemd/system/sockets.target.wants/sssd-kcm.socket → /usr/lib/systemd/system/sssd-kcm.socket. 172s sssd-kcm.service is a disabled or a static unit, not starting it. 172s Setting up sssd-dbus (2.9.4-1.1ubuntu3) ... 172s sssd-ifp.service is a disabled or a static unit, not starting it. 172s Setting up sssd-ad-common (2.9.4-1.1ubuntu3) ... 172s Created symlink /etc/systemd/system/sssd.service.wants/sssd-pac.socket → /usr/lib/systemd/system/sssd-pac.socket. 173s sssd-pac.service is a disabled or a static unit, not starting it. 173s Could not execute systemctl: at /usr/bin/deb-systemd-invoke line 148. 173s Setting up sssd-krb5-common (2.9.4-1.1ubuntu3) ... 173s Setting up sssd-krb5 (2.9.4-1.1ubuntu3) ... 173s Setting up sssd-ldap (2.9.4-1.1ubuntu3) ... 173s Setting up sssd-ad (2.9.4-1.1ubuntu3) ... 173s Setting up sssd-tools (2.9.4-1.1ubuntu3) ... 173s Setting up sssd-ipa (2.9.4-1.1ubuntu3) ... 173s Setting up sssd (2.9.4-1.1ubuntu3) ... 173s Setting up libverto-libevent1t64:ppc64el (0.3.1-1.2ubuntu1) ... 173s Setting up libverto1t64:ppc64el (0.3.1-1.2ubuntu1) ... 173s Setting up libkrad0:ppc64el (1.20.1-5.1build3) ... 173s Setting up sssd-passkey (2.9.4-1.1ubuntu3) ... 173s Setting up sssd-idp (2.9.4-1.1ubuntu3) ... 173s Setting up autopkgtest-satdep (0) ... 173s Processing triggers for libc-bin (2.39-0ubuntu2) ... 173s Processing triggers for ufw (0.36.2-5) ... 173s Processing triggers for man-db (2.12.0-3) ... 174s Processing triggers for dbus (1.14.10-4ubuntu1) ... 183s (Reading database ... 71429 files and directories currently installed.) 183s Removing autopkgtest-satdep (0) ... 183s autopkgtest [04:10:37]: test ldap-user-group-ldap-auth: [----------------------- 183s + . debian/tests/util 183s + . debian/tests/common-tests 183s + mydomain=example.com 183s + myhostname=ldap.example.com 183s + mysuffix=dc=example,dc=com 183s + admin_dn=cn=admin,dc=example,dc=com 183s + admin_pw=secret 183s + ldap_user=testuser1 183s + ldap_user_pw=testuser1secret 183s + ldap_group=ldapusers 183s + adjust_hostname ldap.example.com 183s + local myhostname=ldap.example.com 183s + echo ldap.example.com 183s + hostname ldap.example.com 183s + grep -qE ldap.example.com /etc/hosts 183s + echo 127.0.1.10 ldap.example.com 183s + reconfigure_slapd 183s + debconf-set-selections 184s + rm -rf /var/backups/*slapd* /var/backups/unknown*ldapdb 184s + dpkg-reconfigure -fnoninteractive -pcritical slapd 184s Backing up /etc/ldap/slapd.d in /var/backups/slapd-2.6.7+dfsg-1~exp1ubuntu6... done. 184s Moving old database directory to /var/backups: 184s - directory unknown... done. 184s Creating initial configuration... done. 184s Creating LDAP directory... done. 184s + generate_certs ldap.example.com 184s + local cn=ldap.example.com 184s + local cert=/etc/ldap/server.pem 184s + local key=/etc/ldap/server.key 184s + local cnf=/etc/ldap/openssl.cnf 184s + cat 184s + openssl req -new -x509 -nodes -out /etc/ldap/server.pem -keyout /etc/ldap/server.key -config /etc/ldap/openssl.cnf 184s .................++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ 184s .................................................++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ 184s ----- 184s + chmod 0640 /etc/ldap/server.key 184s + chgrp openldap /etc/ldap/server.key 184s + [ ! -f /etc/ldap/server.pem ] 184s + [ ! -f /etc/ldap/server.key ] 184s + enable_ldap_ssl 184s + cat 184s modifying entry "cn=config" 184s 184s adding new entry "ou=People,dc=example,dc=com" 184s 184s adding new entry "ou=Group,dc=example,dc=com" 184s 184s adding new entry "uid=testuser1,ou=People,dc=example,dc=com" 184s 184s adding new entry "cn=testuser1,ou=Group,dc=example,dc=com" 184s 184s adding new entry "cn=ldapusers,ou=Group,dc=example,dc=com" 184s 184s + cat 184s + ldapmodify -H ldapi:/// -Y EXTERNAL -Q 184s + populate_ldap_rfc2307 184s + + cat 184s ldapadd -x -D cn=admin,dc=example,dc=com -w secret 184s + configure_sssd_ldap_rfc2307 184s + cat 184s + chmod 0600 /etc/sssd/sssd.conf 184s + systemctl restart sssd 185s + enable_pam_mkhomedir 185s + grep -qE ^session.*pam_mkhomedir\.so /etc/pam.d/common-session 185s + echo session optional pam_mkhomedir.so 185s + run_common_tests 185s + echo Assert local user databases do not have our LDAP test data 185s Assert local user databases do not have our LDAP test data 185s + check_local_user testuser1 185s + local local_user=testuser1 185s + grep -q ^testuser1 /etc/passwd 185s + check_local_group testuser1 185s + local local_group=testuser1 185s + grep -q ^testuser1 /etc/group 185s + check_local_group ldapusers 185s + local local_group=ldapusers 185s + grep -q ^ldapusers /etc/group 185s The LDAP user is known to the system via getent 185s The LDAP user's private group is known to the system via getent 185s + echo The LDAP user is known to the system via getent 185s + check_getent_user testuser1 185s + local getent_user=testuser1 185s + local output 185s + getent passwd testuser1 185s + output=testuser1:*:10001:10001:testuser1:/home/testuser1:/bin/bash 185s + [ -z testuser1:*:10001:10001:testuser1:/home/testuser1:/bin/bash ] 185s + echo The LDAP user's private group is known to the system via getent 185s + check_getent_group testuser1 185s + local getent_group=testuser1 185s + local output 185s + getent group testuser1 185s + output=testuser1:*:10001:testuser1 185s + [ -z testuser1:*:10001:testuser1 ] 185s The LDAP group ldapusers is known to the system via getent 185s + echo The LDAP group ldapusers is known to the system via getent 185s + check_getent_group ldapusers 185s + local getent_group=ldapusers 185s + local output 185s + getent group ldapusers 185s + output=ldapusers:*:10100:testuser1 185s + [ -z ldapusers:*:10100:testuser1 ] 185s + echoThe id(1) command can resolve the group membership of the LDAP user 185s The id(1) command can resolve the group membership of the LDAP user 185s + id -Gn testuser1 185s + output=testuser1 ldapusers 185s + [ testuser1 ldapusers != testuser1 ldapusers ] 185s + echo The LDAP user can login on a terminal 185s + /usr/bin/expect -f debian/tests/login.exp testuser1 testuser1secret 185s The LDAP user can login on a terminal 185s spawn login 185s ldap.example.com login: testuser1 185s Password: 185s Welcome to Ubuntu Noble Numbat (development branch) (GNU/Linux 6.8.0-11-generic ppc64le) 185s 185s * Documentation: https://help.ubuntu.com 185s * Management: https://landscape.canonical.com 185s * Support: https://ubuntu.com/pro 185s 185s * Strictly confined Kubernetes makes edge and IoT secure. Learn how MicroK8s 185s just raised the bar for easy, resilient and secure K8s cluster deployment. 185s 185s https://ubuntu.com/engage/secure-kubernetes-at-the-edge 185s 185s The programs included with the Ubuntu system are free software; 185s the exact distribution terms for each program are described in the 185s individual files in /usr/share/doc/*/copyright. 185s 185s Ubuntu comes with ABSOLUTELY NO WARRANTY, to the extent permitted by 185s applicable law. 185s 185s 185s The programs included with the Ubuntu system are free software; 185s the exact distribution terms for each program are described in the 185s individual files in /usr/share/doc/*/copyright. 185s 185s Ubuntu comes with ABSOLUTELY NO WARRANTY, to the extent permitted by 185s applicable law. 185s 185s Creating directory '/home/testuser1'. 185s [?2004htestuser1@ldap:~$ id -un 185s [?2004l testuser1 185s [?2004htestuser1@ldap:~$ autopkgtest [04:10:39]: test ldap-user-group-ldap-auth: -----------------------] 186s autopkgtest [04:10:40]: test ldap-user-group-ldap-auth: - - - - - - - - - - results - - - - - - - - - - 186s ldap-user-group-ldap-auth PASS 186s autopkgtest [04:10:40]: test ldap-user-group-krb5-auth: preparing testbed 188s Reading package lists... 188s Building dependency tree... 188s Reading state information... 188s Starting pkgProblemResolver with broken count: 0 188s Starting 2 pkgProblemResolver with broken count: 0 188s Done 188s The following additional packages will be installed: 188s krb5-admin-server krb5-config krb5-kdc krb5-user libgssrpc4t64 188s libkadm5clnt-mit12 libkadm5srv-mit12 libkdb5-10t64 188s Suggested packages: 188s krb5-kdc-ldap krb5-kpropd krb5-k5tls krb5-doc 188s The following NEW packages will be installed: 188s autopkgtest-satdep krb5-admin-server krb5-config krb5-kdc krb5-user 188s libgssrpc4t64 libkadm5clnt-mit12 libkadm5srv-mit12 libkdb5-10t64 188s 0 upgraded, 9 newly installed, 0 to remove and 225 not upgraded. 188s Need to get 678 kB/679 kB of archives. 188s After this operation, 3110 kB of additional disk space will be used. 188s Get:1 /tmp/autopkgtest.wAitdz/2-autopkgtest-satdep.deb autopkgtest-satdep ppc64el 0 [888 B] 189s Get:2 http://ftpmaster.internal/ubuntu noble/main ppc64el krb5-config all 2.7 [22.0 kB] 189s Get:3 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libgssrpc4t64 ppc64el 1.20.1-5.1build3 [65.9 kB] 189s Get:4 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libkadm5clnt-mit12 ppc64el 1.20.1-5.1build3 [44.5 kB] 189s Get:5 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libkdb5-10t64 ppc64el 1.20.1-5.1build3 [47.4 kB] 189s Get:6 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libkadm5srv-mit12 ppc64el 1.20.1-5.1build3 [61.6 kB] 189s Get:7 http://ftpmaster.internal/ubuntu noble-proposed/universe ppc64el krb5-user ppc64el 1.20.1-5.1build3 [118 kB] 189s Get:8 http://ftpmaster.internal/ubuntu noble-proposed/universe ppc64el krb5-kdc ppc64el 1.20.1-5.1build3 [210 kB] 189s Get:9 http://ftpmaster.internal/ubuntu noble-proposed/universe ppc64el krb5-admin-server ppc64el 1.20.1-5.1build3 [109 kB] 189s Preconfiguring packages ... 189s Fetched 678 kB in 1s (1216 kB/s) 189s Selecting previously unselected package krb5-config. 189s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 71429 files and directories currently installed.) 189s Preparing to unpack .../0-krb5-config_2.7_all.deb ... 189s Unpacking krb5-config (2.7) ... 189s Selecting previously unselected package libgssrpc4t64:ppc64el. 189s Preparing to unpack .../1-libgssrpc4t64_1.20.1-5.1build3_ppc64el.deb ... 189s Unpacking libgssrpc4t64:ppc64el (1.20.1-5.1build3) ... 189s Selecting previously unselected package libkadm5clnt-mit12:ppc64el. 189s Preparing to unpack .../2-libkadm5clnt-mit12_1.20.1-5.1build3_ppc64el.deb ... 189s Unpacking libkadm5clnt-mit12:ppc64el (1.20.1-5.1build3) ... 189s Selecting previously unselected package libkdb5-10t64:ppc64el. 189s Preparing to unpack .../3-libkdb5-10t64_1.20.1-5.1build3_ppc64el.deb ... 189s Unpacking libkdb5-10t64:ppc64el (1.20.1-5.1build3) ... 189s Selecting previously unselected package libkadm5srv-mit12:ppc64el. 189s Preparing to unpack .../4-libkadm5srv-mit12_1.20.1-5.1build3_ppc64el.deb ... 189s Unpacking libkadm5srv-mit12:ppc64el (1.20.1-5.1build3) ... 189s Selecting previously unselected package krb5-user. 190s Preparing to unpack .../5-krb5-user_1.20.1-5.1build3_ppc64el.deb ... 190s Unpacking krb5-user (1.20.1-5.1build3) ... 190s Selecting previously unselected package krb5-kdc. 190s Preparing to unpack .../6-krb5-kdc_1.20.1-5.1build3_ppc64el.deb ... 190s Unpacking krb5-kdc (1.20.1-5.1build3) ... 190s Selecting previously unselected package krb5-admin-server. 190s Preparing to unpack .../7-krb5-admin-server_1.20.1-5.1build3_ppc64el.deb ... 190s Unpacking krb5-admin-server (1.20.1-5.1build3) ... 190s Selecting previously unselected package autopkgtest-satdep. 190s Preparing to unpack .../8-2-autopkgtest-satdep.deb ... 190s Unpacking autopkgtest-satdep (0) ... 190s Setting up libgssrpc4t64:ppc64el (1.20.1-5.1build3) ... 190s Setting up krb5-config (2.7) ... 190s Setting up libkadm5clnt-mit12:ppc64el (1.20.1-5.1build3) ... 190s Setting up libkdb5-10t64:ppc64el (1.20.1-5.1build3) ... 190s Setting up libkadm5srv-mit12:ppc64el (1.20.1-5.1build3) ... 190s Setting up krb5-user (1.20.1-5.1build3) ... 190s update-alternatives: using /usr/bin/kinit.mit to provide /usr/bin/kinit (kinit) in auto mode 190s update-alternatives: using /usr/bin/klist.mit to provide /usr/bin/klist (klist) in auto mode 190s update-alternatives: using /usr/bin/kswitch.mit to provide /usr/bin/kswitch (kswitch) in auto mode 190s update-alternatives: using /usr/bin/ksu.mit to provide /usr/bin/ksu (ksu) in auto mode 190s update-alternatives: using /usr/bin/kpasswd.mit to provide /usr/bin/kpasswd (kpasswd) in auto mode 190s update-alternatives: using /usr/bin/kdestroy.mit to provide /usr/bin/kdestroy (kdestroy) in auto mode 190s update-alternatives: using /usr/bin/kadmin.mit to provide /usr/bin/kadmin (kadmin) in auto mode 190s update-alternatives: using /usr/bin/ktutil.mit to provide /usr/bin/ktutil (ktutil) in auto mode 190s Setting up krb5-kdc (1.20.1-5.1build3) ... 191s Created symlink /etc/systemd/system/multi-user.target.wants/krb5-kdc.service → /usr/lib/systemd/system/krb5-kdc.service. 191s Could not execute systemctl: at /usr/bin/deb-systemd-invoke line 148. 191s Setting up krb5-admin-server (1.20.1-5.1build3) ... 192s Created symlink /etc/systemd/system/multi-user.target.wants/krb5-admin-server.service → /usr/lib/systemd/system/krb5-admin-server.service. 192s Setting up autopkgtest-satdep (0) ... 192s Processing triggers for man-db (2.12.0-3) ... 193s Processing triggers for libc-bin (2.39-0ubuntu2) ... 200s (Reading database ... 71524 files and directories currently installed.) 200s Removing autopkgtest-satdep (0) ... 201s autopkgtest [04:10:55]: test ldap-user-group-krb5-auth: [----------------------- 201s + . debian/tests/util 201s + . debian/tests/common-tests 201s + mydomain=example.com 201s + myhostname=ldap.example.com 201s + mysuffix=dc=example,dc=com 201s + myrealm=EXAMPLE.COM 201s + admin_dn=cn=admin,dc=example,dc=com 201s + admin_pw=secret 201s + ldap_user=testuser1 201s + ldap_user_pw=testuser1secret 201s + kerberos_principal_pw=testuser1kerberos 201s + ldap_group=ldapusers 201s + adjust_hostname ldap.example.com 201s + local myhostname=ldap.example.com 201s + echo ldap.example.com 201s + hostname ldap.example.com 201s + grep -qE ldap.example.com /etc/hosts 201s + reconfigure_slapd 201s + debconf-set-selections 201s + rm -rf /var/backups/slapd-2.6.7+dfsg-1~exp1ubuntu6 /var/backups/unknown-2.6.7+dfsg-1~exp1ubuntu6-20240320-041038.ldapdb 201s + dpkg-reconfigure -fnoninteractive -pcritical slapd 201s Backing up /etc/ldap/slapd.d in /var/backups/slapd-2.6.7+dfsg-1~exp1ubuntu6... done. 201s Moving old database directory to /var/backups: 201s - directory unknown... done. 201s Creating initial configuration... done. 201s Creating LDAP directory... done. 202s + generate_certs ldap.example.com 202s + local cn=ldap.example.com 202s + local cert=/etc/ldap/server.pem 202s + local key=/etc/ldap/server.key 202s + local cnf=/etc/ldap/openssl.cnf 202s + cat 202s + openssl req -new -x509 -nodes -out /etc/ldap/server.pem -keyout /etc/ldap/server.key -config /etc/ldap/openssl.cnf 202s ............++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ 202s ...++++++++++++++++++++++++++++++++modifying entry "cn=config" 202s 202s adding new entry "ou=People,dc=example,dc=com" 202s 202s adding new entry "ou=Group,dc=example,dc=com" 202s 202s adding new entry "uid=testuser1,ou=People,dc=example,dc=com" 202s 202s adding new entry "cn=testuser1,ou=Group,dc=example,dc=com" 202s 202s adding new entry "cn=ldapusers,ou=Group,dc=example,dc=com" 202s 202s Initializing database '/var/lib/krb5kdc/principal' for realm 'EXAMPLE.COM', 202s master key name 'K/M@EXAMPLE.COM' 202s ++++++++++++++++++++++++++++++++ 202s ----- 202s + chmod 0640 /etc/ldap/server.key 202s + chgrp openldap /etc/ldap/server.key 202s + [ ! -f /etc/ldap/server.pem ] 202s + [ ! -f /etc/ldap/server.key ] 202s + enable_ldap_ssl 202s + cat 202s + cat 202s + ldapmodify -H ldapi:/// -Y EXTERNAL -Q 202s + populate_ldap_rfc2307 202s + cat 202s + ldapadd -x -D cn=admin,dc=example,dc=com -w secret 202s + create_realm EXAMPLE.COM ldap.example.com 202s + local realm_name=EXAMPLE.COM 202s + local kerberos_server=ldap.example.com 202s + rm -rf /var/lib/krb5kdc/* 202s + rm -rf /etc/krb5kdc/kdc.conf 202s + rm -f /etc/krb5.keytab 202s + cat 202s + cat 202s + echo # */admin * 202s + kdb5_util create -s -P secretpassword 202s + systemctl restart krb5-kdc.service krb5-admin-server.service 202s + create_krb_principal testuser1 testuser1kerberos 202s + local principal=testuser1 202s + local password=testuser1kerberos 202s + kadmin.local -q addprinc -pw testuser1kerberos testuser1 202s No policy specified for testuser1@EXAMPLE.COM; defaulting to no policy 202s Authenticating as principal root/admin@EXAMPLE.COM with password. 202s Principal "testuser1@EXAMPLE.COM" created. 202s + configure_sssd_ldap_rfc2307_krb5_auth 202s + cat 202s + chmod 0600 /etc/sssd/sssd.conf 202s + systemctl restart sssd 202s + enable_pam_mkhomedir 202s + grep -qE ^session.*pam_mkhomedir\.so /etc/pam.d/common-session 202s Assert local user databases do not have our LDAP test data 202s + run_common_tests 202s + echo Assert local user databases do not have our LDAP test data 202s + check_local_user testuser1 202s + local local_user=testuser1 202s + grep -q ^testuser1 /etc/passwd 202s + check_local_groupThe LDAP user is known to the system via getent 202s testuser1 202s + local local_group=testuser1 202s + grep -q ^testuser1 /etc/group 202s + check_local_group ldapusers 202s + local local_group=ldapusers 202s + grep -q ^ldapusers /etc/group 202s + echo The LDAP user is known to the system via getent 202s + check_getent_user testuser1 202s + local getent_user=testuser1 202s + local output 202s + getent passwd testuser1 202s + output=testuser1:*:10001:10001:testuser1:/home/testuser1:/bin/bash 202s + [The LDAP user's private group is known to the system via getent 202s -z testuser1:*:10001:10001:testuser1:/home/testuser1:/bin/bash ] 202s + echo The LDAP user's private group is known to the system via getent 202s + check_getent_group testuser1 202s + local getent_group=testuser1 202s + local output 202s + getent group testuser1 202s + The LDAP group ldapusers is known to the system via getent 202s output=testuser1:*:10001:testuser1 202s + [ -z testuser1:*:10001:testuser1 ] 202s + echo The LDAP group ldapusers is known to the system via getent 202s + check_getent_group ldapusers 202s + local getent_group=ldapusers 202s + local output 202s + getent group ldapusers 202s + output=ldapusers:*:10100:testuser1 202s + [ -z ldapusers:*:10100:testuser1 ] 202s + echo The id(1) command can resolve the group membership of the LDAP user 202s The id(1) command can resolve the group membership of the LDAP user 202s + id -Gn testuser1 202s The Kerberos principal can login on a terminal 202s + output=testuser1 ldapusers 202s + [ testuser1 ldapusers != testuser1 ldapusers ] 202s + echo The Kerberos principal can login on a terminal 202s + kdestroy 202s + /usr/bin/expect -f debian/tests/login.exp testuser1 testuser1kerberos testuser1@EXAMPLE.COM 202s spawn login 202s ldap.example.com login: testuser1 202s Password: 202s Welcome to Ubuntu Noble Numbat (development branch) (GNU/Linux 6.8.0-11-generic ppc64le) 202s 202s * Documentation: https://help.ubuntu.com 202s * Management: https://landscape.canonical.com 202s * Support: https://ubuntu.com/pro 202s 202s * Strictly confined Kubernetes makes edge and IoT secure. Learn how MicroK8s 202s just raised the bar for easy, resilient and secure K8s cluster deployment. 202s 202s https://ubuntu.com/engage/secure-kubernetes-at-the-edge 202s 202s The programs included with the Ubuntu system are free software; 202s the exact distribution terms for each program are described in the 202s individual files in /usr/share/doc/*/copyright. 202s 202s Ubuntu comes with ABSOLUTELY NO WARRANTY, to the extent permitted by 202s applicable law. 202s 202s Last login: Wed Mar 20 04:10:39 UTC 2024 on pts/0 202s [?2004htestuser1@ldap:~$ id -un 202s [?2004l testuser1 202s [?2004htestuser1@ldap:~$ klist 202s [?2004l Ticket cache: FILE:/tmp/krb5cc_10001_KqcAil 203s Default principal: testuser1@EXAMPLE.COMautopkgtest [04:10:57]: test ldap-user-group-krb5-auth: -----------------------] 203s autopkgtest [04:10:57]: test ldap-user-group-krb5-auth: - - - - - - - - - - results - - - - - - - - - - 203s ldap-user-group-krb5-auth PASS 204s autopkgtest [04:10:58]: test sssd-softhism2-certificates-tests.sh: preparing testbed 349s autopkgtest [04:13:23]: testbed dpkg architecture: ppc64el 349s autopkgtest [04:13:23]: testbed apt version: 2.7.12 349s autopkgtest [04:13:23]: @@@@@@@@@@@@@@@@@@@@ test bed setup 350s Get:1 http://ftpmaster.internal/ubuntu noble-proposed InRelease [117 kB] 350s Get:2 http://ftpmaster.internal/ubuntu noble-proposed/restricted Sources [6540 B] 350s Get:3 http://ftpmaster.internal/ubuntu noble-proposed/universe Sources [3767 kB] 350s Get:4 http://ftpmaster.internal/ubuntu noble-proposed/main Sources [497 kB] 350s Get:5 http://ftpmaster.internal/ubuntu noble-proposed/multiverse Sources [52.7 kB] 350s Get:6 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el Packages [660 kB] 350s Get:7 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el c-n-f Metadata [3116 B] 350s Get:8 http://ftpmaster.internal/ubuntu noble-proposed/restricted ppc64el Packages [1372 B] 350s Get:9 http://ftpmaster.internal/ubuntu noble-proposed/restricted ppc64el c-n-f Metadata [116 B] 350s Get:10 http://ftpmaster.internal/ubuntu noble-proposed/universe ppc64el Packages [4127 kB] 351s Get:11 http://ftpmaster.internal/ubuntu noble-proposed/universe ppc64el c-n-f Metadata [8652 B] 351s Get:12 http://ftpmaster.internal/ubuntu noble-proposed/multiverse ppc64el Packages [47.7 kB] 351s Get:13 http://ftpmaster.internal/ubuntu noble-proposed/multiverse ppc64el c-n-f Metadata [116 B] 354s Fetched 9288 kB in 2s (3798 kB/s) 355s Reading package lists... 357s Reading package lists... 357s Building dependency tree... 357s Reading state information... 357s Calculating upgrade... 358s The following packages will be REMOVED: 358s libreadline8 libssl3 358s The following NEW packages will be installed: 358s libreadline8t64 libssl3t64 358s The following packages have been kept back: 358s libpython3.12-minimal libpython3.12-stdlib python3.12 python3.12-minimal 358s The following packages will be upgraded: 358s libtirpc-common openssl readline-common 358s 3 upgraded, 2 newly installed, 2 to remove and 4 not upgraded. 358s Need to get 3397 kB of archives. 358s After this operation, 75.8 kB of additional disk space will be used. 358s Get:1 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el readline-common all 8.2-3.1 [56.4 kB] 358s Get:2 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libreadline8t64 ppc64el 8.2-3.1 [182 kB] 358s Get:3 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el openssl ppc64el 3.0.13-0ubuntu2 [1026 kB] 358s Get:4 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libssl3t64 ppc64el 3.0.13-0ubuntu2 [2125 kB] 358s Get:5 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libtirpc-common all 1.3.4+ds-1.1 [8018 B] 359s Fetched 3397 kB in 1s (4879 kB/s) 359s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 70095 files and directories currently installed.) 359s Preparing to unpack .../readline-common_8.2-3.1_all.deb ... 359s Unpacking readline-common (8.2-3.1) over (8.2-3) ... 359s dpkg: libreadline8:ppc64el: dependency problems, but removing anyway as you requested: 359s parted depends on libreadline8 (>= 6.0). 359s libpython3.12-stdlib:ppc64el depends on libreadline8 (>= 7.0~beta). 359s libpython3.11-stdlib:ppc64el depends on libreadline8 (>= 7.0~beta). 359s gpgsm depends on libreadline8 (>= 6.0). 359s gpgconf depends on libreadline8 (>= 6.0). 359s gpg depends on libreadline8 (>= 6.0). 359s gawk depends on libreadline8 (>= 6.0). 359s fdisk depends on libreadline8 (>= 6.0). 359s bc depends on libreadline8 (>= 6.0). 359s 359s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 70095 files and directories currently installed.) 359s Removing libreadline8:ppc64el (8.2-3) ... 359s Selecting previously unselected package libreadline8t64:ppc64el. 359s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 70083 files and directories currently installed.) 359s Preparing to unpack .../libreadline8t64_8.2-3.1_ppc64el.deb ... 359s Adding 'diversion of /lib/powerpc64le-linux-gnu/libhistory.so.8 to /lib/powerpc64le-linux-gnu/libhistory.so.8.usr-is-merged by libreadline8t64' 359s Adding 'diversion of /lib/powerpc64le-linux-gnu/libhistory.so.8.2 to /lib/powerpc64le-linux-gnu/libhistory.so.8.2.usr-is-merged by libreadline8t64' 359s Adding 'diversion of /lib/powerpc64le-linux-gnu/libreadline.so.8 to /lib/powerpc64le-linux-gnu/libreadline.so.8.usr-is-merged by libreadline8t64' 359s Adding 'diversion of /lib/powerpc64le-linux-gnu/libreadline.so.8.2 to /lib/powerpc64le-linux-gnu/libreadline.so.8.2.usr-is-merged by libreadline8t64' 359s Unpacking libreadline8t64:ppc64el (8.2-3.1) ... 359s Preparing to unpack .../openssl_3.0.13-0ubuntu2_ppc64el.deb ... 359s Unpacking openssl (3.0.13-0ubuntu2) over (3.0.10-1ubuntu4) ... 359s dpkg: libssl3:ppc64el: dependency problems, but removing anyway as you requested: 359s wget depends on libssl3 (>= 3.0.0). 359s tnftp depends on libssl3 (>= 3.0.0). 359s tcpdump depends on libssl3 (>= 3.0.0). 359s systemd-resolved depends on libssl3 (>= 3.0.0). 359s systemd depends on libssl3 (>= 3.0.0). 359s sudo depends on libssl3 (>= 3.0.0). 359s rsync depends on libssl3 (>= 3.0.0). 359s python3-cryptography depends on libssl3 (>= 3.0.0). 359s openssh-server depends on libssl3 (>= 3.0.10). 359s openssh-client depends on libssl3 (>= 3.0.10). 359s linux-headers-6.8.0-11-generic depends on libssl3 (>= 3.0.0). 359s libsystemd-shared:ppc64el depends on libssl3 (>= 3.0.0). 359s libssh-4:ppc64el depends on libssl3 (>= 3.0.0). 359s libsasl2-modules:ppc64el depends on libssl3 (>= 3.0.0). 359s libsasl2-2:ppc64el depends on libssl3 (>= 3.0.0). 359s libpython3.12-minimal:ppc64el depends on libssl3 (>= 3.0.0). 359s libpython3.11-minimal:ppc64el depends on libssl3 (>= 3.0.0). 359s libnvme1 depends on libssl3 (>= 3.0.0). 359s libkrb5-3:ppc64el depends on libssl3 (>= 3.0.0). 359s libkmod2:ppc64el depends on libssl3 (>= 3.0.0). 359s libfido2-1:ppc64el depends on libssl3 (>= 3.0.0). 359s libcurl4:ppc64el depends on libssl3 (>= 3.0.0). 359s libcryptsetup12:ppc64el depends on libssl3 (>= 3.0.0). 359s kmod depends on libssl3 (>= 3.0.0). 359s dhcpcd-base depends on libssl3 (>= 3.0.0). 359s bind9-libs:ppc64el depends on libssl3 (>= 3.0.0). 359s 359s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 70103 files and directories currently installed.) 359s Removing libssl3:ppc64el (3.0.10-1ubuntu4) ... 359s Selecting previously unselected package libssl3t64:ppc64el. 359s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 70092 files and directories currently installed.) 359s Preparing to unpack .../libssl3t64_3.0.13-0ubuntu2_ppc64el.deb ... 359s Unpacking libssl3t64:ppc64el (3.0.13-0ubuntu2) ... 359s Preparing to unpack .../libtirpc-common_1.3.4+ds-1.1_all.deb ... 359s Unpacking libtirpc-common (1.3.4+ds-1.1) over (1.3.4+ds-1build1) ... 359s Setting up libssl3t64:ppc64el (3.0.13-0ubuntu2) ... 359s Setting up libtirpc-common (1.3.4+ds-1.1) ... 359s Setting up openssl (3.0.13-0ubuntu2) ... 359s Setting up readline-common (8.2-3.1) ... 359s Setting up libreadline8t64:ppc64el (8.2-3.1) ... 359s Processing triggers for libc-bin (2.39-0ubuntu2) ... 359s Processing triggers for man-db (2.12.0-3) ... 360s Processing triggers for install-info (7.1-3) ... 360s Reading package lists... 361s Building dependency tree... 361s Reading state information... 361s 0 upgraded, 0 newly installed, 0 to remove and 4 not upgraded. 361s Hit:1 http://ftpmaster.internal/ubuntu noble-proposed InRelease 361s Hit:2 http://ftpmaster.internal/ubuntu noble InRelease 361s Hit:3 http://ftpmaster.internal/ubuntu noble-updates InRelease 361s Hit:4 http://ftpmaster.internal/ubuntu noble-security InRelease 363s Reading package lists... 363s Reading package lists... 363s Building dependency tree... 363s Reading state information... 363s Calculating upgrade... 363s The following packages have been kept back: 363s libpython3.12-minimal libpython3.12-stdlib python3.12 python3.12-minimal 363s 0 upgraded, 0 newly installed, 0 to remove and 4 not upgraded. 363s Reading package lists... 364s Building dependency tree... 364s Reading state information... 364s 0 upgraded, 0 newly installed, 0 to remove and 4 not upgraded. 369s Reading package lists... 370s Building dependency tree... 370s Reading state information... 370s Starting pkgProblemResolver with broken count: 1 370s Starting 2 pkgProblemResolver with broken count: 1 370s Investigating (0) sssd-common:ppc64el < none -> 2.9.4-1.1ubuntu3 @un puN Ib > 370s Broken sssd-common:ppc64el Depends on libnss-sss:ppc64el < none | 2.9.4-1.1ubuntu3 @un uH > (= 2.9.4-1.1ubuntu3) 370s Considering libnss-sss:ppc64el 0 as a solution to sssd-common:ppc64el 8 370s Re-Instated libnss-sss:ppc64el 370s Broken sssd-common:ppc64el Depends on libpam-sss:ppc64el < none | 2.9.4-1.1ubuntu3 @un uH > (= 2.9.4-1.1ubuntu3) 370s Considering libpam-sss:ppc64el 0 as a solution to sssd-common:ppc64el 8 370s Re-Instated libcrack2:ppc64el 370s Re-Instated libpwquality-common:ppc64el 370s Re-Instated libpwquality1:ppc64el 370s Re-Instated libpam-pwquality:ppc64el 370s Re-Instated libpam-sss:ppc64el 370s Broken sssd-common:ppc64el Depends on libc-ares2:ppc64el < none | 1.27.0-1 @un uH > (>= 1.7.0) 370s Considering libc-ares2:ppc64el 0 as a solution to sssd-common:ppc64el 8 370s Re-Instated libc-ares2:ppc64el 370s Broken sssd-common:ppc64el Depends on libnfsidmap1:ppc64el < none | 1:2.6.3-3ubuntu1 @un uH > (>= 1:2.6.4) 370s Considering libnfsidmap1:ppc64el 0 as a solution to sssd-common:ppc64el 8 370s Re-Instated libnfsidmap1:ppc64el 370s Broken sssd-common:ppc64el Depends on libsss-nss-idmap0:ppc64el < none | 2.9.4-1.1ubuntu3 @un uH > (>= 2.9.4) 370s Considering libsss-nss-idmap0:ppc64el 0 as a solution to sssd-common:ppc64el 8 370s Re-Instated libsss-nss-idmap0:ppc64el 370s Done 370s Some packages could not be installed. This may mean that you have 370s requested an impossible situation or if you are using the unstable 370s distribution that some required packages have not yet been created 370s or been moved out of Incoming. 370s The following information may help to resolve the situation: 370s 370s The following packages have unmet dependencies: 370s sssd-common : Depends: libnfsidmap1 (>= 1:2.6.4) but 1:2.6.3-3ubuntu1 is to be installed 370s E: Unable to correct problems, you have held broken packages. 370s autopkgtest: WARNING: Test dependencies are unsatisfiable with using apt pinning. Retrying with using all packages from noble-proposed 371s Reading package lists... 371s Building dependency tree... 371s Reading state information... 372s Starting pkgProblemResolver with broken count: 0 372s Starting 2 pkgProblemResolver with broken count: 0 372s Done 372s The following additional packages will be installed: 372s gnutls-bin libavahi-client3 libavahi-common-data libavahi-common3 372s libbasicobjects0t64 libc-ares2 libcollection4t64 libcrack2 libdhash1t64 372s libevent-2.1-7 libevent-core-2.1-7 libgnutls-dane0t64 libgnutls30t64 372s libhogweed6t64 libini-config5t64 libipa-hbac0t64 libldb2 libnettle8t64 372s libnfsidmap1 libnss-sss libpam-pwquality libpam-sss libpath-utils1t64 372s libpwquality-common libpwquality1 libref-array1t64 libsmbclient0 libsofthsm2 372s libsss-certmap0 libsss-idmap0 libsss-nss-idmap0 libtalloc2 libtdb1 372s libtevent0t64 libtirpc3t64 libunbound8 libwbclient0 python3-sss samba-libs 372s softhsm2 softhsm2-common sssd sssd-ad sssd-ad-common sssd-common sssd-ipa 372s sssd-krb5 sssd-krb5-common sssd-ldap sssd-proxy 372s Suggested packages: 372s dns-root-data adcli libsss-sudo sssd-tools libsasl2-modules-ldap 372s Recommended packages: 372s cracklib-runtime libsasl2-modules-gssapi-mit 372s | libsasl2-modules-gssapi-heimdal ldap-utils 372s The following packages will be REMOVED: 372s libgnutls30 libhogweed6 libnettle8 libtirpc3 372s The following NEW packages will be installed: 372s autopkgtest-satdep gnutls-bin libavahi-client3 libavahi-common-data 372s libavahi-common3 libbasicobjects0t64 libc-ares2 libcollection4t64 libcrack2 372s libdhash1t64 libevent-2.1-7 libgnutls-dane0t64 libgnutls30t64 libhogweed6t64 372s libini-config5t64 libipa-hbac0t64 libldb2 libnettle8t64 libnfsidmap1 372s libnss-sss libpam-pwquality libpam-sss libpath-utils1t64 libpwquality-common 372s libpwquality1 libref-array1t64 libsmbclient0 libsofthsm2 libsss-certmap0 372s libsss-idmap0 libsss-nss-idmap0 libtalloc2 libtdb1 libtevent0t64 372s libtirpc3t64 libunbound8 libwbclient0 python3-sss samba-libs softhsm2 372s softhsm2-common sssd sssd-ad sssd-ad-common sssd-common sssd-ipa sssd-krb5 372s sssd-krb5-common sssd-ldap sssd-proxy 372s The following packages will be upgraded: 372s libevent-core-2.1-7 372s 1 upgraded, 50 newly installed, 4 to remove and 237 not upgraded. 372s Need to get 13.2 MB/13.2 MB of archives. 372s After this operation, 57.7 MB of additional disk space will be used. 372s Get:1 /tmp/autopkgtest.wAitdz/3-autopkgtest-satdep.deb autopkgtest-satdep ppc64el 0 [744 B] 373s Get:2 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libhogweed6t64 ppc64el 3.9.1-2.2 [208 kB] 373s Get:3 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libnettle8t64 ppc64el 3.9.1-2.2 [226 kB] 373s Get:4 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libgnutls30t64 ppc64el 3.8.3-1.1ubuntu2 [1154 kB] 373s Get:5 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libtirpc3t64 ppc64el 1.3.4+ds-1.1 [102 kB] 373s Get:6 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libevent-2.1-7 ppc64el 2.1.12-stable-9build1 [174 kB] 373s Get:7 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libunbound8 ppc64el 1.19.2-1ubuntu1 [537 kB] 373s Get:8 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libgnutls-dane0t64 ppc64el 3.8.3-1.1ubuntu2 [34.4 kB] 373s Get:9 http://ftpmaster.internal/ubuntu noble-proposed/universe ppc64el gnutls-bin ppc64el 3.8.3-1.1ubuntu2 [300 kB] 373s Get:10 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libavahi-common-data ppc64el 0.8-13ubuntu4 [29.6 kB] 373s Get:11 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libavahi-common3 ppc64el 0.8-13ubuntu4 [26.3 kB] 373s Get:12 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libavahi-client3 ppc64el 0.8-13ubuntu4 [30.8 kB] 373s Get:13 http://ftpmaster.internal/ubuntu noble/main ppc64el libbasicobjects0t64 ppc64el 0.6.2-2.1 [6118 B] 373s Get:14 http://ftpmaster.internal/ubuntu noble/main ppc64el libcollection4t64 ppc64el 0.6.2-2.1 [36.4 kB] 373s Get:15 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libcrack2 ppc64el 2.9.6-5.1build1 [31.1 kB] 373s Get:16 http://ftpmaster.internal/ubuntu noble/main ppc64el libdhash1t64 ppc64el 0.6.2-2.1 [10.4 kB] 373s Get:17 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libevent-core-2.1-7 ppc64el 2.1.12-stable-9build1 [110 kB] 373s Get:18 http://ftpmaster.internal/ubuntu noble/main ppc64el libpath-utils1t64 ppc64el 0.6.2-2.1 [10.6 kB] 373s Get:19 http://ftpmaster.internal/ubuntu noble/main ppc64el libref-array1t64 ppc64el 0.6.2-2.1 [8130 B] 373s Get:20 http://ftpmaster.internal/ubuntu noble/main ppc64el libini-config5t64 ppc64el 0.6.2-2.1 [55.2 kB] 373s Get:21 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libipa-hbac0t64 ppc64el 2.9.4-1.1ubuntu3 [17.8 kB] 373s Get:22 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libtalloc2 ppc64el 2.4.2-1build1 [36.7 kB] 373s Get:23 http://ftpmaster.internal/ubuntu noble/main ppc64el libtdb1 ppc64el 1.4.10-1 [62.7 kB] 373s Get:24 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libtevent0t64 ppc64el 0.16.1-2 [51.1 kB] 373s Get:25 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libldb2 ppc64el 2:2.8.0+samba4.19.5+dfsg-4ubuntu4 [220 kB] 373s Get:26 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libnfsidmap1 ppc64el 1:2.6.4-3ubuntu3 [54.5 kB] 373s Get:27 http://ftpmaster.internal/ubuntu noble/main ppc64el libpwquality-common all 1.4.5-3 [7658 B] 373s Get:28 http://ftpmaster.internal/ubuntu noble/main ppc64el libpwquality1 ppc64el 1.4.5-3 [16.9 kB] 373s Get:29 http://ftpmaster.internal/ubuntu noble/main ppc64el libpam-pwquality ppc64el 1.4.5-3 [12.5 kB] 374s Get:30 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libwbclient0 ppc64el 2:4.19.5+dfsg-4ubuntu4 [77.1 kB] 374s Get:31 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el samba-libs ppc64el 2:4.19.5+dfsg-4ubuntu4 [6674 kB] 374s Get:32 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libsmbclient0 ppc64el 2:4.19.5+dfsg-4ubuntu4 [70.3 kB] 374s Get:33 http://ftpmaster.internal/ubuntu noble-proposed/universe ppc64el softhsm2-common ppc64el 2.6.1-2.2build2 [5974 B] 374s Get:34 http://ftpmaster.internal/ubuntu noble-proposed/universe ppc64el libsofthsm2 ppc64el 2.6.1-2.2build2 [297 kB] 374s Get:35 http://ftpmaster.internal/ubuntu noble-proposed/universe ppc64el softhsm2 ppc64el 2.6.1-2.2build2 [200 kB] 374s Get:36 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el python3-sss ppc64el 2.9.4-1.1ubuntu3 [48.2 kB] 374s Get:37 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libsss-idmap0 ppc64el 2.9.4-1.1ubuntu3 [24.9 kB] 374s Get:38 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libnss-sss ppc64el 2.9.4-1.1ubuntu3 [36.4 kB] 374s Get:39 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libpam-sss ppc64el 2.9.4-1.1ubuntu3 [56.6 kB] 374s Get:40 http://ftpmaster.internal/ubuntu noble/main ppc64el libc-ares2 ppc64el 1.27.0-1 [99.0 kB] 374s Get:41 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libsss-certmap0 ppc64el 2.9.4-1.1ubuntu3 [53.9 kB] 374s Get:42 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libsss-nss-idmap0 ppc64el 2.9.4-1.1ubuntu3 [37.5 kB] 374s Get:43 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el sssd-common ppc64el 2.9.4-1.1ubuntu3 [1280 kB] 374s Get:44 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el sssd-ad-common ppc64el 2.9.4-1.1ubuntu3 [88.6 kB] 374s Get:45 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el sssd-krb5-common ppc64el 2.9.4-1.1ubuntu3 [103 kB] 374s Get:46 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el sssd-ad ppc64el 2.9.4-1.1ubuntu3 [147 kB] 374s Get:47 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el sssd-ipa ppc64el 2.9.4-1.1ubuntu3 [240 kB] 374s Get:48 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el sssd-krb5 ppc64el 2.9.4-1.1ubuntu3 [14.4 kB] 374s Get:49 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el sssd-ldap ppc64el 2.9.4-1.1ubuntu3 [31.6 kB] 374s Get:50 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el sssd-proxy ppc64el 2.9.4-1.1ubuntu3 [47.9 kB] 374s Get:51 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el sssd ppc64el 2.9.4-1.1ubuntu3 [4122 B] 374s Fetched 13.2 MB in 2s (7719 kB/s) 374s dpkg: libhogweed6:ppc64el: dependency problems, but removing anyway as you requested: 374s librtmp1:ppc64el depends on libhogweed6. 374s libjcat1:ppc64el depends on libhogweed6. 374s libgnutls30:ppc64el depends on libhogweed6 (>= 3.6). 374s 374s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 70105 files and directories currently installed.) 374s Removing libhogweed6:ppc64el (3.9.1-2) ... 375s Selecting previously unselected package libhogweed6t64:ppc64el. 375s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 70100 files and directories currently installed.) 375s Preparing to unpack .../libhogweed6t64_3.9.1-2.2_ppc64el.deb ... 375s Unpacking libhogweed6t64:ppc64el (3.9.1-2.2) ... 375s dpkg: libnettle8:ppc64el: dependency problems, but removing anyway as you requested: 375s librtmp1:ppc64el depends on libnettle8. 375s libgnutls30:ppc64el depends on libnettle8 (>= 3.9~). 375s libcurl3-gnutls:ppc64el depends on libnettle8. 375s libarchive13:ppc64el depends on libnettle8. 375s 375s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 70106 files and directories currently installed.) 375s Removing libnettle8:ppc64el (3.9.1-2) ... 375s Selecting previously unselected package libnettle8t64:ppc64el. 375s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 70099 files and directories currently installed.) 375s Preparing to unpack .../libnettle8t64_3.9.1-2.2_ppc64el.deb ... 375s Unpacking libnettle8t64:ppc64el (3.9.1-2.2) ... 375s dpkg: libgnutls30:ppc64el: dependency problems, but removing anyway as you requested: 375s librtmp1:ppc64el depends on libgnutls30 (>= 3.7.2). 375s libldap2:ppc64el depends on libgnutls30 (>= 3.8.2). 375s libjcat1:ppc64el depends on libgnutls30 (>= 3.7.3). 375s libcurl3-gnutls:ppc64el depends on libgnutls30 (>= 3.8.2). 375s fwupd depends on libgnutls30 (>= 3.7.3). 375s dirmngr depends on libgnutls30 (>= 3.8.1). 375s apt depends on libgnutls30 (>= 3.8.1). 375s 375s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 70107 files and directories currently installed.) 375s Removing libgnutls30:ppc64el (3.8.3-1ubuntu1) ... 375s Selecting previously unselected package libgnutls30t64:ppc64el. 375s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 70098 files and directories currently installed.) 375s Preparing to unpack .../libgnutls30t64_3.8.3-1.1ubuntu2_ppc64el.deb ... 375s Unpacking libgnutls30t64:ppc64el (3.8.3-1.1ubuntu2) ... 375s Setting up libnettle8t64:ppc64el (3.9.1-2.2) ... 375s Setting up libhogweed6t64:ppc64el (3.9.1-2.2) ... 375s Setting up libgnutls30t64:ppc64el (3.8.3-1.1ubuntu2) ... 375s dpkg: libtirpc3:ppc64el: dependency problems, but removing anyway as you requested: 375s lsof depends on libtirpc3 (>= 1.0.2). 375s libpython3.12-stdlib:ppc64el depends on libtirpc3 (>= 1.0.2). 375s libpython3.11-stdlib:ppc64el depends on libtirpc3 (>= 1.0.2). 375s libnsl2:ppc64el depends on libtirpc3 (>= 1.0.2). 375s iproute2 depends on libtirpc3 (>= 1.0.2). 375s 375s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 70126 files and directories currently installed.) 375s Removing libtirpc3:ppc64el (1.3.4+ds-1build1) ... 375s Selecting previously unselected package libtirpc3t64:ppc64el. 375s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 70120 files and directories currently installed.) 375s Preparing to unpack .../00-libtirpc3t64_1.3.4+ds-1.1_ppc64el.deb ... 375s Adding 'diversion of /lib/powerpc64le-linux-gnu/libtirpc.so.3 to /lib/powerpc64le-linux-gnu/libtirpc.so.3.usr-is-merged by libtirpc3t64' 375s Adding 'diversion of /lib/powerpc64le-linux-gnu/libtirpc.so.3.0.0 to /lib/powerpc64le-linux-gnu/libtirpc.so.3.0.0.usr-is-merged by libtirpc3t64' 375s Unpacking libtirpc3t64:ppc64el (1.3.4+ds-1.1) ... 375s Selecting previously unselected package libevent-2.1-7:ppc64el. 375s Preparing to unpack .../01-libevent-2.1-7_2.1.12-stable-9build1_ppc64el.deb ... 375s Unpacking libevent-2.1-7:ppc64el (2.1.12-stable-9build1) ... 375s Selecting previously unselected package libunbound8:ppc64el. 375s Preparing to unpack .../02-libunbound8_1.19.2-1ubuntu1_ppc64el.deb ... 375s Unpacking libunbound8:ppc64el (1.19.2-1ubuntu1) ... 375s Selecting previously unselected package libgnutls-dane0t64:ppc64el. 375s Preparing to unpack .../03-libgnutls-dane0t64_3.8.3-1.1ubuntu2_ppc64el.deb ... 375s Unpacking libgnutls-dane0t64:ppc64el (3.8.3-1.1ubuntu2) ... 375s Selecting previously unselected package gnutls-bin. 375s Preparing to unpack .../04-gnutls-bin_3.8.3-1.1ubuntu2_ppc64el.deb ... 375s Unpacking gnutls-bin (3.8.3-1.1ubuntu2) ... 375s Selecting previously unselected package libavahi-common-data:ppc64el. 375s Preparing to unpack .../05-libavahi-common-data_0.8-13ubuntu4_ppc64el.deb ... 375s Unpacking libavahi-common-data:ppc64el (0.8-13ubuntu4) ... 375s Selecting previously unselected package libavahi-common3:ppc64el. 375s Preparing to unpack .../06-libavahi-common3_0.8-13ubuntu4_ppc64el.deb ... 375s Unpacking libavahi-common3:ppc64el (0.8-13ubuntu4) ... 375s Selecting previously unselected package libavahi-client3:ppc64el. 375s Preparing to unpack .../07-libavahi-client3_0.8-13ubuntu4_ppc64el.deb ... 375s Unpacking libavahi-client3:ppc64el (0.8-13ubuntu4) ... 375s Selecting previously unselected package libbasicobjects0t64:ppc64el. 375s Preparing to unpack .../08-libbasicobjects0t64_0.6.2-2.1_ppc64el.deb ... 375s Unpacking libbasicobjects0t64:ppc64el (0.6.2-2.1) ... 375s Selecting previously unselected package libcollection4t64:ppc64el. 375s Preparing to unpack .../09-libcollection4t64_0.6.2-2.1_ppc64el.deb ... 375s Unpacking libcollection4t64:ppc64el (0.6.2-2.1) ... 375s Selecting previously unselected package libcrack2:ppc64el. 375s Preparing to unpack .../10-libcrack2_2.9.6-5.1build1_ppc64el.deb ... 375s Unpacking libcrack2:ppc64el (2.9.6-5.1build1) ... 375s Selecting previously unselected package libdhash1t64:ppc64el. 375s Preparing to unpack .../11-libdhash1t64_0.6.2-2.1_ppc64el.deb ... 375s Unpacking libdhash1t64:ppc64el (0.6.2-2.1) ... 375s Preparing to unpack .../12-libevent-core-2.1-7_2.1.12-stable-9build1_ppc64el.deb ... 375s Unpacking libevent-core-2.1-7:ppc64el (2.1.12-stable-9build1) over (2.1.12-stable-9) ... 375s Selecting previously unselected package libpath-utils1t64:ppc64el. 375s Preparing to unpack .../13-libpath-utils1t64_0.6.2-2.1_ppc64el.deb ... 375s Unpacking libpath-utils1t64:ppc64el (0.6.2-2.1) ... 375s Selecting previously unselected package libref-array1t64:ppc64el. 375s Preparing to unpack .../14-libref-array1t64_0.6.2-2.1_ppc64el.deb ... 375s Unpacking libref-array1t64:ppc64el (0.6.2-2.1) ... 375s Selecting previously unselected package libini-config5t64:ppc64el. 375s Preparing to unpack .../15-libini-config5t64_0.6.2-2.1_ppc64el.deb ... 375s Unpacking libini-config5t64:ppc64el (0.6.2-2.1) ... 375s Selecting previously unselected package libipa-hbac0t64. 375s Preparing to unpack .../16-libipa-hbac0t64_2.9.4-1.1ubuntu3_ppc64el.deb ... 375s Unpacking libipa-hbac0t64 (2.9.4-1.1ubuntu3) ... 375s Selecting previously unselected package libtalloc2:ppc64el. 375s Preparing to unpack .../17-libtalloc2_2.4.2-1build1_ppc64el.deb ... 375s Unpacking libtalloc2:ppc64el (2.4.2-1build1) ... 375s Selecting previously unselected package libtdb1:ppc64el. 375s Preparing to unpack .../18-libtdb1_1.4.10-1_ppc64el.deb ... 375s Unpacking libtdb1:ppc64el (1.4.10-1) ... 375s Selecting previously unselected package libtevent0t64:ppc64el. 375s Preparing to unpack .../19-libtevent0t64_0.16.1-2_ppc64el.deb ... 375s Unpacking libtevent0t64:ppc64el (0.16.1-2) ... 375s Selecting previously unselected package libldb2:ppc64el. 375s Preparing to unpack .../20-libldb2_2%3a2.8.0+samba4.19.5+dfsg-4ubuntu4_ppc64el.deb ... 375s Unpacking libldb2:ppc64el (2:2.8.0+samba4.19.5+dfsg-4ubuntu4) ... 375s Selecting previously unselected package libnfsidmap1:ppc64el. 375s Preparing to unpack .../21-libnfsidmap1_1%3a2.6.4-3ubuntu3_ppc64el.deb ... 375s Unpacking libnfsidmap1:ppc64el (1:2.6.4-3ubuntu3) ... 375s Selecting previously unselected package libpwquality-common. 375s Preparing to unpack .../22-libpwquality-common_1.4.5-3_all.deb ... 375s Unpacking libpwquality-common (1.4.5-3) ... 375s Selecting previously unselected package libpwquality1:ppc64el. 375s Preparing to unpack .../23-libpwquality1_1.4.5-3_ppc64el.deb ... 375s Unpacking libpwquality1:ppc64el (1.4.5-3) ... 375s Selecting previously unselected package libpam-pwquality:ppc64el. 375s Preparing to unpack .../24-libpam-pwquality_1.4.5-3_ppc64el.deb ... 375s Unpacking libpam-pwquality:ppc64el (1.4.5-3) ... 375s Selecting previously unselected package libwbclient0:ppc64el. 375s Preparing to unpack .../25-libwbclient0_2%3a4.19.5+dfsg-4ubuntu4_ppc64el.deb ... 375s Unpacking libwbclient0:ppc64el (2:4.19.5+dfsg-4ubuntu4) ... 375s Selecting previously unselected package samba-libs:ppc64el. 375s Preparing to unpack .../26-samba-libs_2%3a4.19.5+dfsg-4ubuntu4_ppc64el.deb ... 375s Unpacking samba-libs:ppc64el (2:4.19.5+dfsg-4ubuntu4) ... 376s Selecting previously unselected package libsmbclient0:ppc64el. 376s Preparing to unpack .../27-libsmbclient0_2%3a4.19.5+dfsg-4ubuntu4_ppc64el.deb ... 376s Unpacking libsmbclient0:ppc64el (2:4.19.5+dfsg-4ubuntu4) ... 376s Selecting previously unselected package softhsm2-common. 376s Preparing to unpack .../28-softhsm2-common_2.6.1-2.2build2_ppc64el.deb ... 376s Unpacking softhsm2-common (2.6.1-2.2build2) ... 376s Selecting previously unselected package libsofthsm2. 376s Preparing to unpack .../29-libsofthsm2_2.6.1-2.2build2_ppc64el.deb ... 376s Unpacking libsofthsm2 (2.6.1-2.2build2) ... 376s Selecting previously unselected package softhsm2. 376s Preparing to unpack .../30-softhsm2_2.6.1-2.2build2_ppc64el.deb ... 376s Unpacking softhsm2 (2.6.1-2.2build2) ... 376s Selecting previously unselected package python3-sss. 376s Preparing to unpack .../31-python3-sss_2.9.4-1.1ubuntu3_ppc64el.deb ... 376s Unpacking python3-sss (2.9.4-1.1ubuntu3) ... 376s Selecting previously unselected package libsss-idmap0. 376s Preparing to unpack .../32-libsss-idmap0_2.9.4-1.1ubuntu3_ppc64el.deb ... 376s Unpacking libsss-idmap0 (2.9.4-1.1ubuntu3) ... 376s Selecting previously unselected package libnss-sss:ppc64el. 376s Preparing to unpack .../33-libnss-sss_2.9.4-1.1ubuntu3_ppc64el.deb ... 376s Unpacking libnss-sss:ppc64el (2.9.4-1.1ubuntu3) ... 376s Selecting previously unselected package libpam-sss:ppc64el. 376s Preparing to unpack .../34-libpam-sss_2.9.4-1.1ubuntu3_ppc64el.deb ... 376s Unpacking libpam-sss:ppc64el (2.9.4-1.1ubuntu3) ... 376s Selecting previously unselected package libc-ares2:ppc64el. 376s Preparing to unpack .../35-libc-ares2_1.27.0-1_ppc64el.deb ... 376s Unpacking libc-ares2:ppc64el (1.27.0-1) ... 376s Selecting previously unselected package libsss-certmap0. 376s Preparing to unpack .../36-libsss-certmap0_2.9.4-1.1ubuntu3_ppc64el.deb ... 376s Unpacking libsss-certmap0 (2.9.4-1.1ubuntu3) ... 376s Selecting previously unselected package libsss-nss-idmap0. 376s Preparing to unpack .../37-libsss-nss-idmap0_2.9.4-1.1ubuntu3_ppc64el.deb ... 376s Unpacking libsss-nss-idmap0 (2.9.4-1.1ubuntu3) ... 376s Selecting previously unselected package sssd-common. 376s Preparing to unpack .../38-sssd-common_2.9.4-1.1ubuntu3_ppc64el.deb ... 376s Unpacking sssd-common (2.9.4-1.1ubuntu3) ... 376s Selecting previously unselected package sssd-ad-common. 376s Preparing to unpack .../39-sssd-ad-common_2.9.4-1.1ubuntu3_ppc64el.deb ... 376s Unpacking sssd-ad-common (2.9.4-1.1ubuntu3) ... 376s Selecting previously unselected package sssd-krb5-common. 376s Preparing to unpack .../40-sssd-krb5-common_2.9.4-1.1ubuntu3_ppc64el.deb ... 376s Unpacking sssd-krb5-common (2.9.4-1.1ubuntu3) ... 376s Selecting previously unselected package sssd-ad. 376s Preparing to unpack .../41-sssd-ad_2.9.4-1.1ubuntu3_ppc64el.deb ... 376s Unpacking sssd-ad (2.9.4-1.1ubuntu3) ... 376s Selecting previously unselected package sssd-ipa. 376s Preparing to unpack .../42-sssd-ipa_2.9.4-1.1ubuntu3_ppc64el.deb ... 376s Unpacking sssd-ipa (2.9.4-1.1ubuntu3) ... 376s Selecting previously unselected package sssd-krb5. 376s Preparing to unpack .../43-sssd-krb5_2.9.4-1.1ubuntu3_ppc64el.deb ... 376s Unpacking sssd-krb5 (2.9.4-1.1ubuntu3) ... 376s Selecting previously unselected package sssd-ldap. 376s Preparing to unpack .../44-sssd-ldap_2.9.4-1.1ubuntu3_ppc64el.deb ... 376s Unpacking sssd-ldap (2.9.4-1.1ubuntu3) ... 376s Selecting previously unselected package sssd-proxy. 376s Preparing to unpack .../45-sssd-proxy_2.9.4-1.1ubuntu3_ppc64el.deb ... 376s Unpacking sssd-proxy (2.9.4-1.1ubuntu3) ... 376s Selecting previously unselected package sssd. 376s Preparing to unpack .../46-sssd_2.9.4-1.1ubuntu3_ppc64el.deb ... 376s Unpacking sssd (2.9.4-1.1ubuntu3) ... 376s Selecting previously unselected package autopkgtest-satdep. 376s Preparing to unpack .../47-3-autopkgtest-satdep.deb ... 376s Unpacking autopkgtest-satdep (0) ... 376s Setting up libpwquality-common (1.4.5-3) ... 376s Setting up softhsm2-common (2.6.1-2.2build2) ... 376s 376s Creating config file /etc/softhsm/softhsm2.conf with new version 376s Setting up libnfsidmap1:ppc64el (1:2.6.4-3ubuntu3) ... 376s Setting up libsss-idmap0 (2.9.4-1.1ubuntu3) ... 376s Setting up libbasicobjects0t64:ppc64el (0.6.2-2.1) ... 376s Setting up libipa-hbac0t64 (2.9.4-1.1ubuntu3) ... 376s Setting up libtirpc3t64:ppc64el (1.3.4+ds-1.1) ... 376s Setting up libref-array1t64:ppc64el (0.6.2-2.1) ... 376s Setting up libtdb1:ppc64el (1.4.10-1) ... 376s Setting up libcollection4t64:ppc64el (0.6.2-2.1) ... 376s Setting up libc-ares2:ppc64el (1.27.0-1) ... 376s Setting up libwbclient0:ppc64el (2:4.19.5+dfsg-4ubuntu4) ... 376s Setting up libtalloc2:ppc64el (2.4.2-1build1) ... 376s Setting up libpath-utils1t64:ppc64el (0.6.2-2.1) ... 376s Setting up libavahi-common-data:ppc64el (0.8-13ubuntu4) ... 376s Setting up libdhash1t64:ppc64el (0.6.2-2.1) ... 376s Setting up libevent-core-2.1-7:ppc64el (2.1.12-stable-9build1) ... 376s Setting up libevent-2.1-7:ppc64el (2.1.12-stable-9build1) ... 376s Setting up libcrack2:ppc64el (2.9.6-5.1build1) ... 376s Setting up libsss-nss-idmap0 (2.9.4-1.1ubuntu3) ... 376s Setting up libini-config5t64:ppc64el (0.6.2-2.1) ... 376s Setting up libtevent0t64:ppc64el (0.16.1-2) ... 377s Setting up libnss-sss:ppc64el (2.9.4-1.1ubuntu3) ... 377s Setting up libsofthsm2 (2.6.1-2.2build2) ... 377s Setting up softhsm2 (2.6.1-2.2build2) ... 377s Setting up libavahi-common3:ppc64el (0.8-13ubuntu4) ... 377s Setting up libsss-certmap0 (2.9.4-1.1ubuntu3) ... 377s Setting up libunbound8:ppc64el (1.19.2-1ubuntu1) ... 377s Setting up libpwquality1:ppc64el (1.4.5-3) ... 377s Setting up libgnutls-dane0t64:ppc64el (3.8.3-1.1ubuntu2) ... 377s Setting up libldb2:ppc64el (2:2.8.0+samba4.19.5+dfsg-4ubuntu4) ... 377s Setting up libavahi-client3:ppc64el (0.8-13ubuntu4) ... 377s Setting up gnutls-bin (3.8.3-1.1ubuntu2) ... 377s Setting up libpam-pwquality:ppc64el (1.4.5-3) ... 377s Setting up samba-libs:ppc64el (2:4.19.5+dfsg-4ubuntu4) ... 377s Setting up python3-sss (2.9.4-1.1ubuntu3) ... 377s Setting up libsmbclient0:ppc64el (2:4.19.5+dfsg-4ubuntu4) ... 377s Setting up libpam-sss:ppc64el (2.9.4-1.1ubuntu3) ... 377s Setting up sssd-common (2.9.4-1.1ubuntu3) ... 377s Creating SSSD system user & group... 377s warn: The home directory `/var/lib/sss' already exists. Not touching this directory. 377s warn: Warning: The home directory `/var/lib/sss' does not belong to the user you are currently creating. 377s Warning: found usr.sbin.sssd in /etc/apparmor.d/force-complain, forcing complain mode 377s Warning from /etc/apparmor.d/usr.sbin.sssd (/etc/apparmor.d/usr.sbin.sssd line 63): Caching disabled for: 'usr.sbin.sssd' due to force complain 378s Created symlink /etc/systemd/system/sssd.service.wants/sssd-autofs.socket → /usr/lib/systemd/system/sssd-autofs.socket. 378s Created symlink /etc/systemd/system/sssd.service.wants/sssd-nss.socket → /usr/lib/systemd/system/sssd-nss.socket. 378s Created symlink /etc/systemd/system/sssd.service.wants/sssd-pam-priv.socket → /usr/lib/systemd/system/sssd-pam-priv.socket. 379s Created symlink /etc/systemd/system/sssd.service.wants/sssd-pam.socket → /usr/lib/systemd/system/sssd-pam.socket. 379s Created symlink /etc/systemd/system/sssd.service.wants/sssd-ssh.socket → /usr/lib/systemd/system/sssd-ssh.socket. 379s Created symlink /etc/systemd/system/sssd.service.wants/sssd-sudo.socket → /usr/lib/systemd/system/sssd-sudo.socket. 379s Created symlink /etc/systemd/system/multi-user.target.wants/sssd.service → /usr/lib/systemd/system/sssd.service. 380s sssd-autofs.service is a disabled or a static unit, not starting it. 380s sssd-nss.service is a disabled or a static unit, not starting it. 380s sssd-pam.service is a disabled or a static unit, not starting it. 380s sssd-ssh.service is a disabled or a static unit, not starting it. 380s sssd-sudo.service is a disabled or a static unit, not starting it. 380s Could not execute systemctl: at /usr/bin/deb-systemd-invoke line 148. 380s Setting up sssd-proxy (2.9.4-1.1ubuntu3) ... 380s Setting up sssd-ad-common (2.9.4-1.1ubuntu3) ... 380s Created symlink /etc/systemd/system/sssd.service.wants/sssd-pac.socket → /usr/lib/systemd/system/sssd-pac.socket. 381s sssd-pac.service is a disabled or a static unit, not starting it. 381s Could not execute systemctl: at /usr/bin/deb-systemd-invoke line 148. 381s Setting up sssd-krb5-common (2.9.4-1.1ubuntu3) ... 381s Setting up sssd-krb5 (2.9.4-1.1ubuntu3) ... 381s Setting up sssd-ldap (2.9.4-1.1ubuntu3) ... 381s Setting up sssd-ad (2.9.4-1.1ubuntu3) ... 381s Setting up sssd-ipa (2.9.4-1.1ubuntu3) ... 381s Setting up sssd (2.9.4-1.1ubuntu3) ... 381s Setting up autopkgtest-satdep (0) ... 381s Processing triggers for man-db (2.12.0-3) ... 381s Processing triggers for libc-bin (2.39-0ubuntu2) ... 384s (Reading database ... 70727 files and directories currently installed.) 384s Removing autopkgtest-satdep (0) ... 389s autopkgtest [04:14:03]: test sssd-softhism2-certificates-tests.sh: [----------------------- 389s + '[' -z ubuntu ']' 389s + required_tools=(p11tool openssl softhsm2-util) 389s + for cmd in "${required_tools[@]}" 389s + command -v p11tool 389s + for cmd in "${required_tools[@]}" 389s + command -v openssl 389s + for cmd in "${required_tools[@]}" 389s + command -v softhsm2-util 389s + PIN=053350 389s +++ find /usr/lib/softhsm/libsofthsm2.so 389s +++ head -n 1 389s ++ realpath /usr/lib/softhsm/libsofthsm2.so 389s + SOFTHSM2_MODULE=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so 389s + SSSD_P11_CHILD=/usr/libexec/sssd/p11_child 389s + TOKEN_ID=00112233445566778899FFAABBCCDDEEFF012345 389s + '[' '!' -v NO_SSSD_TESTS ']' 389s + '[' '!' -x /usr/libexec/sssd/p11_child ']' 389s + ca_db_arg=ca_db 389s ++ /usr/libexec/sssd/p11_child --help 389s + p11_child_help='Usage: p11_child [OPTION...] 389s -d, --debug-level=INT Debug level 389s --debug-timestamps=INT Add debug timestamps 389s --debug-microseconds=INT Show timestamps with microseconds 389s --dumpable=INT Allow core dumps 389s --debug-fd=INT An open file descriptor for the debug 389s logs 389s --logger=stderr|files|journald Set logger 389s --auth Run in auth mode 389s --pre Run in pre-auth mode 389s --wait_for_card Wait until card is available 389s --verification Run in verification mode 389s --pin Expect PIN on stdin 389s --keypad Expect PIN on keypad 389s --verify=STRING Tune validation 389s --ca_db=STRING CA DB to use 389s --module_name=STRING Module name for authentication 389s --token_name=STRING Token name for authentication 389s --key_id=STRING Key ID for authentication 389s --label=STRING Label for authentication 389s --certificate=STRING certificate to verify, base64 encoded 389s --uri=STRING PKCS#11 URI to restrict selection 389s --chain-id=LONG Tevent chain ID used for logging 389s purposes 389s 389s Help options: 389s -?, --help Show this help message 389s --usage Display brief usage message' 389s + echo 'Usage: p11_child [OPTION...] 389s -d, --debug-level=INT Debug level 389s + grep nssdb -qs 389s --debug-timestamps=INT Add debug timestamps 389s --debug-microseconds=INT Show timestamps with microseconds 389s --dumpable=INT Allow core dumps 389s --debug-fd=INT An open file descriptor for the debug 389s logs 389s --logger=stderr|files|journald Set logger 389s --auth Run in auth mode 389s --pre Run in pre-auth mode 389s --wait_for_card Wait until card is available 389s --verification Run in verification mode 389s --pin Expect PIN on stdin 389s --keypad Expect PIN on keypad 389s --verify=STRING Tune validation 389s --ca_db=STRING CA DB to use 389s --module_name=STRING Module name for authentication 389s --token_name=STRING Token name for authentication 389s --key_id=STRING Key ID for authentication 389s --label=STRING Label for authentication 389s --certificate=STRING certificate to verify, base64 encoded 389s --uri=STRING PKCS#11 URI to restrict selection 389s --chain-id=LONG Tevent chain ID used for logging 389s purposes 389s 389s Help options: 389s -?, --help Show this help message 389s --usage Display brief usage message' 389s + echo 'Usage: p11_child [OPTION...] 389s -d, --debug-level=INT Debug level 389s + grep -qs -- --ca_db 389s --debug-timestamps=INT Add debug timestamps 389s --debug-microseconds=INT Show timestamps with microseconds 389s --dumpable=INT Allow core dumps 389s --debug-fd=INT An open file descriptor for the debug 389s logs 389s --logger=stderr|files|journald Set logger 389s --auth Run in auth mode 389s --pre Run in pre-auth mode 389s --wait_for_card Wait until card is available 389s --verification Run in verification mode 389s --pin Expect PIN on stdin 389s --keypad Expect PIN on keypad 389s --verify=STRING Tune validation 389s --ca_db=STRING CA DB to use 389s --module_name=STRING Module name for authentication 389s --token_name=STRING Token name for authentication 389s --key_id=STRING Key ID for authentication 389s --label=STRING Label for authentication 389s --certificate=STRING certificate to verify, base64 encoded 389s --uri=STRING PKCS#11 URI to restrict selection 389s --chain-id=LONG Tevent chain ID used for logging 389s purposes 389s 389s Help options: 389s -?, --help Show this help message 389s --usage Display brief usage message' 389s + '[' '!' -e /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so ']' 389s ++ mktemp -d -t sssd-softhsm2-XXXXXX 389s + tmpdir=/tmp/sssd-softhsm2-OnwLCh 389s + keys_size=1024 389s + [[ ! -v KEEP_TEMPORARY_FILES ]] 389s + trap 'rm -rf "$tmpdir"' EXIT 389s + trap 'set +x; echo -e "\nUnexpected failure!!!"' ERR 389s + echo -n 01 389s + touch /tmp/sssd-softhsm2-OnwLCh/index.txt 389s + mkdir -p /tmp/sssd-softhsm2-OnwLCh/new_certs 389s + cat 389s + root_ca_key_pass=pass:random-root-CA-password-16048 389s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-OnwLCh/test-root-CA-key.pem -passout pass:random-root-CA-password-16048 1024 389s + openssl req -passin pass:random-root-CA-password-16048 -batch -config /tmp/sssd-softhsm2-OnwLCh/test-root-CA.config -x509 -new -nodes -key /tmp/sssd-softhsm2-OnwLCh/test-root-CA-key.pem -sha256 -days 1024 -set_serial 0 -extensions v3_ca -out /tmp/sssd-softhsm2-OnwLCh/test-root-CA.pem 389s + openssl x509 -noout -in /tmp/sssd-softhsm2-OnwLCh/test-root-CA.pem 389s + cat 389s + intermediate_ca_key_pass=pass:random-intermediate-CA-password-21974 389s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA-key.pem -passout pass:random-intermediate-CA-password-21974 1024 389s + openssl req -batch -new -nodes -passin pass:random-intermediate-CA-password-21974 -config /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA.config -key /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA-key.pem -passout pass:random-root-CA-password-16048 -sha256 -extensions v3_ca -out /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA-certificate-request.pem 389s + openssl req -text -noout -in /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA-certificate-request.pem 389s Certificate Request: 389s Data: 389s Version: 1 (0x0) 389s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 389s Subject Public Key Info: 389s Public Key Algorithm: rsaEncryption 389s Public-Key: (1024 bit) 389s Modulus: 389s 00:b4:4f:07:e3:12:8a:07:9d:2d:0c:6d:c3:dc:f3: 389s 79:4f:ed:59:61:75:38:ed:f4:6e:53:6b:14:e3:ec: 389s dc:2b:37:35:af:89:20:ad:2c:e4:ea:fd:f8:bc:d7: 389s c5:c1:c0:ef:5d:44:e2:0c:7a:f1:e4:04:4c:a9:5c: 389s fc:a3:57:bb:21:9e:62:d8:f9:94:57:dd:94:1c:20: 389s 92:36:61:5a:8d:ed:0a:68:02:36:24:d8:1e:e5:f9: 389s f8:9d:fb:a9:3c:dd:fb:32:c2:77:37:cc:75:8f:a4: 389s b9:ca:bf:90:ee:84:28:84:81:1d:ab:1d:de:ae:a9: 389s c0:0b:54:f9:90:3a:20:fa:e3 389s Exponent: 65537 (0x10001) 389s Attributes: 389s (none) 389s Requested Extensions: 389s Signature Algorithm: sha256WithRSAEncryption 389s Signature Value: 389s 42:3c:71:11:52:cb:c4:4a:39:93:5a:0a:64:41:f7:13:1b:3b: 389s 49:5c:86:22:37:9f:e7:70:f2:c0:2c:c5:19:e5:3e:98:16:cc: 389s df:79:e7:b6:df:5a:4a:bc:ae:3a:7e:dd:ab:53:d8:9d:0e:75: 389s ae:c9:3d:ce:b2:95:91:1a:6b:92:c7:40:05:c3:90:79:54:d1: 389s 8e:0c:6c:f8:b5:65:2c:82:d5:ff:f9:32:45:b0:33:70:e6:45: 389s 64:e6:dc:16:7f:24:4d:76:73:8c:35:39:e5:32:99:38:b5:c7: 389s 2a:79:a5:f8:f4:85:8c:9d:28:b5:d7:56:91:39:38:5f:d7:28: 389s ab:0d 389s + openssl ca -batch -notext -config /tmp/sssd-softhsm2-OnwLCh/test-root-CA.config -passin pass:random-root-CA-password-16048 -keyfile /tmp/sssd-softhsm2-OnwLCh/test-root-CA-key.pem -in /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA-certificate-request.pem -days 365 -extensions v3_intermediate_ca -out /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA.pem 389s Using configuration from /tmp/sssd-softhsm2-OnwLCh/test-root-CA.config 389s Check that the request matches the signature 389s Signature ok 389s Certificate Details: 389s Serial Number: 1 (0x1) 389s Validity 389s Not Before: Mar 20 04:14:03 2024 GMT 389s Not After : Mar 20 04:14:03 2025 GMT 389s Subject: 389s organizationName = Test Organization 389s organizationalUnitName = Test Organization Unit 389s commonName = Test Organization Intermediate CA 389s X509v3 extensions: 389s X509v3 Subject Key Identifier: 389s 23:A6:E2:94:B7:17:90:42:ED:CF:CD:99:1C:B9:22:74:FC:61:4B:50 389s X509v3 Authority Key Identifier: 389s keyid:70:74:B7:BF:DB:F4:0D:AA:C4:0C:9F:D6:7D:AB:65:0C:31:AA:94:92 389s DirName:/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root CA 389s serial:00 389s X509v3 Basic Constraints: 389s CA:TRUE 389s X509v3 Key Usage: critical 389s Digital Signature, Certificate Sign, CRL Sign 389s Certificate is to be certified until Mar 20 04:14:03 2025 GMT (365 days) 389s 389s Write out database with 1 new entries 389s Database updated 389s + openssl x509 -noout -in /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA.pem 389s + openssl verify -CAfile /tmp/sssd-softhsm2-OnwLCh/test-root-CA.pem /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA.pem 389s /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA.pem: OK 389s + cat 389s + sub_intermediate_ca_key_pass=pass:random-sub-intermediate-CA-password-27491 389s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-key.pem -passout pass:random-sub-intermediate-CA-password-27491 1024 389s + openssl req -batch -new -nodes -passin pass:random-sub-intermediate-CA-password-27491 -config /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA.config -key /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-key.pem -passout pass:random-intermediate-CA-password-21974 -sha256 -extensions v3_ca -out /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-certificate-request.pem 389s + openssl req -text -noout -in /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-certificate-request.pem 389s Certificate Request: 389s Data: 389s Version: 1 (0x0) 389s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 389s Subject Public Key Info: 389s Public Key Algorithm: rsaEncryption 389s Public-Key: (1024 bit) 389s Modulus: 389s 00:ab:1e:2b:61:9d:9e:25:3c:03:95:6e:7a:4a:cd: 389s 55:d3:8f:3a:0a:01:6a:c2:f6:b6:37:9d:f6:c7:6a: 389s 11:31:6f:ad:d5:a8:1b:f2:87:4a:3b:60:a3:4b:07: 389s fa:9a:e2:b1:93:af:2a:05:80:b2:ac:da:ae:ab:29: 389s 5b:dd:a4:d1:8d:5f:1b:7b:eb:ff:85:99:b5:0d:eb: 389s 35:a5:43:df:29:d1:ca:d2:9e:de:69:13:dd:db:e3: 389s 7b:96:1b:8c:cd:22:14:32:32:29:14:18:56:91:de: 389s b9:ec:f3:f2:a4:dc:fc:7c:5a:5d:d6:37:be:40:d0: 389s ba:bb:46:95:d6:33:de:89:01 389s Exponent: 65537 (0x10001) 389s Attributes: 389s (none) 389s Requested Extensions: 389s Signature Algorithm: sha256WithRSAEncryption 389s Signature Value: 389s 80:fd:88:ac:16:c6:a3:6a:df:3c:04:a6:ab:d0:e0:d0:9e:47: 389s da:35:8f:da:ba:cd:e8:63:52:96:7d:59:ed:f3:c6:27:0f:34: 389s 5b:08:62:dc:d7:3f:5b:b1:cb:bc:ab:d6:45:54:3a:d9:cb:c5: 389s ce:ef:96:fa:0c:68:62:07:96:27:b1:ed:06:4a:30:0f:9f:93: 389s 0a:db:d2:9d:a2:79:01:04:9f:db:4d:54:08:90:5d:ea:38:fe: 389s b4:8f:3f:62:44:db:a7:fa:81:27:c3:da:76:36:e7:cf:50:96: 389s f4:44:00:ea:8d:bc:2c:22:d2:94:fc:97:6f:da:d0:e0:93:e7: 389s 62:39 389s + openssl ca -batch -notext -config /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA.config -passin pass:random-intermediate-CA-password-21974 -keyfile /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA-key.pem -in /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-certificate-request.pem -days 365 -extensions v3_intermediate_ca -out /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA.pem 389s Using configuration from /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA.config 389s Check that the request matches the signature 389s Signature ok 389s Certificate Details: 389s Serial Number: 2 (0x2) 389s Validity 389s Not Before: Mar 20 04:14:03 2024 GMT 389s Not After : Mar 20 04:14:03 2025 GMT 389s Subject: 389s organizationName = Test Organization 389s organizationalUnitName = Test Organization Unit 389s commonName = Test Organization Sub Intermediate CA 389s X509v3 extensions: 389s X509v3 Subject Key Identifier: 389s 45:E0:C3:E1:3A:E0:9B:CD:DD:20:F7:3F:52:AB:59:04:57:EF:2F:A3 389s X509v3 Authority Key Identifier: 389s keyid:23:A6:E2:94:B7:17:90:42:ED:CF:CD:99:1C:B9:22:74:FC:61:4B:50 389s DirName:/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root CA 389s serial:01 389s X509v3 Basic Constraints: 389s CA:TRUE 389s X509v3 Key Usage: critical 389s Digital Signature, Certificate Sign, CRL Sign 389s Certificate is to be certified until Mar 20 04:14:03 2025 GMT (365 days) 389s 389s Write out database with 1 new entries 389s Database updated 389s + openssl x509 -noout -in /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA.pem 389s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA.pem /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA.pem 389s /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA.pem: OK 389s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-OnwLCh/test-root-CA.pem /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA.pem 389s + local cmd=openssl 389s + shift 389s + openssl verify -CAfile /tmp/sssd-softhsm2-OnwLCh/test-root-CA.pem /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA.pem 389s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 389s error 20 at 0 depth lookup: unable to get local issuer certificate 389s error /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA.pem: verification failed 389s + cat 389s + root_ca_trusted_cert_0001_key_pass=pass:random-root-ca-trusted-cert-0001-31239 389s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-OnwLCh/test-root-CA-trusted-certificate-0001-key.pem -passout pass:random-root-ca-trusted-cert-0001-31239 1024 389s + openssl req -new -nodes -reqexts req_exts -passin pass:random-root-ca-trusted-cert-0001-31239 -key /tmp/sssd-softhsm2-OnwLCh/test-root-CA-trusted-certificate-0001-key.pem -config /tmp/sssd-softhsm2-OnwLCh/test-root-CA-trusted-certificate-0001.config -out /tmp/sssd-softhsm2-OnwLCh/test-root-CA-trusted-certificate-0001-request.pem 389s + openssl req -text -noout -in /tmp/sssd-softhsm2-OnwLCh/test-root-CA-trusted-certificate-0001-request.pem 389s Certificate Request: 389s Data: 389s Version: 1 (0x0) 389s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 389s Subject Public Key Info: 389s Public Key Algorithm: rsaEncryption 389s Public-Key: (1024 bit) 389s Modulus: 389s 00:d0:9a:e6:ee:13:82:d1:bc:33:b2:c2:e0:8d:20: 389s b2:a4:98:6c:13:d2:8c:a5:df:36:48:67:1b:61:1e: 389s 42:05:c4:cd:39:99:0f:00:41:cc:c3:7b:27:cf:c3: 389s 60:8f:49:61:5f:e1:6c:b7:bd:01:6e:a6:d7:39:26: 389s d0:af:be:dd:d4:11:52:56:39:c9:08:dd:18:7a:e0: 389s fa:56:95:8b:04:fd:1b:af:87:60:4e:21:50:97:2e: 389s 12:c7:92:27:56:bc:0e:69:6b:79:8c:11:5d:db:c2: 389s b1:d4:66:a2:c4:68:57:75:12:bb:66:c0:34:e1:55: 389s f0:57:c9:e8:d2:2f:7a:c8:19 389s Exponent: 65537 (0x10001) 389s Attributes: 389s Requested Extensions: 389s X509v3 Basic Constraints: 389s CA:FALSE 389s Netscape Cert Type: 389s SSL Client, S/MIME 389s Netscape Comment: 389s Test Organization Root CA trusted Certificate 389s X509v3 Subject Key Identifier: 389s 35:B5:3D:3E:BE:0E:68:10:43:2F:45:9B:AC:DA:4A:80:C6:5F:A2:ED 389s X509v3 Key Usage: critical 389s Digital Signature, Non Repudiation, Key Encipherment 389s X509v3 Extended Key Usage: 389s TLS Web Client Authentication, E-mail Protection 389s X509v3 Subject Alternative Name: 389s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 389s Signature Algorithm: sha256WithRSAEncryption 389s Signature Value: 389s cd:f6:00:9c:3b:61:b4:81:98:45:4d:53:05:83:c7:e0:2c:b9: 389s 64:eb:c0:7f:0b:2c:48:b4:09:0f:53:a1:49:1f:ee:b4:e2:8e: 389s 92:b5:61:0d:38:32:d8:8b:c1:6a:53:72:93:e3:ff:65:5a:93: 389s 24:38:97:0b:86:43:1d:eb:db:c6:82:26:d3:ce:77:91:b6:be: 389s 6a:9d:d0:76:26:f8:9d:12:e3:41:f8:7e:fa:92:bc:de:0e:14: 389s 29:75:b5:d3:12:f3:2a:63:0f:43:55:45:9f:9c:62:8f:3d:1c: 389s 73:43:df:29:2b:74:f3:4c:19:fc:d0:ab:31:fa:e0:ef:fe:6d: 389s 4d:51 389s + openssl ca -batch -notext -config /tmp/sssd-softhsm2-OnwLCh/test-root-CA.config -passin pass:random-root-CA-password-16048 -keyfile /tmp/sssd-softhsm2-OnwLCh/test-root-CA-key.pem -in /tmp/sssd-softhsm2-OnwLCh/test-root-CA-trusted-certificate-0001-request.pem -days 365 -extensions usr_cert -out /tmp/sssd-softhsm2-OnwLCh/test-root-CA-trusted-certificate-0001.pem 389s Using configuration from /tmp/sssd-softhsm2-OnwLCh/test-root-CA.config 389s Check that the request matches the signature 389s Signature ok 389s Certificate Details: 389s Serial Number: 3 (0x3) 389s Validity 389s Not Before: Mar 20 04:14:03 2024 GMT 389s Not After : Mar 20 04:14:03 2025 GMT 389s Subject: 389s organizationName = Test Organization 389s organizationalUnitName = Test Organization Unit 389s commonName = Test Organization Root Trusted Certificate 0001 389s X509v3 extensions: 389s X509v3 Authority Key Identifier: 389s 70:74:B7:BF:DB:F4:0D:AA:C4:0C:9F:D6:7D:AB:65:0C:31:AA:94:92 389s X509v3 Basic Constraints: 389s CA:FALSE 389s Netscape Cert Type: 389s SSL Client, S/MIME 389s Netscape Comment: 389s Test Organization Root CA trusted Certificate 389s X509v3 Subject Key Identifier: 389s 35:B5:3D:3E:BE:0E:68:10:43:2F:45:9B:AC:DA:4A:80:C6:5F:A2:ED 389s X509v3 Key Usage: critical 389s Digital Signature, Non Repudiation, Key Encipherment 389s X509v3 Extended Key Usage: 389s TLS Web Client Authentication, E-mail Protection 389s X509v3 Subject Alternative Name: 389s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 389s Certificate is to be certified until Mar 20 04:14:03 2025 GMT (365 days) 389s 389s Write out database with 1 new entries 389s Database updated 389s + openssl x509 -noout -in /tmp/sssd-softhsm2-OnwLCh/test-root-CA-trusted-certificate-0001.pem 389s + openssl verify -CAfile /tmp/sssd-softhsm2-OnwLCh/test-root-CA.pem /tmp/sssd-softhsm2-OnwLCh/test-root-CA-trusted-certificate-0001.pem 389s /tmp/sssd-softhsm2-OnwLCh/test-root-CA-trusted-certificate-0001.pem: OK 389s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA.pem /tmp/sssd-softhsm2-OnwLCh/test-root-CA-trusted-certificate-0001.pem 389s + local cmd=openssl 389s + shift 389s + openssl verify -CAfile /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA.pem /tmp/sssd-softhsm2-OnwLCh/test-root-CA-trusted-certificate-0001.pem 389s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 389s error 20 at 0 depth lookup: unable to get local issuer certificate 389s error /tmp/sssd-softhsm2-OnwLCh/test-root-CA-trusted-certificate-0001.pem: verification failed 389s + cat 389s + intermediate_ca_trusted_cert_0001_key_pass=pass:random-intermediate-ca-trusted-cert-0001-7089 389s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA-trusted-certificate-0001-key.pem -passout pass:random-intermediate-ca-trusted-cert-0001-7089 1024 389s + openssl req -new -nodes -reqexts req_exts -passin pass:random-intermediate-ca-trusted-cert-0001-7089 -key /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA-trusted-certificate-0001-key.pem -config /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA-trusted-certificate-0001.config -out /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA-trusted-certificate-0001-request.pem 389s + openssl req -text -noout -in /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA-trusted-certificate-0001-request.pem 389s Certificate Request: 389s Data: 389s Version: 1 (0x0) 389s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 389s Subject Public Key Info: 389s Public Key Algorithm: rsaEncryption 389s Public-Key: (1024 bit) 389s Modulus: 389s 00:e1:50:21:27:e2:3f:41:2a:68:28:e0:31:09:95: 389s 47:86:35:67:e6:c3:17:5b:5e:1a:ff:55:e6:05:18: 389s f9:1c:33:f8:25:62:69:7c:63:72:30:7c:a3:83:ea: 389s a9:eb:37:98:04:89:7b:60:80:fd:e9:be:87:c2:18: 389s 77:db:81:16:7c:a2:0d:87:3f:69:ae:db:35:96:c4: 389s 19:92:82:bf:4b:c3:3d:34:90:50:54:9f:96:2d:c4: 389s 0a:1f:4d:d3:c9:c3:16:35:1a:f3:bf:b7:cf:61:82: 389s 1e:85:e0:a4:8b:50:cd:01:85:50:c1:8d:dc:37:48: 389s 91:9d:83:af:f6:fb:55:1d:a7 389s Exponent: 65537 (0x10001) 389s Attributes: 389s Requested Extensions: 389s X509v3 Basic Constraints: 389s CA:FALSE 389s Netscape Cert Type: 389s SSL Client, S/MIME 389s Netscape Comment: 389s Test Organization Intermediate CA trusted Certificate 389s X509v3 Subject Key Identifier: 389s 1A:3D:9B:57:59:58:53:9C:51:D4:06:F7:B2:50:47:79:3C:DE:89:FD 389s X509v3 Key Usage: critical 389s Digital Signature, Non Repudiation, Key Encipherment 389s X509v3 Extended Key Usage: 389s TLS Web Client Authentication, E-mail Protection 389s X509v3 Subject Alternative Name: 389s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 389s Signature Algorithm: sha256WithRSAEncryption 389s Signature Value: 389s 0c:f5:b1:f1:55:5c:79:0f:3d:d8:e0:08:eb:a2:a7:62:5d:80: 389s 9a:45:19:b7:54:e6:d4:db:47:75:7f:d2:7f:d8:d1:11:16:a1: 389s d1:4f:bc:5f:ef:a2:f9:3d:2a:50:dd:4f:ba:d5:32:eb:7e:79: 389s 36:e6:7d:b6:78:bb:63:cf:0d:ad:68:8e:29:b7:c2:52:92:2c: 389s 30:09:fc:36:e1:77:e7:68:a9:f8:29:b9:5d:81:a4:19:53:f3: 389s ad:38:3f:01:cb:07:d2:c6:62:5e:24:e4:35:30:6c:e4:e3:0c: 389s 25:02:28:32:45:ed:30:0d:cb:49:ea:71:52:ce:ee:5f:a6:92: 389s 0b:c8 389s + openssl ca -passin pass:random-intermediate-CA-password-21974 -config /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA.config -batch -notext -keyfile /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA-key.pem -in /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA-trusted-certificate-0001-request.pem -days 365 -extensions usr_cert -out /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA-trusted-certificate-0001.pem 389s Using configuration from /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA.config 389s Check that the request matches the signature 389s Signature ok 389s Certificate Details: 389s Serial Number: 4 (0x4) 389s Validity 389s Not Before: Mar 20 04:14:03 2024 GMT 389s Not After : Mar 20 04:14:03 2025 GMT 389s Subject: 389s organizationName = Test Organization 389s organizationalUnitName = Test Organization Unit 389s commonName = Test Organization Intermediate Trusted Certificate 0001 389s X509v3 extensions: 389s X509v3 Authority Key Identifier: 389s 23:A6:E2:94:B7:17:90:42:ED:CF:CD:99:1C:B9:22:74:FC:61:4B:50 389s X509v3 Basic Constraints: 389s CA:FALSE 389s Netscape Cert Type: 389s SSL Client, S/MIME 389s Netscape Comment: 389s Test Organization Intermediate CA trusted Certificate 389s X509v3 Subject Key Identifier: 389s 1A:3D:9B:57:59:58:53:9C:51:D4:06:F7:B2:50:47:79:3C:DE:89:FD 389s X509v3 Key Usage: critical 389s Digital Signature, Non Repudiation, Key Encipherment 389s X509v3 Extended Key Usage: 389s TLS Web Client Authentication, E-mail Protection 389s X509v3 Subject Alternative Name: 389s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 389s Certificate is to be certified until Mar 20 04:14:03 2025 GMT (365 days) 389s 389s Write out database with 1 new entries 389s Database updated 389s + openssl x509 -noout -in /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA-trusted-certificate-0001.pem 389s + echo 'This certificate should not be trusted fully' 389s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA.pem /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA-trusted-certificate-0001.pem 389s + local cmd=openssl 389s + shift 389s This certificate should not be trusted fully 389s + openssl verify -CAfile /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA.pem /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA-trusted-certificate-0001.pem 389s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 389s error 2 at 1 depth lookup: unable to get issuer certificate 389s error /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA-trusted-certificate-0001.pem: verification failed 389s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA.pem /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA-trusted-certificate-0001.pem 389s /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA-trusted-certificate-0001.pem: OK 389s + cat 389s + sub_intermediate_ca_trusted_cert_0001_key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-10509 389s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-trusted-certificate-0001-key.pem -passout pass:random-sub-intermediate-ca-trusted-cert-0001-10509 1024 389s + openssl req -new -nodes -reqexts req_exts -passin pass:random-sub-intermediate-ca-trusted-cert-0001-10509 -key /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-trusted-certificate-0001-key.pem -config /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-trusted-certificate-0001.config -out /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-trusted-certificate-0001-request.pem 390s Certificate Request: 390s Data: 390s Version: 1 (0x0) 390s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 390s Subject Public Key Info: 390s Public Key Algorithm: rsaEncryption 390s Public-Key: (1024 bit) 390s Modulus: 390s 00:b4:a9:66:82:34:e9:48:81:7e:d4:5e:0c:d4:a5: 390s de:a3:d6:42:62:f3:00:7f:e4:1d:09:c5:27:38:cd: 390s 5a:66:f7:33:39:36:2e:47:1d:a0:06:0d:93:ae:44: 390s 67:b9:6f:09:79:4f:4c:33:44:5c:cc:06:9d:07:b2: 390s 35:15:8c:de:e0:95:2f:24:9e:5a:81:97:cb:39:d0: 390s 4b:5d:6f:b0:3a:b8:81:5e:bb:9c:24:e0:7e:e2:cb: 390s 9c:c7:01:11:11:e9:11:2a:a8:d2:8d:de:10:43:ac: 390s 9e:e4:5a:3b:3c:1d:02:9d:0a:4b:7a:7d:ca:11:bc: 390s a4:29:73:7c:00:3c:7f:30:41 390s Exponent: 65537 (0x10001) 390s Attributes: 390s Requested Extensions: 390s X509v3 Basic Constraints: 390s CA:FALSE 390s Netscape Cert Type: 390s SSL Client, S/MIME 390s Netscape Comment: 390s Test Organization Sub Intermediate CA trusted Certificate 390s X509v3 Subject Key Identifier: 390s 6E:66:4D:15:EB:5E:66:11:17:D1:E3:3B:AC:B3:F7:54:C8:22:F1:55 390s X509v3 Key Usage: critical 390s Digital Signature, Non Repudiation, Key Encipherment 390s X509v3 Extended Key Usage: 390s TLS Web Client Authentication, E-mail Protection 390s X509v3 Subject Alternative Name: 390s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 390s Signature Algorithm: sha256WithRSAEncryption 390s Signature Value: 390s 48:4c:da:10:44:ca:df:fb:7f:00:f6:ac:6c:3e:20:d3:d7:36: 390s a7:a0:f6:85:cd:b2:5c:4b:93:d5:19:0a:d5:ce:f4:de:21:17: 390s 99:3f:af:5a:66:16:ba:01:fa:e5:da:2c:ff:95:3d:c3:a3:4c: 390s 5b:e1:46:02:44:e7:32:ed:5f:d5:42:db:08:55:e2:9f:62:4e: 390s de:e0:70:42:3a:0f:8c:31:b7:cc:d2:11:54:70:59:3b:54:aa: 390s 1c:c1:60:33:d3:58:cc:bf:6b:ec:14:cc:75:b5:1a:d0:4e:9b: 390s 08:fc:d7:2b:dd:3e:4f:fb:98:92:ff:d7:07:1b:4e:eb:db:7a: 390s 53:9e 390s + openssl req -text -noout -in /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-trusted-certificate-0001-request.pem 390s + openssl ca -passin pass:random-sub-intermediate-CA-password-27491 -config /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA.config -batch -notext -keyfile /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-key.pem -in /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-trusted-certificate-0001-request.pem -days 365 -extensions usr_cert -out /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-trusted-certificate-0001.pem 390s Using configuration from /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA.config 390s Check that the request matches the signature 390s Signature ok 390s Certificate Details: 390s Serial Number: 5 (0x5) 390s Validity 390s Not Before: Mar 20 04:14:03 2024 GMT 390s Not After : Mar 20 04:14:03 2025 GMT 390s Subject: 390s organizationName = Test Organization 390s organizationalUnitName = Test Organization Unit 390s commonName = Test Organization Sub Intermediate Trusted Certificate 0001 390s X509v3 extensions: 390s X509v3 Authority Key Identifier: 390s 45:E0:C3:E1:3A:E0:9B:CD:DD:20:F7:3F:52:AB:59:04:57:EF:2F:A3 390s X509v3 Basic Constraints: 390s CA:FALSE 390s Netscape Cert Type: 390s SSL Client, S/MIME 390s Netscape Comment: 390s Test Organization Sub Intermediate CA trusted Certificate 390s X509v3 Subject Key Identifier: 390s 6E:66:4D:15:EB:5E:66:11:17:D1:E3:3B:AC:B3:F7:54:C8:22:F1:55 390s X509v3 Key Usage: critical 390s Digital Signature, Non Repudiation, Key Encipherment 390s X509v3 Extended Key Usage: 390s TLS Web Client Authentication, E-mail Protection 390s X509v3 Subject Alternative Name: 390s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 390s Certificate is to be certified until Mar 20 04:14:03 2025 GMT (365 days) 390s 390s Write out database with 1 new entries 390s Database updated 390s + openssl x509 -noout -in /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-trusted-certificate-0001.pem 390s + echo 'This certificate should not be trusted fully' 390s This certificate should not be trusted fully 390s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA.pem /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-trusted-certificate-0001.pem 390s + local cmd=openssl 390s + shift 390s + openssl verify -CAfile /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA.pem /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-trusted-certificate-0001.pem 390s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 390s error 2 at 1 depth lookup: unable to get issuer certificate 390s error /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-trusted-certificate-0001.pem: verification failed 390s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA.pem /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-trusted-certificate-0001.pem 390s + local cmd=openssl 390s + shift 390s + openssl verify -CAfile /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA.pem /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-trusted-certificate-0001.pem 390s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 390s error 20 at 0 depth lookup: unable to get local issuer certificate 390s error /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-trusted-certificate-0001.pem: verification failed 390s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA.pem /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-trusted-certificate-0001.pem 390s /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-trusted-certificate-0001.pem: OK 390s + expect_fail openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA.pem /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-trusted-certificate-0001.pem 390s + local cmd=openssl 390s + shift 390s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA.pem /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-trusted-certificate-0001.pem 390s Building a the full-chain CA file... 390s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 390s error 20 at 0 depth lookup: unable to get local issuer certificate 390s error /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-trusted-certificate-0001.pem: verification failed 390s + echo 'Building a the full-chain CA file...' 390s + cat /tmp/sssd-softhsm2-OnwLCh/test-root-CA.pem /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA.pem /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA.pem 390s + cat /tmp/sssd-softhsm2-OnwLCh/test-root-CA.pem /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA.pem 390s + cat /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA.pem /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA.pem 390s + openssl crl2pkcs7 -nocrl -certfile /tmp/sssd-softhsm2-OnwLCh/test-full-chain-CA.pem 390s subject=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 390s issuer=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 390s 390s subject=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 390s issuer=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 390s 390s subject=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 390s issuer=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 390s 390s + openssl pkcs7 -print_certs -noout 390s + openssl verify -CAfile /tmp/sssd-softhsm2-OnwLCh/test-full-chain-CA.pem /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA.pem 390s /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA.pem: OK 390s + openssl verify -CAfile /tmp/sssd-softhsm2-OnwLCh/test-full-chain-CA.pem /tmp/sssd-softhsm2-OnwLCh/test-root-CA-trusted-certificate-0001.pem 390s /tmp/sssd-softhsm2-OnwLCh/test-root-CA-trusted-certificate-0001.pem: OK 390s + openssl verify -CAfile /tmp/sssd-softhsm2-OnwLCh/test-full-chain-CA.pem /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA-trusted-certificate-0001.pem 390s + openssl verify -CAfile /tmp/sssd-softhsm2-OnwLCh/test-full-chain-CA.pem /tmp/sssd-softhsm2-OnwLCh/test-root-intermediate-chain-CA.pem 390s /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA-trusted-certificate-0001.pem: OK 390s /tmp/sssd-softhsm2-OnwLCh/test-root-intermediate-chain-CA.pem: OK 390s + openssl verify -CAfile /tmp/sssd-softhsm2-OnwLCh/test-full-chain-CA.pem /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-trusted-certificate-0001.pem 390s /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-trusted-certificate-0001.pem: OK 390s + echo 'Certificates generation completed!' 390s Certificates generation completed! 390s + [[ -v NO_SSSD_TESTS ]] 390s + invalid_certificate /tmp/sssd-softhsm2-OnwLCh/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-31239 /dev/null 390s + check_certificate /tmp/sssd-softhsm2-OnwLCh/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-31239 /dev/null 390s + local certificate=/tmp/sssd-softhsm2-OnwLCh/test-root-CA-trusted-certificate-0001.pem 390s + local key_pass=pass:random-root-ca-trusted-cert-0001-31239 390s + local key_ring=/dev/null 390s + local verify_option= 390s + prepare_softhsm2_card /tmp/sssd-softhsm2-OnwLCh/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-31239 390s + local certificate=/tmp/sssd-softhsm2-OnwLCh/test-root-CA-trusted-certificate-0001.pem 390s + local key_pass=pass:random-root-ca-trusted-cert-0001-31239 390s + local key_cn 390s + local key_name 390s + local tokens_dir 390s + local output_cert_file 390s + token_name= 390s ++ basename /tmp/sssd-softhsm2-OnwLCh/test-root-CA-trusted-certificate-0001.pem .pem 390s + key_name=test-root-CA-trusted-certificate-0001 390s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-OnwLCh/test-root-CA-trusted-certificate-0001.pem 390s ++ sed -n 's/ *commonName *= //p' 390s + key_cn='Test Organization Root Trusted Certificate 0001' 390s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 390s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-OnwLCh/softhsm2-test-root-CA-trusted-certificate-0001.conf 390s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-OnwLCh/softhsm2-test-root-CA-trusted-certificate-0001.conf 390s ++ basename /tmp/sssd-softhsm2-OnwLCh/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 390s + tokens_dir=/tmp/sssd-softhsm2-OnwLCh/softhsm2-test-root-CA-trusted-certificate-0001 390s + token_name='Test Organization Root Tr Token' 390s + '[' '!' -e /tmp/sssd-softhsm2-OnwLCh/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 390s + local key_file 390s + local decrypted_key 390s + mkdir -p /tmp/sssd-softhsm2-OnwLCh/softhsm2-test-root-CA-trusted-certificate-0001 390s + key_file=/tmp/sssd-softhsm2-OnwLCh/test-root-CA-trusted-certificate-0001-key.pem 390s + decrypted_key=/tmp/sssd-softhsm2-OnwLCh/test-root-CA-trusted-certificate-0001-key-decrypted.pem 390s + cat 390s + softhsm2-util --init-token --label 'Test Organization Root Tr Token' --pin 053350 --so-pin 053350 --free 390s Slot 0 has a free/uninitialized token. 390s The token has been initialized and is reassigned to slot 1182865622 390s + softhsm2-util --show-slots 390s Available slots: 390s Slot 1182865622 390s Slot info: 390s Description: SoftHSM slot ID 0x468118d6 390s Manufacturer ID: SoftHSM project 390s Hardware version: 2.6 390s Firmware version: 2.6 390s Token present: yes 390s Token info: 390s Manufacturer ID: SoftHSM project 390s Model: SoftHSM v2 390s Hardware version: 2.6 390s Firmware version: 2.6 390s Serial number: 7c62ded9468118d6 390s Initialized: yes 390s User PIN init.: yes 390s Label: Test Organization Root Tr Token 390s Slot 1 390s Slot info: 390s Description: SoftHSM slot ID 0x1 390s Manufacturer ID: SoftHSM project 390s Hardware version: 2.6 390s Firmware version: 2.6 390s Token present: yes 390s Token info: 390s Manufacturer ID: SoftHSM project 390s Model: SoftHSM v2 390s Hardware version: 2.6 390s Firmware version: 2.6 390s Serial number: 390s Initialized: no 390s User PIN init.: no 390s Label: 390s + p11tool --provider=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --write --no-mark-private --load-certificate=/tmp/sssd-softhsm2-OnwLCh/test-root-CA-trusted-certificate-0001.pem --login --set-pin=053350 --label 'Test Organization Root Trusted Certificate 0001' --id 00112233445566778899FFAABBCCDDEEFF012345 390s + openssl rsa -passin pass:random-root-ca-trusted-cert-0001-31239 -in /tmp/sssd-softhsm2-OnwLCh/test-root-CA-trusted-certificate-0001-key.pem -out /tmp/sssd-softhsm2-OnwLCh/test-root-CA-trusted-certificate-0001-key-decrypted.pem 390s writing RSA key 390s + p11tool --provider=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --write --load-privkey=/tmp/sssd-softhsm2-OnwLCh/test-root-CA-trusted-certificate-0001-key-decrypted.pem --login --set-pin=053350 --label 'Test Organization Root Trusted Certificate 0001 Key' --id 00112233445566778899FFAABBCCDDEEFF012345 390s + rm /tmp/sssd-softhsm2-OnwLCh/test-root-CA-trusted-certificate-0001-key-decrypted.pem 390s + p11tool --provider=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --list-all 390s Object 0: 390s URL: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7c62ded9468118d6;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert 390s Type: X.509 Certificate (RSA-1024) 390s Expires: Thu Mar 20 04:14:03 2025 390s Label: Test Organization Root Trusted Certificate 0001 390s ID: 00:11:22:33:44:55:66:77:88:99:ff:aa:bb:cc:dd:ee:ff:01:23:45 390s 390s Test Organization Root Tr Token 390s + echo 'Test Organization Root Tr Token' 390s + '[' -n '' ']' 390s + local output_base_name=SSSD-child-16231 390s + local output_file=/tmp/sssd-softhsm2-OnwLCh/SSSD-child-16231.output 390s + output_cert_file=/tmp/sssd-softhsm2-OnwLCh/SSSD-child-16231.pem 390s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/dev/null 390s [p11_child[3262]] [main] (0x0400): p11_child started. 390s [p11_child[3262]] [main] (0x2000): Running in [pre-auth] mode. 390s [p11_child[3262]] [main] (0x2000): Running with effective IDs: [0][0]. 390s [p11_child[3262]] [main] (0x2000): Running with real IDs [0][0]. 390s [p11_child[3262]] [init_verification] (0x0040): X509_LOOKUP_load_file [/dev/null] failed [92274824][error:05800088:x509 certificate routines::no certificate or crl found]. 390s [p11_child[3262]] [do_work] (0x0040): init_verification failed. 390s [p11_child[3262]] [main] (0x0020): p11_child failed (5) 390s + return 2 390s + valid_certificate /tmp/sssd-softhsm2-OnwLCh/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-31239 /dev/null no_verification 390s + check_certificate /tmp/sssd-softhsm2-OnwLCh/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-31239 /dev/null no_verification 390s + local certificate=/tmp/sssd-softhsm2-OnwLCh/test-root-CA-trusted-certificate-0001.pem 390s + local key_pass=pass:random-root-ca-trusted-cert-0001-31239 390s + local key_ring=/dev/null 390s + local verify_option=no_verification 390s + prepare_softhsm2_card /tmp/sssd-softhsm2-OnwLCh/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-31239 390s + local certificate=/tmp/sssd-softhsm2-OnwLCh/test-root-CA-trusted-certificate-0001.pem 390s + local key_pass=pass:random-root-ca-trusted-cert-0001-31239 390s + local key_cn 390s + local key_name 390s + local tokens_dir 390s + local output_cert_file 390s + token_name= 390s ++ basename /tmp/sssd-softhsm2-OnwLCh/test-root-CA-trusted-certificate-0001.pem .pem 390s + key_name=test-root-CA-trusted-certificate-0001 390s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-OnwLCh/test-root-CA-trusted-certificate-0001.pem 390s ++ sed -n 's/ *commonName *= //p' 390s + key_cn='Test Organization Root Trusted Certificate 0001' 390s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 390s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-OnwLCh/softhsm2-test-root-CA-trusted-certificate-0001.conf 390s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-OnwLCh/softhsm2-test-root-CA-trusted-certificate-0001.conf 390s ++ basename /tmp/sssd-softhsm2-OnwLCh/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 390s + tokens_dir=/tmp/sssd-softhsm2-OnwLCh/softhsm2-test-root-CA-trusted-certificate-0001 390s + token_name='Test Organization Root Tr Token' 390s + '[' '!' -e /tmp/sssd-softhsm2-OnwLCh/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 390s + '[' '!' -d /tmp/sssd-softhsm2-OnwLCh/softhsm2-test-root-CA-trusted-certificate-0001 ']' 390s + echo 'Test Organization Root Tr Token' 390s Test Organization Root Tr Token 390s + '[' -n no_verification ']' 390s + local verify_arg=--verify=no_verification 390s + local output_base_name=SSSD-child-26293 390s + local output_file=/tmp/sssd-softhsm2-OnwLCh/SSSD-child-26293.output 390s + output_cert_file=/tmp/sssd-softhsm2-OnwLCh/SSSD-child-26293.pem 390s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --verify=no_verification --ca_db=/dev/null 390s [p11_child[3268]] [main] (0x0400): p11_child started. 390s [p11_child[3268]] [main] (0x2000): Running in [pre-auth] mode. 390s [p11_child[3268]] [main] (0x2000): Running with effective IDs: [0][0]. 390s [p11_child[3268]] [main] (0x2000): Running with real IDs [0][0]. 390s [p11_child[3268]] [parse_cert_verify_opts] (0x0020): Found 'no_verification' option, disabling verification completely. This should not be used in production. 390s [p11_child[3268]] [do_card] (0x4000): Module List: 390s [p11_child[3268]] [do_card] (0x4000): common name: [softhsm2]. 390s [p11_child[3268]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 390s [p11_child[3268]] [do_card] (0x4000): Description [SoftHSM slot ID 0x468118d6] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 390s [p11_child[3268]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 390s [p11_child[3268]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x468118d6][1182865622] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 390s [p11_child[3268]] [do_card] (0x4000): Login NOT required. 390s [p11_child[3268]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 390s [p11_child[3268]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Root Tr Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 390s [p11_child[3268]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x468118d6;slot-manufacturer=SoftHSM%20project;slot-id=1182865622;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7c62ded9468118d6;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 390s [p11_child[3268]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 390s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-OnwLCh/SSSD-child-26293.output 390s + echo '-----BEGIN CERTIFICATE-----' 390s + tail -n1 /tmp/sssd-softhsm2-OnwLCh/SSSD-child-26293.output 390s + echo '-----END CERTIFICATE-----' 390s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-OnwLCh/SSSD-child-26293.pem 390s Certificate: 390s Data: 390s Version: 3 (0x2) 390s Serial Number: 3 (0x3) 390s Signature Algorithm: sha256WithRSAEncryption 390s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 390s Validity 390s Not Before: Mar 20 04:14:03 2024 GMT 390s Not After : Mar 20 04:14:03 2025 GMT 390s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 390s Subject Public Key Info: 390s Public Key Algorithm: rsaEncryption 390s Public-Key: (1024 bit) 390s Modulus: 390s 00:d0:9a:e6:ee:13:82:d1:bc:33:b2:c2:e0:8d:20: 390s b2:a4:98:6c:13:d2:8c:a5:df:36:48:67:1b:61:1e: 390s 42:05:c4:cd:39:99:0f:00:41:cc:c3:7b:27:cf:c3: 390s 60:8f:49:61:5f:e1:6c:b7:bd:01:6e:a6:d7:39:26: 390s d0:af:be:dd:d4:11:52:56:39:c9:08:dd:18:7a:e0: 390s fa:56:95:8b:04:fd:1b:af:87:60:4e:21:50:97:2e: 390s 12:c7:92:27:56:bc:0e:69:6b:79:8c:11:5d:db:c2: 390s b1:d4:66:a2:c4:68:57:75:12:bb:66:c0:34:e1:55: 390s f0:57:c9:e8:d2:2f:7a:c8:19 390s Exponent: 65537 (0x10001) 390s X509v3 extensions: 390s X509v3 Authority Key Identifier: 390s 70:74:B7:BF:DB:F4:0D:AA:C4:0C:9F:D6:7D:AB:65:0C:31:AA:94:92 390s X509v3 Basic Constraints: 390s CA:FALSE 390s Netscape Cert Type: 390s SSL Client, S/MIME 390s Netscape Comment: 390s Test Organization Root CA trusted Certificate 390s X509v3 Subject Key Identifier: 390s 35:B5:3D:3E:BE:0E:68:10:43:2F:45:9B:AC:DA:4A:80:C6:5F:A2:ED 390s X509v3 Key Usage: critical 390s Digital Signature, Non Repudiation, Key Encipherment 390s X509v3 Extended Key Usage: 390s TLS Web Client Authentication, E-mail Protection 390s X509v3 Subject Alternative Name: 390s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 390s Signature Algorithm: sha256WithRSAEncryption 390s Signature Value: 390s ad:b8:27:68:46:da:ce:29:57:d1:2a:43:9a:06:c8:0a:29:6f: 390s 11:74:1c:84:03:7b:c4:f1:12:94:fd:bb:4e:4c:fe:9b:70:99: 390s 67:54:f2:c9:c9:4e:2e:ac:43:be:f8:05:21:c0:ae:c4:d3:54: 390s 84:bd:d1:66:98:0d:0b:05:06:36:77:3f:a3:90:a1:0c:d0:5e: 390s 38:f5:55:78:01:5c:ca:80:47:3a:e2:a5:93:e6:91:83:0b:0d: 390s 47:58:f6:98:ef:eb:3f:cd:3d:e4:26:ed:18:35:ef:9a:88:d3: 390s bd:63:56:c4:84:a8:46:5c:12:f3:7c:4b:37:8d:8b:b9:a0:f4: 390s c0:32 390s + local found_md5 expected_md5 390s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-OnwLCh/test-root-CA-trusted-certificate-0001.pem 390s + expected_md5=Modulus=D09AE6EE1382D1BC33B2C2E08D20B2A4986C13D28CA5DF3648671B611E4205C4CD39990F0041CCC37B27CFC3608F49615FE16CB7BD016EA6D73926D0AFBEDDD411525639C908DD187AE0FA56958B04FD1BAF87604E2150972E12C7922756BC0E696B798C115DDBC2B1D466A2C468577512BB66C034E155F057C9E8D22F7AC819 390s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-OnwLCh/SSSD-child-26293.pem 390s + found_md5=Modulus=D09AE6EE1382D1BC33B2C2E08D20B2A4986C13D28CA5DF3648671B611E4205C4CD39990F0041CCC37B27CFC3608F49615FE16CB7BD016EA6D73926D0AFBEDDD411525639C908DD187AE0FA56958B04FD1BAF87604E2150972E12C7922756BC0E696B798C115DDBC2B1D466A2C468577512BB66C034E155F057C9E8D22F7AC819 390s + '[' Modulus=D09AE6EE1382D1BC33B2C2E08D20B2A4986C13D28CA5DF3648671B611E4205C4CD39990F0041CCC37B27CFC3608F49615FE16CB7BD016EA6D73926D0AFBEDDD411525639C908DD187AE0FA56958B04FD1BAF87604E2150972E12C7922756BC0E696B798C115DDBC2B1D466A2C468577512BB66C034E155F057C9E8D22F7AC819 '!=' Modulus=D09AE6EE1382D1BC33B2C2E08D20B2A4986C13D28CA5DF3648671B611E4205C4CD39990F0041CCC37B27CFC3608F49615FE16CB7BD016EA6D73926D0AFBEDDD411525639C908DD187AE0FA56958B04FD1BAF87604E2150972E12C7922756BC0E696B798C115DDBC2B1D466A2C468577512BB66C034E155F057C9E8D22F7AC819 ']' 390s + output_file=/tmp/sssd-softhsm2-OnwLCh/SSSD-child-26293-auth.output 390s ++ basename /tmp/sssd-softhsm2-OnwLCh/SSSD-child-26293-auth.output .output 390s + output_cert_file=/tmp/sssd-softhsm2-OnwLCh/SSSD-child-26293-auth.pem 390s + echo -n 053350 390s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/dev/null --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=no_verification --token_name 'Test Organization Root Tr Token' --module_name /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so 390s [p11_child[3276]] [main] (0x0400): p11_child started. 390s [p11_child[3276]] [main] (0x2000): Running in [auth] mode. 390s [p11_child[3276]] [main] (0x2000): Running with effective IDs: [0][0]. 390s [p11_child[3276]] [main] (0x2000): Running with real IDs [0][0]. 390s [p11_child[3276]] [parse_cert_verify_opts] (0x0020): Found 'no_verification' option, disabling verification completely. This should not be used in production. 390s [p11_child[3276]] [do_card] (0x4000): Module List: 390s [p11_child[3276]] [do_card] (0x4000): common name: [softhsm2]. 390s [p11_child[3276]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 390s [p11_child[3276]] [do_card] (0x4000): Description [SoftHSM slot ID 0x468118d6] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 390s [p11_child[3276]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 390s [p11_child[3276]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x468118d6][1182865622] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 390s [p11_child[3276]] [do_card] (0x4000): Login required. 390s [p11_child[3276]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 390s [p11_child[3276]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so Test Organization Root Tr Token Test Organization Root Tr Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 390s [p11_child[3276]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x468118d6;slot-manufacturer=SoftHSM%20project;slot-id=1182865622;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7c62ded9468118d6;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 390s [p11_child[3276]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 390s [p11_child[3276]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 390s [p11_child[3276]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 390s [p11_child[3276]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 390s [p11_child[3276]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 390s [p11_child[3276]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 390s [p11_child[3276]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 390s [p11_child[3276]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 390s [p11_child[3276]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 390s [p11_child[3276]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 390s [p11_child[3276]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 390s [p11_child[3276]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 390s [p11_child[3276]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 390s [p11_child[3276]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 390s [p11_child[3276]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 390s [p11_child[3276]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 390s [p11_child[3276]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 390s [p11_child[3276]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 390s [p11_child[3276]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 390s [p11_child[3276]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 390s [p11_child[3276]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 390s [p11_child[3276]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 390s [p11_child[3276]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 390s [p11_child[3276]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 390s [p11_child[3276]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 390s [p11_child[3276]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 390s [p11_child[3276]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 390s [p11_child[3276]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 390s [p11_child[3276]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 390s [p11_child[3276]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 390s [p11_child[3276]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 390s [p11_child[3276]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 390s [p11_child[3276]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 390s [p11_child[3276]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 390s [p11_child[3276]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 390s [p11_child[3276]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 390s [p11_child[3276]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 390s [p11_child[3276]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 390s [p11_child[3276]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 390s [p11_child[3276]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 390s [p11_child[3276]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 390s [p11_child[3276]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 390s [p11_child[3276]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 390s [p11_child[3276]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 390s [p11_child[3276]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 390s [p11_child[3276]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 390s [p11_child[3276]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 390s [p11_child[3276]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 390s [p11_child[3276]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 390s [p11_child[3276]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 390s [p11_child[3276]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 390s [p11_child[3276]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 390s [p11_child[3276]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 390s [p11_child[3276]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 390s [p11_child[3276]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 390s [p11_child[3276]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 390s [p11_child[3276]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 390s [p11_child[3276]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 390s [p11_child[3276]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 390s [p11_child[3276]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 390s [p11_child[3276]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 390s [p11_child[3276]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 390s [p11_child[3276]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 390s [p11_child[3276]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 390s [p11_child[3276]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 390s [p11_child[3276]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 390s [p11_child[3276]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 390s [p11_child[3276]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 390s [p11_child[3276]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 390s [p11_child[3276]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 390s [p11_child[3276]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 390s [p11_child[3276]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 390s [p11_child[3276]] [do_card] (0x4000): Certificate verified and validated. 390s [p11_child[3276]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 390s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-OnwLCh/SSSD-child-26293-auth.output 390s + echo '-----BEGIN CERTIFICATE-----' 390s + tail -n1 /tmp/sssd-softhsm2-OnwLCh/SSSD-child-26293-auth.output 390s + echo '-----END CERTIFICATE-----' 390s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-OnwLCh/SSSD-child-26293-auth.pem 390s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-OnwLCh/SSSD-child-26293-auth.pem 390s Certificate: 390s Data: 390s Version: 3 (0x2) 390s Serial Number: 3 (0x3) 390s Signature Algorithm: sha256WithRSAEncryption 390s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 390s Validity 390s Not Before: Mar 20 04:14:03 2024 GMT 390s Not After : Mar 20 04:14:03 2025 GMT 390s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 390s Subject Public Key Info: 390s Public Key Algorithm: rsaEncryption 390s Public-Key: (1024 bit) 390s Modulus: 390s 00:d0:9a:e6:ee:13:82:d1:bc:33:b2:c2:e0:8d:20: 390s b2:a4:98:6c:13:d2:8c:a5:df:36:48:67:1b:61:1e: 390s 42:05:c4:cd:39:99:0f:00:41:cc:c3:7b:27:cf:c3: 390s 60:8f:49:61:5f:e1:6c:b7:bd:01:6e:a6:d7:39:26: 390s d0:af:be:dd:d4:11:52:56:39:c9:08:dd:18:7a:e0: 390s fa:56:95:8b:04:fd:1b:af:87:60:4e:21:50:97:2e: 390s 12:c7:92:27:56:bc:0e:69:6b:79:8c:11:5d:db:c2: 390s b1:d4:66:a2:c4:68:57:75:12:bb:66:c0:34:e1:55: 390s f0:57:c9:e8:d2:2f:7a:c8:19 390s Exponent: 65537 (0x10001) 390s X509v3 extensions: 390s X509v3 Authority Key Identifier: 390s 70:74:B7:BF:DB:F4:0D:AA:C4:0C:9F:D6:7D:AB:65:0C:31:AA:94:92 390s X509v3 Basic Constraints: 390s CA:FALSE 390s Netscape Cert Type: 390s SSL Client, S/MIME 390s Netscape Comment: 390s Test Organization Root CA trusted Certificate 390s X509v3 Subject Key Identifier: 390s 35:B5:3D:3E:BE:0E:68:10:43:2F:45:9B:AC:DA:4A:80:C6:5F:A2:ED 390s X509v3 Key Usage: critical 390s Digital Signature, Non Repudiation, Key Encipherment 390s X509v3 Extended Key Usage: 390s TLS Web Client Authentication, E-mail Protection 390s X509v3 Subject Alternative Name: 390s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 390s Signature Algorithm: sha256WithRSAEncryption 390s Signature Value: 390s ad:b8:27:68:46:da:ce:29:57:d1:2a:43:9a:06:c8:0a:29:6f: 390s 11:74:1c:84:03:7b:c4:f1:12:94:fd:bb:4e:4c:fe:9b:70:99: 390s 67:54:f2:c9:c9:4e:2e:ac:43:be:f8:05:21:c0:ae:c4:d3:54: 390s 84:bd:d1:66:98:0d:0b:05:06:36:77:3f:a3:90:a1:0c:d0:5e: 390s 38:f5:55:78:01:5c:ca:80:47:3a:e2:a5:93:e6:91:83:0b:0d: 390s 47:58:f6:98:ef:eb:3f:cd:3d:e4:26:ed:18:35:ef:9a:88:d3: 390s bd:63:56:c4:84:a8:46:5c:12:f3:7c:4b:37:8d:8b:b9:a0:f4: 390s c0:32 390s + found_md5=Modulus=D09AE6EE1382D1BC33B2C2E08D20B2A4986C13D28CA5DF3648671B611E4205C4CD39990F0041CCC37B27CFC3608F49615FE16CB7BD016EA6D73926D0AFBEDDD411525639C908DD187AE0FA56958B04FD1BAF87604E2150972E12C7922756BC0E696B798C115DDBC2B1D466A2C468577512BB66C034E155F057C9E8D22F7AC819 390s + '[' Modulus=D09AE6EE1382D1BC33B2C2E08D20B2A4986C13D28CA5DF3648671B611E4205C4CD39990F0041CCC37B27CFC3608F49615FE16CB7BD016EA6D73926D0AFBEDDD411525639C908DD187AE0FA56958B04FD1BAF87604E2150972E12C7922756BC0E696B798C115DDBC2B1D466A2C468577512BB66C034E155F057C9E8D22F7AC819 '!=' Modulus=D09AE6EE1382D1BC33B2C2E08D20B2A4986C13D28CA5DF3648671B611E4205C4CD39990F0041CCC37B27CFC3608F49615FE16CB7BD016EA6D73926D0AFBEDDD411525639C908DD187AE0FA56958B04FD1BAF87604E2150972E12C7922756BC0E696B798C115DDBC2B1D466A2C468577512BB66C034E155F057C9E8D22F7AC819 ']' 390s + valid_certificate /tmp/sssd-softhsm2-OnwLCh/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-31239 /tmp/sssd-softhsm2-OnwLCh/test-root-CA.pem 390s + check_certificate /tmp/sssd-softhsm2-OnwLCh/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-31239 /tmp/sssd-softhsm2-OnwLCh/test-root-CA.pem 390s + local certificate=/tmp/sssd-softhsm2-OnwLCh/test-root-CA-trusted-certificate-0001.pem 390s + local key_pass=pass:random-root-ca-trusted-cert-0001-31239 390s + local key_ring=/tmp/sssd-softhsm2-OnwLCh/test-root-CA.pem 390s + local verify_option= 390s + prepare_softhsm2_card /tmp/sssd-softhsm2-OnwLCh/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-31239 390s + local certificate=/tmp/sssd-softhsm2-OnwLCh/test-root-CA-trusted-certificate-0001.pem 390s + local key_pass=pass:random-root-ca-trusted-cert-0001-31239 390s + local key_cn 390s + local key_name 390s + local tokens_dir 390s + local output_cert_file 390s + token_name= 390s ++ basename /tmp/sssd-softhsm2-OnwLCh/test-root-CA-trusted-certificate-0001.pem .pem 390s + key_name=test-root-CA-trusted-certificate-0001 390s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-OnwLCh/test-root-CA-trusted-certificate-0001.pem 390s ++ sed -n 's/ *commonName *= //p' 390s + key_cn='Test Organization Root Trusted Certificate 0001' 390s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 390s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-OnwLCh/softhsm2-test-root-CA-trusted-certificate-0001.conf 390s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-OnwLCh/softhsm2-test-root-CA-trusted-certificate-0001.conf 390s ++ basename /tmp/sssd-softhsm2-OnwLCh/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 390s + tokens_dir=/tmp/sssd-softhsm2-OnwLCh/softhsm2-test-root-CA-trusted-certificate-0001 390s + token_name='Test Organization Root Tr Token' 390s + '[' '!' -e /tmp/sssd-softhsm2-OnwLCh/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 390s + '[' '!' -d /tmp/sssd-softhsm2-OnwLCh/softhsm2-test-root-CA-trusted-certificate-0001 ']' 390s + echo 'Test Organization Root Tr Token' 390s Test Organization Root Tr Token 390s + '[' -n '' ']' 390s + local output_base_name=SSSD-child-3876 390s + local output_file=/tmp/sssd-softhsm2-OnwLCh/SSSD-child-3876.output 390s + output_cert_file=/tmp/sssd-softhsm2-OnwLCh/SSSD-child-3876.pem 390s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-OnwLCh/test-root-CA.pem 390s [p11_child[3286]] [main] (0x0400): p11_child started. 390s [p11_child[3286]] [main] (0x2000): Running in [pre-auth] mode. 390s [p11_child[3286]] [main] (0x2000): Running with effective IDs: [0][0]. 390s [p11_child[3286]] [main] (0x2000): Running with real IDs [0][0]. 390s [p11_child[3286]] [do_card] (0x4000): Module List: 390s [p11_child[3286]] [do_card] (0x4000): common name: [softhsm2]. 390s [p11_child[3286]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 390s [p11_child[3286]] [do_card] (0x4000): Description [SoftHSM slot ID 0x468118d6] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 390s [p11_child[3286]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 390s [p11_child[3286]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x468118d6][1182865622] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 390s [p11_child[3286]] [do_card] (0x4000): Login NOT required. 390s [p11_child[3286]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 390s [p11_child[3286]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 390s [p11_child[3286]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Root Tr Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 390s [p11_child[3286]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x468118d6;slot-manufacturer=SoftHSM%20project;slot-id=1182865622;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7c62ded9468118d6;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 390s [p11_child[3286]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 390s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-OnwLCh/SSSD-child-3876.output 390s + echo '-----BEGIN CERTIFICATE-----' 390s + tail -n1 /tmp/sssd-softhsm2-OnwLCh/SSSD-child-3876.output 390s + echo '-----END CERTIFICATE-----' 390s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-OnwLCh/SSSD-child-3876.pem 390s Certificate: 390s Data: 390s Version: 3 (0x2) 390s Serial Number: 3 (0x3) 390s Signature Algorithm: sha256WithRSAEncryption 390s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 390s Validity 390s Not Before: Mar 20 04:14:03 2024 GMT 390s Not After : Mar 20 04:14:03 2025 GMT 390s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 390s Subject Public Key Info: 390s Public Key Algorithm: rsaEncryption 390s Public-Key: (1024 bit) 390s Modulus: 390s 00:d0:9a:e6:ee:13:82:d1:bc:33:b2:c2:e0:8d:20: 390s b2:a4:98:6c:13:d2:8c:a5:df:36:48:67:1b:61:1e: 390s 42:05:c4:cd:39:99:0f:00:41:cc:c3:7b:27:cf:c3: 390s 60:8f:49:61:5f:e1:6c:b7:bd:01:6e:a6:d7:39:26: 390s d0:af:be:dd:d4:11:52:56:39:c9:08:dd:18:7a:e0: 390s fa:56:95:8b:04:fd:1b:af:87:60:4e:21:50:97:2e: 390s 12:c7:92:27:56:bc:0e:69:6b:79:8c:11:5d:db:c2: 390s b1:d4:66:a2:c4:68:57:75:12:bb:66:c0:34:e1:55: 390s f0:57:c9:e8:d2:2f:7a:c8:19 390s Exponent: 65537 (0x10001) 390s X509v3 extensions: 390s X509v3 Authority Key Identifier: 390s 70:74:B7:BF:DB:F4:0D:AA:C4:0C:9F:D6:7D:AB:65:0C:31:AA:94:92 390s X509v3 Basic Constraints: 390s CA:FALSE 390s Netscape Cert Type: 390s SSL Client, S/MIME 390s Netscape Comment: 390s Test Organization Root CA trusted Certificate 390s X509v3 Subject Key Identifier: 390s 35:B5:3D:3E:BE:0E:68:10:43:2F:45:9B:AC:DA:4A:80:C6:5F:A2:ED 390s X509v3 Key Usage: critical 390s Digital Signature, Non Repudiation, Key Encipherment 390s X509v3 Extended Key Usage: 390s TLS Web Client Authentication, E-mail Protection 390s X509v3 Subject Alternative Name: 390s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 390s Signature Algorithm: sha256WithRSAEncryption 390s Signature Value: 390s ad:b8:27:68:46:da:ce:29:57:d1:2a:43:9a:06:c8:0a:29:6f: 390s 11:74:1c:84:03:7b:c4:f1:12:94:fd:bb:4e:4c:fe:9b:70:99: 390s 67:54:f2:c9:c9:4e:2e:ac:43:be:f8:05:21:c0:ae:c4:d3:54: 390s 84:bd:d1:66:98:0d:0b:05:06:36:77:3f:a3:90:a1:0c:d0:5e: 390s 38:f5:55:78:01:5c:ca:80:47:3a:e2:a5:93:e6:91:83:0b:0d: 390s 47:58:f6:98:ef:eb:3f:cd:3d:e4:26:ed:18:35:ef:9a:88:d3: 390s bd:63:56:c4:84:a8:46:5c:12:f3:7c:4b:37:8d:8b:b9:a0:f4: 390s c0:32 390s + local found_md5 expected_md5 390s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-OnwLCh/test-root-CA-trusted-certificate-0001.pem 390s + expected_md5=Modulus=D09AE6EE1382D1BC33B2C2E08D20B2A4986C13D28CA5DF3648671B611E4205C4CD39990F0041CCC37B27CFC3608F49615FE16CB7BD016EA6D73926D0AFBEDDD411525639C908DD187AE0FA56958B04FD1BAF87604E2150972E12C7922756BC0E696B798C115DDBC2B1D466A2C468577512BB66C034E155F057C9E8D22F7AC819 390s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-OnwLCh/SSSD-child-3876.pem 390s + found_md5=Modulus=D09AE6EE1382D1BC33B2C2E08D20B2A4986C13D28CA5DF3648671B611E4205C4CD39990F0041CCC37B27CFC3608F49615FE16CB7BD016EA6D73926D0AFBEDDD411525639C908DD187AE0FA56958B04FD1BAF87604E2150972E12C7922756BC0E696B798C115DDBC2B1D466A2C468577512BB66C034E155F057C9E8D22F7AC819 390s + '[' Modulus=D09AE6EE1382D1BC33B2C2E08D20B2A4986C13D28CA5DF3648671B611E4205C4CD39990F0041CCC37B27CFC3608F49615FE16CB7BD016EA6D73926D0AFBEDDD411525639C908DD187AE0FA56958B04FD1BAF87604E2150972E12C7922756BC0E696B798C115DDBC2B1D466A2C468577512BB66C034E155F057C9E8D22F7AC819 '!=' Modulus=D09AE6EE1382D1BC33B2C2E08D20B2A4986C13D28CA5DF3648671B611E4205C4CD39990F0041CCC37B27CFC3608F49615FE16CB7BD016EA6D73926D0AFBEDDD411525639C908DD187AE0FA56958B04FD1BAF87604E2150972E12C7922756BC0E696B798C115DDBC2B1D466A2C468577512BB66C034E155F057C9E8D22F7AC819 ']' 390s + output_file=/tmp/sssd-softhsm2-OnwLCh/SSSD-child-3876-auth.output 390s ++ basename /tmp/sssd-softhsm2-OnwLCh/SSSD-child-3876-auth.output .output 390s + output_cert_file=/tmp/sssd-softhsm2-OnwLCh/SSSD-child-3876-auth.pem 390s + echo -n 053350 390s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-OnwLCh/test-root-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 '' --token_name 'Test Organization Root Tr Token' --module_name /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so 390s [p11_child[3294]] [main] (0x0400): p11_child started. 390s [p11_child[3294]] [main] (0x2000): Running in [auth] mode. 390s [p11_child[3294]] [main] (0x2000): Running with effective IDs: [0][0]. 390s [p11_child[3294]] [main] (0x2000): Running with real IDs [0][0]. 390s [p11_child[3294]] [do_card] (0x4000): Module List: 390s [p11_child[3294]] [do_card] (0x4000): common name: [softhsm2]. 390s [p11_child[3294]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 390s [p11_child[3294]] [do_card] (0x4000): Description [SoftHSM slot ID 0x468118d6] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 390s [p11_child[3294]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 390s [p11_child[3294]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x468118d6][1182865622] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 390s [p11_child[3294]] [do_card] (0x4000): Login required. 390s [p11_child[3294]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 390s [p11_child[3294]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 390s [p11_child[3294]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so Test Organization Root Tr Token Test Organization Root Tr Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 390s [p11_child[3294]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x468118d6;slot-manufacturer=SoftHSM%20project;slot-id=1182865622;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7c62ded9468118d6;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 390s [p11_child[3294]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 390s [p11_child[3294]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 390s [p11_child[3294]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 390s [p11_child[3294]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 390s [p11_child[3294]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 390s [p11_child[3294]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 390s [p11_child[3294]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 390s [p11_child[3294]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 390s [p11_child[3294]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 390s [p11_child[3294]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 390s [p11_child[3294]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 390s [p11_child[3294]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 390s [p11_child[3294]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 390s [p11_child[3294]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 390s [p11_child[3294]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 390s [p11_child[3294]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 390s [p11_child[3294]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 390s [p11_child[3294]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 390s [p11_child[3294]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 390s [p11_child[3294]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 390s [p11_child[3294]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 390s [p11_child[3294]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 390s [p11_child[3294]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 390s [p11_child[3294]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 390s [p11_child[3294]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 390s [p11_child[3294]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 390s [p11_child[3294]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 390s [p11_child[3294]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 390s [p11_child[3294]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 390s [p11_child[3294]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 390s [p11_child[3294]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 390s [p11_child[3294]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 390s [p11_child[3294]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 390s [p11_child[3294]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 390s [p11_child[3294]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 390s [p11_child[3294]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 390s [p11_child[3294]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 390s [p11_child[3294]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 390s [p11_child[3294]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 390s [p11_child[3294]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 390s [p11_child[3294]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 390s [p11_child[3294]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 390s [p11_child[3294]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 390s [p11_child[3294]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 390s [p11_child[3294]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 390s [p11_child[3294]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 390s [p11_child[3294]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 390s [p11_child[3294]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 390s [p11_child[3294]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 390s [p11_child[3294]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 390s [p11_child[3294]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 390s [p11_child[3294]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 390s [p11_child[3294]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 390s [p11_child[3294]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 390s [p11_child[3294]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 390s [p11_child[3294]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 390s [p11_child[3294]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 390s [p11_child[3294]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 390s [p11_child[3294]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 390s [p11_child[3294]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 390s [p11_child[3294]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 390s [p11_child[3294]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 390s [p11_child[3294]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 390s [p11_child[3294]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 390s [p11_child[3294]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 390s [p11_child[3294]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 390s [p11_child[3294]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 390s [p11_child[3294]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 390s [p11_child[3294]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 390s [p11_child[3294]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 390s [p11_child[3294]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 390s [p11_child[3294]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 390s [p11_child[3294]] [do_card] (0x4000): Certificate verified and validated. 390s [p11_child[3294]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 390s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-OnwLCh/SSSD-child-3876-auth.output 390s + echo '-----BEGIN CERTIFICATE-----' 390s + tail -n1 /tmp/sssd-softhsm2-OnwLCh/SSSD-child-3876-auth.output 390s + echo '-----END CERTIFICATE-----' 390s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-OnwLCh/SSSD-child-3876-auth.pem 391s Certificate: 391s Data: 391s Version: 3 (0x2) 391s Serial Number: 3 (0x3) 391s Signature Algorithm: sha256WithRSAEncryption 391s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 391s Validity 391s Not Before: Mar 20 04:14:03 2024 GMT 391s Not After : Mar 20 04:14:03 2025 GMT 391s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 391s Subject Public Key Info: 391s Public Key Algorithm: rsaEncryption 391s Public-Key: (1024 bit) 391s Modulus: 391s 00:d0:9a:e6:ee:13:82:d1:bc:33:b2:c2:e0:8d:20: 391s b2:a4:98:6c:13:d2:8c:a5:df:36:48:67:1b:61:1e: 391s 42:05:c4:cd:39:99:0f:00:41:cc:c3:7b:27:cf:c3: 391s 60:8f:49:61:5f:e1:6c:b7:bd:01:6e:a6:d7:39:26: 391s d0:af:be:dd:d4:11:52:56:39:c9:08:dd:18:7a:e0: 391s fa:56:95:8b:04:fd:1b:af:87:60:4e:21:50:97:2e: 391s 12:c7:92:27:56:bc:0e:69:6b:79:8c:11:5d:db:c2: 391s b1:d4:66:a2:c4:68:57:75:12:bb:66:c0:34:e1:55: 391s f0:57:c9:e8:d2:2f:7a:c8:19 391s Exponent: 65537 (0x10001) 391s X509v3 extensions: 391s X509v3 Authority Key Identifier: 391s 70:74:B7:BF:DB:F4:0D:AA:C4:0C:9F:D6:7D:AB:65:0C:31:AA:94:92 391s X509v3 Basic Constraints: 391s CA:FALSE 391s Netscape Cert Type: 391s SSL Client, S/MIME 391s Netscape Comment: 391s Test Organization Root CA trusted Certificate 391s X509v3 Subject Key Identifier: 391s 35:B5:3D:3E:BE:0E:68:10:43:2F:45:9B:AC:DA:4A:80:C6:5F:A2:ED 391s X509v3 Key Usage: critical 391s Digital Signature, Non Repudiation, Key Encipherment 391s X509v3 Extended Key Usage: 391s TLS Web Client Authentication, E-mail Protection 391s X509v3 Subject Alternative Name: 391s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 391s Signature Algorithm: sha256WithRSAEncryption 391s Signature Value: 391s ad:b8:27:68:46:da:ce:29:57:d1:2a:43:9a:06:c8:0a:29:6f: 391s 11:74:1c:84:03:7b:c4:f1:12:94:fd:bb:4e:4c:fe:9b:70:99: 391s 67:54:f2:c9:c9:4e:2e:ac:43:be:f8:05:21:c0:ae:c4:d3:54: 391s 84:bd:d1:66:98:0d:0b:05:06:36:77:3f:a3:90:a1:0c:d0:5e: 391s 38:f5:55:78:01:5c:ca:80:47:3a:e2:a5:93:e6:91:83:0b:0d: 391s 47:58:f6:98:ef:eb:3f:cd:3d:e4:26:ed:18:35:ef:9a:88:d3: 391s bd:63:56:c4:84:a8:46:5c:12:f3:7c:4b:37:8d:8b:b9:a0:f4: 391s c0:32 391s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-OnwLCh/SSSD-child-3876-auth.pem 391s + found_md5=Modulus=D09AE6EE1382D1BC33B2C2E08D20B2A4986C13D28CA5DF3648671B611E4205C4CD39990F0041CCC37B27CFC3608F49615FE16CB7BD016EA6D73926D0AFBEDDD411525639C908DD187AE0FA56958B04FD1BAF87604E2150972E12C7922756BC0E696B798C115DDBC2B1D466A2C468577512BB66C034E155F057C9E8D22F7AC819 391s + '[' Modulus=D09AE6EE1382D1BC33B2C2E08D20B2A4986C13D28CA5DF3648671B611E4205C4CD39990F0041CCC37B27CFC3608F49615FE16CB7BD016EA6D73926D0AFBEDDD411525639C908DD187AE0FA56958B04FD1BAF87604E2150972E12C7922756BC0E696B798C115DDBC2B1D466A2C468577512BB66C034E155F057C9E8D22F7AC819 '!=' Modulus=D09AE6EE1382D1BC33B2C2E08D20B2A4986C13D28CA5DF3648671B611E4205C4CD39990F0041CCC37B27CFC3608F49615FE16CB7BD016EA6D73926D0AFBEDDD411525639C908DD187AE0FA56958B04FD1BAF87604E2150972E12C7922756BC0E696B798C115DDBC2B1D466A2C468577512BB66C034E155F057C9E8D22F7AC819 ']' 391s + valid_certificate /tmp/sssd-softhsm2-OnwLCh/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-31239 /tmp/sssd-softhsm2-OnwLCh/test-root-CA.pem partial_chain 391s + check_certificate /tmp/sssd-softhsm2-OnwLCh/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-31239 /tmp/sssd-softhsm2-OnwLCh/test-root-CA.pem partial_chain 391s + local certificate=/tmp/sssd-softhsm2-OnwLCh/test-root-CA-trusted-certificate-0001.pem 391s + local key_pass=pass:random-root-ca-trusted-cert-0001-31239 391s + local key_ring=/tmp/sssd-softhsm2-OnwLCh/test-root-CA.pem 391s + local verify_option=partial_chain 391s + prepare_softhsm2_card /tmp/sssd-softhsm2-OnwLCh/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-31239 391s + local certificate=/tmp/sssd-softhsm2-OnwLCh/test-root-CA-trusted-certificate-0001.pem 391s + local key_pass=pass:random-root-ca-trusted-cert-0001-31239 391s + local key_cn 391s + local key_name 391s + local tokens_dir 391s + local output_cert_file 391s + token_name= 391s ++ basename /tmp/sssd-softhsm2-OnwLCh/test-root-CA-trusted-certificate-0001.pem .pem 391s + key_name=test-root-CA-trusted-certificate-0001 391s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-OnwLCh/test-root-CA-trusted-certificate-0001.pem 391s ++ sed -n 's/ *commonName *= //p' 391s + key_cn='Test Organization Root Trusted Certificate 0001' 391s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 391s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-OnwLCh/softhsm2-test-root-CA-trusted-certificate-0001.conf 391s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-OnwLCh/softhsm2-test-root-CA-trusted-certificate-0001.conf 391s ++ basename /tmp/sssd-softhsm2-OnwLCh/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 391s Test Organization Root Tr Token 391s + tokens_dir=/tmp/sssd-softhsm2-OnwLCh/softhsm2-test-root-CA-trusted-certificate-0001 391s + token_name='Test Organization Root Tr Token' 391s + '[' '!' -e /tmp/sssd-softhsm2-OnwLCh/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 391s + '[' '!' -d /tmp/sssd-softhsm2-OnwLCh/softhsm2-test-root-CA-trusted-certificate-0001 ']' 391s + echo 'Test Organization Root Tr Token' 391s + '[' -n partial_chain ']' 391s + local verify_arg=--verify=partial_chain 391s + local output_base_name=SSSD-child-6209 391s + local output_file=/tmp/sssd-softhsm2-OnwLCh/SSSD-child-6209.output 391s + output_cert_file=/tmp/sssd-softhsm2-OnwLCh/SSSD-child-6209.pem 391s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-OnwLCh/test-root-CA.pem 391s [p11_child[3304]] [main] (0x0400): p11_child started. 391s [p11_child[3304]] [main] (0x2000): Running in [pre-auth] mode. 391s [p11_child[3304]] [main] (0x2000): Running with effective IDs: [0][0]. 391s [p11_child[3304]] [main] (0x2000): Running with real IDs [0][0]. 391s [p11_child[3304]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 391s [p11_child[3304]] [do_card] (0x4000): Module List: 391s [p11_child[3304]] [do_card] (0x4000): common name: [softhsm2]. 391s [p11_child[3304]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 391s [p11_child[3304]] [do_card] (0x4000): Description [SoftHSM slot ID 0x468118d6] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 391s [p11_child[3304]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 391s [p11_child[3304]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x468118d6][1182865622] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 391s [p11_child[3304]] [do_card] (0x4000): Login NOT required. 391s [p11_child[3304]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 391s [p11_child[3304]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 391s [p11_child[3304]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Root Tr Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 391s [p11_child[3304]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x468118d6;slot-manufacturer=SoftHSM%20project;slot-id=1182865622;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7c62ded9468118d6;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 391s [p11_child[3304]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 391s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-OnwLCh/SSSD-child-6209.output 391s + echo '-----BEGIN CERTIFICATE-----' 391s + tail -n1 /tmp/sssd-softhsm2-OnwLCh/SSSD-child-6209.output 391s + echo '-----END CERTIFICATE-----' 391s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-OnwLCh/SSSD-child-6209.pem 391s Certificate: 391s Data: 391s Version: 3 (0x2) 391s Serial Number: 3 (0x3) 391s Signature Algorithm: sha256WithRSAEncryption 391s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 391s Validity 391s Not Before: Mar 20 04:14:03 2024 GMT 391s Not After : Mar 20 04:14:03 2025 GMT 391s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 391s Subject Public Key Info: 391s Public Key Algorithm: rsaEncryption 391s Public-Key: (1024 bit) 391s Modulus: 391s 00:d0:9a:e6:ee:13:82:d1:bc:33:b2:c2:e0:8d:20: 391s b2:a4:98:6c:13:d2:8c:a5:df:36:48:67:1b:61:1e: 391s 42:05:c4:cd:39:99:0f:00:41:cc:c3:7b:27:cf:c3: 391s 60:8f:49:61:5f:e1:6c:b7:bd:01:6e:a6:d7:39:26: 391s d0:af:be:dd:d4:11:52:56:39:c9:08:dd:18:7a:e0: 391s fa:56:95:8b:04:fd:1b:af:87:60:4e:21:50:97:2e: 391s 12:c7:92:27:56:bc:0e:69:6b:79:8c:11:5d:db:c2: 391s b1:d4:66:a2:c4:68:57:75:12:bb:66:c0:34:e1:55: 391s f0:57:c9:e8:d2:2f:7a:c8:19 391s Exponent: 65537 (0x10001) 391s X509v3 extensions: 391s X509v3 Authority Key Identifier: 391s 70:74:B7:BF:DB:F4:0D:AA:C4:0C:9F:D6:7D:AB:65:0C:31:AA:94:92 391s X509v3 Basic Constraints: 391s CA:FALSE 391s Netscape Cert Type: 391s SSL Client, S/MIME 391s Netscape Comment: 391s Test Organization Root CA trusted Certificate 391s X509v3 Subject Key Identifier: 391s 35:B5:3D:3E:BE:0E:68:10:43:2F:45:9B:AC:DA:4A:80:C6:5F:A2:ED 391s X509v3 Key Usage: critical 391s Digital Signature, Non Repudiation, Key Encipherment 391s X509v3 Extended Key Usage: 391s TLS Web Client Authentication, E-mail Protection 391s X509v3 Subject Alternative Name: 391s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 391s Signature Algorithm: sha256WithRSAEncryption 391s Signature Value: 391s ad:b8:27:68:46:da:ce:29:57:d1:2a:43:9a:06:c8:0a:29:6f: 391s 11:74:1c:84:03:7b:c4:f1:12:94:fd:bb:4e:4c:fe:9b:70:99: 391s 67:54:f2:c9:c9:4e:2e:ac:43:be:f8:05:21:c0:ae:c4:d3:54: 391s 84:bd:d1:66:98:0d:0b:05:06:36:77:3f:a3:90:a1:0c:d0:5e: 391s 38:f5:55:78:01:5c:ca:80:47:3a:e2:a5:93:e6:91:83:0b:0d: 391s 47:58:f6:98:ef:eb:3f:cd:3d:e4:26:ed:18:35:ef:9a:88:d3: 391s bd:63:56:c4:84:a8:46:5c:12:f3:7c:4b:37:8d:8b:b9:a0:f4: 391s c0:32 391s + local found_md5 expected_md5 391s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-OnwLCh/test-root-CA-trusted-certificate-0001.pem 391s + expected_md5=Modulus=D09AE6EE1382D1BC33B2C2E08D20B2A4986C13D28CA5DF3648671B611E4205C4CD39990F0041CCC37B27CFC3608F49615FE16CB7BD016EA6D73926D0AFBEDDD411525639C908DD187AE0FA56958B04FD1BAF87604E2150972E12C7922756BC0E696B798C115DDBC2B1D466A2C468577512BB66C034E155F057C9E8D22F7AC819 391s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-OnwLCh/SSSD-child-6209.pem 391s + found_md5=Modulus=D09AE6EE1382D1BC33B2C2E08D20B2A4986C13D28CA5DF3648671B611E4205C4CD39990F0041CCC37B27CFC3608F49615FE16CB7BD016EA6D73926D0AFBEDDD411525639C908DD187AE0FA56958B04FD1BAF87604E2150972E12C7922756BC0E696B798C115DDBC2B1D466A2C468577512BB66C034E155F057C9E8D22F7AC819 391s + '[' Modulus=D09AE6EE1382D1BC33B2C2E08D20B2A4986C13D28CA5DF3648671B611E4205C4CD39990F0041CCC37B27CFC3608F49615FE16CB7BD016EA6D73926D0AFBEDDD411525639C908DD187AE0FA56958B04FD1BAF87604E2150972E12C7922756BC0E696B798C115DDBC2B1D466A2C468577512BB66C034E155F057C9E8D22F7AC819 '!=' Modulus=D09AE6EE1382D1BC33B2C2E08D20B2A4986C13D28CA5DF3648671B611E4205C4CD39990F0041CCC37B27CFC3608F49615FE16CB7BD016EA6D73926D0AFBEDDD411525639C908DD187AE0FA56958B04FD1BAF87604E2150972E12C7922756BC0E696B798C115DDBC2B1D466A2C468577512BB66C034E155F057C9E8D22F7AC819 ']' 391s + output_file=/tmp/sssd-softhsm2-OnwLCh/SSSD-child-6209-auth.output 391s ++ basename /tmp/sssd-softhsm2-OnwLCh/SSSD-child-6209-auth.output .output 391s + output_cert_file=/tmp/sssd-softhsm2-OnwLCh/SSSD-child-6209-auth.pem 391s + echo -n 053350 391s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-OnwLCh/test-root-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Root Tr Token' --module_name /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so 391s [p11_child[3312]] [main] (0x0400): p11_child started. 391s [p11_child[3312]] [main] (0x2000): Running in [auth] mode. 391s [p11_child[3312]] [main] (0x2000): Running with effective IDs: [0][0]. 391s [p11_child[3312]] [main] (0x2000): Running with real IDs [0][0]. 391s [p11_child[3312]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 391s [p11_child[3312]] [do_card] (0x4000): Module List: 391s [p11_child[3312]] [do_card] (0x4000): common name: [softhsm2]. 391s [p11_child[3312]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 391s [p11_child[3312]] [do_card] (0x4000): Description [SoftHSM slot ID 0x468118d6] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 391s [p11_child[3312]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 391s [p11_child[3312]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x468118d6][1182865622] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 391s [p11_child[3312]] [do_card] (0x4000): Login required. 391s [p11_child[3312]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 391s [p11_child[3312]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 391s [p11_child[3312]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so Test Organization Root Tr Token Test Organization Root Tr Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 391s [p11_child[3312]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x468118d6;slot-manufacturer=SoftHSM%20project;slot-id=1182865622;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7c62ded9468118d6;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 391s [p11_child[3312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 391s [p11_child[3312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 391s [p11_child[3312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 391s [p11_child[3312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 391s [p11_child[3312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 391s [p11_child[3312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 391s [p11_child[3312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 391s [p11_child[3312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 391s [p11_child[3312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 391s [p11_child[3312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 391s [p11_child[3312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 391s [p11_child[3312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 391s [p11_child[3312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 391s [p11_child[3312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 391s [p11_child[3312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 391s [p11_child[3312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 391s [p11_child[3312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 391s [p11_child[3312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 391s [p11_child[3312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 391s [p11_child[3312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 391s [p11_child[3312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 391s [p11_child[3312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 391s [p11_child[3312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 391s [p11_child[3312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 391s [p11_child[3312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 391s [p11_child[3312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 391s [p11_child[3312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 391s [p11_child[3312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 391s [p11_child[3312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 391s [p11_child[3312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 391s [p11_child[3312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 391s [p11_child[3312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 391s [p11_child[3312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 391s [p11_child[3312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 391s [p11_child[3312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 391s [p11_child[3312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 391s [p11_child[3312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 391s [p11_child[3312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 391s [p11_child[3312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 391s [p11_child[3312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 391s [p11_child[3312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 391s [p11_child[3312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 391s [p11_child[3312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 391s [p11_child[3312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 391s [p11_child[3312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 391s [p11_child[3312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 391s [p11_child[3312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 391s [p11_child[3312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 391s [p11_child[3312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 391s [p11_child[3312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 391s [p11_child[3312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 391s [p11_child[3312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 391s [p11_child[3312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 391s [p11_child[3312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 391s [p11_child[3312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 391s [p11_child[3312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 391s [p11_child[3312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 391s [p11_child[3312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 391s [p11_child[3312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 391s [p11_child[3312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 391s [p11_child[3312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 391s [p11_child[3312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 391s [p11_child[3312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 391s [p11_child[3312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 391s [p11_child[3312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 391s [p11_child[3312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 391s [p11_child[3312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 391s [p11_child[3312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 391s [p11_child[3312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 391s [p11_child[3312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 391s [p11_child[3312]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 391s [p11_child[3312]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 391s [p11_child[3312]] [do_card] (0x4000): Certificate verified and validated. 391s [p11_child[3312]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 391s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-OnwLCh/SSSD-child-6209-auth.output 391s + echo '-----BEGIN CERTIFICATE-----' 391s + tail -n1 /tmp/sssd-softhsm2-OnwLCh/SSSD-child-6209-auth.output 391s + echo '-----END CERTIFICATE-----' 391s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-OnwLCh/SSSD-child-6209-auth.pem 391s Certificate: 391s Data: 391s Version: 3 (0x2) 391s Serial Number: 3 (0x3) 391s Signature Algorithm: sha256WithRSAEncryption 391s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 391s Validity 391s Not Before: Mar 20 04:14:03 2024 GMT 391s Not After : Mar 20 04:14:03 2025 GMT 391s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 391s Subject Public Key Info: 391s Public Key Algorithm: rsaEncryption 391s Public-Key: (1024 bit) 391s Modulus: 391s 00:d0:9a:e6:ee:13:82:d1:bc:33:b2:c2:e0:8d:20: 391s b2:a4:98:6c:13:d2:8c:a5:df:36:48:67:1b:61:1e: 391s 42:05:c4:cd:39:99:0f:00:41:cc:c3:7b:27:cf:c3: 391s 60:8f:49:61:5f:e1:6c:b7:bd:01:6e:a6:d7:39:26: 391s d0:af:be:dd:d4:11:52:56:39:c9:08:dd:18:7a:e0: 391s fa:56:95:8b:04:fd:1b:af:87:60:4e:21:50:97:2e: 391s 12:c7:92:27:56:bc:0e:69:6b:79:8c:11:5d:db:c2: 391s b1:d4:66:a2:c4:68:57:75:12:bb:66:c0:34:e1:55: 391s f0:57:c9:e8:d2:2f:7a:c8:19 391s Exponent: 65537 (0x10001) 391s X509v3 extensions: 391s X509v3 Authority Key Identifier: 391s 70:74:B7:BF:DB:F4:0D:AA:C4:0C:9F:D6:7D:AB:65:0C:31:AA:94:92 391s X509v3 Basic Constraints: 391s CA:FALSE 391s Netscape Cert Type: 391s SSL Client, S/MIME 391s Netscape Comment: 391s Test Organization Root CA trusted Certificate 391s X509v3 Subject Key Identifier: 391s 35:B5:3D:3E:BE:0E:68:10:43:2F:45:9B:AC:DA:4A:80:C6:5F:A2:ED 391s X509v3 Key Usage: critical 391s Digital Signature, Non Repudiation, Key Encipherment 391s X509v3 Extended Key Usage: 391s TLS Web Client Authentication, E-mail Protection 391s X509v3 Subject Alternative Name: 391s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 391s Signature Algorithm: sha256WithRSAEncryption 391s Signature Value: 391s ad:b8:27:68:46:da:ce:29:57:d1:2a:43:9a:06:c8:0a:29:6f: 391s 11:74:1c:84:03:7b:c4:f1:12:94:fd:bb:4e:4c:fe:9b:70:99: 391s 67:54:f2:c9:c9:4e:2e:ac:43:be:f8:05:21:c0:ae:c4:d3:54: 391s 84:bd:d1:66:98:0d:0b:05:06:36:77:3f:a3:90:a1:0c:d0:5e: 391s 38:f5:55:78:01:5c:ca:80:47:3a:e2:a5:93:e6:91:83:0b:0d: 391s 47:58:f6:98:ef:eb:3f:cd:3d:e4:26:ed:18:35:ef:9a:88:d3: 391s bd:63:56:c4:84:a8:46:5c:12:f3:7c:4b:37:8d:8b:b9:a0:f4: 391s c0:32 391s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-OnwLCh/SSSD-child-6209-auth.pem 391s + found_md5=Modulus=D09AE6EE1382D1BC33B2C2E08D20B2A4986C13D28CA5DF3648671B611E4205C4CD39990F0041CCC37B27CFC3608F49615FE16CB7BD016EA6D73926D0AFBEDDD411525639C908DD187AE0FA56958B04FD1BAF87604E2150972E12C7922756BC0E696B798C115DDBC2B1D466A2C468577512BB66C034E155F057C9E8D22F7AC819 391s + '[' Modulus=D09AE6EE1382D1BC33B2C2E08D20B2A4986C13D28CA5DF3648671B611E4205C4CD39990F0041CCC37B27CFC3608F49615FE16CB7BD016EA6D73926D0AFBEDDD411525639C908DD187AE0FA56958B04FD1BAF87604E2150972E12C7922756BC0E696B798C115DDBC2B1D466A2C468577512BB66C034E155F057C9E8D22F7AC819 '!=' Modulus=D09AE6EE1382D1BC33B2C2E08D20B2A4986C13D28CA5DF3648671B611E4205C4CD39990F0041CCC37B27CFC3608F49615FE16CB7BD016EA6D73926D0AFBEDDD411525639C908DD187AE0FA56958B04FD1BAF87604E2150972E12C7922756BC0E696B798C115DDBC2B1D466A2C468577512BB66C034E155F057C9E8D22F7AC819 ']' 391s + valid_certificate /tmp/sssd-softhsm2-OnwLCh/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-31239 /tmp/sssd-softhsm2-OnwLCh/test-full-chain-CA.pem 391s + check_certificate /tmp/sssd-softhsm2-OnwLCh/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-31239 /tmp/sssd-softhsm2-OnwLCh/test-full-chain-CA.pem 391s + local certificate=/tmp/sssd-softhsm2-OnwLCh/test-root-CA-trusted-certificate-0001.pem 391s + local key_pass=pass:random-root-ca-trusted-cert-0001-31239 391s + local key_ring=/tmp/sssd-softhsm2-OnwLCh/test-full-chain-CA.pem 391s + local verify_option= 391s + prepare_softhsm2_card /tmp/sssd-softhsm2-OnwLCh/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-31239 391s + local certificate=/tmp/sssd-softhsm2-OnwLCh/test-root-CA-trusted-certificate-0001.pem 391s + local key_pass=pass:random-root-ca-trusted-cert-0001-31239 391s + local key_cn 391s + local key_name 391s + local tokens_dir 391s + local output_cert_file 391s + token_name= 391s ++ basename /tmp/sssd-softhsm2-OnwLCh/test-root-CA-trusted-certificate-0001.pem .pem 391s + key_name=test-root-CA-trusted-certificate-0001 391s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-OnwLCh/test-root-CA-trusted-certificate-0001.pem 391s ++ sed -n 's/ *commonName *= //p' 391s + key_cn='Test Organization Root Trusted Certificate 0001' 391s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 391s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-OnwLCh/softhsm2-test-root-CA-trusted-certificate-0001.conf 391s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-OnwLCh/softhsm2-test-root-CA-trusted-certificate-0001.conf 391s ++ basename /tmp/sssd-softhsm2-OnwLCh/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 391s + tokens_dir=/tmp/sssd-softhsm2-OnwLCh/softhsm2-test-root-CA-trusted-certificate-0001 391s + token_name='Test Organization Root Tr Token' 391s + '[' '!' -e /tmp/sssd-softhsm2-OnwLCh/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 391s Test Organization Root Tr Token 391s + '[' '!' -d /tmp/sssd-softhsm2-OnwLCh/softhsm2-test-root-CA-trusted-certificate-0001 ']' 391s + echo 'Test Organization Root Tr Token' 391s + '[' -n '' ']' 391s + local output_base_name=SSSD-child-8482 391s + local output_file=/tmp/sssd-softhsm2-OnwLCh/SSSD-child-8482.output 391s + output_cert_file=/tmp/sssd-softhsm2-OnwLCh/SSSD-child-8482.pem 391s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-OnwLCh/test-full-chain-CA.pem 391s [p11_child[3322]] [main] (0x0400): p11_child started. 391s [p11_child[3322]] [main] (0x2000): Running in [pre-auth] mode. 391s [p11_child[3322]] [main] (0x2000): Running with effective IDs: [0][0]. 391s [p11_child[3322]] [main] (0x2000): Running with real IDs [0][0]. 391s [p11_child[3322]] [do_card] (0x4000): Module List: 391s [p11_child[3322]] [do_card] (0x4000): common name: [softhsm2]. 391s [p11_child[3322]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 391s [p11_child[3322]] [do_card] (0x4000): Description [SoftHSM slot ID 0x468118d6] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 391s [p11_child[3322]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 391s [p11_child[3322]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x468118d6][1182865622] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 391s [p11_child[3322]] [do_card] (0x4000): Login NOT required. 391s [p11_child[3322]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 391s [p11_child[3322]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 391s [p11_child[3322]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Root Tr Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 391s [p11_child[3322]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x468118d6;slot-manufacturer=SoftHSM%20project;slot-id=1182865622;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7c62ded9468118d6;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 391s [p11_child[3322]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 391s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-OnwLCh/SSSD-child-8482.output 391s + echo '-----BEGIN CERTIFICATE-----' 391s + tail -n1 /tmp/sssd-softhsm2-OnwLCh/SSSD-child-8482.output 391s + echo '-----END CERTIFICATE-----' 391s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-OnwLCh/SSSD-child-8482.pem 391s Certificate: 391s Data: 391s Version: 3 (0x2) 391s Serial Number: 3 (0x3) 391s Signature Algorithm: sha256WithRSAEncryption 391s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 391s Validity 391s Not Before: Mar 20 04:14:03 2024 GMT 391s Not After : Mar 20 04:14:03 2025 GMT 391s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 391s Subject Public Key Info: 391s Public Key Algorithm: rsaEncryption 391s Public-Key: (1024 bit) 391s Modulus: 391s 00:d0:9a:e6:ee:13:82:d1:bc:33:b2:c2:e0:8d:20: 391s b2:a4:98:6c:13:d2:8c:a5:df:36:48:67:1b:61:1e: 391s 42:05:c4:cd:39:99:0f:00:41:cc:c3:7b:27:cf:c3: 391s 60:8f:49:61:5f:e1:6c:b7:bd:01:6e:a6:d7:39:26: 391s d0:af:be:dd:d4:11:52:56:39:c9:08:dd:18:7a:e0: 391s fa:56:95:8b:04:fd:1b:af:87:60:4e:21:50:97:2e: 391s 12:c7:92:27:56:bc:0e:69:6b:79:8c:11:5d:db:c2: 391s b1:d4:66:a2:c4:68:57:75:12:bb:66:c0:34:e1:55: 391s f0:57:c9:e8:d2:2f:7a:c8:19 391s Exponent: 65537 (0x10001) 391s X509v3 extensions: 391s X509v3 Authority Key Identifier: 391s 70:74:B7:BF:DB:F4:0D:AA:C4:0C:9F:D6:7D:AB:65:0C:31:AA:94:92 391s X509v3 Basic Constraints: 391s CA:FALSE 391s Netscape Cert Type: 391s SSL Client, S/MIME 391s Netscape Comment: 391s Test Organization Root CA trusted Certificate 391s X509v3 Subject Key Identifier: 391s 35:B5:3D:3E:BE:0E:68:10:43:2F:45:9B:AC:DA:4A:80:C6:5F:A2:ED 391s X509v3 Key Usage: critical 391s Digital Signature, Non Repudiation, Key Encipherment 391s X509v3 Extended Key Usage: 391s TLS Web Client Authentication, E-mail Protection 391s X509v3 Subject Alternative Name: 391s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 391s Signature Algorithm: sha256WithRSAEncryption 391s Signature Value: 391s ad:b8:27:68:46:da:ce:29:57:d1:2a:43:9a:06:c8:0a:29:6f: 391s 11:74:1c:84:03:7b:c4:f1:12:94:fd:bb:4e:4c:fe:9b:70:99: 391s 67:54:f2:c9:c9:4e:2e:ac:43:be:f8:05:21:c0:ae:c4:d3:54: 391s 84:bd:d1:66:98:0d:0b:05:06:36:77:3f:a3:90:a1:0c:d0:5e: 391s 38:f5:55:78:01:5c:ca:80:47:3a:e2:a5:93:e6:91:83:0b:0d: 391s 47:58:f6:98:ef:eb:3f:cd:3d:e4:26:ed:18:35:ef:9a:88:d3: 391s bd:63:56:c4:84:a8:46:5c:12:f3:7c:4b:37:8d:8b:b9:a0:f4: 391s c0:32 391s + local found_md5 expected_md5 391s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-OnwLCh/test-root-CA-trusted-certificate-0001.pem 391s + expected_md5=Modulus=D09AE6EE1382D1BC33B2C2E08D20B2A4986C13D28CA5DF3648671B611E4205C4CD39990F0041CCC37B27CFC3608F49615FE16CB7BD016EA6D73926D0AFBEDDD411525639C908DD187AE0FA56958B04FD1BAF87604E2150972E12C7922756BC0E696B798C115DDBC2B1D466A2C468577512BB66C034E155F057C9E8D22F7AC819 391s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-OnwLCh/SSSD-child-8482.pem 391s + found_md5=Modulus=D09AE6EE1382D1BC33B2C2E08D20B2A4986C13D28CA5DF3648671B611E4205C4CD39990F0041CCC37B27CFC3608F49615FE16CB7BD016EA6D73926D0AFBEDDD411525639C908DD187AE0FA56958B04FD1BAF87604E2150972E12C7922756BC0E696B798C115DDBC2B1D466A2C468577512BB66C034E155F057C9E8D22F7AC819 391s + '[' Modulus=D09AE6EE1382D1BC33B2C2E08D20B2A4986C13D28CA5DF3648671B611E4205C4CD39990F0041CCC37B27CFC3608F49615FE16CB7BD016EA6D73926D0AFBEDDD411525639C908DD187AE0FA56958B04FD1BAF87604E2150972E12C7922756BC0E696B798C115DDBC2B1D466A2C468577512BB66C034E155F057C9E8D22F7AC819 '!=' Modulus=D09AE6EE1382D1BC33B2C2E08D20B2A4986C13D28CA5DF3648671B611E4205C4CD39990F0041CCC37B27CFC3608F49615FE16CB7BD016EA6D73926D0AFBEDDD411525639C908DD187AE0FA56958B04FD1BAF87604E2150972E12C7922756BC0E696B798C115DDBC2B1D466A2C468577512BB66C034E155F057C9E8D22F7AC819 ']' 391s + output_file=/tmp/sssd-softhsm2-OnwLCh/SSSD-child-8482-auth.output 391s ++ basename /tmp/sssd-softhsm2-OnwLCh/SSSD-child-8482-auth.output .output 391s + output_cert_file=/tmp/sssd-softhsm2-OnwLCh/SSSD-child-8482-auth.pem 391s + echo -n 053350 391s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-OnwLCh/test-full-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 '' --token_name 'Test Organization Root Tr Token' --module_name /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so 391s [p11_child[3330]] [main] (0x0400): p11_child started. 391s [p11_child[3330]] [main] (0x2000): Running in [auth] mode. 391s [p11_child[3330]] [main] (0x2000): Running with effective IDs: [0][0]. 391s [p11_child[3330]] [main] (0x2000): Running with real IDs [0][0]. 391s [p11_child[3330]] [do_card] (0x4000): Module List: 391s [p11_child[3330]] [do_card] (0x4000): common name: [softhsm2]. 391s [p11_child[3330]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 391s [p11_child[3330]] [do_card] (0x4000): Description [SoftHSM slot ID 0x468118d6] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 391s [p11_child[3330]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 391s [p11_child[3330]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x468118d6][1182865622] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 391s [p11_child[3330]] [do_card] (0x4000): Login required. 391s [p11_child[3330]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 391s [p11_child[3330]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 391s [p11_child[3330]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so Test Organization Root Tr Token Test Organization Root Tr Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 391s [p11_child[3330]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x468118d6;slot-manufacturer=SoftHSM%20project;slot-id=1182865622;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7c62ded9468118d6;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 391s [p11_child[3330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 391s [p11_child[3330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 391s [p11_child[3330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 391s [p11_child[3330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 391s [p11_child[3330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 391s [p11_child[3330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 391s [p11_child[3330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 391s [p11_child[3330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 391s [p11_child[3330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 391s [p11_child[3330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 391s [p11_child[3330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 391s [p11_child[3330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 391s [p11_child[3330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 391s [p11_child[3330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 391s [p11_child[3330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 391s [p11_child[3330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 391s [p11_child[3330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 391s [p11_child[3330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 391s [p11_child[3330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 391s [p11_child[3330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 391s [p11_child[3330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 391s [p11_child[3330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 391s [p11_child[3330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 391s [p11_child[3330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 391s [p11_child[3330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 391s [p11_child[3330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 391s [p11_child[3330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 391s [p11_child[3330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 391s [p11_child[3330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 391s [p11_child[3330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 391s [p11_child[3330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 391s [p11_child[3330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 391s [p11_child[3330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 391s [p11_child[3330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 391s [p11_child[3330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 391s [p11_child[3330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 391s [p11_child[3330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 391s [p11_child[3330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 391s [p11_child[3330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 391s [p11_child[3330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 391s [p11_child[3330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 391s [p11_child[3330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 391s [p11_child[3330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 391s [p11_child[3330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 391s [p11_child[3330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 391s [p11_child[3330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 391s [p11_child[3330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 391s [p11_child[3330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 391s [p11_child[3330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 391s [p11_child[3330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 391s [p11_child[3330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 391s [p11_child[3330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 391s [p11_child[3330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 391s [p11_child[3330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 391s [p11_child[3330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 391s [p11_child[3330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 391s [p11_child[3330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 391s [p11_child[3330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 391s [p11_child[3330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 391s [p11_child[3330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 391s [p11_child[3330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 391s [p11_child[3330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 391s [p11_child[3330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 391s [p11_child[3330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 391s [p11_child[3330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 391s [p11_child[3330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 391s [p11_child[3330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 391s [p11_child[3330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 391s [p11_child[3330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 391s [p11_child[3330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 391s [p11_child[3330]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 391s [p11_child[3330]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 391s [p11_child[3330]] [do_card] (0x4000): Certificate verified and validated. 391s [p11_child[3330]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 391s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-OnwLCh/SSSD-child-8482-auth.output 391s + echo '-----BEGIN CERTIFICATE-----' 391s + tail -n1 /tmp/sssd-softhsm2-OnwLCh/SSSD-child-8482-auth.output 391s + echo '-----END CERTIFICATE-----' 391s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-OnwLCh/SSSD-child-8482-auth.pem 391s Certificate: 391s Data: 391s Version: 3 (0x2) 391s Serial Number: 3 (0x3) 391s Signature Algorithm: sha256WithRSAEncryption 391s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 391s Validity 391s Not Before: Mar 20 04:14:03 2024 GMT 391s Not After : Mar 20 04:14:03 2025 GMT 391s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 391s Subject Public Key Info: 391s Public Key Algorithm: rsaEncryption 391s Public-Key: (1024 bit) 391s Modulus: 391s 00:d0:9a:e6:ee:13:82:d1:bc:33:b2:c2:e0:8d:20: 391s b2:a4:98:6c:13:d2:8c:a5:df:36:48:67:1b:61:1e: 391s 42:05:c4:cd:39:99:0f:00:41:cc:c3:7b:27:cf:c3: 391s 60:8f:49:61:5f:e1:6c:b7:bd:01:6e:a6:d7:39:26: 391s d0:af:be:dd:d4:11:52:56:39:c9:08:dd:18:7a:e0: 391s fa:56:95:8b:04:fd:1b:af:87:60:4e:21:50:97:2e: 391s 12:c7:92:27:56:bc:0e:69:6b:79:8c:11:5d:db:c2: 391s b1:d4:66:a2:c4:68:57:75:12:bb:66:c0:34:e1:55: 391s f0:57:c9:e8:d2:2f:7a:c8:19 391s Exponent: 65537 (0x10001) 391s X509v3 extensions: 391s X509v3 Authority Key Identifier: 391s 70:74:B7:BF:DB:F4:0D:AA:C4:0C:9F:D6:7D:AB:65:0C:31:AA:94:92 391s X509v3 Basic Constraints: 391s CA:FALSE 391s Netscape Cert Type: 391s SSL Client, S/MIME 391s Netscape Comment: 391s Test Organization Root CA trusted Certificate 391s X509v3 Subject Key Identifier: 391s 35:B5:3D:3E:BE:0E:68:10:43:2F:45:9B:AC:DA:4A:80:C6:5F:A2:ED 391s X509v3 Key Usage: critical 391s Digital Signature, Non Repudiation, Key Encipherment 391s X509v3 Extended Key Usage: 391s TLS Web Client Authentication, E-mail Protection 391s X509v3 Subject Alternative Name: 391s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 391s Signature Algorithm: sha256WithRSAEncryption 391s Signature Value: 391s ad:b8:27:68:46:da:ce:29:57:d1:2a:43:9a:06:c8:0a:29:6f: 391s 11:74:1c:84:03:7b:c4:f1:12:94:fd:bb:4e:4c:fe:9b:70:99: 391s 67:54:f2:c9:c9:4e:2e:ac:43:be:f8:05:21:c0:ae:c4:d3:54: 391s 84:bd:d1:66:98:0d:0b:05:06:36:77:3f:a3:90:a1:0c:d0:5e: 391s 38:f5:55:78:01:5c:ca:80:47:3a:e2:a5:93:e6:91:83:0b:0d: 391s 47:58:f6:98:ef:eb:3f:cd:3d:e4:26:ed:18:35:ef:9a:88:d3: 391s bd:63:56:c4:84:a8:46:5c:12:f3:7c:4b:37:8d:8b:b9:a0:f4: 391s c0:32 391s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-OnwLCh/SSSD-child-8482-auth.pem 391s + found_md5=Modulus=D09AE6EE1382D1BC33B2C2E08D20B2A4986C13D28CA5DF3648671B611E4205C4CD39990F0041CCC37B27CFC3608F49615FE16CB7BD016EA6D73926D0AFBEDDD411525639C908DD187AE0FA56958B04FD1BAF87604E2150972E12C7922756BC0E696B798C115DDBC2B1D466A2C468577512BB66C034E155F057C9E8D22F7AC819 391s + '[' Modulus=D09AE6EE1382D1BC33B2C2E08D20B2A4986C13D28CA5DF3648671B611E4205C4CD39990F0041CCC37B27CFC3608F49615FE16CB7BD016EA6D73926D0AFBEDDD411525639C908DD187AE0FA56958B04FD1BAF87604E2150972E12C7922756BC0E696B798C115DDBC2B1D466A2C468577512BB66C034E155F057C9E8D22F7AC819 '!=' Modulus=D09AE6EE1382D1BC33B2C2E08D20B2A4986C13D28CA5DF3648671B611E4205C4CD39990F0041CCC37B27CFC3608F49615FE16CB7BD016EA6D73926D0AFBEDDD411525639C908DD187AE0FA56958B04FD1BAF87604E2150972E12C7922756BC0E696B798C115DDBC2B1D466A2C468577512BB66C034E155F057C9E8D22F7AC819 ']' 391s + valid_certificate /tmp/sssd-softhsm2-OnwLCh/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-31239 /tmp/sssd-softhsm2-OnwLCh/test-full-chain-CA.pem partial_chain 391s + check_certificate /tmp/sssd-softhsm2-OnwLCh/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-31239 /tmp/sssd-softhsm2-OnwLCh/test-full-chain-CA.pem partial_chain 391s + local certificate=/tmp/sssd-softhsm2-OnwLCh/test-root-CA-trusted-certificate-0001.pem 391s + local key_pass=pass:random-root-ca-trusted-cert-0001-31239 391s + local key_ring=/tmp/sssd-softhsm2-OnwLCh/test-full-chain-CA.pem 391s + local verify_option=partial_chain 391s + prepare_softhsm2_card /tmp/sssd-softhsm2-OnwLCh/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-31239 391s + local certificate=/tmp/sssd-softhsm2-OnwLCh/test-root-CA-trusted-certificate-0001.pem 391s + local key_pass=pass:random-root-ca-trusted-cert-0001-31239 391s + local key_cn 391s + local key_name 391s + local tokens_dir 391s + local output_cert_file 391s + token_name= 391s ++ basename /tmp/sssd-softhsm2-OnwLCh/test-root-CA-trusted-certificate-0001.pem .pem 391s + key_name=test-root-CA-trusted-certificate-0001 391s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-OnwLCh/test-root-CA-trusted-certificate-0001.pem 391s ++ sed -n 's/ *commonName *= //p' 391s + key_cn='Test Organization Root Trusted Certificate 0001' 391s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 391s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-OnwLCh/softhsm2-test-root-CA-trusted-certificate-0001.conf 391s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-OnwLCh/softhsm2-test-root-CA-trusted-certificate-0001.conf 391s ++ basename /tmp/sssd-softhsm2-OnwLCh/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 391s + tokens_dir=/tmp/sssd-softhsm2-OnwLCh/softhsm2-test-root-CA-trusted-certificate-0001 391s Test Organization Root Tr Token 391s + token_name='Test Organization Root Tr Token' 391s + '[' '!' -e /tmp/sssd-softhsm2-OnwLCh/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 391s + '[' '!' -d /tmp/sssd-softhsm2-OnwLCh/softhsm2-test-root-CA-trusted-certificate-0001 ']' 391s + echo 'Test Organization Root Tr Token' 391s + '[' -n partial_chain ']' 391s + local verify_arg=--verify=partial_chain 391s + local output_base_name=SSSD-child-19265 391s + local output_file=/tmp/sssd-softhsm2-OnwLCh/SSSD-child-19265.output 391s + output_cert_file=/tmp/sssd-softhsm2-OnwLCh/SSSD-child-19265.pem 391s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-OnwLCh/test-full-chain-CA.pem 391s [p11_child[3340]] [main] (0x0400): p11_child started. 391s [p11_child[3340]] [main] (0x2000): Running in [pre-auth] mode. 391s [p11_child[3340]] [main] (0x2000): Running with effective IDs: [0][0]. 391s [p11_child[3340]] [main] (0x2000): Running with real IDs [0][0]. 391s [p11_child[3340]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 391s [p11_child[3340]] [do_card] (0x4000): Module List: 391s [p11_child[3340]] [do_card] (0x4000): common name: [softhsm2]. 391s [p11_child[3340]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 391s [p11_child[3340]] [do_card] (0x4000): Description [SoftHSM slot ID 0x468118d6] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 391s [p11_child[3340]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 391s [p11_child[3340]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x468118d6][1182865622] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 391s [p11_child[3340]] [do_card] (0x4000): Login NOT required. 391s [p11_child[3340]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 391s [p11_child[3340]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 391s [p11_child[3340]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Root Tr Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 391s [p11_child[3340]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x468118d6;slot-manufacturer=SoftHSM%20project;slot-id=1182865622;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7c62ded9468118d6;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 391s [p11_child[3340]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 391s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-OnwLCh/SSSD-child-19265.output 391s + echo '-----BEGIN CERTIFICATE-----' 391s + tail -n1 /tmp/sssd-softhsm2-OnwLCh/SSSD-child-19265.output 391s + echo '-----END CERTIFICATE-----' 391s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-OnwLCh/SSSD-child-19265.pem 391s Certificate: 391s Data: 391s Version: 3 (0x2) 391s Serial Number: 3 (0x3) 391s Signature Algorithm: sha256WithRSAEncryption 391s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 391s Validity 391s Not Before: Mar 20 04:14:03 2024 GMT 391s Not After : Mar 20 04:14:03 2025 GMT 391s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 391s Subject Public Key Info: 391s Public Key Algorithm: rsaEncryption 391s Public-Key: (1024 bit) 391s Modulus: 391s 00:d0:9a:e6:ee:13:82:d1:bc:33:b2:c2:e0:8d:20: 391s b2:a4:98:6c:13:d2:8c:a5:df:36:48:67:1b:61:1e: 391s 42:05:c4:cd:39:99:0f:00:41:cc:c3:7b:27:cf:c3: 391s 60:8f:49:61:5f:e1:6c:b7:bd:01:6e:a6:d7:39:26: 391s d0:af:be:dd:d4:11:52:56:39:c9:08:dd:18:7a:e0: 391s fa:56:95:8b:04:fd:1b:af:87:60:4e:21:50:97:2e: 391s 12:c7:92:27:56:bc:0e:69:6b:79:8c:11:5d:db:c2: 391s b1:d4:66:a2:c4:68:57:75:12:bb:66:c0:34:e1:55: 391s f0:57:c9:e8:d2:2f:7a:c8:19 391s Exponent: 65537 (0x10001) 391s X509v3 extensions: 391s X509v3 Authority Key Identifier: 391s 70:74:B7:BF:DB:F4:0D:AA:C4:0C:9F:D6:7D:AB:65:0C:31:AA:94:92 391s X509v3 Basic Constraints: 391s CA:FALSE 391s Netscape Cert Type: 391s SSL Client, S/MIME 391s Netscape Comment: 391s Test Organization Root CA trusted Certificate 391s X509v3 Subject Key Identifier: 391s 35:B5:3D:3E:BE:0E:68:10:43:2F:45:9B:AC:DA:4A:80:C6:5F:A2:ED 391s X509v3 Key Usage: critical 391s Digital Signature, Non Repudiation, Key Encipherment 391s X509v3 Extended Key Usage: 391s TLS Web Client Authentication, E-mail Protection 391s X509v3 Subject Alternative Name: 391s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 391s Signature Algorithm: sha256WithRSAEncryption 391s Signature Value: 391s ad:b8:27:68:46:da:ce:29:57:d1:2a:43:9a:06:c8:0a:29:6f: 391s 11:74:1c:84:03:7b:c4:f1:12:94:fd:bb:4e:4c:fe:9b:70:99: 391s 67:54:f2:c9:c9:4e:2e:ac:43:be:f8:05:21:c0:ae:c4:d3:54: 391s 84:bd:d1:66:98:0d:0b:05:06:36:77:3f:a3:90:a1:0c:d0:5e: 391s 38:f5:55:78:01:5c:ca:80:47:3a:e2:a5:93:e6:91:83:0b:0d: 391s 47:58:f6:98:ef:eb:3f:cd:3d:e4:26:ed:18:35:ef:9a:88:d3: 391s bd:63:56:c4:84:a8:46:5c:12:f3:7c:4b:37:8d:8b:b9:a0:f4: 391s c0:32 391s + local found_md5 expected_md5 391s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-OnwLCh/test-root-CA-trusted-certificate-0001.pem 392s + expected_md5=Modulus=D09AE6EE1382D1BC33B2C2E08D20B2A4986C13D28CA5DF3648671B611E4205C4CD39990F0041CCC37B27CFC3608F49615FE16CB7BD016EA6D73926D0AFBEDDD411525639C908DD187AE0FA56958B04FD1BAF87604E2150972E12C7922756BC0E696B798C115DDBC2B1D466A2C468577512BB66C034E155F057C9E8D22F7AC819 392s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-OnwLCh/SSSD-child-19265.pem 392s + found_md5=Modulus=D09AE6EE1382D1BC33B2C2E08D20B2A4986C13D28CA5DF3648671B611E4205C4CD39990F0041CCC37B27CFC3608F49615FE16CB7BD016EA6D73926D0AFBEDDD411525639C908DD187AE0FA56958B04FD1BAF87604E2150972E12C7922756BC0E696B798C115DDBC2B1D466A2C468577512BB66C034E155F057C9E8D22F7AC819 392s + '[' Modulus=D09AE6EE1382D1BC33B2C2E08D20B2A4986C13D28CA5DF3648671B611E4205C4CD39990F0041CCC37B27CFC3608F49615FE16CB7BD016EA6D73926D0AFBEDDD411525639C908DD187AE0FA56958B04FD1BAF87604E2150972E12C7922756BC0E696B798C115DDBC2B1D466A2C468577512BB66C034E155F057C9E8D22F7AC819 '!=' Modulus=D09AE6EE1382D1BC33B2C2E08D20B2A4986C13D28CA5DF3648671B611E4205C4CD39990F0041CCC37B27CFC3608F49615FE16CB7BD016EA6D73926D0AFBEDDD411525639C908DD187AE0FA56958B04FD1BAF87604E2150972E12C7922756BC0E696B798C115DDBC2B1D466A2C468577512BB66C034E155F057C9E8D22F7AC819 ']' 392s + output_file=/tmp/sssd-softhsm2-OnwLCh/SSSD-child-19265-auth.output 392s ++ basename /tmp/sssd-softhsm2-OnwLCh/SSSD-child-19265-auth.output .output 392s + output_cert_file=/tmp/sssd-softhsm2-OnwLCh/SSSD-child-19265-auth.pem 392s + echo -n 053350 392s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-OnwLCh/test-full-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Root Tr Token' --module_name /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so 392s [p11_child[3348]] [main] (0x0400): p11_child started. 392s [p11_child[3348]] [main] (0x2000): Running in [auth] mode. 392s [p11_child[3348]] [main] (0x2000): Running with effective IDs: [0][0]. 392s [p11_child[3348]] [main] (0x2000): Running with real IDs [0][0]. 392s [p11_child[3348]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 392s [p11_child[3348]] [do_card] (0x4000): Module List: 392s [p11_child[3348]] [do_card] (0x4000): common name: [softhsm2]. 392s [p11_child[3348]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 392s [p11_child[3348]] [do_card] (0x4000): Description [SoftHSM slot ID 0x468118d6] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 392s [p11_child[3348]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 392s [p11_child[3348]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x468118d6][1182865622] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 392s [p11_child[3348]] [do_card] (0x4000): Login required. 392s [p11_child[3348]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 392s [p11_child[3348]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 392s [p11_child[3348]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so Test Organization Root Tr Token Test Organization Root Tr Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 392s [p11_child[3348]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x468118d6;slot-manufacturer=SoftHSM%20project;slot-id=1182865622;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7c62ded9468118d6;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 392s [p11_child[3348]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 392s [p11_child[3348]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 392s [p11_child[3348]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 392s [p11_child[3348]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 392s [p11_child[3348]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 392s [p11_child[3348]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 392s [p11_child[3348]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 392s [p11_child[3348]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 392s [p11_child[3348]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 392s [p11_child[3348]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 392s [p11_child[3348]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 392s [p11_child[3348]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 392s [p11_child[3348]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 392s [p11_child[3348]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 392s [p11_child[3348]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 392s [p11_child[3348]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 392s [p11_child[3348]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 392s [p11_child[3348]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 392s [p11_child[3348]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 392s [p11_child[3348]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 392s [p11_child[3348]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 392s [p11_child[3348]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 392s [p11_child[3348]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 392s [p11_child[3348]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 392s [p11_child[3348]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 392s [p11_child[3348]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 392s [p11_child[3348]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 392s [p11_child[3348]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 392s [p11_child[3348]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 392s [p11_child[3348]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 392s [p11_child[3348]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 392s [p11_child[3348]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 392s [p11_child[3348]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 392s [p11_child[3348]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 392s [p11_child[3348]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 392s [p11_child[3348]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 392s [p11_child[3348]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 392s [p11_child[3348]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 392s [p11_child[3348]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 392s [p11_child[3348]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 392s [p11_child[3348]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 392s [p11_child[3348]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 392s [p11_child[3348]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 392s [p11_child[3348]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 392s [p11_child[3348]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 392s [p11_child[3348]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 392s [p11_child[3348]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 392s [p11_child[3348]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 392s [p11_child[3348]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 392s [p11_child[3348]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 392s [p11_child[3348]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 392s [p11_child[3348]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 392s [p11_child[3348]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 392s [p11_child[3348]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 392s [p11_child[3348]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 392s [p11_child[3348]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 392s [p11_child[3348]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 392s [p11_child[3348]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 392s [p11_child[3348]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 392s [p11_child[3348]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 392s [p11_child[3348]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 392s [p11_child[3348]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 392s [p11_child[3348]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 392s [p11_child[3348]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 392s [p11_child[3348]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 392s [p11_child[3348]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 392s [p11_child[3348]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 392s [p11_child[3348]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 392s [p11_child[3348]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 392s [p11_child[3348]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 392s [p11_child[3348]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 392s [p11_child[3348]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 392s [p11_child[3348]] [do_card] (0x4000): Certificate verified and validated. 392s [p11_child[3348]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 392s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-OnwLCh/SSSD-child-19265-auth.output 392s + echo '-----BEGIN CERTIFICATE-----' 392s Certificate: 392s Data: 392s Version: 3 (0x2) 392s Serial Number: 3 (0x3) 392s Signature Algorithm: sha256WithRSAEncryption 392s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 392s Validity 392s Not Before: Mar 20 04:14:03 2024 GMT 392s Not After : Mar 20 04:14:03 2025 GMT 392s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 392s Subject Public Key Info: 392s Public Key Algorithm: rsaEncryption 392s Public-Key: (1024 bit) 392s Modulus: 392s 00:d0:9a:e6:ee:13:82:d1:bc:33:b2:c2:e0:8d:20: 392s b2:a4:98:6c:13:d2:8c:a5:df:36:48:67:1b:61:1e: 392s 42:05:c4:cd:39:99:0f:00:41:cc:c3:7b:27:cf:c3: 392s 60:8f:49:61:5f:e1:6c:b7:bd:01:6e:a6:d7:39:26: 392s d0:af:be:dd:d4:11:52:56:39:c9:08:dd:18:7a:e0: 392s fa:56:95:8b:04:fd:1b:af:87:60:4e:21:50:97:2e: 392s 12:c7:92:27:56:bc:0e:69:6b:79:8c:11:5d:db:c2: 392s b1:d4:66:a2:c4:68:57:75:12:bb:66:c0:34:e1:55: 392s f0:57:c9:e8:d2:2f:7a:c8:19 392s Exponent: 65537 (0x10001) 392s X509v3 extensions: 392s X509v3 Authority Key Identifier: 392s 70:74:B7:BF:DB:F4:0D:AA:C4:0C:9F:D6:7D:AB:65:0C:31:AA:94:92 392s X509v3 Basic Constraints: 392s CA:FALSE 392s Netscape Cert Type: 392s SSL Client, S/MIME 392s Netscape Comment: 392s Test Organization Root CA trusted Certificate 392s X509v3 Subject Key Identifier: 392s 35:B5:3D:3E:BE:0E:68:10:43:2F:45:9B:AC:DA:4A:80:C6:5F:A2:ED 392s X509v3 Key Usage: critical 392s Digital Signature, Non Repudiation, Key Encipherment 392s X509v3 Extended Key Usage: 392s TLS Web Client Authentication, E-mail Protection 392s X509v3 Subject Alternative Name: 392s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 392s Signature Algorithm: sha256WithRSAEncryption 392s Signature Value: 392s ad:b8:27:68:46:da:ce:29:57:d1:2a:43:9a:06:c8:0a:29:6f: 392s 11:74:1c:84:03:7b:c4:f1:12:94:fd:bb:4e:4c:fe:9b:70:99: 392s 67:54:f2:c9:c9:4e:2e:ac:43:be:f8:05:21:c0:ae:c4:d3:54: 392s 84:bd:d1:66:98:0d:0b:05:06:36:77:3f:a3:90:a1:0c:d0:5e: 392s 38:f5:55:78:01:5c:ca:80:47:3a:e2:a5:93:e6:91:83:0b:0d: 392s 47:58:f6:98:ef:eb:3f:cd:3d:e4:26:ed:18:35:ef:9a:88:d3: 392s bd:63:56:c4:84:a8:46:5c:12:f3:7c:4b:37:8d:8b:b9:a0:f4: 392s c0:32 392s + tail -n1 /tmp/sssd-softhsm2-OnwLCh/SSSD-child-19265-auth.output 392s + echo '-----END CERTIFICATE-----' 392s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-OnwLCh/SSSD-child-19265-auth.pem 392s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-OnwLCh/SSSD-child-19265-auth.pem 392s + found_md5=Modulus=D09AE6EE1382D1BC33B2C2E08D20B2A4986C13D28CA5DF3648671B611E4205C4CD39990F0041CCC37B27CFC3608F49615FE16CB7BD016EA6D73926D0AFBEDDD411525639C908DD187AE0FA56958B04FD1BAF87604E2150972E12C7922756BC0E696B798C115DDBC2B1D466A2C468577512BB66C034E155F057C9E8D22F7AC819 392s + '[' Modulus=D09AE6EE1382D1BC33B2C2E08D20B2A4986C13D28CA5DF3648671B611E4205C4CD39990F0041CCC37B27CFC3608F49615FE16CB7BD016EA6D73926D0AFBEDDD411525639C908DD187AE0FA56958B04FD1BAF87604E2150972E12C7922756BC0E696B798C115DDBC2B1D466A2C468577512BB66C034E155F057C9E8D22F7AC819 '!=' Modulus=D09AE6EE1382D1BC33B2C2E08D20B2A4986C13D28CA5DF3648671B611E4205C4CD39990F0041CCC37B27CFC3608F49615FE16CB7BD016EA6D73926D0AFBEDDD411525639C908DD187AE0FA56958B04FD1BAF87604E2150972E12C7922756BC0E696B798C115DDBC2B1D466A2C468577512BB66C034E155F057C9E8D22F7AC819 ']' 392s + invalid_certificate /tmp/sssd-softhsm2-OnwLCh/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-31239 /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA.pem 392s + check_certificate /tmp/sssd-softhsm2-OnwLCh/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-31239 /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA.pem 392s + local certificate=/tmp/sssd-softhsm2-OnwLCh/test-root-CA-trusted-certificate-0001.pem 392s + local key_pass=pass:random-root-ca-trusted-cert-0001-31239 392s + local key_ring=/tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA.pem 392s + local verify_option= 392s + prepare_softhsm2_card /tmp/sssd-softhsm2-OnwLCh/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-31239 392s + local certificate=/tmp/sssd-softhsm2-OnwLCh/test-root-CA-trusted-certificate-0001.pem 392s + local key_pass=pass:random-root-ca-trusted-cert-0001-31239 392s + local key_cn 392s + local key_name 392s + local tokens_dir 392s + local output_cert_file 392s + token_name= 392s ++ basename /tmp/sssd-softhsm2-OnwLCh/test-root-CA-trusted-certificate-0001.pem .pem 392s + key_name=test-root-CA-trusted-certificate-0001 392s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-OnwLCh/test-root-CA-trusted-certificate-0001.pem 392s ++ sed -n 's/ *commonName *= //p' 392s + key_cn='Test Organization Root Trusted Certificate 0001' 392s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 392s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-OnwLCh/softhsm2-test-root-CA-trusted-certificate-0001.conf 392s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-OnwLCh/softhsm2-test-root-CA-trusted-certificate-0001.conf 392s ++ basename /tmp/sssd-softhsm2-OnwLCh/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 392s + tokens_dir=/tmp/sssd-softhsm2-OnwLCh/softhsm2-test-root-CA-trusted-certificate-0001 392s + token_name='Test Organization Root Tr Token' 392s + '[' '!' -e /tmp/sssd-softhsm2-OnwLCh/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 392s + '[' '!' -d /tmp/sssd-softhsm2-OnwLCh/softhsm2-test-root-CA-trusted-certificate-0001 ']' 392s Test Organization Root Tr Token 392s + echo 'Test Organization Root Tr Token' 392s + '[' -n '' ']' 392s + local output_base_name=SSSD-child-13985 392s + local output_file=/tmp/sssd-softhsm2-OnwLCh/SSSD-child-13985.output 392s + output_cert_file=/tmp/sssd-softhsm2-OnwLCh/SSSD-child-13985.pem 392s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA.pem 392s [p11_child[3358]] [main] (0x0400): p11_child started. 392s [p11_child[3358]] [main] (0x2000): Running in [pre-auth] mode. 392s [p11_child[3358]] [main] (0x2000): Running with effective IDs: [0][0]. 392s [p11_child[3358]] [main] (0x2000): Running with real IDs [0][0]. 392s [p11_child[3358]] [do_card] (0x4000): Module List: 392s [p11_child[3358]] [do_card] (0x4000): common name: [softhsm2]. 392s [p11_child[3358]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 392s [p11_child[3358]] [do_card] (0x4000): Description [SoftHSM slot ID 0x468118d6] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 392s [p11_child[3358]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 392s [p11_child[3358]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x468118d6][1182865622] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 392s [p11_child[3358]] [do_card] (0x4000): Login NOT required. 392s [p11_child[3358]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 392s [p11_child[3358]] [do_verification] (0x0040): X509_verify_cert failed [0]. 392s [p11_child[3358]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 392s [p11_child[3358]] [read_certs] (0x0040): Certificate [Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] not valid, skipping. 392s [p11_child[3358]] [do_card] (0x4000): No certificate found. 392s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-OnwLCh/SSSD-child-13985.output 392s + return 2 392s + invalid_certificate /tmp/sssd-softhsm2-OnwLCh/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-31239 /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA.pem partial_chain 392s + check_certificate /tmp/sssd-softhsm2-OnwLCh/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-31239 /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA.pem partial_chain 392s + local certificate=/tmp/sssd-softhsm2-OnwLCh/test-root-CA-trusted-certificate-0001.pem 392s + local key_pass=pass:random-root-ca-trusted-cert-0001-31239 392s + local key_ring=/tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA.pem 392s + local verify_option=partial_chain 392s + prepare_softhsm2_card /tmp/sssd-softhsm2-OnwLCh/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-31239 392s + local certificate=/tmp/sssd-softhsm2-OnwLCh/test-root-CA-trusted-certificate-0001.pem 392s + local key_pass=pass:random-root-ca-trusted-cert-0001-31239 392s + local key_cn 392s + local key_name 392s + local tokens_dir 392s + local output_cert_file 392s + token_name= 392s ++ basename /tmp/sssd-softhsm2-OnwLCh/test-root-CA-trusted-certificate-0001.pem .pem 392s + key_name=test-root-CA-trusted-certificate-0001 392s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-OnwLCh/test-root-CA-trusted-certificate-0001.pem 392s ++ sed -n 's/ *commonName *= //p' 392s + key_cn='Test Organization Root Trusted Certificate 0001' 392s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 392s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-OnwLCh/softhsm2-test-root-CA-trusted-certificate-0001.conf 392s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-OnwLCh/softhsm2-test-root-CA-trusted-certificate-0001.conf 392s ++ basename /tmp/sssd-softhsm2-OnwLCh/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 392s + tokens_dir=/tmp/sssd-softhsm2-OnwLCh/softhsm2-test-root-CA-trusted-certificate-0001 392s + token_name='Test Organization Root Tr Token' 392s + '[' '!' -e /tmp/sssd-softhsm2-OnwLCh/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 392s + '[' '!' -d /tmp/sssd-softhsm2-OnwLCh/softhsm2-test-root-CA-trusted-certificate-0001 ']' 392s + echo 'Test Organization Root Tr Token' 392s Test Organization Root Tr Token 392s + '[' -n partial_chain ']' 392s + local verify_arg=--verify=partial_chain 392s + local output_base_name=SSSD-child-18894 392s + local output_file=/tmp/sssd-softhsm2-OnwLCh/SSSD-child-18894.output 392s + output_cert_file=/tmp/sssd-softhsm2-OnwLCh/SSSD-child-18894.pem 392s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA.pem 392s [p11_child[3365]] [main] (0x0400): p11_child started. 392s [p11_child[3365]] [main] (0x2000): Running in [pre-auth] mode. 392s [p11_child[3365]] [main] (0x2000): Running with effective IDs: [0][0]. 392s [p11_child[3365]] [main] (0x2000): Running with real IDs [0][0]. 392s [p11_child[3365]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 392s [p11_child[3365]] [do_card] (0x4000): Module List: 392s [p11_child[3365]] [do_card] (0x4000): common name: [softhsm2]. 392s [p11_child[3365]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 392s [p11_child[3365]] [do_card] (0x4000): Description [SoftHSM slot ID 0x468118d6] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 392s [p11_child[3365]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 392s [p11_child[3365]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x468118d6][1182865622] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 392s [p11_child[3365]] [do_card] (0x4000): Login NOT required. 392s [p11_child[3365]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 392s [p11_child[3365]] [do_verification] (0x0040): X509_verify_cert failed [0]. 392s [p11_child[3365]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 392s [p11_child[3365]] [read_certs] (0x0040): Certificate [Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] not valid, skipping. 392s [p11_child[3365]] [do_card] (0x4000): No certificate found. 392s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-OnwLCh/SSSD-child-18894.output 392s + return 2 392s + invalid_certificate /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-7089 /dev/null 392s + check_certificate /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-7089 /dev/null 392s + local certificate=/tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA-trusted-certificate-0001.pem 392s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-7089 392s + local key_ring=/dev/null 392s + local verify_option= 392s + prepare_softhsm2_card /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-7089 392s + local certificate=/tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA-trusted-certificate-0001.pem 392s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-7089 392s + local key_cn 392s + local key_name 392s + local tokens_dir 392s + local output_cert_file 392s + token_name= 392s ++ basename /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA-trusted-certificate-0001.pem .pem 392s + key_name=test-intermediate-CA-trusted-certificate-0001 392s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA-trusted-certificate-0001.pem 392s ++ sed -n 's/ *commonName *= //p' 392s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 392s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 392s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-OnwLCh/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 392s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-OnwLCh/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 392s ++ basename /tmp/sssd-softhsm2-OnwLCh/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 392s + tokens_dir=/tmp/sssd-softhsm2-OnwLCh/softhsm2-test-intermediate-CA-trusted-certificate-0001 392s + token_name='Test Organization Interme Token' 392s + '[' '!' -e /tmp/sssd-softhsm2-OnwLCh/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 392s + local key_file 392s + local decrypted_key 392s + mkdir -p /tmp/sssd-softhsm2-OnwLCh/softhsm2-test-intermediate-CA-trusted-certificate-0001 392s + key_file=/tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA-trusted-certificate-0001-key.pem 392s + decrypted_key=/tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 392s + cat 392s + softhsm2-util --init-token --label 'Test Organization Interme Token' --pin 053350 --so-pin 053350 --free 392s Slot 0 has a free/uninitialized token. 392s The token has been initialized and is reassigned to slot 850179168 392s + softhsm2-util --show-slots 392s Available slots: 392s Slot 850179168 392s Slot info: 392s Description: SoftHSM slot ID 0x32acb460 392s Manufacturer ID: SoftHSM project 392s Hardware version: 2.6 392s Firmware version: 2.6 392s Token present: yes 392s Token info: 392s Manufacturer ID: SoftHSM project 392s Model: SoftHSM v2 392s Hardware version: 2.6 392s Firmware version: 2.6 392s Serial number: 2c68f46a32acb460 392s Initialized: yes 392s User PIN init.: yes 392s Label: Test Organization Interme Token 392s Slot 1 392s Slot info: 392s Description: SoftHSM slot ID 0x1 392s Manufacturer ID: SoftHSM project 392s Hardware version: 2.6 392s Firmware version: 2.6 392s Token present: yes 392s Token info: 392s Manufacturer ID: SoftHSM project 392s Model: SoftHSM v2 392s Hardware version: 2.6 392s Firmware version: 2.6 392s Serial number: 392s Initialized: no 392s User PIN init.: no 392s Label: 392s + p11tool --provider=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --write --no-mark-private --load-certificate=/tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA-trusted-certificate-0001.pem --login --set-pin=053350 --label 'Test Organization Intermediate Trusted Certificate 0001' --id 00112233445566778899FFAABBCCDDEEFF012345 392s + openssl rsa -passin pass:random-intermediate-ca-trusted-cert-0001-7089 -in /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA-trusted-certificate-0001-key.pem -out /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 392s writing RSA key 392s + p11tool --provider=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --write --load-privkey=/tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem --login --set-pin=053350 --label 'Test Organization Intermediate Trusted Certificate 0001 Key' --id 00112233445566778899FFAABBCCDDEEFF012345 392s + rm /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 392s + p11tool --provider=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --list-all 392s Object 0: 392s URL: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=2c68f46a32acb460;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert 392s Type: X.509 Certificate (RSA-1024) 392s Expires: Thu Mar 20 04:14:03 2025 392s Label: Test Organization Intermediate Trusted Certificate 0001 392s ID: 00:11:22:33:44:55:66:77:88:99:ff:aa:bb:cc:dd:ee:ff:01:23:45 392s 392s Test Organization Interme Token 392s + echo 'Test Organization Interme Token' 392s + '[' -n '' ']' 392s + local output_base_name=SSSD-child-22708 392s + local output_file=/tmp/sssd-softhsm2-OnwLCh/SSSD-child-22708.output 392s + output_cert_file=/tmp/sssd-softhsm2-OnwLCh/SSSD-child-22708.pem 392s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/dev/null 392s [p11_child[3381]] [main] (0x0400): p11_child started. 392s [p11_child[3381]] [main] (0x2000): Running in [pre-auth] mode. 392s [p11_child[3381]] [main] (0x2000): Running with effective IDs: [0][0]. 392s [p11_child[3381]] [main] (0x2000): Running with real IDs [0][0]. 392s [p11_child[3381]] [init_verification] (0x0040): X509_LOOKUP_load_file [/dev/null] failed [92274824][error:05800088:x509 certificate routines::no certificate or crl found]. 392s [p11_child[3381]] [do_work] (0x0040): init_verification failed. 392s [p11_child[3381]] [main] (0x0020): p11_child failed (5) 392s + return 2 392s + valid_certificate /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-7089 /dev/null no_verification 392s + check_certificate /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-7089 /dev/null no_verification 392s + local certificate=/tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA-trusted-certificate-0001.pem 392s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-7089 392s + local key_ring=/dev/null 392s + local verify_option=no_verification 392s + prepare_softhsm2_card /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-7089 392s + local certificate=/tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA-trusted-certificate-0001.pem 392s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-7089 392s + local key_cn 392s + local key_name 392s + local tokens_dir 392s + local output_cert_file 392s + token_name= 392s ++ basename /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA-trusted-certificate-0001.pem .pem 392s + key_name=test-intermediate-CA-trusted-certificate-0001 392s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA-trusted-certificate-0001.pem 392s ++ sed -n 's/ *commonName *= //p' 392s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 392s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 392s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-OnwLCh/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 392s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-OnwLCh/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 392s ++ basename /tmp/sssd-softhsm2-OnwLCh/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 392s + tokens_dir=/tmp/sssd-softhsm2-OnwLCh/softhsm2-test-intermediate-CA-trusted-certificate-0001 392s + token_name='Test Organization Interme Token' 392s + '[' '!' -e /tmp/sssd-softhsm2-OnwLCh/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 392s + '[' '!' -d /tmp/sssd-softhsm2-OnwLCh/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 392s + echo 'Test Organization Interme Token' 392s + '[' -n no_verification ']' 392s + local verify_arg=--verify=no_verification 392s + local output_base_name=SSSD-child-28000 392s + local output_file=/tmp/sssd-softhsm2-OnwLCh/SSSD-child-28000.output 392s + output_cert_file=/tmp/sssd-softhsm2-OnwLCh/SSSD-child-28000.pem 392s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --verify=no_verification --ca_db=/dev/null 392s Test Organization Interme Token 392s [p11_child[3387]] [main] (0x0400): p11_child started. 392s [p11_child[3387]] [main] (0x2000): Running in [pre-auth] mode. 392s [p11_child[3387]] [main] (0x2000): Running with effective IDs: [0][0]. 392s [p11_child[3387]] [main] (0x2000): Running with real IDs [0][0]. 392s [p11_child[3387]] [parse_cert_verify_opts] (0x0020): Found 'no_verification' option, disabling verification completely. This should not be used in production. 392s [p11_child[3387]] [do_card] (0x4000): Module List: 392s [p11_child[3387]] [do_card] (0x4000): common name: [softhsm2]. 392s [p11_child[3387]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 392s [p11_child[3387]] [do_card] (0x4000): Description [SoftHSM slot ID 0x32acb460] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 392s [p11_child[3387]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 392s [p11_child[3387]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x32acb460][850179168] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 392s [p11_child[3387]] [do_card] (0x4000): Login NOT required. 392s [p11_child[3387]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 392s [p11_child[3387]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Interme Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 392s [p11_child[3387]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x32acb460;slot-manufacturer=SoftHSM%20project;slot-id=850179168;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=2c68f46a32acb460;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 392s [p11_child[3387]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 392s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-OnwLCh/SSSD-child-28000.output 392s + echo '-----BEGIN CERTIFICATE-----' 392s + tail -n1 /tmp/sssd-softhsm2-OnwLCh/SSSD-child-28000.output 392s + echo '-----END CERTIFICATE-----' 392s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-OnwLCh/SSSD-child-28000.pem 392s Certificate: 392s Data: 392s Version: 3 (0x2) 392s Serial Number: 4 (0x4) 392s Signature Algorithm: sha256WithRSAEncryption 392s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 392s Validity 392s Not Before: Mar 20 04:14:03 2024 GMT 392s Not After : Mar 20 04:14:03 2025 GMT 392s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 392s Subject Public Key Info: 392s Public Key Algorithm: rsaEncryption 392s Public-Key: (1024 bit) 392s Modulus: 392s 00:e1:50:21:27:e2:3f:41:2a:68:28:e0:31:09:95: 392s 47:86:35:67:e6:c3:17:5b:5e:1a:ff:55:e6:05:18: 392s f9:1c:33:f8:25:62:69:7c:63:72:30:7c:a3:83:ea: 392s a9:eb:37:98:04:89:7b:60:80:fd:e9:be:87:c2:18: 392s 77:db:81:16:7c:a2:0d:87:3f:69:ae:db:35:96:c4: 392s 19:92:82:bf:4b:c3:3d:34:90:50:54:9f:96:2d:c4: 392s 0a:1f:4d:d3:c9:c3:16:35:1a:f3:bf:b7:cf:61:82: 392s 1e:85:e0:a4:8b:50:cd:01:85:50:c1:8d:dc:37:48: 392s 91:9d:83:af:f6:fb:55:1d:a7 392s Exponent: 65537 (0x10001) 392s X509v3 extensions: 392s X509v3 Authority Key Identifier: 392s 23:A6:E2:94:B7:17:90:42:ED:CF:CD:99:1C:B9:22:74:FC:61:4B:50 392s X509v3 Basic Constraints: 392s CA:FALSE 392s Netscape Cert Type: 392s SSL Client, S/MIME 392s Netscape Comment: 392s Test Organization Intermediate CA trusted Certificate 392s X509v3 Subject Key Identifier: 392s 1A:3D:9B:57:59:58:53:9C:51:D4:06:F7:B2:50:47:79:3C:DE:89:FD 392s X509v3 Key Usage: critical 392s Digital Signature, Non Repudiation, Key Encipherment 392s X509v3 Extended Key Usage: 392s TLS Web Client Authentication, E-mail Protection 392s X509v3 Subject Alternative Name: 392s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 392s Signature Algorithm: sha256WithRSAEncryption 392s Signature Value: 392s 80:c4:81:8a:dc:a3:3f:ad:55:8b:38:21:b3:ed:ae:83:bc:62: 392s 23:90:0c:11:56:4e:e0:b0:46:55:35:6e:2a:74:cb:79:9f:8f: 392s 94:bf:84:d5:34:81:cb:4e:43:06:fe:7b:25:40:55:5f:c2:f6: 392s ba:47:c6:94:85:a7:19:13:91:89:84:d6:94:d8:7c:82:cf:37: 392s 94:be:7e:64:e7:6a:95:4b:04:da:61:d3:de:c1:63:6d:50:de: 392s f0:c3:c8:91:85:5a:51:24:0a:2e:29:12:c1:17:a6:32:3e:53: 392s e5:51:70:73:2c:71:04:62:19:7d:fe:a7:27:72:62:c3:c4:61: 392s 6a:1f 392s + local found_md5 expected_md5 392s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA-trusted-certificate-0001.pem 392s + expected_md5=Modulus=E1502127E23F412A6828E031099547863567E6C3175B5E1AFF55E60518F91C33F82562697C6372307CA383EAA9EB379804897B6080FDE9BE87C21877DB81167CA20D873F69AEDB3596C4199282BF4BC33D349050549F962DC40A1F4DD3C9C316351AF3BFB7CF61821E85E0A48B50CD018550C18DDC3748919D83AFF6FB551DA7 392s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-OnwLCh/SSSD-child-28000.pem 392s + found_md5=Modulus=E1502127E23F412A6828E031099547863567E6C3175B5E1AFF55E60518F91C33F82562697C6372307CA383EAA9EB379804897B6080FDE9BE87C21877DB81167CA20D873F69AEDB3596C4199282BF4BC33D349050549F962DC40A1F4DD3C9C316351AF3BFB7CF61821E85E0A48B50CD018550C18DDC3748919D83AFF6FB551DA7 392s + '[' Modulus=E1502127E23F412A6828E031099547863567E6C3175B5E1AFF55E60518F91C33F82562697C6372307CA383EAA9EB379804897B6080FDE9BE87C21877DB81167CA20D873F69AEDB3596C4199282BF4BC33D349050549F962DC40A1F4DD3C9C316351AF3BFB7CF61821E85E0A48B50CD018550C18DDC3748919D83AFF6FB551DA7 '!=' Modulus=E1502127E23F412A6828E031099547863567E6C3175B5E1AFF55E60518F91C33F82562697C6372307CA383EAA9EB379804897B6080FDE9BE87C21877DB81167CA20D873F69AEDB3596C4199282BF4BC33D349050549F962DC40A1F4DD3C9C316351AF3BFB7CF61821E85E0A48B50CD018550C18DDC3748919D83AFF6FB551DA7 ']' 392s + output_file=/tmp/sssd-softhsm2-OnwLCh/SSSD-child-28000-auth.output 392s ++ basename /tmp/sssd-softhsm2-OnwLCh/SSSD-child-28000-auth.output .output 392s + output_cert_file=/tmp/sssd-softhsm2-OnwLCh/SSSD-child-28000-auth.pem 392s + echo -n 053350 392s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/dev/null --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=no_verification --token_name 'Test Organization Interme Token' --module_name /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so 392s [p11_child[3395]] [main] (0x0400): p11_child started. 392s [p11_child[3395]] [main] (0x2000): Running in [auth] mode. 392s [p11_child[3395]] [main] (0x2000): Running with effective IDs: [0][0]. 392s [p11_child[3395]] [main] (0x2000): Running with real IDs [0][0]. 392s [p11_child[3395]] [parse_cert_verify_opts] (0x0020): Found 'no_verification' option, disabling verification completely. This should not be used in production. 392s [p11_child[3395]] [do_card] (0x4000): Module List: 392s [p11_child[3395]] [do_card] (0x4000): common name: [softhsm2]. 392s [p11_child[3395]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 392s [p11_child[3395]] [do_card] (0x4000): Description [SoftHSM slot ID 0x32acb460] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 392s [p11_child[3395]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 392s [p11_child[3395]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x32acb460][850179168] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 392s [p11_child[3395]] [do_card] (0x4000): Login required. 392s [p11_child[3395]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 392s [p11_child[3395]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so Test Organization Interme Token Test Organization Interme Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 392s [p11_child[3395]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x32acb460;slot-manufacturer=SoftHSM%20project;slot-id=850179168;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=2c68f46a32acb460;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 392s [p11_child[3395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 392s [p11_child[3395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 392s [p11_child[3395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 392s [p11_child[3395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 392s [p11_child[3395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 392s [p11_child[3395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 392s [p11_child[3395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 392s [p11_child[3395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 392s [p11_child[3395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 392s [p11_child[3395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 392s [p11_child[3395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 392s [p11_child[3395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 392s [p11_child[3395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 392s [p11_child[3395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 392s [p11_child[3395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 392s [p11_child[3395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 392s [p11_child[3395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 392s [p11_child[3395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 392s [p11_child[3395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 392s [p11_child[3395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 392s [p11_child[3395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 392s [p11_child[3395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 392s [p11_child[3395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 392s [p11_child[3395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 392s [p11_child[3395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 392s [p11_child[3395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 392s [p11_child[3395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 392s [p11_child[3395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 392s [p11_child[3395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 392s [p11_child[3395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 392s [p11_child[3395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 392s [p11_child[3395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 392s [p11_child[3395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 392s [p11_child[3395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 392s [p11_child[3395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 392s [p11_child[3395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 392s [p11_child[3395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 392s [p11_child[3395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 392s [p11_child[3395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 392s [p11_child[3395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 392s [p11_child[3395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 392s [p11_child[3395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 392s [p11_child[3395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 392s [p11_child[3395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 392s [p11_child[3395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 392s [p11_child[3395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 392s [p11_child[3395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 392s [p11_child[3395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 392s [p11_child[3395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 392s [p11_child[3395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 392s [p11_child[3395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 392s [p11_child[3395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 392s [p11_child[3395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 392s [p11_child[3395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 392s [p11_child[3395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 392s [p11_child[3395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 392s [p11_child[3395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 392s [p11_child[3395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 392s [p11_child[3395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 392s [p11_child[3395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 392s [p11_child[3395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 392s [p11_child[3395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 392s [p11_child[3395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 392s [p11_child[3395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 392s [p11_child[3395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 392s [p11_child[3395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 392s [p11_child[3395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 392s [p11_child[3395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 392s [p11_child[3395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 392s [p11_child[3395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 392s [p11_child[3395]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 392s [p11_child[3395]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 392s [p11_child[3395]] [do_card] (0x4000): Certificate verified and validated. 392s [p11_child[3395]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 392s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-OnwLCh/SSSD-child-28000-auth.output 392s + echo '-----BEGIN CERTIFICATE-----' 392s + tail -n1 /tmp/sssd-softhsm2-OnwLCh/SSSD-child-28000-auth.output 392s + echo '-----END CERTIFICATE-----' 392s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-OnwLCh/SSSD-child-28000-auth.pem 392s Certificate: 392s Data: 392s Version: 3 (0x2) 392s Serial Number: 4 (0x4) 392s Signature Algorithm: sha256WithRSAEncryption 392s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 392s Validity 392s Not Before: Mar 20 04:14:03 2024 GMT 392s Not After : Mar 20 04:14:03 2025 GMT 392s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 392s Subject Public Key Info: 392s Public Key Algorithm: rsaEncryption 392s Public-Key: (1024 bit) 392s Modulus: 392s 00:e1:50:21:27:e2:3f:41:2a:68:28:e0:31:09:95: 392s 47:86:35:67:e6:c3:17:5b:5e:1a:ff:55:e6:05:18: 392s f9:1c:33:f8:25:62:69:7c:63:72:30:7c:a3:83:ea: 392s a9:eb:37:98:04:89:7b:60:80:fd:e9:be:87:c2:18: 392s 77:db:81:16:7c:a2:0d:87:3f:69:ae:db:35:96:c4: 392s 19:92:82:bf:4b:c3:3d:34:90:50:54:9f:96:2d:c4: 392s 0a:1f:4d:d3:c9:c3:16:35:1a:f3:bf:b7:cf:61:82: 392s 1e:85:e0:a4:8b:50:cd:01:85:50:c1:8d:dc:37:48: 392s 91:9d:83:af:f6:fb:55:1d:a7 392s Exponent: 65537 (0x10001) 392s X509v3 extensions: 392s X509v3 Authority Key Identifier: 392s 23:A6:E2:94:B7:17:90:42:ED:CF:CD:99:1C:B9:22:74:FC:61:4B:50 392s X509v3 Basic Constraints: 392s CA:FALSE 392s Netscape Cert Type: 392s SSL Client, S/MIME 392s Netscape Comment: 392s Test Organization Intermediate CA trusted Certificate 392s X509v3 Subject Key Identifier: 392s 1A:3D:9B:57:59:58:53:9C:51:D4:06:F7:B2:50:47:79:3C:DE:89:FD 392s X509v3 Key Usage: critical 392s Digital Signature, Non Repudiation, Key Encipherment 392s X509v3 Extended Key Usage: 392s TLS Web Client Authentication, E-mail Protection 392s X509v3 Subject Alternative Name: 392s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 392s Signature Algorithm: sha256WithRSAEncryption 392s Signature Value: 392s 80:c4:81:8a:dc:a3:3f:ad:55:8b:38:21:b3:ed:ae:83:bc:62: 392s 23:90:0c:11:56:4e:e0:b0:46:55:35:6e:2a:74:cb:79:9f:8f: 392s 94:bf:84:d5:34:81:cb:4e:43:06:fe:7b:25:40:55:5f:c2:f6: 392s ba:47:c6:94:85:a7:19:13:91:89:84:d6:94:d8:7c:82:cf:37: 392s 94:be:7e:64:e7:6a:95:4b:04:da:61:d3:de:c1:63:6d:50:de: 392s f0:c3:c8:91:85:5a:51:24:0a:2e:29:12:c1:17:a6:32:3e:53: 392s e5:51:70:73:2c:71:04:62:19:7d:fe:a7:27:72:62:c3:c4:61: 392s 6a:1f 392s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-OnwLCh/SSSD-child-28000-auth.pem 392s + found_md5=Modulus=E1502127E23F412A6828E031099547863567E6C3175B5E1AFF55E60518F91C33F82562697C6372307CA383EAA9EB379804897B6080FDE9BE87C21877DB81167CA20D873F69AEDB3596C4199282BF4BC33D349050549F962DC40A1F4DD3C9C316351AF3BFB7CF61821E85E0A48B50CD018550C18DDC3748919D83AFF6FB551DA7 392s + '[' Modulus=E1502127E23F412A6828E031099547863567E6C3175B5E1AFF55E60518F91C33F82562697C6372307CA383EAA9EB379804897B6080FDE9BE87C21877DB81167CA20D873F69AEDB3596C4199282BF4BC33D349050549F962DC40A1F4DD3C9C316351AF3BFB7CF61821E85E0A48B50CD018550C18DDC3748919D83AFF6FB551DA7 '!=' Modulus=E1502127E23F412A6828E031099547863567E6C3175B5E1AFF55E60518F91C33F82562697C6372307CA383EAA9EB379804897B6080FDE9BE87C21877DB81167CA20D873F69AEDB3596C4199282BF4BC33D349050549F962DC40A1F4DD3C9C316351AF3BFB7CF61821E85E0A48B50CD018550C18DDC3748919D83AFF6FB551DA7 ']' 392s + invalid_certificate /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-7089 /tmp/sssd-softhsm2-OnwLCh/test-root-CA.pem 392s + check_certificate /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-7089 /tmp/sssd-softhsm2-OnwLCh/test-root-CA.pem 392s + local certificate=/tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA-trusted-certificate-0001.pem 392s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-7089 392s + local key_ring=/tmp/sssd-softhsm2-OnwLCh/test-root-CA.pem 392s + local verify_option= 392s + prepare_softhsm2_card /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-7089 392s + local certificate=/tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA-trusted-certificate-0001.pem 392s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-7089 392s + local key_cn 392s + local key_name 392s + local tokens_dir 392s + local output_cert_file 392s + token_name= 392s ++ basename /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA-trusted-certificate-0001.pem .pem 392s + key_name=test-intermediate-CA-trusted-certificate-0001 392s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA-trusted-certificate-0001.pem 392s ++ sed -n 's/ *commonName *= //p' 392s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 392s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 392s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-OnwLCh/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 392s Test Organization Interme Token 392s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-OnwLCh/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 392s ++ basename /tmp/sssd-softhsm2-OnwLCh/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 392s + tokens_dir=/tmp/sssd-softhsm2-OnwLCh/softhsm2-test-intermediate-CA-trusted-certificate-0001 392s + token_name='Test Organization Interme Token' 392s + '[' '!' -e /tmp/sssd-softhsm2-OnwLCh/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 392s + '[' '!' -d /tmp/sssd-softhsm2-OnwLCh/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 392s + echo 'Test Organization Interme Token' 392s + '[' -n '' ']' 392s + local output_base_name=SSSD-child-21584 392s + local output_file=/tmp/sssd-softhsm2-OnwLCh/SSSD-child-21584.output 392s + output_cert_file=/tmp/sssd-softhsm2-OnwLCh/SSSD-child-21584.pem 392s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-OnwLCh/test-root-CA.pem 392s [p11_child[3405]] [main] (0x0400): p11_child started. 392s [p11_child[3405]] [main] (0x2000): Running in [pre-auth] mode. 392s [p11_child[3405]] [main] (0x2000): Running with effective IDs: [0][0]. 392s [p11_child[3405]] [main] (0x2000): Running with real IDs [0][0]. 392s [p11_child[3405]] [do_card] (0x4000): Module List: 392s [p11_child[3405]] [do_card] (0x4000): common name: [softhsm2]. 392s [p11_child[3405]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 392s [p11_child[3405]] [do_card] (0x4000): Description [SoftHSM slot ID 0x32acb460] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 392s [p11_child[3405]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 392s [p11_child[3405]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x32acb460][850179168] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 392s [p11_child[3405]] [do_card] (0x4000): Login NOT required. 392s [p11_child[3405]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 392s [p11_child[3405]] [do_verification] (0x0040): X509_verify_cert failed [0]. 392s [p11_child[3405]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 392s [p11_child[3405]] [read_certs] (0x0040): Certificate [Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] not valid, skipping. 392s [p11_child[3405]] [do_card] (0x4000): No certificate found. 392s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-OnwLCh/SSSD-child-21584.output 392s + return 2 392s + invalid_certificate /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-7089 /tmp/sssd-softhsm2-OnwLCh/test-root-CA.pem partial_chain 392s + check_certificate /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-7089 /tmp/sssd-softhsm2-OnwLCh/test-root-CA.pem partial_chain 392s + local certificate=/tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA-trusted-certificate-0001.pem 392s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-7089 392s + local key_ring=/tmp/sssd-softhsm2-OnwLCh/test-root-CA.pem 392s + local verify_option=partial_chain 392s + prepare_softhsm2_card /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-7089 392s + local certificate=/tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA-trusted-certificate-0001.pem 392s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-7089 392s + local key_cn 392s + local key_name 392s + local tokens_dir 392s + local output_cert_file 392s + token_name= 392s ++ basename /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA-trusted-certificate-0001.pem .pem 392s + key_name=test-intermediate-CA-trusted-certificate-0001 392s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA-trusted-certificate-0001.pem 392s ++ sed -n 's/ *commonName *= //p' 393s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 393s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 393s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-OnwLCh/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 393s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-OnwLCh/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 393s ++ basename /tmp/sssd-softhsm2-OnwLCh/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 393s + tokens_dir=/tmp/sssd-softhsm2-OnwLCh/softhsm2-test-intermediate-CA-trusted-certificate-0001 393s Test Organization Interme Token 393s + token_name='Test Organization Interme Token' 393s + '[' '!' -e /tmp/sssd-softhsm2-OnwLCh/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 393s + '[' '!' -d /tmp/sssd-softhsm2-OnwLCh/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 393s + echo 'Test Organization Interme Token' 393s + '[' -n partial_chain ']' 393s + local verify_arg=--verify=partial_chain 393s + local output_base_name=SSSD-child-25882 393s + local output_file=/tmp/sssd-softhsm2-OnwLCh/SSSD-child-25882.output 393s + output_cert_file=/tmp/sssd-softhsm2-OnwLCh/SSSD-child-25882.pem 393s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-OnwLCh/test-root-CA.pem 393s [p11_child[3412]] [main] (0x0400): p11_child started. 393s [p11_child[3412]] [main] (0x2000): Running in [pre-auth] mode. 393s [p11_child[3412]] [main] (0x2000): Running with effective IDs: [0][0]. 393s [p11_child[3412]] [main] (0x2000): Running with real IDs [0][0]. 393s [p11_child[3412]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 393s [p11_child[3412]] [do_card] (0x4000): Module List: 393s [p11_child[3412]] [do_card] (0x4000): common name: [softhsm2]. 393s [p11_child[3412]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 393s [p11_child[3412]] [do_card] (0x4000): Description [SoftHSM slot ID 0x32acb460] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 393s [p11_child[3412]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 393s [p11_child[3412]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x32acb460][850179168] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 393s [p11_child[3412]] [do_card] (0x4000): Login NOT required. 393s [p11_child[3412]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 393s [p11_child[3412]] [do_verification] (0x0040): X509_verify_cert failed [0]. 393s [p11_child[3412]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 393s [p11_child[3412]] [read_certs] (0x0040): Certificate [Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] not valid, skipping. 393s [p11_child[3412]] [do_card] (0x4000): No certificate found. 393s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-OnwLCh/SSSD-child-25882.output 393s + return 2 393s + valid_certificate /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-7089 /tmp/sssd-softhsm2-OnwLCh/test-full-chain-CA.pem 393s + check_certificate /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-7089 /tmp/sssd-softhsm2-OnwLCh/test-full-chain-CA.pem 393s + local certificate=/tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA-trusted-certificate-0001.pem 393s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-7089 393s + local key_ring=/tmp/sssd-softhsm2-OnwLCh/test-full-chain-CA.pem 393s + local verify_option= 393s + prepare_softhsm2_card /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-7089 393s + local certificate=/tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA-trusted-certificate-0001.pem 393s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-7089 393s + local key_cn 393s + local key_name 393s + local tokens_dir 393s + local output_cert_file 393s + token_name= 393s ++ basename /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA-trusted-certificate-0001.pem .pem 393s + key_name=test-intermediate-CA-trusted-certificate-0001 393s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA-trusted-certificate-0001.pem 393s ++ sed -n 's/ *commonName *= //p' 393s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 393s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 393s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-OnwLCh/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 393s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-OnwLCh/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 393s ++ basename /tmp/sssd-softhsm2-OnwLCh/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 393s + tokens_dir=/tmp/sssd-softhsm2-OnwLCh/softhsm2-test-intermediate-CA-trusted-certificate-0001 393s Test Organization Interme Token 393s + token_name='Test Organization Interme Token' 393s + '[' '!' -e /tmp/sssd-softhsm2-OnwLCh/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 393s + '[' '!' -d /tmp/sssd-softhsm2-OnwLCh/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 393s + echo 'Test Organization Interme Token' 393s + '[' -n '' ']' 393s + local output_base_name=SSSD-child-27008 393s + local output_file=/tmp/sssd-softhsm2-OnwLCh/SSSD-child-27008.output 393s + output_cert_file=/tmp/sssd-softhsm2-OnwLCh/SSSD-child-27008.pem 393s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-OnwLCh/test-full-chain-CA.pem 393s [p11_child[3419]] [main] (0x0400): p11_child started. 393s [p11_child[3419]] [main] (0x2000): Running in [pre-auth] mode. 393s [p11_child[3419]] [main] (0x2000): Running with effective IDs: [0][0]. 393s [p11_child[3419]] [main] (0x2000): Running with real IDs [0][0]. 393s [p11_child[3419]] [do_card] (0x4000): Module List: 393s [p11_child[3419]] [do_card] (0x4000): common name: [softhsm2]. 393s [p11_child[3419]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 393s [p11_child[3419]] [do_card] (0x4000): Description [SoftHSM slot ID 0x32acb460] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 393s [p11_child[3419]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 393s [p11_child[3419]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x32acb460][850179168] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 393s [p11_child[3419]] [do_card] (0x4000): Login NOT required. 393s [p11_child[3419]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 393s [p11_child[3419]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 393s [p11_child[3419]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Interme Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 393s [p11_child[3419]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x32acb460;slot-manufacturer=SoftHSM%20project;slot-id=850179168;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=2c68f46a32acb460;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 393s [p11_child[3419]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 393s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-OnwLCh/SSSD-child-27008.output 393s + echo '-----BEGIN CERTIFICATE-----' 393s + tail -n1 /tmp/sssd-softhsm2-OnwLCh/SSSD-child-27008.output 393s + echo '-----END CERTIFICATE-----' 393s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-OnwLCh/SSSD-child-27008.pem 393s Certificate: 393s Data: 393s Version: 3 (0x2) 393s Serial Number: 4 (0x4) 393s Signature Algorithm: sha256WithRSAEncryption 393s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 393s Validity 393s Not Before: Mar 20 04:14:03 2024 GMT 393s Not After : Mar 20 04:14:03 2025 GMT 393s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 393s Subject Public Key Info: 393s Public Key Algorithm: rsaEncryption 393s Public-Key: (1024 bit) 393s Modulus: 393s 00:e1:50:21:27:e2:3f:41:2a:68:28:e0:31:09:95: 393s 47:86:35:67:e6:c3:17:5b:5e:1a:ff:55:e6:05:18: 393s f9:1c:33:f8:25:62:69:7c:63:72:30:7c:a3:83:ea: 393s a9:eb:37:98:04:89:7b:60:80:fd:e9:be:87:c2:18: 393s 77:db:81:16:7c:a2:0d:87:3f:69:ae:db:35:96:c4: 393s 19:92:82:bf:4b:c3:3d:34:90:50:54:9f:96:2d:c4: 393s 0a:1f:4d:d3:c9:c3:16:35:1a:f3:bf:b7:cf:61:82: 393s 1e:85:e0:a4:8b:50:cd:01:85:50:c1:8d:dc:37:48: 393s 91:9d:83:af:f6:fb:55:1d:a7 393s Exponent: 65537 (0x10001) 393s X509v3 extensions: 393s X509v3 Authority Key Identifier: 393s 23:A6:E2:94:B7:17:90:42:ED:CF:CD:99:1C:B9:22:74:FC:61:4B:50 393s X509v3 Basic Constraints: 393s CA:FALSE 393s Netscape Cert Type: 393s SSL Client, S/MIME 393s Netscape Comment: 393s Test Organization Intermediate CA trusted Certificate 393s X509v3 Subject Key Identifier: 393s 1A:3D:9B:57:59:58:53:9C:51:D4:06:F7:B2:50:47:79:3C:DE:89:FD 393s X509v3 Key Usage: critical 393s Digital Signature, Non Repudiation, Key Encipherment 393s X509v3 Extended Key Usage: 393s TLS Web Client Authentication, E-mail Protection 393s X509v3 Subject Alternative Name: 393s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 393s Signature Algorithm: sha256WithRSAEncryption 393s Signature Value: 393s 80:c4:81:8a:dc:a3:3f:ad:55:8b:38:21:b3:ed:ae:83:bc:62: 393s 23:90:0c:11:56:4e:e0:b0:46:55:35:6e:2a:74:cb:79:9f:8f: 393s 94:bf:84:d5:34:81:cb:4e:43:06:fe:7b:25:40:55:5f:c2:f6: 393s ba:47:c6:94:85:a7:19:13:91:89:84:d6:94:d8:7c:82:cf:37: 393s 94:be:7e:64:e7:6a:95:4b:04:da:61:d3:de:c1:63:6d:50:de: 393s f0:c3:c8:91:85:5a:51:24:0a:2e:29:12:c1:17:a6:32:3e:53: 393s e5:51:70:73:2c:71:04:62:19:7d:fe:a7:27:72:62:c3:c4:61: 393s 6a:1f 393s + local found_md5 expected_md5 393s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA-trusted-certificate-0001.pem 393s + expected_md5=Modulus=E1502127E23F412A6828E031099547863567E6C3175B5E1AFF55E60518F91C33F82562697C6372307CA383EAA9EB379804897B6080FDE9BE87C21877DB81167CA20D873F69AEDB3596C4199282BF4BC33D349050549F962DC40A1F4DD3C9C316351AF3BFB7CF61821E85E0A48B50CD018550C18DDC3748919D83AFF6FB551DA7 393s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-OnwLCh/SSSD-child-27008.pem 393s + found_md5=Modulus=E1502127E23F412A6828E031099547863567E6C3175B5E1AFF55E60518F91C33F82562697C6372307CA383EAA9EB379804897B6080FDE9BE87C21877DB81167CA20D873F69AEDB3596C4199282BF4BC33D349050549F962DC40A1F4DD3C9C316351AF3BFB7CF61821E85E0A48B50CD018550C18DDC3748919D83AFF6FB551DA7 393s + '[' Modulus=E1502127E23F412A6828E031099547863567E6C3175B5E1AFF55E60518F91C33F82562697C6372307CA383EAA9EB379804897B6080FDE9BE87C21877DB81167CA20D873F69AEDB3596C4199282BF4BC33D349050549F962DC40A1F4DD3C9C316351AF3BFB7CF61821E85E0A48B50CD018550C18DDC3748919D83AFF6FB551DA7 '!=' Modulus=E1502127E23F412A6828E031099547863567E6C3175B5E1AFF55E60518F91C33F82562697C6372307CA383EAA9EB379804897B6080FDE9BE87C21877DB81167CA20D873F69AEDB3596C4199282BF4BC33D349050549F962DC40A1F4DD3C9C316351AF3BFB7CF61821E85E0A48B50CD018550C18DDC3748919D83AFF6FB551DA7 ']' 393s + output_file=/tmp/sssd-softhsm2-OnwLCh/SSSD-child-27008-auth.output 393s ++ basename /tmp/sssd-softhsm2-OnwLCh/SSSD-child-27008-auth.output .output 393s + output_cert_file=/tmp/sssd-softhsm2-OnwLCh/SSSD-child-27008-auth.pem 393s + echo -n 053350 393s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-OnwLCh/test-full-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 '' --token_name 'Test Organization Interme Token' --module_name /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so 393s [p11_child[3427]] [main] (0x0400): p11_child started. 393s [p11_child[3427]] [main] (0x2000): Running in [auth] mode. 393s [p11_child[3427]] [main] (0x2000): Running with effective IDs: [0][0]. 393s [p11_child[3427]] [main] (0x2000): Running with real IDs [0][0]. 393s [p11_child[3427]] [do_card] (0x4000): Module List: 393s [p11_child[3427]] [do_card] (0x4000): common name: [softhsm2]. 393s [p11_child[3427]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 393s [p11_child[3427]] [do_card] (0x4000): Description [SoftHSM slot ID 0x32acb460] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 393s [p11_child[3427]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 393s [p11_child[3427]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x32acb460][850179168] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 393s [p11_child[3427]] [do_card] (0x4000): Login required. 393s [p11_child[3427]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 393s [p11_child[3427]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 393s [p11_child[3427]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so Test Organization Interme Token Test Organization Interme Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 393s [p11_child[3427]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x32acb460;slot-manufacturer=SoftHSM%20project;slot-id=850179168;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=2c68f46a32acb460;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 393s [p11_child[3427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 393s [p11_child[3427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 393s [p11_child[3427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 393s [p11_child[3427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 393s [p11_child[3427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 393s [p11_child[3427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 393s [p11_child[3427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 393s [p11_child[3427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 393s [p11_child[3427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 393s [p11_child[3427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 393s [p11_child[3427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 393s [p11_child[3427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 393s [p11_child[3427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 393s [p11_child[3427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 393s [p11_child[3427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 393s [p11_child[3427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 393s [p11_child[3427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 393s [p11_child[3427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 393s [p11_child[3427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 393s [p11_child[3427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 393s [p11_child[3427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 393s [p11_child[3427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 393s [p11_child[3427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 393s [p11_child[3427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 393s [p11_child[3427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 393s [p11_child[3427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 393s [p11_child[3427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 393s [p11_child[3427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 393s [p11_child[3427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 393s [p11_child[3427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 393s [p11_child[3427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 393s [p11_child[3427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 393s [p11_child[3427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 393s [p11_child[3427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 393s [p11_child[3427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 393s [p11_child[3427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 393s [p11_child[3427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 393s [p11_child[3427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 393s [p11_child[3427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 393s [p11_child[3427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 393s [p11_child[3427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 393s [p11_child[3427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 393s [p11_child[3427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 393s [p11_child[3427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 393s [p11_child[3427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 393s [p11_child[3427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 393s [p11_child[3427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 393s [p11_child[3427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 393s [p11_child[3427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 393s [p11_child[3427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 393s [p11_child[3427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 393s [p11_child[3427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 393s [p11_child[3427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 393s [p11_child[3427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 393s [p11_child[3427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 393s [p11_child[3427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 393s [p11_child[3427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 393s [p11_child[3427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 393s [p11_child[3427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 393s [p11_child[3427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 393s [p11_child[3427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 393s [p11_child[3427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 393s [p11_child[3427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 393s [p11_child[3427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 393s [p11_child[3427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 393s [p11_child[3427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 393s [p11_child[3427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 393s [p11_child[3427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 393s [p11_child[3427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 393s [p11_child[3427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 393s [p11_child[3427]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 393s [p11_child[3427]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 393s [p11_child[3427]] [do_card] (0x4000): Certificate verified and validated. 393s [p11_child[3427]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 393s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-OnwLCh/SSSD-child-27008-auth.output 393s + echo '-----BEGIN CERTIFICATE-----' 393s + tail -n1 /tmp/sssd-softhsm2-OnwLCh/SSSD-child-27008-auth.output 393s + echo '-----END CERTIFICATE-----' 393s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-OnwLCh/SSSD-child-27008-auth.pem 393s Certificate: 393s Data: 393s Version: 3 (0x2) 393s Serial Number: 4 (0x4) 393s Signature Algorithm: sha256WithRSAEncryption 393s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 393s Validity 393s Not Before: Mar 20 04:14:03 2024 GMT 393s Not After : Mar 20 04:14:03 2025 GMT 393s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 393s Subject Public Key Info: 393s Public Key Algorithm: rsaEncryption 393s Public-Key: (1024 bit) 393s Modulus: 393s 00:e1:50:21:27:e2:3f:41:2a:68:28:e0:31:09:95: 393s 47:86:35:67:e6:c3:17:5b:5e:1a:ff:55:e6:05:18: 393s f9:1c:33:f8:25:62:69:7c:63:72:30:7c:a3:83:ea: 393s a9:eb:37:98:04:89:7b:60:80:fd:e9:be:87:c2:18: 393s 77:db:81:16:7c:a2:0d:87:3f:69:ae:db:35:96:c4: 393s 19:92:82:bf:4b:c3:3d:34:90:50:54:9f:96:2d:c4: 393s 0a:1f:4d:d3:c9:c3:16:35:1a:f3:bf:b7:cf:61:82: 393s 1e:85:e0:a4:8b:50:cd:01:85:50:c1:8d:dc:37:48: 393s 91:9d:83:af:f6:fb:55:1d:a7 393s Exponent: 65537 (0x10001) 393s X509v3 extensions: 393s X509v3 Authority Key Identifier: 393s 23:A6:E2:94:B7:17:90:42:ED:CF:CD:99:1C:B9:22:74:FC:61:4B:50 393s X509v3 Basic Constraints: 393s CA:FALSE 393s Netscape Cert Type: 393s SSL Client, S/MIME 393s Netscape Comment: 393s Test Organization Intermediate CA trusted Certificate 393s X509v3 Subject Key Identifier: 393s 1A:3D:9B:57:59:58:53:9C:51:D4:06:F7:B2:50:47:79:3C:DE:89:FD 393s X509v3 Key Usage: critical 393s Digital Signature, Non Repudiation, Key Encipherment 393s X509v3 Extended Key Usage: 393s TLS Web Client Authentication, E-mail Protection 393s X509v3 Subject Alternative Name: 393s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 393s Signature Algorithm: sha256WithRSAEncryption 393s Signature Value: 393s 80:c4:81:8a:dc:a3:3f:ad:55:8b:38:21:b3:ed:ae:83:bc:62: 393s 23:90:0c:11:56:4e:e0:b0:46:55:35:6e:2a:74:cb:79:9f:8f: 393s 94:bf:84:d5:34:81:cb:4e:43:06:fe:7b:25:40:55:5f:c2:f6: 393s ba:47:c6:94:85:a7:19:13:91:89:84:d6:94:d8:7c:82:cf:37: 393s 94:be:7e:64:e7:6a:95:4b:04:da:61:d3:de:c1:63:6d:50:de: 393s f0:c3:c8:91:85:5a:51:24:0a:2e:29:12:c1:17:a6:32:3e:53: 393s e5:51:70:73:2c:71:04:62:19:7d:fe:a7:27:72:62:c3:c4:61: 393s 6a:1f 393s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-OnwLCh/SSSD-child-27008-auth.pem 393s + found_md5=Modulus=E1502127E23F412A6828E031099547863567E6C3175B5E1AFF55E60518F91C33F82562697C6372307CA383EAA9EB379804897B6080FDE9BE87C21877DB81167CA20D873F69AEDB3596C4199282BF4BC33D349050549F962DC40A1F4DD3C9C316351AF3BFB7CF61821E85E0A48B50CD018550C18DDC3748919D83AFF6FB551DA7 393s + '[' Modulus=E1502127E23F412A6828E031099547863567E6C3175B5E1AFF55E60518F91C33F82562697C6372307CA383EAA9EB379804897B6080FDE9BE87C21877DB81167CA20D873F69AEDB3596C4199282BF4BC33D349050549F962DC40A1F4DD3C9C316351AF3BFB7CF61821E85E0A48B50CD018550C18DDC3748919D83AFF6FB551DA7 '!=' Modulus=E1502127E23F412A6828E031099547863567E6C3175B5E1AFF55E60518F91C33F82562697C6372307CA383EAA9EB379804897B6080FDE9BE87C21877DB81167CA20D873F69AEDB3596C4199282BF4BC33D349050549F962DC40A1F4DD3C9C316351AF3BFB7CF61821E85E0A48B50CD018550C18DDC3748919D83AFF6FB551DA7 ']' 393s + valid_certificate /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-7089 /tmp/sssd-softhsm2-OnwLCh/test-full-chain-CA.pem partial_chain 393s + check_certificate /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-7089 /tmp/sssd-softhsm2-OnwLCh/test-full-chain-CA.pem partial_chain 393s + local certificate=/tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA-trusted-certificate-0001.pem 393s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-7089 393s + local key_ring=/tmp/sssd-softhsm2-OnwLCh/test-full-chain-CA.pem 393s + local verify_option=partial_chain 393s + prepare_softhsm2_card /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-7089 393s + local certificate=/tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA-trusted-certificate-0001.pem 393s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-7089 393s + local key_cn 393s + local key_name 393s + local tokens_dir 393s + local output_cert_file 393s + token_name= 393s ++ basename /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA-trusted-certificate-0001.pem .pem 393s + key_name=test-intermediate-CA-trusted-certificate-0001 393s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA-trusted-certificate-0001.pem 393s ++ sed -n 's/ *commonName *= //p' 393s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 393s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 393s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-OnwLCh/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 393s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-OnwLCh/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 393s ++ basename /tmp/sssd-softhsm2-OnwLCh/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 393s + tokens_dir=/tmp/sssd-softhsm2-OnwLCh/softhsm2-test-intermediate-CA-trusted-certificate-0001 393s Test Organization Interme Token 393s + token_name='Test Organization Interme Token' 393s + '[' '!' -e /tmp/sssd-softhsm2-OnwLCh/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 393s + '[' '!' -d /tmp/sssd-softhsm2-OnwLCh/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 393s + echo 'Test Organization Interme Token' 393s + '[' -n partial_chain ']' 393s + local verify_arg=--verify=partial_chain 393s + local output_base_name=SSSD-child-20126 393s + local output_file=/tmp/sssd-softhsm2-OnwLCh/SSSD-child-20126.output 393s + output_cert_file=/tmp/sssd-softhsm2-OnwLCh/SSSD-child-20126.pem 393s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-OnwLCh/test-full-chain-CA.pem 393s [p11_child[3437]] [main] (0x0400): p11_child started. 393s [p11_child[3437]] [main] (0x2000): Running in [pre-auth] mode. 393s [p11_child[3437]] [main] (0x2000): Running with effective IDs: [0][0]. 393s [p11_child[3437]] [main] (0x2000): Running with real IDs [0][0]. 393s [p11_child[3437]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 393s [p11_child[3437]] [do_card] (0x4000): Module List: 393s [p11_child[3437]] [do_card] (0x4000): common name: [softhsm2]. 393s [p11_child[3437]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 393s [p11_child[3437]] [do_card] (0x4000): Description [SoftHSM slot ID 0x32acb460] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 393s [p11_child[3437]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 393s [p11_child[3437]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x32acb460][850179168] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 393s [p11_child[3437]] [do_card] (0x4000): Login NOT required. 393s [p11_child[3437]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 393s [p11_child[3437]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 393s [p11_child[3437]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Interme Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 393s [p11_child[3437]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x32acb460;slot-manufacturer=SoftHSM%20project;slot-id=850179168;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=2c68f46a32acb460;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 393s [p11_child[3437]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 393s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-OnwLCh/SSSD-child-20126.output 393s + echo '-----BEGIN CERTIFICATE-----' 393s + tail -n1 /tmp/sssd-softhsm2-OnwLCh/SSSD-child-20126.output 393s + echo '-----END CERTIFICATE-----' 393s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-OnwLCh/SSSD-child-20126.pem 393s Certificate: 393s Data: 393s Version: 3 (0x2) 393s Serial Number: 4 (0x4) 393s Signature Algorithm: sha256WithRSAEncryption 393s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 393s Validity 393s Not Before: Mar 20 04:14:03 2024 GMT 393s Not After : Mar 20 04:14:03 2025 GMT 393s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 393s Subject Public Key Info: 393s Public Key Algorithm: rsaEncryption 393s Public-Key: (1024 bit) 393s Modulus: 393s 00:e1:50:21:27:e2:3f:41:2a:68:28:e0:31:09:95: 393s 47:86:35:67:e6:c3:17:5b:5e:1a:ff:55:e6:05:18: 393s f9:1c:33:f8:25:62:69:7c:63:72:30:7c:a3:83:ea: 393s a9:eb:37:98:04:89:7b:60:80:fd:e9:be:87:c2:18: 393s 77:db:81:16:7c:a2:0d:87:3f:69:ae:db:35:96:c4: 393s 19:92:82:bf:4b:c3:3d:34:90:50:54:9f:96:2d:c4: 393s 0a:1f:4d:d3:c9:c3:16:35:1a:f3:bf:b7:cf:61:82: 393s 1e:85:e0:a4:8b:50:cd:01:85:50:c1:8d:dc:37:48: 393s 91:9d:83:af:f6:fb:55:1d:a7 393s Exponent: 65537 (0x10001) 393s X509v3 extensions: 393s X509v3 Authority Key Identifier: 393s 23:A6:E2:94:B7:17:90:42:ED:CF:CD:99:1C:B9:22:74:FC:61:4B:50 393s X509v3 Basic Constraints: 393s CA:FALSE 393s Netscape Cert Type: 393s SSL Client, S/MIME 393s Netscape Comment: 393s Test Organization Intermediate CA trusted Certificate 393s X509v3 Subject Key Identifier: 393s 1A:3D:9B:57:59:58:53:9C:51:D4:06:F7:B2:50:47:79:3C:DE:89:FD 393s X509v3 Key Usage: critical 393s Digital Signature, Non Repudiation, Key Encipherment 393s X509v3 Extended Key Usage: 393s TLS Web Client Authentication, E-mail Protection 393s X509v3 Subject Alternative Name: 393s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 393s Signature Algorithm: sha256WithRSAEncryption 393s Signature Value: 393s 80:c4:81:8a:dc:a3:3f:ad:55:8b:38:21:b3:ed:ae:83:bc:62: 393s 23:90:0c:11:56:4e:e0:b0:46:55:35:6e:2a:74:cb:79:9f:8f: 393s 94:bf:84:d5:34:81:cb:4e:43:06:fe:7b:25:40:55:5f:c2:f6: 393s ba:47:c6:94:85:a7:19:13:91:89:84:d6:94:d8:7c:82:cf:37: 393s 94:be:7e:64:e7:6a:95:4b:04:da:61:d3:de:c1:63:6d:50:de: 393s f0:c3:c8:91:85:5a:51:24:0a:2e:29:12:c1:17:a6:32:3e:53: 393s e5:51:70:73:2c:71:04:62:19:7d:fe:a7:27:72:62:c3:c4:61: 393s 6a:1f 393s + local found_md5 expected_md5 393s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA-trusted-certificate-0001.pem 393s + expected_md5=Modulus=E1502127E23F412A6828E031099547863567E6C3175B5E1AFF55E60518F91C33F82562697C6372307CA383EAA9EB379804897B6080FDE9BE87C21877DB81167CA20D873F69AEDB3596C4199282BF4BC33D349050549F962DC40A1F4DD3C9C316351AF3BFB7CF61821E85E0A48B50CD018550C18DDC3748919D83AFF6FB551DA7 393s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-OnwLCh/SSSD-child-20126.pem 393s + found_md5=Modulus=E1502127E23F412A6828E031099547863567E6C3175B5E1AFF55E60518F91C33F82562697C6372307CA383EAA9EB379804897B6080FDE9BE87C21877DB81167CA20D873F69AEDB3596C4199282BF4BC33D349050549F962DC40A1F4DD3C9C316351AF3BFB7CF61821E85E0A48B50CD018550C18DDC3748919D83AFF6FB551DA7 393s + '[' Modulus=E1502127E23F412A6828E031099547863567E6C3175B5E1AFF55E60518F91C33F82562697C6372307CA383EAA9EB379804897B6080FDE9BE87C21877DB81167CA20D873F69AEDB3596C4199282BF4BC33D349050549F962DC40A1F4DD3C9C316351AF3BFB7CF61821E85E0A48B50CD018550C18DDC3748919D83AFF6FB551DA7 '!=' Modulus=E1502127E23F412A6828E031099547863567E6C3175B5E1AFF55E60518F91C33F82562697C6372307CA383EAA9EB379804897B6080FDE9BE87C21877DB81167CA20D873F69AEDB3596C4199282BF4BC33D349050549F962DC40A1F4DD3C9C316351AF3BFB7CF61821E85E0A48B50CD018550C18DDC3748919D83AFF6FB551DA7 ']' 393s + output_file=/tmp/sssd-softhsm2-OnwLCh/SSSD-child-20126-auth.output 393s ++ basename /tmp/sssd-softhsm2-OnwLCh/SSSD-child-20126-auth.output .output 393s + output_cert_file=/tmp/sssd-softhsm2-OnwLCh/SSSD-child-20126-auth.pem 393s + echo -n 053350 393s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-OnwLCh/test-full-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Interme Token' --module_name /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so 393s [p11_child[3445]] [main] (0x0400): p11_child started. 393s [p11_child[3445]] [main] (0x2000): Running in [auth] mode. 393s [p11_child[3445]] [main] (0x2000): Running with effective IDs: [0][0]. 393s [p11_child[3445]] [main] (0x2000): Running with real IDs [0][0]. 393s [p11_child[3445]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 393s [p11_child[3445]] [do_card] (0x4000): Module List: 393s [p11_child[3445]] [do_card] (0x4000): common name: [softhsm2]. 393s [p11_child[3445]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 393s [p11_child[3445]] [do_card] (0x4000): Description [SoftHSM slot ID 0x32acb460] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 393s [p11_child[3445]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 393s [p11_child[3445]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x32acb460][850179168] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 393s [p11_child[3445]] [do_card] (0x4000): Login required. 393s [p11_child[3445]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 393s [p11_child[3445]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 393s [p11_child[3445]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so Test Organization Interme Token Test Organization Interme Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 393s [p11_child[3445]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x32acb460;slot-manufacturer=SoftHSM%20project;slot-id=850179168;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=2c68f46a32acb460;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 393s [p11_child[3445]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 393s [p11_child[3445]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 393s [p11_child[3445]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 393s [p11_child[3445]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 393s [p11_child[3445]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 393s [p11_child[3445]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 393s [p11_child[3445]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 393s [p11_child[3445]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 393s [p11_child[3445]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 393s [p11_child[3445]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 393s [p11_child[3445]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 393s [p11_child[3445]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 393s [p11_child[3445]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 393s [p11_child[3445]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 393s [p11_child[3445]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 393s [p11_child[3445]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 393s [p11_child[3445]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 393s [p11_child[3445]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 393s [p11_child[3445]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 393s [p11_child[3445]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 393s [p11_child[3445]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 393s [p11_child[3445]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 393s [p11_child[3445]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 393s [p11_child[3445]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 393s [p11_child[3445]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 393s [p11_child[3445]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 393s [p11_child[3445]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 393s [p11_child[3445]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 393s [p11_child[3445]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 393s [p11_child[3445]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 393s [p11_child[3445]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 393s [p11_child[3445]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 393s [p11_child[3445]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 393s [p11_child[3445]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 393s [p11_child[3445]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 393s [p11_child[3445]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 393s [p11_child[3445]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 393s [p11_child[3445]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 393s [p11_child[3445]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 393s [p11_child[3445]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 393s [p11_child[3445]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 393s [p11_child[3445]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 393s [p11_child[3445]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 393s [p11_child[3445]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 393s [p11_child[3445]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 393s [p11_child[3445]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 393s [p11_child[3445]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 393s [p11_child[3445]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 393s [p11_child[3445]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 393s [p11_child[3445]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 393s [p11_child[3445]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 393s [p11_child[3445]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 393s [p11_child[3445]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 393s [p11_child[3445]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 393s [p11_child[3445]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 393s [p11_child[3445]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 393s [p11_child[3445]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 393s [p11_child[3445]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 393s [p11_child[3445]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 393s [p11_child[3445]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 393s [p11_child[3445]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 393s [p11_child[3445]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 393s [p11_child[3445]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 393s [p11_child[3445]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 393s [p11_child[3445]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 393s [p11_child[3445]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 393s [p11_child[3445]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 393s [p11_child[3445]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 393s [p11_child[3445]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 393s [p11_child[3445]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 393s [p11_child[3445]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 393s [p11_child[3445]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 393s [p11_child[3445]] [do_card] (0x4000): Certificate verified and validated. 393s [p11_child[3445]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 393s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-OnwLCh/SSSD-child-20126-auth.output 393s + echo '-----BEGIN CERTIFICATE-----' 393s + tail -n1 /tmp/sssd-softhsm2-OnwLCh/SSSD-child-20126-auth.output 393s + echo '-----END CERTIFICATE-----' 393s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-OnwLCh/SSSD-child-20126-auth.pem 393s Certificate: 393s Data: 393s Version: 3 (0x2) 393s Serial Number: 4 (0x4) 393s Signature Algorithm: sha256WithRSAEncryption 393s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 393s Validity 393s Not Before: Mar 20 04:14:03 2024 GMT 393s Not After : Mar 20 04:14:03 2025 GMT 393s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 393s Subject Public Key Info: 393s Public Key Algorithm: rsaEncryption 393s Public-Key: (1024 bit) 393s Modulus: 393s 00:e1:50:21:27:e2:3f:41:2a:68:28:e0:31:09:95: 393s 47:86:35:67:e6:c3:17:5b:5e:1a:ff:55:e6:05:18: 393s f9:1c:33:f8:25:62:69:7c:63:72:30:7c:a3:83:ea: 393s a9:eb:37:98:04:89:7b:60:80:fd:e9:be:87:c2:18: 393s 77:db:81:16:7c:a2:0d:87:3f:69:ae:db:35:96:c4: 393s 19:92:82:bf:4b:c3:3d:34:90:50:54:9f:96:2d:c4: 393s 0a:1f:4d:d3:c9:c3:16:35:1a:f3:bf:b7:cf:61:82: 393s 1e:85:e0:a4:8b:50:cd:01:85:50:c1:8d:dc:37:48: 393s 91:9d:83:af:f6:fb:55:1d:a7 393s Exponent: 65537 (0x10001) 393s X509v3 extensions: 393s X509v3 Authority Key Identifier: 393s 23:A6:E2:94:B7:17:90:42:ED:CF:CD:99:1C:B9:22:74:FC:61:4B:50 393s X509v3 Basic Constraints: 393s CA:FALSE 393s Netscape Cert Type: 393s SSL Client, S/MIME 393s Netscape Comment: 393s Test Organization Intermediate CA trusted Certificate 393s X509v3 Subject Key Identifier: 393s 1A:3D:9B:57:59:58:53:9C:51:D4:06:F7:B2:50:47:79:3C:DE:89:FD 393s X509v3 Key Usage: critical 393s Digital Signature, Non Repudiation, Key Encipherment 393s X509v3 Extended Key Usage: 393s TLS Web Client Authentication, E-mail Protection 393s X509v3 Subject Alternative Name: 393s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 393s Signature Algorithm: sha256WithRSAEncryption 393s Signature Value: 393s 80:c4:81:8a:dc:a3:3f:ad:55:8b:38:21:b3:ed:ae:83:bc:62: 393s 23:90:0c:11:56:4e:e0:b0:46:55:35:6e:2a:74:cb:79:9f:8f: 393s 94:bf:84:d5:34:81:cb:4e:43:06:fe:7b:25:40:55:5f:c2:f6: 393s ba:47:c6:94:85:a7:19:13:91:89:84:d6:94:d8:7c:82:cf:37: 393s 94:be:7e:64:e7:6a:95:4b:04:da:61:d3:de:c1:63:6d:50:de: 393s f0:c3:c8:91:85:5a:51:24:0a:2e:29:12:c1:17:a6:32:3e:53: 393s e5:51:70:73:2c:71:04:62:19:7d:fe:a7:27:72:62:c3:c4:61: 393s 6a:1f 393s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-OnwLCh/SSSD-child-20126-auth.pem 393s + found_md5=Modulus=E1502127E23F412A6828E031099547863567E6C3175B5E1AFF55E60518F91C33F82562697C6372307CA383EAA9EB379804897B6080FDE9BE87C21877DB81167CA20D873F69AEDB3596C4199282BF4BC33D349050549F962DC40A1F4DD3C9C316351AF3BFB7CF61821E85E0A48B50CD018550C18DDC3748919D83AFF6FB551DA7 393s + '[' Modulus=E1502127E23F412A6828E031099547863567E6C3175B5E1AFF55E60518F91C33F82562697C6372307CA383EAA9EB379804897B6080FDE9BE87C21877DB81167CA20D873F69AEDB3596C4199282BF4BC33D349050549F962DC40A1F4DD3C9C316351AF3BFB7CF61821E85E0A48B50CD018550C18DDC3748919D83AFF6FB551DA7 '!=' Modulus=E1502127E23F412A6828E031099547863567E6C3175B5E1AFF55E60518F91C33F82562697C6372307CA383EAA9EB379804897B6080FDE9BE87C21877DB81167CA20D873F69AEDB3596C4199282BF4BC33D349050549F962DC40A1F4DD3C9C316351AF3BFB7CF61821E85E0A48B50CD018550C18DDC3748919D83AFF6FB551DA7 ']' 393s + invalid_certificate /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-7089 /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA.pem 393s + check_certificate /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-7089 /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA.pem 393s + local certificate=/tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA-trusted-certificate-0001.pem 393s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-7089 393s + local key_ring=/tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA.pem 393s + local verify_option= 393s + prepare_softhsm2_card /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-7089 393s + local certificate=/tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA-trusted-certificate-0001.pem 393s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-7089 393s + local key_cn 393s + local key_name 393s + local tokens_dir 393s + local output_cert_file 393s + token_name= 393s ++ basename /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA-trusted-certificate-0001.pem .pem 393s + key_name=test-intermediate-CA-trusted-certificate-0001 393s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA-trusted-certificate-0001.pem 393s ++ sed -n 's/ *commonName *= //p' 393s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 393s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 393s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-OnwLCh/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 393s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-OnwLCh/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 393s ++ basename /tmp/sssd-softhsm2-OnwLCh/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 393s + tokens_dir=/tmp/sssd-softhsm2-OnwLCh/softhsm2-test-intermediate-CA-trusted-certificate-0001 393s + token_name='Test Organization Interme Token' 393s + '[' '!' -e /tmp/sssd-softhsm2-OnwLCh/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 393s + '[' '!' -d /tmp/sssd-softhsm2-OnwLCh/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 393s + echo 'Test Organization Interme Token' 393s Test Organization Interme Token 393s + '[' -n '' ']' 393s + local output_base_name=SSSD-child-30141 393s + local output_file=/tmp/sssd-softhsm2-OnwLCh/SSSD-child-30141.output 393s + output_cert_file=/tmp/sssd-softhsm2-OnwLCh/SSSD-child-30141.pem 393s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA.pem 393s [p11_child[3455]] [main] (0x0400): p11_child started. 393s [p11_child[3455]] [main] (0x2000): Running in [pre-auth] mode. 393s [p11_child[3455]] [main] (0x2000): Running with effective IDs: [0][0]. 393s [p11_child[3455]] [main] (0x2000): Running with real IDs [0][0]. 393s [p11_child[3455]] [do_card] (0x4000): Module List: 393s [p11_child[3455]] [do_card] (0x4000): common name: [softhsm2]. 393s [p11_child[3455]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 393s [p11_child[3455]] [do_card] (0x4000): Description [SoftHSM slot ID 0x32acb460] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 393s [p11_child[3455]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 393s [p11_child[3455]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x32acb460][850179168] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 393s [p11_child[3455]] [do_card] (0x4000): Login NOT required. 393s [p11_child[3455]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 393s [p11_child[3455]] [do_verification] (0x0040): X509_verify_cert failed [0]. 393s [p11_child[3455]] [do_verification] (0x0040): X509_verify_cert failed [2][unable to get issuer certificate]. 393s [p11_child[3455]] [read_certs] (0x0040): Certificate [Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] not valid, skipping. 393s [p11_child[3455]] [do_card] (0x4000): No certificate found. 393s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-OnwLCh/SSSD-child-30141.output 393s + return 2 393s + valid_certificate /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-7089 /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA.pem partial_chain 393s + check_certificate /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-7089 /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA.pem partial_chain 393s + local certificate=/tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA-trusted-certificate-0001.pem 393s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-7089 393s + local key_ring=/tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA.pem 393s + local verify_option=partial_chain 393s + prepare_softhsm2_card /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-7089 393s + local certificate=/tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA-trusted-certificate-0001.pem 393s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-7089 393s + local key_cn 393s + local key_name 393s + local tokens_dir 393s + local output_cert_file 393s + token_name= 393s ++ basename /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA-trusted-certificate-0001.pem .pem 393s + key_name=test-intermediate-CA-trusted-certificate-0001 393s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA-trusted-certificate-0001.pem 393s ++ sed -n 's/ *commonName *= //p' 393s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 393s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 393s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-OnwLCh/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 393s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-OnwLCh/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 393s ++ basename /tmp/sssd-softhsm2-OnwLCh/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 393s + tokens_dir=/tmp/sssd-softhsm2-OnwLCh/softhsm2-test-intermediate-CA-trusted-certificate-0001 393s + token_name='Test Organization Interme Token' 393s + '[' '!' -e /tmp/sssd-softhsm2-OnwLCh/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 393s + '[' '!' -d /tmp/sssd-softhsm2-OnwLCh/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 393s + echo 'Test Organization Interme Token' 393s Test Organization Interme Token 393s + '[' -n partial_chain ']' 393s + local verify_arg=--verify=partial_chain 393s + local output_base_name=SSSD-child-6426 393s + local output_file=/tmp/sssd-softhsm2-OnwLCh/SSSD-child-6426.output 393s + output_cert_file=/tmp/sssd-softhsm2-OnwLCh/SSSD-child-6426.pem 393s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA.pem 393s [p11_child[3462]] [main] (0x0400): p11_child started. 393s [p11_child[3462]] [main] (0x2000): Running in [pre-auth] mode. 393s [p11_child[3462]] [main] (0x2000): Running with effective IDs: [0][0]. 393s [p11_child[3462]] [main] (0x2000): Running with real IDs [0][0]. 393s [p11_child[3462]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 393s [p11_child[3462]] [do_card] (0x4000): Module List: 393s [p11_child[3462]] [do_card] (0x4000): common name: [softhsm2]. 393s [p11_child[3462]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 393s [p11_child[3462]] [do_card] (0x4000): Description [SoftHSM slot ID 0x32acb460] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 393s [p11_child[3462]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 393s [p11_child[3462]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x32acb460][850179168] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 393s [p11_child[3462]] [do_card] (0x4000): Login NOT required. 393s [p11_child[3462]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 393s [p11_child[3462]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 393s [p11_child[3462]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Interme Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 393s [p11_child[3462]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x32acb460;slot-manufacturer=SoftHSM%20project;slot-id=850179168;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=2c68f46a32acb460;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 393s [p11_child[3462]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 393s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-OnwLCh/SSSD-child-6426.output 393s + echo '-----BEGIN CERTIFICATE-----' 393s + tail -n1 /tmp/sssd-softhsm2-OnwLCh/SSSD-child-6426.output 393s + echo '-----END CERTIFICATE-----' 393s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-OnwLCh/SSSD-child-6426.pem 394s Certificate: 394s Data: 394s Version: 3 (0x2) 394s Serial Number: 4 (0x4) 394s Signature Algorithm: sha256WithRSAEncryption 394s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 394s Validity 394s Not Before: Mar 20 04:14:03 2024 GMT 394s Not After : Mar 20 04:14:03 2025 GMT 394s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 394s Subject Public Key Info: 394s Public Key Algorithm: rsaEncryption 394s Public-Key: (1024 bit) 394s Modulus: 394s 00:e1:50:21:27:e2:3f:41:2a:68:28:e0:31:09:95: 394s 47:86:35:67:e6:c3:17:5b:5e:1a:ff:55:e6:05:18: 394s f9:1c:33:f8:25:62:69:7c:63:72:30:7c:a3:83:ea: 394s a9:eb:37:98:04:89:7b:60:80:fd:e9:be:87:c2:18: 394s 77:db:81:16:7c:a2:0d:87:3f:69:ae:db:35:96:c4: 394s 19:92:82:bf:4b:c3:3d:34:90:50:54:9f:96:2d:c4: 394s 0a:1f:4d:d3:c9:c3:16:35:1a:f3:bf:b7:cf:61:82: 394s 1e:85:e0:a4:8b:50:cd:01:85:50:c1:8d:dc:37:48: 394s 91:9d:83:af:f6:fb:55:1d:a7 394s Exponent: 65537 (0x10001) 394s X509v3 extensions: 394s X509v3 Authority Key Identifier: 394s 23:A6:E2:94:B7:17:90:42:ED:CF:CD:99:1C:B9:22:74:FC:61:4B:50 394s X509v3 Basic Constraints: 394s CA:FALSE 394s Netscape Cert Type: 394s SSL Client, S/MIME 394s Netscape Comment: 394s Test Organization Intermediate CA trusted Certificate 394s X509v3 Subject Key Identifier: 394s 1A:3D:9B:57:59:58:53:9C:51:D4:06:F7:B2:50:47:79:3C:DE:89:FD 394s X509v3 Key Usage: critical 394s Digital Signature, Non Repudiation, Key Encipherment 394s X509v3 Extended Key Usage: 394s TLS Web Client Authentication, E-mail Protection 394s X509v3 Subject Alternative Name: 394s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 394s Signature Algorithm: sha256WithRSAEncryption 394s Signature Value: 394s 80:c4:81:8a:dc:a3:3f:ad:55:8b:38:21:b3:ed:ae:83:bc:62: 394s 23:90:0c:11:56:4e:e0:b0:46:55:35:6e:2a:74:cb:79:9f:8f: 394s 94:bf:84:d5:34:81:cb:4e:43:06:fe:7b:25:40:55:5f:c2:f6: 394s ba:47:c6:94:85:a7:19:13:91:89:84:d6:94:d8:7c:82:cf:37: 394s 94:be:7e:64:e7:6a:95:4b:04:da:61:d3:de:c1:63:6d:50:de: 394s f0:c3:c8:91:85:5a:51:24:0a:2e:29:12:c1:17:a6:32:3e:53: 394s e5:51:70:73:2c:71:04:62:19:7d:fe:a7:27:72:62:c3:c4:61: 394s 6a:1f 394s + local found_md5 expected_md5 394s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA-trusted-certificate-0001.pem 394s + expected_md5=Modulus=E1502127E23F412A6828E031099547863567E6C3175B5E1AFF55E60518F91C33F82562697C6372307CA383EAA9EB379804897B6080FDE9BE87C21877DB81167CA20D873F69AEDB3596C4199282BF4BC33D349050549F962DC40A1F4DD3C9C316351AF3BFB7CF61821E85E0A48B50CD018550C18DDC3748919D83AFF6FB551DA7 394s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-OnwLCh/SSSD-child-6426.pem 394s + found_md5=Modulus=E1502127E23F412A6828E031099547863567E6C3175B5E1AFF55E60518F91C33F82562697C6372307CA383EAA9EB379804897B6080FDE9BE87C21877DB81167CA20D873F69AEDB3596C4199282BF4BC33D349050549F962DC40A1F4DD3C9C316351AF3BFB7CF61821E85E0A48B50CD018550C18DDC3748919D83AFF6FB551DA7 394s + '[' Modulus=E1502127E23F412A6828E031099547863567E6C3175B5E1AFF55E60518F91C33F82562697C6372307CA383EAA9EB379804897B6080FDE9BE87C21877DB81167CA20D873F69AEDB3596C4199282BF4BC33D349050549F962DC40A1F4DD3C9C316351AF3BFB7CF61821E85E0A48B50CD018550C18DDC3748919D83AFF6FB551DA7 '!=' Modulus=E1502127E23F412A6828E031099547863567E6C3175B5E1AFF55E60518F91C33F82562697C6372307CA383EAA9EB379804897B6080FDE9BE87C21877DB81167CA20D873F69AEDB3596C4199282BF4BC33D349050549F962DC40A1F4DD3C9C316351AF3BFB7CF61821E85E0A48B50CD018550C18DDC3748919D83AFF6FB551DA7 ']' 394s + output_file=/tmp/sssd-softhsm2-OnwLCh/SSSD-child-6426-auth.output 394s ++ basename /tmp/sssd-softhsm2-OnwLCh/SSSD-child-6426-auth.output .output 394s + output_cert_file=/tmp/sssd-softhsm2-OnwLCh/SSSD-child-6426-auth.pem 394s + echo -n 053350 394s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-OnwLCh/test-intermediate-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Interme Token' --module_name /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so 394s [p11_child[3470]] [main] (0x0400): p11_child started. 394s [p11_child[3470]] [main] (0x2000): Running in [auth] mode. 394s [p11_child[3470]] [main] (0x2000): Running with effective IDs: [0][0]. 394s [p11_child[3470]] [main] (0x2000): Running with real IDs [0][0]. 394s [p11_child[3470]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 394s [p11_child[3470]] [do_card] (0x4000): Module List: 394s [p11_child[3470]] [do_card] (0x4000): common name: [softhsm2]. 394s [p11_child[3470]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 394s [p11_child[3470]] [do_card] (0x4000): Description [SoftHSM slot ID 0x32acb460] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 394s [p11_child[3470]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 394s [p11_child[3470]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x32acb460][850179168] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 394s [p11_child[3470]] [do_card] (0x4000): Login required. 394s [p11_child[3470]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 394s [p11_child[3470]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 394s [p11_child[3470]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so Test Organization Interme Token Test Organization Interme Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 394s [p11_child[3470]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x32acb460;slot-manufacturer=SoftHSM%20project;slot-id=850179168;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=2c68f46a32acb460;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 394s [p11_child[3470]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 394s [p11_child[3470]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 394s [p11_child[3470]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 394s [p11_child[3470]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 394s [p11_child[3470]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 394s [p11_child[3470]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 394s [p11_child[3470]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 394s [p11_child[3470]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 394s [p11_child[3470]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 394s [p11_child[3470]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 394s [p11_child[3470]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 394s [p11_child[3470]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 394s [p11_child[3470]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 394s [p11_child[3470]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 394s [p11_child[3470]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 394s [p11_child[3470]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 394s [p11_child[3470]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 394s [p11_child[3470]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 394s [p11_child[3470]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 394s [p11_child[3470]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 394s [p11_child[3470]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 394s [p11_child[3470]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 394s [p11_child[3470]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 394s [p11_child[3470]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 394s [p11_child[3470]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 394s [p11_child[3470]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 394s [p11_child[3470]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 394s [p11_child[3470]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 394s [p11_child[3470]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 394s [p11_child[3470]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 394s [p11_child[3470]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 394s [p11_child[3470]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 394s [p11_child[3470]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 394s [p11_child[3470]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 394s [p11_child[3470]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 394s [p11_child[3470]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 394s [p11_child[3470]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 394s [p11_child[3470]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 394s [p11_child[3470]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 394s [p11_child[3470]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 394s [p11_child[3470]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 394s [p11_child[3470]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 394s [p11_child[3470]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 394s [p11_child[3470]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 394s [p11_child[3470]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 394s [p11_child[3470]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 394s [p11_child[3470]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 394s [p11_child[3470]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 394s [p11_child[3470]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 394s [p11_child[3470]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 394s [p11_child[3470]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 394s [p11_child[3470]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 394s [p11_child[3470]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 394s [p11_child[3470]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 394s [p11_child[3470]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 394s [p11_child[3470]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 394s [p11_child[3470]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 394s [p11_child[3470]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 394s [p11_child[3470]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 394s [p11_child[3470]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 394s [p11_child[3470]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 394s [p11_child[3470]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 394s [p11_child[3470]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 394s [p11_child[3470]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 394s [p11_child[3470]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 394s [p11_child[3470]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 394s [p11_child[3470]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 394s [p11_child[3470]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 394s [p11_child[3470]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 394s [p11_child[3470]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 394s [p11_child[3470]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 394s [p11_child[3470]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 394s [p11_child[3470]] [do_card] (0x4000): Certificate verified and validated. 394s [p11_child[3470]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 394s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-OnwLCh/SSSD-child-6426-auth.output 394s + echo '-----BEGIN CERTIFICATE-----' 394s + tail -n1 /tmp/sssd-softhsm2-OnwLCh/SSSD-child-6426-auth.output 394s + echo '-----END CERTIFICATE-----' 394s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-OnwLCh/SSSD-child-6426-auth.pem 394s Certificate: 394s Data: 394s Version: 3 (0x2) 394s Serial Number: 4 (0x4) 394s Signature Algorithm: sha256WithRSAEncryption 394s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 394s Validity 394s Not Before: Mar 20 04:14:03 2024 GMT 394s Not After : Mar 20 04:14:03 2025 GMT 394s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 394s Subject Public Key Info: 394s Public Key Algorithm: rsaEncryption 394s Public-Key: (1024 bit) 394s Modulus: 394s 00:e1:50:21:27:e2:3f:41:2a:68:28:e0:31:09:95: 394s 47:86:35:67:e6:c3:17:5b:5e:1a:ff:55:e6:05:18: 394s f9:1c:33:f8:25:62:69:7c:63:72:30:7c:a3:83:ea: 394s a9:eb:37:98:04:89:7b:60:80:fd:e9:be:87:c2:18: 394s 77:db:81:16:7c:a2:0d:87:3f:69:ae:db:35:96:c4: 394s 19:92:82:bf:4b:c3:3d:34:90:50:54:9f:96:2d:c4: 394s 0a:1f:4d:d3:c9:c3:16:35:1a:f3:bf:b7:cf:61:82: 394s 1e:85:e0:a4:8b:50:cd:01:85:50:c1:8d:dc:37:48: 394s 91:9d:83:af:f6:fb:55:1d:a7 394s Exponent: 65537 (0x10001) 394s X509v3 extensions: 394s X509v3 Authority Key Identifier: 394s 23:A6:E2:94:B7:17:90:42:ED:CF:CD:99:1C:B9:22:74:FC:61:4B:50 394s X509v3 Basic Constraints: 394s CA:FALSE 394s Netscape Cert Type: 394s SSL Client, S/MIME 394s Netscape Comment: 394s Test Organization Intermediate CA trusted Certificate 394s X509v3 Subject Key Identifier: 394s 1A:3D:9B:57:59:58:53:9C:51:D4:06:F7:B2:50:47:79:3C:DE:89:FD 394s X509v3 Key Usage: critical 394s Digital Signature, Non Repudiation, Key Encipherment 394s X509v3 Extended Key Usage: 394s TLS Web Client Authentication, E-mail Protection 394s X509v3 Subject Alternative Name: 394s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 394s Signature Algorithm: sha256WithRSAEncryption 394s Signature Value: 394s 80:c4:81:8a:dc:a3:3f:ad:55:8b:38:21:b3:ed:ae:83:bc:62: 394s 23:90:0c:11:56:4e:e0:b0:46:55:35:6e:2a:74:cb:79:9f:8f: 394s 94:bf:84:d5:34:81:cb:4e:43:06:fe:7b:25:40:55:5f:c2:f6: 394s ba:47:c6:94:85:a7:19:13:91:89:84:d6:94:d8:7c:82:cf:37: 394s 94:be:7e:64:e7:6a:95:4b:04:da:61:d3:de:c1:63:6d:50:de: 394s f0:c3:c8:91:85:5a:51:24:0a:2e:29:12:c1:17:a6:32:3e:53: 394s e5:51:70:73:2c:71:04:62:19:7d:fe:a7:27:72:62:c3:c4:61: 394s 6a:1f 394s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-OnwLCh/SSSD-child-6426-auth.pem 394s + found_md5=Modulus=E1502127E23F412A6828E031099547863567E6C3175B5E1AFF55E60518F91C33F82562697C6372307CA383EAA9EB379804897B6080FDE9BE87C21877DB81167CA20D873F69AEDB3596C4199282BF4BC33D349050549F962DC40A1F4DD3C9C316351AF3BFB7CF61821E85E0A48B50CD018550C18DDC3748919D83AFF6FB551DA7 394s + '[' Modulus=E1502127E23F412A6828E031099547863567E6C3175B5E1AFF55E60518F91C33F82562697C6372307CA383EAA9EB379804897B6080FDE9BE87C21877DB81167CA20D873F69AEDB3596C4199282BF4BC33D349050549F962DC40A1F4DD3C9C316351AF3BFB7CF61821E85E0A48B50CD018550C18DDC3748919D83AFF6FB551DA7 '!=' Modulus=E1502127E23F412A6828E031099547863567E6C3175B5E1AFF55E60518F91C33F82562697C6372307CA383EAA9EB379804897B6080FDE9BE87C21877DB81167CA20D873F69AEDB3596C4199282BF4BC33D349050549F962DC40A1F4DD3C9C316351AF3BFB7CF61821E85E0A48B50CD018550C18DDC3748919D83AFF6FB551DA7 ']' 394s + invalid_certificate /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-10509 /tmp/sssd-softhsm2-OnwLCh/test-root-CA.pem 394s + check_certificate /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-10509 /tmp/sssd-softhsm2-OnwLCh/test-root-CA.pem 394s + local certificate=/tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-trusted-certificate-0001.pem 394s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-10509 394s + local key_ring=/tmp/sssd-softhsm2-OnwLCh/test-root-CA.pem 394s + local verify_option= 394s + prepare_softhsm2_card /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-10509 394s + local certificate=/tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-trusted-certificate-0001.pem 394s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-10509 394s + local key_cn 394s + local key_name 394s + local tokens_dir 394s + local output_cert_file 394s + token_name= 394s ++ basename /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 394s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 394s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-trusted-certificate-0001.pem 394s ++ sed -n 's/ *commonName *= //p' 394s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 394s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 394s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-OnwLCh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 394s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-OnwLCh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 394s ++ basename /tmp/sssd-softhsm2-OnwLCh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 394s + tokens_dir=/tmp/sssd-softhsm2-OnwLCh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 394s + token_name='Test Organization Sub Int Token' 394s + '[' '!' -e /tmp/sssd-softhsm2-OnwLCh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 394s + local key_file 394s + local decrypted_key 394s + mkdir -p /tmp/sssd-softhsm2-OnwLCh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 394s + key_file=/tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-trusted-certificate-0001-key.pem 394s + decrypted_key=/tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 394s + cat 394s + softhsm2-util --init-token --label 'Test Organization Sub Int Token' --pin 053350 --so-pin 053350 --free 394s Slot 0 has a free/uninitialized token. 394s The token has been initialized and is reassigned to slot 148801065 394s + softhsm2-util --show-slots 394s Available slots: 394s Slot 148801065 394s Slot info: 394s Description: SoftHSM slot ID 0x8de8629 394s Manufacturer ID: SoftHSM project 394s Hardware version: 2.6 394s Firmware version: 2.6 394s Token present: yes 394s Token info: 394s Manufacturer ID: SoftHSM project 394s Model: SoftHSM v2 394s Hardware version: 2.6 394s Firmware version: 2.6 394s Serial number: 30577e6308de8629 394s Initialized: yes 394s User PIN init.: yes 394s Label: Test Organization Sub Int Token 394s Slot 1 394s Slot info: 394s Description: SoftHSM slot ID 0x1 394s Manufacturer ID: SoftHSM project 394s Hardware version: 2.6 394s Firmware version: 2.6 394s Token present: yes 394s Token info: 394s Manufacturer ID: SoftHSM project 394s Model: SoftHSM v2 394s Hardware version: 2.6 394s Firmware version: 2.6 394s Serial number: 394s Initialized: no 394s User PIN init.: no 394s Label: 394s + p11tool --provider=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --write --no-mark-private --load-certificate=/tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-trusted-certificate-0001.pem --login --set-pin=053350 --label 'Test Organization Sub Intermediate Trusted Certificate 0001' --id 00112233445566778899FFAABBCCDDEEFF012345 394s + openssl rsa -passin pass:random-sub-intermediate-ca-trusted-cert-0001-10509 -in /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-trusted-certificate-0001-key.pem -out /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 394s writing RSA key 394s + p11tool --provider=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --write --load-privkey=/tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem --login --set-pin=053350 --label 'Test Organization Sub Intermediate Trusted Certificate 0001 Key' --id 00112233445566778899FFAABBCCDDEEFF012345 394s + rm /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 394s + p11tool --provider=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --list-all 394s Object 0: 394s URL: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=30577e6308de8629;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert 394s Type: X.509 Certificate (RSA-1024) 394s Expires: Thu Mar 20 04:14:03 2025 394s Label: Test Organization Sub Intermediate Trusted Certificate 0001 394s ID: 00:11:22:33:44:55:66:77:88:99:ff:aa:bb:cc:dd:ee:ff:01:23:45 394s 394s Test Organization Sub Int Token 394s + echo 'Test Organization Sub Int Token' 394s + '[' -n '' ']' 394s + local output_base_name=SSSD-child-6616 394s + local output_file=/tmp/sssd-softhsm2-OnwLCh/SSSD-child-6616.output 394s + output_cert_file=/tmp/sssd-softhsm2-OnwLCh/SSSD-child-6616.pem 394s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-OnwLCh/test-root-CA.pem 394s [p11_child[3489]] [main] (0x0400): p11_child started. 394s [p11_child[3489]] [main] (0x2000): Running in [pre-auth] mode. 394s [p11_child[3489]] [main] (0x2000): Running with effective IDs: [0][0]. 394s [p11_child[3489]] [main] (0x2000): Running with real IDs [0][0]. 394s [p11_child[3489]] [do_card] (0x4000): Module List: 394s [p11_child[3489]] [do_card] (0x4000): common name: [softhsm2]. 394s [p11_child[3489]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 394s [p11_child[3489]] [do_card] (0x4000): Description [SoftHSM slot ID 0x8de8629] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 394s [p11_child[3489]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 394s [p11_child[3489]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x8de8629][148801065] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 394s [p11_child[3489]] [do_card] (0x4000): Login NOT required. 394s [p11_child[3489]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 394s [p11_child[3489]] [do_verification] (0x0040): X509_verify_cert failed [0]. 394s [p11_child[3489]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 394s [p11_child[3489]] [read_certs] (0x0040): Certificate [Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] not valid, skipping. 394s [p11_child[3489]] [do_card] (0x4000): No certificate found. 394s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-OnwLCh/SSSD-child-6616.output 394s + return 2 394s + invalid_certificate /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-10509 /tmp/sssd-softhsm2-OnwLCh/test-root-CA.pem partial_chain 394s + check_certificate /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-10509 /tmp/sssd-softhsm2-OnwLCh/test-root-CA.pem partial_chain 394s + local certificate=/tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-trusted-certificate-0001.pem 394s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-10509 394s + local key_ring=/tmp/sssd-softhsm2-OnwLCh/test-root-CA.pem 394s + local verify_option=partial_chain 394s + prepare_softhsm2_card /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-10509 394s + local certificate=/tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-trusted-certificate-0001.pem 394s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-10509 394s + local key_cn 394s + local key_name 394s + local tokens_dir 394s + local output_cert_file 394s + token_name= 394s ++ basename /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 394s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 394s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-trusted-certificate-0001.pem 394s ++ sed -n 's/ *commonName *= //p' 394s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 394s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 394s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-OnwLCh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 394s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-OnwLCh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 394s Test Organization Sub Int Token 394s ++ basename /tmp/sssd-softhsm2-OnwLCh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 394s + tokens_dir=/tmp/sssd-softhsm2-OnwLCh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 394s + token_name='Test Organization Sub Int Token' 394s + '[' '!' -e /tmp/sssd-softhsm2-OnwLCh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 394s + '[' '!' -d /tmp/sssd-softhsm2-OnwLCh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 394s + echo 'Test Organization Sub Int Token' 394s + '[' -n partial_chain ']' 394s + local verify_arg=--verify=partial_chain 394s + local output_base_name=SSSD-child-1229 394s + local output_file=/tmp/sssd-softhsm2-OnwLCh/SSSD-child-1229.output 394s + output_cert_file=/tmp/sssd-softhsm2-OnwLCh/SSSD-child-1229.pem 394s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-OnwLCh/test-root-CA.pem 394s [p11_child[3496]] [main] (0x0400): p11_child started. 394s [p11_child[3496]] [main] (0x2000): Running in [pre-auth] mode. 394s [p11_child[3496]] [main] (0x2000): Running with effective IDs: [0][0]. 394s [p11_child[3496]] [main] (0x2000): Running with real IDs [0][0]. 394s [p11_child[3496]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 394s [p11_child[3496]] [do_card] (0x4000): Module List: 394s [p11_child[3496]] [do_card] (0x4000): common name: [softhsm2]. 394s [p11_child[3496]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 394s [p11_child[3496]] [do_card] (0x4000): Description [SoftHSM slot ID 0x8de8629] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 394s [p11_child[3496]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 394s [p11_child[3496]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x8de8629][148801065] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 394s [p11_child[3496]] [do_card] (0x4000): Login NOT required. 394s [p11_child[3496]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 394s [p11_child[3496]] [do_verification] (0x0040): X509_verify_cert failed [0]. 394s [p11_child[3496]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 394s [p11_child[3496]] [read_certs] (0x0040): Certificate [Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] not valid, skipping. 394s [p11_child[3496]] [do_card] (0x4000): No certificate found. 394s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-OnwLCh/SSSD-child-1229.output 394s + return 2 394s + valid_certificate /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-10509 /tmp/sssd-softhsm2-OnwLCh/test-full-chain-CA.pem 394s + check_certificate /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-10509 /tmp/sssd-softhsm2-OnwLCh/test-full-chain-CA.pem 394s + local certificate=/tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-trusted-certificate-0001.pem 394s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-10509 394s + local key_ring=/tmp/sssd-softhsm2-OnwLCh/test-full-chain-CA.pem 394s + local verify_option= 394s + prepare_softhsm2_card /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-10509 394s + local certificate=/tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-trusted-certificate-0001.pem 394s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-10509 394s + local key_cn 394s + local key_name 394s + local tokens_dir 394s + local output_cert_file 394s + token_name= 394s ++ basename /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 394s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 394s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-trusted-certificate-0001.pem 394s ++ sed -n 's/ *commonName *= //p' 394s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 394s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 394s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-OnwLCh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 394s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-OnwLCh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 394s ++ basename /tmp/sssd-softhsm2-OnwLCh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 394s + tokens_dir=/tmp/sssd-softhsm2-OnwLCh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 394s + token_name='Test Organization Sub Int Token' 394s Test Organization Sub Int Token 394s + '[' '!' -e /tmp/sssd-softhsm2-OnwLCh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 394s + '[' '!' -d /tmp/sssd-softhsm2-OnwLCh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 394s + echo 'Test Organization Sub Int Token' 394s + '[' -n '' ']' 394s + local output_base_name=SSSD-child-8699 394s + local output_file=/tmp/sssd-softhsm2-OnwLCh/SSSD-child-8699.output 394s + output_cert_file=/tmp/sssd-softhsm2-OnwLCh/SSSD-child-8699.pem 394s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-OnwLCh/test-full-chain-CA.pem 394s [p11_child[3503]] [main] (0x0400): p11_child started. 394s [p11_child[3503]] [main] (0x2000): Running in [pre-auth] mode. 394s [p11_child[3503]] [main] (0x2000): Running with effective IDs: [0][0]. 394s [p11_child[3503]] [main] (0x2000): Running with real IDs [0][0]. 394s [p11_child[3503]] [do_card] (0x4000): Module List: 394s [p11_child[3503]] [do_card] (0x4000): common name: [softhsm2]. 394s [p11_child[3503]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 394s [p11_child[3503]] [do_card] (0x4000): Description [SoftHSM slot ID 0x8de8629] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 394s [p11_child[3503]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 394s [p11_child[3503]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x8de8629][148801065] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 394s [p11_child[3503]] [do_card] (0x4000): Login NOT required. 394s [p11_child[3503]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 394s [p11_child[3503]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 394s [p11_child[3503]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Sub Int Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 394s [p11_child[3503]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x8de8629;slot-manufacturer=SoftHSM%20project;slot-id=148801065;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=30577e6308de8629;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 394s [p11_child[3503]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 394s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-OnwLCh/SSSD-child-8699.output 394s + echo '-----BEGIN CERTIFICATE-----' 394s + tail -n1 /tmp/sssd-softhsm2-OnwLCh/SSSD-child-8699.output 394s + echo '-----END CERTIFICATE-----' 394s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-OnwLCh/SSSD-child-8699.pem 394s Certificate: 394s Data: 394s Version: 3 (0x2) 394s Serial Number: 5 (0x5) 394s Signature Algorithm: sha256WithRSAEncryption 394s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 394s Validity 394s Not Before: Mar 20 04:14:03 2024 GMT 394s Not After : Mar 20 04:14:03 2025 GMT 394s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 394s Subject Public Key Info: 394s Public Key Algorithm: rsaEncryption 394s Public-Key: (1024 bit) 394s Modulus: 394s 00:b4:a9:66:82:34:e9:48:81:7e:d4:5e:0c:d4:a5: 394s de:a3:d6:42:62:f3:00:7f:e4:1d:09:c5:27:38:cd: 394s 5a:66:f7:33:39:36:2e:47:1d:a0:06:0d:93:ae:44: 394s 67:b9:6f:09:79:4f:4c:33:44:5c:cc:06:9d:07:b2: 394s 35:15:8c:de:e0:95:2f:24:9e:5a:81:97:cb:39:d0: 394s 4b:5d:6f:b0:3a:b8:81:5e:bb:9c:24:e0:7e:e2:cb: 394s 9c:c7:01:11:11:e9:11:2a:a8:d2:8d:de:10:43:ac: 394s 9e:e4:5a:3b:3c:1d:02:9d:0a:4b:7a:7d:ca:11:bc: 394s a4:29:73:7c:00:3c:7f:30:41 394s Exponent: 65537 (0x10001) 394s X509v3 extensions: 394s X509v3 Authority Key Identifier: 394s 45:E0:C3:E1:3A:E0:9B:CD:DD:20:F7:3F:52:AB:59:04:57:EF:2F:A3 394s X509v3 Basic Constraints: 394s CA:FALSE 394s Netscape Cert Type: 394s SSL Client, S/MIME 394s Netscape Comment: 394s Test Organization Sub Intermediate CA trusted Certificate 394s X509v3 Subject Key Identifier: 394s 6E:66:4D:15:EB:5E:66:11:17:D1:E3:3B:AC:B3:F7:54:C8:22:F1:55 394s X509v3 Key Usage: critical 394s Digital Signature, Non Repudiation, Key Encipherment 394s X509v3 Extended Key Usage: 394s TLS Web Client Authentication, E-mail Protection 394s X509v3 Subject Alternative Name: 394s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 394s Signature Algorithm: sha256WithRSAEncryption 394s Signature Value: 394s 45:d2:46:cb:9c:a5:85:25:94:6b:ee:30:1c:88:96:cf:5c:12: 394s ab:4f:69:f7:ea:6a:44:4e:7e:03:7e:09:25:6a:97:0b:a5:32: 394s 31:b9:ed:fc:44:6e:b8:d6:b1:9e:1d:82:30:bd:08:e8:58:61: 394s 72:16:fc:15:29:f4:77:d0:81:72:b6:e8:59:e8:3d:9e:4a:9b: 394s c4:ca:c8:5f:50:44:5d:ca:ae:f4:a2:31:6d:e7:30:60:34:47: 394s 5c:22:4e:63:fd:f1:51:a8:bc:b4:66:0c:89:ae:44:97:e5:95: 394s e9:7d:19:f8:12:09:53:45:03:a2:45:7b:12:30:2f:fd:bd:68: 394s 71:87 394s + local found_md5 expected_md5 394s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-trusted-certificate-0001.pem 394s + expected_md5=Modulus=B4A9668234E948817ED45E0CD4A5DEA3D64262F3007FE41D09C52738CD5A66F73339362E471DA0060D93AE4467B96F09794F4C33445CCC069D07B235158CDEE0952F249E5A8197CB39D04B5D6FB03AB8815EBB9C24E07EE2CB9CC7011111E9112AA8D28DDE1043AC9EE45A3B3C1D029D0A4B7A7DCA11BCA429737C003C7F3041 394s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-OnwLCh/SSSD-child-8699.pem 394s + found_md5=Modulus=B4A9668234E948817ED45E0CD4A5DEA3D64262F3007FE41D09C52738CD5A66F73339362E471DA0060D93AE4467B96F09794F4C33445CCC069D07B235158CDEE0952F249E5A8197CB39D04B5D6FB03AB8815EBB9C24E07EE2CB9CC7011111E9112AA8D28DDE1043AC9EE45A3B3C1D029D0A4B7A7DCA11BCA429737C003C7F3041 394s + '[' Modulus=B4A9668234E948817ED45E0CD4A5DEA3D64262F3007FE41D09C52738CD5A66F73339362E471DA0060D93AE4467B96F09794F4C33445CCC069D07B235158CDEE0952F249E5A8197CB39D04B5D6FB03AB8815EBB9C24E07EE2CB9CC7011111E9112AA8D28DDE1043AC9EE45A3B3C1D029D0A4B7A7DCA11BCA429737C003C7F3041 '!=' Modulus=B4A9668234E948817ED45E0CD4A5DEA3D64262F3007FE41D09C52738CD5A66F73339362E471DA0060D93AE4467B96F09794F4C33445CCC069D07B235158CDEE0952F249E5A8197CB39D04B5D6FB03AB8815EBB9C24E07EE2CB9CC7011111E9112AA8D28DDE1043AC9EE45A3B3C1D029D0A4B7A7DCA11BCA429737C003C7F3041 ']' 394s + output_file=/tmp/sssd-softhsm2-OnwLCh/SSSD-child-8699-auth.output 394s ++ basename /tmp/sssd-softhsm2-OnwLCh/SSSD-child-8699-auth.output .output 394s + output_cert_file=/tmp/sssd-softhsm2-OnwLCh/SSSD-child-8699-auth.pem 394s + echo -n 053350 394s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-OnwLCh/test-full-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 '' --token_name 'Test Organization Sub Int Token' --module_name /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so 394s [p11_child[3511]] [main] (0x0400): p11_child started. 394s [p11_child[3511]] [main] (0x2000): Running in [auth] mode. 394s [p11_child[3511]] [main] (0x2000): Running with effective IDs: [0][0]. 394s [p11_child[3511]] [main] (0x2000): Running with real IDs [0][0]. 394s [p11_child[3511]] [do_card] (0x4000): Module List: 394s [p11_child[3511]] [do_card] (0x4000): common name: [softhsm2]. 394s [p11_child[3511]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 394s [p11_child[3511]] [do_card] (0x4000): Description [SoftHSM slot ID 0x8de8629] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 394s [p11_child[3511]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 394s [p11_child[3511]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x8de8629][148801065] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 394s [p11_child[3511]] [do_card] (0x4000): Login required. 394s [p11_child[3511]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 394s [p11_child[3511]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 394s [p11_child[3511]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so Test Organization Sub Int Token Test Organization Sub Int Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 394s [p11_child[3511]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x8de8629;slot-manufacturer=SoftHSM%20project;slot-id=148801065;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=30577e6308de8629;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 394s [p11_child[3511]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 394s [p11_child[3511]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 394s [p11_child[3511]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 394s [p11_child[3511]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 394s [p11_child[3511]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 394s [p11_child[3511]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 394s [p11_child[3511]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 394s [p11_child[3511]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 394s [p11_child[3511]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 394s [p11_child[3511]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 394s [p11_child[3511]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 394s [p11_child[3511]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 394s [p11_child[3511]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 394s [p11_child[3511]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 394s [p11_child[3511]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 394s [p11_child[3511]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 394s [p11_child[3511]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 394s [p11_child[3511]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 394s [p11_child[3511]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 394s [p11_child[3511]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 394s [p11_child[3511]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 394s [p11_child[3511]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 394s [p11_child[3511]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 394s [p11_child[3511]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 394s [p11_child[3511]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 394s [p11_child[3511]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 394s [p11_child[3511]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 394s [p11_child[3511]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 394s [p11_child[3511]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 394s [p11_child[3511]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 394s [p11_child[3511]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 394s [p11_child[3511]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 394s [p11_child[3511]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 394s [p11_child[3511]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 394s [p11_child[3511]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 394s [p11_child[3511]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 394s [p11_child[3511]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 394s [p11_child[3511]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 394s [p11_child[3511]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 394s [p11_child[3511]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 394s [p11_child[3511]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 394s [p11_child[3511]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 394s [p11_child[3511]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 394s [p11_child[3511]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 394s [p11_child[3511]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 394s [p11_child[3511]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 394s [p11_child[3511]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 394s [p11_child[3511]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 394s [p11_child[3511]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 394s [p11_child[3511]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 394s [p11_child[3511]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 394s [p11_child[3511]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 394s [p11_child[3511]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 394s [p11_child[3511]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 394s [p11_child[3511]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 394s [p11_child[3511]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 394s [p11_child[3511]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 394s [p11_child[3511]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 394s [p11_child[3511]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 394s [p11_child[3511]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 394s [p11_child[3511]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 394s [p11_child[3511]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 394s [p11_child[3511]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 394s [p11_child[3511]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 394s [p11_child[3511]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 394s [p11_child[3511]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 394s [p11_child[3511]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 394s [p11_child[3511]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 394s [p11_child[3511]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 394s [p11_child[3511]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 394s [p11_child[3511]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 394s [p11_child[3511]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 394s [p11_child[3511]] [do_card] (0x4000): Certificate verified and validated. 394s [p11_child[3511]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 394s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-OnwLCh/SSSD-child-8699-auth.output 394s + echo '-----BEGIN CERTIFICATE-----' 394s + tail -n1 /tmp/sssd-softhsm2-OnwLCh/SSSD-child-8699-auth.output 394s + echo '-----END CERTIFICATE-----' 394s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-OnwLCh/SSSD-child-8699-auth.pem 394s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-OnwLCh/SSSD-child-8699-auth.pem 394s Certificate: 394s Data: 394s Version: 3 (0x2) 394s Serial Number: 5 (0x5) 394s Signature Algorithm: sha256WithRSAEncryption 394s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 394s Validity 394s Not Before: Mar 20 04:14:03 2024 GMT 394s Not After : Mar 20 04:14:03 2025 GMT 394s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 394s Subject Public Key Info: 394s Public Key Algorithm: rsaEncryption 394s Public-Key: (1024 bit) 394s Modulus: 394s 00:b4:a9:66:82:34:e9:48:81:7e:d4:5e:0c:d4:a5: 394s de:a3:d6:42:62:f3:00:7f:e4:1d:09:c5:27:38:cd: 394s 5a:66:f7:33:39:36:2e:47:1d:a0:06:0d:93:ae:44: 394s 67:b9:6f:09:79:4f:4c:33:44:5c:cc:06:9d:07:b2: 394s 35:15:8c:de:e0:95:2f:24:9e:5a:81:97:cb:39:d0: 394s 4b:5d:6f:b0:3a:b8:81:5e:bb:9c:24:e0:7e:e2:cb: 394s 9c:c7:01:11:11:e9:11:2a:a8:d2:8d:de:10:43:ac: 394s 9e:e4:5a:3b:3c:1d:02:9d:0a:4b:7a:7d:ca:11:bc: 394s a4:29:73:7c:00:3c:7f:30:41 394s Exponent: 65537 (0x10001) 394s X509v3 extensions: 394s X509v3 Authority Key Identifier: 394s 45:E0:C3:E1:3A:E0:9B:CD:DD:20:F7:3F:52:AB:59:04:57:EF:2F:A3 394s X509v3 Basic Constraints: 394s CA:FALSE 394s Netscape Cert Type: 394s SSL Client, S/MIME 394s Netscape Comment: 394s Test Organization Sub Intermediate CA trusted Certificate 394s X509v3 Subject Key Identifier: 394s 6E:66:4D:15:EB:5E:66:11:17:D1:E3:3B:AC:B3:F7:54:C8:22:F1:55 394s X509v3 Key Usage: critical 394s Digital Signature, Non Repudiation, Key Encipherment 394s X509v3 Extended Key Usage: 394s TLS Web Client Authentication, E-mail Protection 394s X509v3 Subject Alternative Name: 394s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 394s Signature Algorithm: sha256WithRSAEncryption 394s Signature Value: 394s 45:d2:46:cb:9c:a5:85:25:94:6b:ee:30:1c:88:96:cf:5c:12: 394s ab:4f:69:f7:ea:6a:44:4e:7e:03:7e:09:25:6a:97:0b:a5:32: 394s 31:b9:ed:fc:44:6e:b8:d6:b1:9e:1d:82:30:bd:08:e8:58:61: 394s 72:16:fc:15:29:f4:77:d0:81:72:b6:e8:59:e8:3d:9e:4a:9b: 394s c4:ca:c8:5f:50:44:5d:ca:ae:f4:a2:31:6d:e7:30:60:34:47: 394s 5c:22:4e:63:fd:f1:51:a8:bc:b4:66:0c:89:ae:44:97:e5:95: 394s e9:7d:19:f8:12:09:53:45:03:a2:45:7b:12:30:2f:fd:bd:68: 394s 71:87 394s + found_md5=Modulus=B4A9668234E948817ED45E0CD4A5DEA3D64262F3007FE41D09C52738CD5A66F73339362E471DA0060D93AE4467B96F09794F4C33445CCC069D07B235158CDEE0952F249E5A8197CB39D04B5D6FB03AB8815EBB9C24E07EE2CB9CC7011111E9112AA8D28DDE1043AC9EE45A3B3C1D029D0A4B7A7DCA11BCA429737C003C7F3041 394s + '[' Modulus=B4A9668234E948817ED45E0CD4A5DEA3D64262F3007FE41D09C52738CD5A66F73339362E471DA0060D93AE4467B96F09794F4C33445CCC069D07B235158CDEE0952F249E5A8197CB39D04B5D6FB03AB8815EBB9C24E07EE2CB9CC7011111E9112AA8D28DDE1043AC9EE45A3B3C1D029D0A4B7A7DCA11BCA429737C003C7F3041 '!=' Modulus=B4A9668234E948817ED45E0CD4A5DEA3D64262F3007FE41D09C52738CD5A66F73339362E471DA0060D93AE4467B96F09794F4C33445CCC069D07B235158CDEE0952F249E5A8197CB39D04B5D6FB03AB8815EBB9C24E07EE2CB9CC7011111E9112AA8D28DDE1043AC9EE45A3B3C1D029D0A4B7A7DCA11BCA429737C003C7F3041 ']' 394s + valid_certificate /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-10509 /tmp/sssd-softhsm2-OnwLCh/test-full-chain-CA.pem partial_chain 394s + check_certificate /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-10509 /tmp/sssd-softhsm2-OnwLCh/test-full-chain-CA.pem partial_chain 394s + local certificate=/tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-trusted-certificate-0001.pem 394s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-10509 394s + local key_ring=/tmp/sssd-softhsm2-OnwLCh/test-full-chain-CA.pem 394s + local verify_option=partial_chain 394s + prepare_softhsm2_card /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-10509 394s + local certificate=/tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-trusted-certificate-0001.pem 394s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-10509 394s + local key_cn 394s + local key_name 394s + local tokens_dir 394s + local output_cert_file 394s + token_name= 394s ++ basename /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 394s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 394s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-trusted-certificate-0001.pem 394s ++ sed -n 's/ *commonName *= //p' 394s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 394s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 394s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-OnwLCh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 394s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-OnwLCh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 394s ++ basename /tmp/sssd-softhsm2-OnwLCh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 394s + tokens_dir=/tmp/sssd-softhsm2-OnwLCh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 394s + token_name='Test Organization Sub Int Token' 394s + '[' '!' -e /tmp/sssd-softhsm2-OnwLCh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 394s + '[' '!' -d /tmp/sssd-softhsm2-OnwLCh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 394s + echo 'Test Organization Sub Int Token' 394s Test Organization Sub Int Token 394s + '[' -n partial_chain ']' 394s + local verify_arg=--verify=partial_chain 394s + local output_base_name=SSSD-child-6130 394s + local output_file=/tmp/sssd-softhsm2-OnwLCh/SSSD-child-6130.output 394s + output_cert_file=/tmp/sssd-softhsm2-OnwLCh/SSSD-child-6130.pem 394s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-OnwLCh/test-full-chain-CA.pem 394s [p11_child[3521]] [main] (0x0400): p11_child started. 394s [p11_child[3521]] [main] (0x2000): Running in [pre-auth] mode. 394s [p11_child[3521]] [main] (0x2000): Running with effective IDs: [0][0]. 394s [p11_child[3521]] [main] (0x2000): Running with real IDs [0][0]. 394s [p11_child[3521]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 394s [p11_child[3521]] [do_card] (0x4000): Module List: 394s [p11_child[3521]] [do_card] (0x4000): common name: [softhsm2]. 394s [p11_child[3521]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 394s [p11_child[3521]] [do_card] (0x4000): Description [SoftHSM slot ID 0x8de8629] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 394s [p11_child[3521]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 394s [p11_child[3521]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x8de8629][148801065] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 394s [p11_child[3521]] [do_card] (0x4000): Login NOT required. 394s [p11_child[3521]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 394s [p11_child[3521]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 394s [p11_child[3521]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Sub Int Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 394s [p11_child[3521]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x8de8629;slot-manufacturer=SoftHSM%20project;slot-id=148801065;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=30577e6308de8629;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 394s [p11_child[3521]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 394s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-OnwLCh/SSSD-child-6130.output 394s + echo '-----BEGIN CERTIFICATE-----' 394s + tail -n1 /tmp/sssd-softhsm2-OnwLCh/SSSD-child-6130.output 394s + echo '-----END CERTIFICATE-----' 394s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-OnwLCh/SSSD-child-6130.pem 395s Certificate: 395s Data: 395s Version: 3 (0x2) 395s Serial Number: 5 (0x5) 395s Signature Algorithm: sha256WithRSAEncryption 395s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 395s Validity 395s Not Before: Mar 20 04:14:03 2024 GMT 395s Not After : Mar 20 04:14:03 2025 GMT 395s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 395s Subject Public Key Info: 395s Public Key Algorithm: rsaEncryption 395s Public-Key: (1024 bit) 395s Modulus: 395s 00:b4:a9:66:82:34:e9:48:81:7e:d4:5e:0c:d4:a5: 395s de:a3:d6:42:62:f3:00:7f:e4:1d:09:c5:27:38:cd: 395s 5a:66:f7:33:39:36:2e:47:1d:a0:06:0d:93:ae:44: 395s 67:b9:6f:09:79:4f:4c:33:44:5c:cc:06:9d:07:b2: 395s 35:15:8c:de:e0:95:2f:24:9e:5a:81:97:cb:39:d0: 395s 4b:5d:6f:b0:3a:b8:81:5e:bb:9c:24:e0:7e:e2:cb: 395s 9c:c7:01:11:11:e9:11:2a:a8:d2:8d:de:10:43:ac: 395s 9e:e4:5a:3b:3c:1d:02:9d:0a:4b:7a:7d:ca:11:bc: 395s a4:29:73:7c:00:3c:7f:30:41 395s Exponent: 65537 (0x10001) 395s X509v3 extensions: 395s X509v3 Authority Key Identifier: 395s 45:E0:C3:E1:3A:E0:9B:CD:DD:20:F7:3F:52:AB:59:04:57:EF:2F:A3 395s X509v3 Basic Constraints: 395s CA:FALSE 395s Netscape Cert Type: 395s SSL Client, S/MIME 395s Netscape Comment: 395s Test Organization Sub Intermediate CA trusted Certificate 395s X509v3 Subject Key Identifier: 395s 6E:66:4D:15:EB:5E:66:11:17:D1:E3:3B:AC:B3:F7:54:C8:22:F1:55 395s X509v3 Key Usage: critical 395s Digital Signature, Non Repudiation, Key Encipherment 395s X509v3 Extended Key Usage: 395s TLS Web Client Authentication, E-mail Protection 395s X509v3 Subject Alternative Name: 395s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 395s Signature Algorithm: sha256WithRSAEncryption 395s Signature Value: 395s 45:d2:46:cb:9c:a5:85:25:94:6b:ee:30:1c:88:96:cf:5c:12: 395s ab:4f:69:f7:ea:6a:44:4e:7e:03:7e:09:25:6a:97:0b:a5:32: 395s 31:b9:ed:fc:44:6e:b8:d6:b1:9e:1d:82:30:bd:08:e8:58:61: 395s 72:16:fc:15:29:f4:77:d0:81:72:b6:e8:59:e8:3d:9e:4a:9b: 395s c4:ca:c8:5f:50:44:5d:ca:ae:f4:a2:31:6d:e7:30:60:34:47: 395s 5c:22:4e:63:fd:f1:51:a8:bc:b4:66:0c:89:ae:44:97:e5:95: 395s e9:7d:19:f8:12:09:53:45:03:a2:45:7b:12:30:2f:fd:bd:68: 395s 71:87 395s + local found_md5 expected_md5 395s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-trusted-certificate-0001.pem 395s + expected_md5=Modulus=B4A9668234E948817ED45E0CD4A5DEA3D64262F3007FE41D09C52738CD5A66F73339362E471DA0060D93AE4467B96F09794F4C33445CCC069D07B235158CDEE0952F249E5A8197CB39D04B5D6FB03AB8815EBB9C24E07EE2CB9CC7011111E9112AA8D28DDE1043AC9EE45A3B3C1D029D0A4B7A7DCA11BCA429737C003C7F3041 395s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-OnwLCh/SSSD-child-6130.pem 395s + found_md5=Modulus=B4A9668234E948817ED45E0CD4A5DEA3D64262F3007FE41D09C52738CD5A66F73339362E471DA0060D93AE4467B96F09794F4C33445CCC069D07B235158CDEE0952F249E5A8197CB39D04B5D6FB03AB8815EBB9C24E07EE2CB9CC7011111E9112AA8D28DDE1043AC9EE45A3B3C1D029D0A4B7A7DCA11BCA429737C003C7F3041 395s + '[' Modulus=B4A9668234E948817ED45E0CD4A5DEA3D64262F3007FE41D09C52738CD5A66F73339362E471DA0060D93AE4467B96F09794F4C33445CCC069D07B235158CDEE0952F249E5A8197CB39D04B5D6FB03AB8815EBB9C24E07EE2CB9CC7011111E9112AA8D28DDE1043AC9EE45A3B3C1D029D0A4B7A7DCA11BCA429737C003C7F3041 '!=' Modulus=B4A9668234E948817ED45E0CD4A5DEA3D64262F3007FE41D09C52738CD5A66F73339362E471DA0060D93AE4467B96F09794F4C33445CCC069D07B235158CDEE0952F249E5A8197CB39D04B5D6FB03AB8815EBB9C24E07EE2CB9CC7011111E9112AA8D28DDE1043AC9EE45A3B3C1D029D0A4B7A7DCA11BCA429737C003C7F3041 ']' 395s + output_file=/tmp/sssd-softhsm2-OnwLCh/SSSD-child-6130-auth.output 395s ++ basename /tmp/sssd-softhsm2-OnwLCh/SSSD-child-6130-auth.output .output 395s + output_cert_file=/tmp/sssd-softhsm2-OnwLCh/SSSD-child-6130-auth.pem 395s + echo -n 053350 395s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-OnwLCh/test-full-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Sub Int Token' --module_name /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so 395s [p11_child[3529]] [main] (0x0400): p11_child started. 395s [p11_child[3529]] [main] (0x2000): Running in [auth] mode. 395s [p11_child[3529]] [main] (0x2000): Running with effective IDs: [0][0]. 395s [p11_child[3529]] [main] (0x2000): Running with real IDs [0][0]. 395s [p11_child[3529]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 395s [p11_child[3529]] [do_card] (0x4000): Module List: 395s [p11_child[3529]] [do_card] (0x4000): common name: [softhsm2]. 395s [p11_child[3529]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 395s [p11_child[3529]] [do_card] (0x4000): Description [SoftHSM slot ID 0x8de8629] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 395s [p11_child[3529]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 395s [p11_child[3529]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x8de8629][148801065] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 395s [p11_child[3529]] [do_card] (0x4000): Login required. 395s [p11_child[3529]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 395s [p11_child[3529]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 395s [p11_child[3529]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so Test Organization Sub Int Token Test Organization Sub Int Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 395s [p11_child[3529]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x8de8629;slot-manufacturer=SoftHSM%20project;slot-id=148801065;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=30577e6308de8629;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 395s [p11_child[3529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 395s [p11_child[3529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 395s [p11_child[3529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 395s [p11_child[3529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 395s [p11_child[3529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 395s [p11_child[3529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 395s [p11_child[3529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 395s [p11_child[3529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 395s [p11_child[3529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 395s [p11_child[3529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 395s [p11_child[3529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 395s [p11_child[3529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 395s [p11_child[3529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 395s [p11_child[3529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 395s [p11_child[3529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 395s [p11_child[3529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 395s [p11_child[3529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 395s [p11_child[3529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 395s [p11_child[3529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 395s [p11_child[3529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 395s [p11_child[3529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 395s [p11_child[3529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 395s [p11_child[3529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 395s [p11_child[3529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 395s [p11_child[3529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 395s [p11_child[3529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 395s [p11_child[3529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 395s [p11_child[3529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 395s [p11_child[3529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 395s [p11_child[3529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 395s [p11_child[3529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 395s [p11_child[3529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 395s [p11_child[3529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 395s [p11_child[3529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 395s [p11_child[3529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 395s [p11_child[3529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 395s [p11_child[3529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 395s [p11_child[3529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 395s [p11_child[3529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 395s [p11_child[3529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 395s [p11_child[3529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 395s [p11_child[3529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 395s [p11_child[3529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 395s [p11_child[3529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 395s [p11_child[3529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 395s [p11_child[3529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 395s [p11_child[3529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 395s [p11_child[3529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 395s [p11_child[3529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 395s [p11_child[3529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 395s [p11_child[3529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 395s [p11_child[3529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 395s [p11_child[3529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 395s [p11_child[3529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 395s [p11_child[3529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 395s [p11_child[3529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 395s [p11_child[3529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 395s [p11_child[3529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 395s [p11_child[3529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 395s [p11_child[3529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 395s [p11_child[3529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 395s [p11_child[3529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 395s [p11_child[3529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 395s [p11_child[3529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 395s [p11_child[3529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 395s [p11_child[3529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 395s [p11_child[3529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 395s [p11_child[3529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 395s [p11_child[3529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 395s [p11_child[3529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 395s [p11_child[3529]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 395s [p11_child[3529]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 395s [p11_child[3529]] [do_card] (0x4000): Certificate verified and validated. 395s [p11_child[3529]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 395s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-OnwLCh/SSSD-child-6130-auth.output 395s + echo '-----BEGIN CERTIFICATE-----' 395s + tail -n1 /tmp/sssd-softhsm2-OnwLCh/SSSD-child-6130-auth.output 395s + echo '-----END CERTIFICATE-----' 395s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-OnwLCh/SSSD-child-6130-auth.pem 395s Certificate: 395s Data: 395s Version: 3 (0x2) 395s Serial Number: 5 (0x5) 395s Signature Algorithm: sha256WithRSAEncryption 395s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 395s Validity 395s Not Before: Mar 20 04:14:03 2024 GMT 395s Not After : Mar 20 04:14:03 2025 GMT 395s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 395s Subject Public Key Info: 395s Public Key Algorithm: rsaEncryption 395s Public-Key: (1024 bit) 395s Modulus: 395s 00:b4:a9:66:82:34:e9:48:81:7e:d4:5e:0c:d4:a5: 395s de:a3:d6:42:62:f3:00:7f:e4:1d:09:c5:27:38:cd: 395s 5a:66:f7:33:39:36:2e:47:1d:a0:06:0d:93:ae:44: 395s 67:b9:6f:09:79:4f:4c:33:44:5c:cc:06:9d:07:b2: 395s 35:15:8c:de:e0:95:2f:24:9e:5a:81:97:cb:39:d0: 395s 4b:5d:6f:b0:3a:b8:81:5e:bb:9c:24:e0:7e:e2:cb: 395s 9c:c7:01:11:11:e9:11:2a:a8:d2:8d:de:10:43:ac: 395s 9e:e4:5a:3b:3c:1d:02:9d:0a:4b:7a:7d:ca:11:bc: 395s a4:29:73:7c:00:3c:7f:30:41 395s Exponent: 65537 (0x10001) 395s X509v3 extensions: 395s X509v3 Authority Key Identifier: 395s 45:E0:C3:E1:3A:E0:9B:CD:DD:20:F7:3F:52:AB:59:04:57:EF:2F:A3 395s X509v3 Basic Constraints: 395s CA:FALSE 395s Netscape Cert Type: 395s SSL Client, S/MIME 395s Netscape Comment: 395s Test Organization Sub Intermediate CA trusted Certificate 395s X509v3 Subject Key Identifier: 395s 6E:66:4D:15:EB:5E:66:11:17:D1:E3:3B:AC:B3:F7:54:C8:22:F1:55 395s X509v3 Key Usage: critical 395s Digital Signature, Non Repudiation, Key Encipherment 395s X509v3 Extended Key Usage: 395s TLS Web Client Authentication, E-mail Protection 395s X509v3 Subject Alternative Name: 395s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 395s Signature Algorithm: sha256WithRSAEncryption 395s Signature Value: 395s 45:d2:46:cb:9c:a5:85:25:94:6b:ee:30:1c:88:96:cf:5c:12: 395s ab:4f:69:f7:ea:6a:44:4e:7e:03:7e:09:25:6a:97:0b:a5:32: 395s 31:b9:ed:fc:44:6e:b8:d6:b1:9e:1d:82:30:bd:08:e8:58:61: 395s 72:16:fc:15:29:f4:77:d0:81:72:b6:e8:59:e8:3d:9e:4a:9b: 395s c4:ca:c8:5f:50:44:5d:ca:ae:f4:a2:31:6d:e7:30:60:34:47: 395s 5c:22:4e:63:fd:f1:51:a8:bc:b4:66:0c:89:ae:44:97:e5:95: 395s e9:7d:19:f8:12:09:53:45:03:a2:45:7b:12:30:2f:fd:bd:68: 395s 71:87 395s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-OnwLCh/SSSD-child-6130-auth.pem 395s + found_md5=Modulus=B4A9668234E948817ED45E0CD4A5DEA3D64262F3007FE41D09C52738CD5A66F73339362E471DA0060D93AE4467B96F09794F4C33445CCC069D07B235158CDEE0952F249E5A8197CB39D04B5D6FB03AB8815EBB9C24E07EE2CB9CC7011111E9112AA8D28DDE1043AC9EE45A3B3C1D029D0A4B7A7DCA11BCA429737C003C7F3041 395s + '[' Modulus=B4A9668234E948817ED45E0CD4A5DEA3D64262F3007FE41D09C52738CD5A66F73339362E471DA0060D93AE4467B96F09794F4C33445CCC069D07B235158CDEE0952F249E5A8197CB39D04B5D6FB03AB8815EBB9C24E07EE2CB9CC7011111E9112AA8D28DDE1043AC9EE45A3B3C1D029D0A4B7A7DCA11BCA429737C003C7F3041 '!=' Modulus=B4A9668234E948817ED45E0CD4A5DEA3D64262F3007FE41D09C52738CD5A66F73339362E471DA0060D93AE4467B96F09794F4C33445CCC069D07B235158CDEE0952F249E5A8197CB39D04B5D6FB03AB8815EBB9C24E07EE2CB9CC7011111E9112AA8D28DDE1043AC9EE45A3B3C1D029D0A4B7A7DCA11BCA429737C003C7F3041 ']' 395s + invalid_certificate /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-10509 /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA.pem 395s + check_certificate /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-10509 /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA.pem 395s + local certificate=/tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-trusted-certificate-0001.pem 395s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-10509 395s + local key_ring=/tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA.pem 395s + local verify_option= 395s + prepare_softhsm2_card /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-10509 395s + local certificate=/tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-trusted-certificate-0001.pem 395s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-10509 395s + local key_cn 395s + local key_name 395s + local tokens_dir 395s + local output_cert_file 395s + token_name= 395s ++ basename /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 395s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 395s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-trusted-certificate-0001.pem 395s ++ sed -n 's/ *commonName *= //p' 395s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 395s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 395s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-OnwLCh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 395s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-OnwLCh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 395s ++ basename /tmp/sssd-softhsm2-OnwLCh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 395s + tokens_dir=/tmp/sssd-softhsm2-OnwLCh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 395s + token_name='Test Organization Sub Int Token' 395s + '[' '!' -e /tmp/sssd-softhsm2-OnwLCh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 395s + '[' '!' -d /tmp/sssd-softhsm2-OnwLCh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 395s + echo 'Test Organization Sub Int Token' 395s Test Organization Sub Int Token 395s + '[' -n '' ']' 395s + local output_base_name=SSSD-child-3476 395s + local output_file=/tmp/sssd-softhsm2-OnwLCh/SSSD-child-3476.output 395s + output_cert_file=/tmp/sssd-softhsm2-OnwLCh/SSSD-child-3476.pem 395s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA.pem 395s [p11_child[3539]] [main] (0x0400): p11_child started. 395s [p11_child[3539]] [main] (0x2000): Running in [pre-auth] mode. 395s [p11_child[3539]] [main] (0x2000): Running with effective IDs: [0][0]. 395s [p11_child[3539]] [main] (0x2000): Running with real IDs [0][0]. 395s [p11_child[3539]] [do_card] (0x4000): Module List: 395s [p11_child[3539]] [do_card] (0x4000): common name: [softhsm2]. 395s [p11_child[3539]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 395s [p11_child[3539]] [do_card] (0x4000): Description [SoftHSM slot ID 0x8de8629] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 395s [p11_child[3539]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 395s [p11_child[3539]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x8de8629][148801065] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 395s [p11_child[3539]] [do_card] (0x4000): Login NOT required. 395s [p11_child[3539]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 395s [p11_child[3539]] [do_verification] (0x0040): X509_verify_cert failed [0]. 395s [p11_child[3539]] [do_verification] (0x0040): X509_verify_cert failed [2][unable to get issuer certificate]. 395s [p11_child[3539]] [read_certs] (0x0040): Certificate [Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] not valid, skipping. 395s [p11_child[3539]] [do_card] (0x4000): No certificate found. 395s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-OnwLCh/SSSD-child-3476.output 395s + return 2 395s + invalid_certificate /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-10509 /tmp/sssd-softhsm2-OnwLCh/test-root-intermediate-chain-CA.pem partial_chain 395s + check_certificate /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-10509 /tmp/sssd-softhsm2-OnwLCh/test-root-intermediate-chain-CA.pem partial_chain 395s + local certificate=/tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-trusted-certificate-0001.pem 395s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-10509 395s + local key_ring=/tmp/sssd-softhsm2-OnwLCh/test-root-intermediate-chain-CA.pem 395s + local verify_option=partial_chain 395s + prepare_softhsm2_card /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-10509 395s + local certificate=/tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-trusted-certificate-0001.pem 395s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-10509 395s + local key_cn 395s + local key_name 395s + local tokens_dir 395s + local output_cert_file 395s + token_name= 395s ++ basename /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 395s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 395s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-trusted-certificate-0001.pem 395s ++ sed -n 's/ *commonName *= //p' 395s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 395s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 395s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-OnwLCh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 395s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-OnwLCh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 395s ++ basename /tmp/sssd-softhsm2-OnwLCh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 395s + tokens_dir=/tmp/sssd-softhsm2-OnwLCh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 395s + token_name='Test Organization Sub Int Token' 395s + '[' '!' -e /tmp/sssd-softhsm2-OnwLCh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 395s + '[' '!' -d /tmp/sssd-softhsm2-OnwLCh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 395s + echo 'Test Organization Sub Int Token' 395s Test Organization Sub Int Token 395s + '[' -n partial_chain ']' 395s + local verify_arg=--verify=partial_chain 395s + local output_base_name=SSSD-child-14972 395s + local output_file=/tmp/sssd-softhsm2-OnwLCh/SSSD-child-14972.output 395s + output_cert_file=/tmp/sssd-softhsm2-OnwLCh/SSSD-child-14972.pem 395s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-OnwLCh/test-root-intermediate-chain-CA.pem 395s [p11_child[3546]] [main] (0x0400): p11_child started. 395s [p11_child[3546]] [main] (0x2000): Running in [pre-auth] mode. 395s [p11_child[3546]] [main] (0x2000): Running with effective IDs: [0][0]. 395s [p11_child[3546]] [main] (0x2000): Running with real IDs [0][0]. 395s [p11_child[3546]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 395s [p11_child[3546]] [do_card] (0x4000): Module List: 395s [p11_child[3546]] [do_card] (0x4000): common name: [softhsm2]. 395s [p11_child[3546]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 395s [p11_child[3546]] [do_card] (0x4000): Description [SoftHSM slot ID 0x8de8629] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 395s [p11_child[3546]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 395s [p11_child[3546]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x8de8629][148801065] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 395s [p11_child[3546]] [do_card] (0x4000): Login NOT required. 395s [p11_child[3546]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 395s [p11_child[3546]] [do_verification] (0x0040): X509_verify_cert failed [0]. 395s [p11_child[3546]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 395s [p11_child[3546]] [read_certs] (0x0040): Certificate [Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] not valid, skipping. 395s [p11_child[3546]] [do_card] (0x4000): No certificate found. 395s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-OnwLCh/SSSD-child-14972.output 395s + return 2 395s + valid_certificate /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-10509 /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA.pem partial_chain 395s + check_certificate /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-10509 /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA.pem partial_chain 395s + local certificate=/tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-trusted-certificate-0001.pem 395s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-10509 395s + local key_ring=/tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA.pem 395s + local verify_option=partial_chain 395s + prepare_softhsm2_card /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-10509 395s + local certificate=/tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-trusted-certificate-0001.pem 395s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-10509 395s + local key_cn 395s + local key_name 395s + local tokens_dir 395s + local output_cert_file 395s + token_name= 395s ++ basename /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 395s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 395s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-trusted-certificate-0001.pem 395s ++ sed -n 's/ *commonName *= //p' 395s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 395s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 395s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-OnwLCh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 395s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-OnwLCh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 395s ++ basename /tmp/sssd-softhsm2-OnwLCh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 395s + tokens_dir=/tmp/sssd-softhsm2-OnwLCh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 395s + token_name='Test Organization Sub Int Token' 395s + '[' '!' -e /tmp/sssd-softhsm2-OnwLCh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 395s + '[' '!' -d /tmp/sssd-softhsm2-OnwLCh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 395s + echo 'Test Organization Sub Int Token' 395s Test Organization Sub Int Token 395s + '[' -n partial_chain ']' 395s + local verify_arg=--verify=partial_chain 395s + local output_base_name=SSSD-child-8274 395s + local output_file=/tmp/sssd-softhsm2-OnwLCh/SSSD-child-8274.output 395s + output_cert_file=/tmp/sssd-softhsm2-OnwLCh/SSSD-child-8274.pem 395s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA.pem 395s [p11_child[3553]] [main] (0x0400): p11_child started. 395s [p11_child[3553]] [main] (0x2000): Running in [pre-auth] mode. 395s [p11_child[3553]] [main] (0x2000): Running with effective IDs: [0][0]. 395s [p11_child[3553]] [main] (0x2000): Running with real IDs [0][0]. 395s [p11_child[3553]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 395s [p11_child[3553]] [do_card] (0x4000): Module List: 395s [p11_child[3553]] [do_card] (0x4000): common name: [softhsm2]. 395s [p11_child[3553]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 395s [p11_child[3553]] [do_card] (0x4000): Description [SoftHSM slot ID 0x8de8629] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 395s [p11_child[3553]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 395s [p11_child[3553]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x8de8629][148801065] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 395s [p11_child[3553]] [do_card] (0x4000): Login NOT required. 395s [p11_child[3553]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 395s [p11_child[3553]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 395s [p11_child[3553]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Sub Int Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 395s [p11_child[3553]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x8de8629;slot-manufacturer=SoftHSM%20project;slot-id=148801065;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=30577e6308de8629;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 395s [p11_child[3553]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 395s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-OnwLCh/SSSD-child-8274.output 395s + echo '-----BEGIN CERTIFICATE-----' 395s + tail -n1 /tmp/sssd-softhsm2-OnwLCh/SSSD-child-8274.output 395s + echo '-----END CERTIFICATE-----' 395s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-OnwLCh/SSSD-child-8274.pem 395s + local found_md5 expected_md5 395s Certificate: 395s Data: 395s Version: 3 (0x2) 395s Serial Number: 5 (0x5) 395s Signature Algorithm: sha256WithRSAEncryption 395s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 395s Validity 395s Not Before: Mar 20 04:14:03 2024 GMT 395s Not After : Mar 20 04:14:03 2025 GMT 395s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 395s Subject Public Key Info: 395s Public Key Algorithm: rsaEncryption 395s Public-Key: (1024 bit) 395s Modulus: 395s 00:b4:a9:66:82:34:e9:48:81:7e:d4:5e:0c:d4:a5: 395s de:a3:d6:42:62:f3:00:7f:e4:1d:09:c5:27:38:cd: 395s 5a:66:f7:33:39:36:2e:47:1d:a0:06:0d:93:ae:44: 395s 67:b9:6f:09:79:4f:4c:33:44:5c:cc:06:9d:07:b2: 395s 35:15:8c:de:e0:95:2f:24:9e:5a:81:97:cb:39:d0: 395s 4b:5d:6f:b0:3a:b8:81:5e:bb:9c:24:e0:7e:e2:cb: 395s 9c:c7:01:11:11:e9:11:2a:a8:d2:8d:de:10:43:ac: 395s 9e:e4:5a:3b:3c:1d:02:9d:0a:4b:7a:7d:ca:11:bc: 395s a4:29:73:7c:00:3c:7f:30:41 395s Exponent: 65537 (0x10001) 395s X509v3 extensions: 395s X509v3 Authority Key Identifier: 395s 45:E0:C3:E1:3A:E0:9B:CD:DD:20:F7:3F:52:AB:59:04:57:EF:2F:A3 395s X509v3 Basic Constraints: 395s CA:FALSE 395s Netscape Cert Type: 395s SSL Client, S/MIME 395s Netscape Comment: 395s Test Organization Sub Intermediate CA trusted Certificate 395s X509v3 Subject Key Identifier: 395s 6E:66:4D:15:EB:5E:66:11:17:D1:E3:3B:AC:B3:F7:54:C8:22:F1:55 395s X509v3 Key Usage: critical 395s Digital Signature, Non Repudiation, Key Encipherment 395s X509v3 Extended Key Usage: 395s TLS Web Client Authentication, E-mail Protection 395s X509v3 Subject Alternative Name: 395s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 395s Signature Algorithm: sha256WithRSAEncryption 395s Signature Value: 395s 45:d2:46:cb:9c:a5:85:25:94:6b:ee:30:1c:88:96:cf:5c:12: 395s ab:4f:69:f7:ea:6a:44:4e:7e:03:7e:09:25:6a:97:0b:a5:32: 395s 31:b9:ed:fc:44:6e:b8:d6:b1:9e:1d:82:30:bd:08:e8:58:61: 395s 72:16:fc:15:29:f4:77:d0:81:72:b6:e8:59:e8:3d:9e:4a:9b: 395s c4:ca:c8:5f:50:44:5d:ca:ae:f4:a2:31:6d:e7:30:60:34:47: 395s 5c:22:4e:63:fd:f1:51:a8:bc:b4:66:0c:89:ae:44:97:e5:95: 395s e9:7d:19:f8:12:09:53:45:03:a2:45:7b:12:30:2f:fd:bd:68: 395s 71:87 395s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-trusted-certificate-0001.pem 395s + expected_md5=Modulus=B4A9668234E948817ED45E0CD4A5DEA3D64262F3007FE41D09C52738CD5A66F73339362E471DA0060D93AE4467B96F09794F4C33445CCC069D07B235158CDEE0952F249E5A8197CB39D04B5D6FB03AB8815EBB9C24E07EE2CB9CC7011111E9112AA8D28DDE1043AC9EE45A3B3C1D029D0A4B7A7DCA11BCA429737C003C7F3041 395s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-OnwLCh/SSSD-child-8274.pem 395s + found_md5=Modulus=B4A9668234E948817ED45E0CD4A5DEA3D64262F3007FE41D09C52738CD5A66F73339362E471DA0060D93AE4467B96F09794F4C33445CCC069D07B235158CDEE0952F249E5A8197CB39D04B5D6FB03AB8815EBB9C24E07EE2CB9CC7011111E9112AA8D28DDE1043AC9EE45A3B3C1D029D0A4B7A7DCA11BCA429737C003C7F3041 395s + '[' Modulus=B4A9668234E948817ED45E0CD4A5DEA3D64262F3007FE41D09C52738CD5A66F73339362E471DA0060D93AE4467B96F09794F4C33445CCC069D07B235158CDEE0952F249E5A8197CB39D04B5D6FB03AB8815EBB9C24E07EE2CB9CC7011111E9112AA8D28DDE1043AC9EE45A3B3C1D029D0A4B7A7DCA11BCA429737C003C7F3041 '!=' Modulus=B4A9668234E948817ED45E0CD4A5DEA3D64262F3007FE41D09C52738CD5A66F73339362E471DA0060D93AE4467B96F09794F4C33445CCC069D07B235158CDEE0952F249E5A8197CB39D04B5D6FB03AB8815EBB9C24E07EE2CB9CC7011111E9112AA8D28DDE1043AC9EE45A3B3C1D029D0A4B7A7DCA11BCA429737C003C7F3041 ']' 395s + output_file=/tmp/sssd-softhsm2-OnwLCh/SSSD-child-8274-auth.output 395s ++ basename /tmp/sssd-softhsm2-OnwLCh/SSSD-child-8274-auth.output .output 395s + output_cert_file=/tmp/sssd-softhsm2-OnwLCh/SSSD-child-8274-auth.pem 395s + echo -n 053350 395s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Sub Int Token' --module_name /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so 395s [p11_child[3561]] [main] (0x0400): p11_child started. 395s [p11_child[3561]] [main] (0x2000): Running in [auth] mode. 395s [p11_child[3561]] [main] (0x2000): Running with effective IDs: [0][0]. 395s [p11_child[3561]] [main] (0x2000): Running with real IDs [0][0]. 395s [p11_child[3561]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 395s [p11_child[3561]] [do_card] (0x4000): Module List: 395s [p11_child[3561]] [do_card] (0x4000): common name: [softhsm2]. 395s [p11_child[3561]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 395s [p11_child[3561]] [do_card] (0x4000): Description [SoftHSM slot ID 0x8de8629] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 395s [p11_child[3561]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 395s [p11_child[3561]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x8de8629][148801065] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 395s [p11_child[3561]] [do_card] (0x4000): Login required. 395s [p11_child[3561]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 395s [p11_child[3561]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 395s [p11_child[3561]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so Test Organization Sub Int Token Test Organization Sub Int Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 395s [p11_child[3561]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x8de8629;slot-manufacturer=SoftHSM%20project;slot-id=148801065;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=30577e6308de8629;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 395s [p11_child[3561]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 395s [p11_child[3561]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 395s [p11_child[3561]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 395s [p11_child[3561]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 395s [p11_child[3561]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 395s [p11_child[3561]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 395s [p11_child[3561]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 395s [p11_child[3561]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 395s [p11_child[3561]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 395s [p11_child[3561]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 395s [p11_child[3561]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 395s [p11_child[3561]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 395s [p11_child[3561]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 395s [p11_child[3561]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 395s [p11_child[3561]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 395s [p11_child[3561]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 395s [p11_child[3561]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 395s [p11_child[3561]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 395s [p11_child[3561]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 395s [p11_child[3561]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 395s [p11_child[3561]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 395s [p11_child[3561]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 395s [p11_child[3561]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 395s [p11_child[3561]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 395s [p11_child[3561]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 395s [p11_child[3561]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 395s [p11_child[3561]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 395s [p11_child[3561]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 395s [p11_child[3561]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 395s [p11_child[3561]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 395s [p11_child[3561]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 395s [p11_child[3561]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 395s [p11_child[3561]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 395s [p11_child[3561]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 395s [p11_child[3561]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 395s [p11_child[3561]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 395s [p11_child[3561]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 395s [p11_child[3561]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 395s [p11_child[3561]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 395s [p11_child[3561]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 395s [p11_child[3561]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 395s [p11_child[3561]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 395s [p11_child[3561]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 395s [p11_child[3561]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 395s [p11_child[3561]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 395s [p11_child[3561]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 395s [p11_child[3561]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 395s [p11_child[3561]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 395s [p11_child[3561]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 395s [p11_child[3561]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 395s [p11_child[3561]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 395s [p11_child[3561]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 395s [p11_child[3561]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 395s [p11_child[3561]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 395s [p11_child[3561]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 395s [p11_child[3561]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 395s [p11_child[3561]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 395s [p11_child[3561]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 395s [p11_child[3561]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 395s [p11_child[3561]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 395s [p11_child[3561]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 395s [p11_child[3561]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 395s [p11_child[3561]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 395s [p11_child[3561]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 395s [p11_child[3561]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 395s [p11_child[3561]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 395s [p11_child[3561]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 395s [p11_child[3561]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 395s [p11_child[3561]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 395s [p11_child[3561]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 395s [p11_child[3561]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 395s [p11_child[3561]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 395s [p11_child[3561]] [do_card] (0x4000): Certificate verified and validated. 395s [p11_child[3561]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 395s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-OnwLCh/SSSD-child-8274-auth.output 395s + echo '-----BEGIN CERTIFICATE-----' 395s + tail -n1 /tmp/sssd-softhsm2-OnwLCh/SSSD-child-8274-auth.output 395s + echo '-----END CERTIFICATE-----' 395s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-OnwLCh/SSSD-child-8274-auth.pem 395s Certificate: 395s Data: 395s Version: 3 (0x2) 395s Serial Number: 5 (0x5) 395s Signature Algorithm: sha256WithRSAEncryption 395s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 395s Validity 395s Not Before: Mar 20 04:14:03 2024 GMT 395s Not After : Mar 20 04:14:03 2025 GMT 395s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 395s Subject Public Key Info: 395s Public Key Algorithm: rsaEncryption 395s Public-Key: (1024 bit) 395s Modulus: 395s 00:b4:a9:66:82:34:e9:48:81:7e:d4:5e:0c:d4:a5: 395s de:a3:d6:42:62:f3:00:7f:e4:1d:09:c5:27:38:cd: 395s 5a:66:f7:33:39:36:2e:47:1d:a0:06:0d:93:ae:44: 395s 67:b9:6f:09:79:4f:4c:33:44:5c:cc:06:9d:07:b2: 395s 35:15:8c:de:e0:95:2f:24:9e:5a:81:97:cb:39:d0: 395s 4b:5d:6f:b0:3a:b8:81:5e:bb:9c:24:e0:7e:e2:cb: 395s 9c:c7:01:11:11:e9:11:2a:a8:d2:8d:de:10:43:ac: 395s 9e:e4:5a:3b:3c:1d:02:9d:0a:4b:7a:7d:ca:11:bc: 395s a4:29:73:7c:00:3c:7f:30:41 395s Exponent: 65537 (0x10001) 395s X509v3 extensions: 395s X509v3 Authority Key Identifier: 395s 45:E0:C3:E1:3A:E0:9B:CD:DD:20:F7:3F:52:AB:59:04:57:EF:2F:A3 395s X509v3 Basic Constraints: 395s CA:FALSE 395s Netscape Cert Type: 395s SSL Client, S/MIME 395s Netscape Comment: 395s Test Organization Sub Intermediate CA trusted Certificate 395s X509v3 Subject Key Identifier: 395s 6E:66:4D:15:EB:5E:66:11:17:D1:E3:3B:AC:B3:F7:54:C8:22:F1:55 395s X509v3 Key Usage: critical 395s Digital Signature, Non Repudiation, Key Encipherment 395s X509v3 Extended Key Usage: 395s TLS Web Client Authentication, E-mail Protection 395s X509v3 Subject Alternative Name: 395s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 395s Signature Algorithm: sha256WithRSAEncryption 395s Signature Value: 395s 45:d2:46:cb:9c:a5:85:25:94:6b:ee:30:1c:88:96:cf:5c:12: 395s ab:4f:69:f7:ea:6a:44:4e:7e:03:7e:09:25:6a:97:0b:a5:32: 395s 31:b9:ed:fc:44:6e:b8:d6:b1:9e:1d:82:30:bd:08:e8:58:61: 395s 72:16:fc:15:29:f4:77:d0:81:72:b6:e8:59:e8:3d:9e:4a:9b: 395s c4:ca:c8:5f:50:44:5d:ca:ae:f4:a2:31:6d:e7:30:60:34:47: 395s 5c:22:4e:63:fd:f1:51:a8:bc:b4:66:0c:89:ae:44:97:e5:95: 395s e9:7d:19:f8:12:09:53:45:03:a2:45:7b:12:30:2f:fd:bd:68: 395s 71:87 395s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-OnwLCh/SSSD-child-8274-auth.pem 395s + found_md5=Modulus=B4A9668234E948817ED45E0CD4A5DEA3D64262F3007FE41D09C52738CD5A66F73339362E471DA0060D93AE4467B96F09794F4C33445CCC069D07B235158CDEE0952F249E5A8197CB39D04B5D6FB03AB8815EBB9C24E07EE2CB9CC7011111E9112AA8D28DDE1043AC9EE45A3B3C1D029D0A4B7A7DCA11BCA429737C003C7F3041 395s + '[' Modulus=B4A9668234E948817ED45E0CD4A5DEA3D64262F3007FE41D09C52738CD5A66F73339362E471DA0060D93AE4467B96F09794F4C33445CCC069D07B235158CDEE0952F249E5A8197CB39D04B5D6FB03AB8815EBB9C24E07EE2CB9CC7011111E9112AA8D28DDE1043AC9EE45A3B3C1D029D0A4B7A7DCA11BCA429737C003C7F3041 '!=' Modulus=B4A9668234E948817ED45E0CD4A5DEA3D64262F3007FE41D09C52738CD5A66F73339362E471DA0060D93AE4467B96F09794F4C33445CCC069D07B235158CDEE0952F249E5A8197CB39D04B5D6FB03AB8815EBB9C24E07EE2CB9CC7011111E9112AA8D28DDE1043AC9EE45A3B3C1D029D0A4B7A7DCA11BCA429737C003C7F3041 ']' 395s + valid_certificate /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-10509 /tmp/sssd-softhsm2-OnwLCh/test-intermediate-sub-chain-CA.pem partial_chain 395s + check_certificate /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-10509 /tmp/sssd-softhsm2-OnwLCh/test-intermediate-sub-chain-CA.pem partial_chain 395s + local certificate=/tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-trusted-certificate-0001.pem 395s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-10509 395s + local key_ring=/tmp/sssd-softhsm2-OnwLCh/test-intermediate-sub-chain-CA.pem 395s + local verify_option=partial_chain 395s + prepare_softhsm2_card /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-10509 395s + local certificate=/tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-trusted-certificate-0001.pem 395s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-10509 395s + local key_cn 395s + local key_name 395s + local tokens_dir 395s + local output_cert_file 395s + token_name= 395s ++ basename /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 395s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 395s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-trusted-certificate-0001.pem 395s ++ sed -n 's/ *commonName *= //p' 395s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 395s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 395s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-OnwLCh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 395s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-OnwLCh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 395s ++ basename /tmp/sssd-softhsm2-OnwLCh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 395s + tokens_dir=/tmp/sssd-softhsm2-OnwLCh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 395s + token_name='Test Organization Sub Int Token' 395s + '[' '!' -e /tmp/sssd-softhsm2-OnwLCh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 395s + '[' '!' -d /tmp/sssd-softhsm2-OnwLCh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 395s + echo 'Test Organization Sub Int Token' 395s Test Organization Sub Int Token 395s + '[' -n partial_chain ']' 395s + local verify_arg=--verify=partial_chain 395s + local output_base_name=SSSD-child-29854 395s + local output_file=/tmp/sssd-softhsm2-OnwLCh/SSSD-child-29854.output 395s + output_cert_file=/tmp/sssd-softhsm2-OnwLCh/SSSD-child-29854.pem 395s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-OnwLCh/test-intermediate-sub-chain-CA.pem 395s [p11_child[3571]] [main] (0x0400): p11_child started. 395s [p11_child[3571]] [main] (0x2000): Running in [pre-auth] mode. 395s [p11_child[3571]] [main] (0x2000): Running with effective IDs: [0][0]. 395s [p11_child[3571]] [main] (0x2000): Running with real IDs [0][0]. 395s [p11_child[3571]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 395s [p11_child[3571]] [do_card] (0x4000): Module List: 395s [p11_child[3571]] [do_card] (0x4000): common name: [softhsm2]. 395s [p11_child[3571]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 395s [p11_child[3571]] [do_card] (0x4000): Description [SoftHSM slot ID 0x8de8629] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 395s [p11_child[3571]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 395s [p11_child[3571]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x8de8629][148801065] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 395s [p11_child[3571]] [do_card] (0x4000): Login NOT required. 395s [p11_child[3571]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 395s [p11_child[3571]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 395s [p11_child[3571]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Sub Int Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 395s [p11_child[3571]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x8de8629;slot-manufacturer=SoftHSM%20project;slot-id=148801065;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=30577e6308de8629;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 395s [p11_child[3571]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 395s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-OnwLCh/SSSD-child-29854.output 395s + echo '-----BEGIN CERTIFICATE-----' 395s + tail -n1 /tmp/sssd-softhsm2-OnwLCh/SSSD-child-29854.output 395s + echo '-----END CERTIFICATE-----' 395s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-OnwLCh/SSSD-child-29854.pem 395s Certificate: 395s Data: 395s Version: 3 (0x2) 395s Serial Number: 5 (0x5) 395s Signature Algorithm: sha256WithRSAEncryption 395s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 395s Validity 395s Not Before: Mar 20 04:14:03 2024 GMT 395s Not After : Mar 20 04:14:03 2025 GMT 395s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 395s Subject Public Key Info: 395s Public Key Algorithm: rsaEncryption 395s Public-Key: (1024 bit) 395s Modulus: 395s 00:b4:a9:66:82:34:e9:48:81:7e:d4:5e:0c:d4:a5: 395s de:a3:d6:42:62:f3:00:7f:e4:1d:09:c5:27:38:cd: 395s 5a:66:f7:33:39:36:2e:47:1d:a0:06:0d:93:ae:44: 395s 67:b9:6f:09:79:4f:4c:33:44:5c:cc:06:9d:07:b2: 395s 35:15:8c:de:e0:95:2f:24:9e:5a:81:97:cb:39:d0: 395s 4b:5d:6f:b0:3a:b8:81:5e:bb:9c:24:e0:7e:e2:cb: 395s 9c:c7:01:11:11:e9:11:2a:a8:d2:8d:de:10:43:ac: 395s 9e:e4:5a:3b:3c:1d:02:9d:0a:4b:7a:7d:ca:11:bc: 395s a4:29:73:7c:00:3c:7f:30:41 395s Exponent: 65537 (0x10001) 395s X509v3 extensions: 395s X509v3 Authority Key Identifier: 395s 45:E0:C3:E1:3A:E0:9B:CD:DD:20:F7:3F:52:AB:59:04:57:EF:2F:A3 395s X509v3 Basic Constraints: 395s CA:FALSE 395s Netscape Cert Type: 395s SSL Client, S/MIME 395s Netscape Comment: 395s Test Organization Sub Intermediate CA trusted Certificate 395s X509v3 Subject Key Identifier: 395s 6E:66:4D:15:EB:5E:66:11:17:D1:E3:3B:AC:B3:F7:54:C8:22:F1:55 395s X509v3 Key Usage: critical 395s Digital Signature, Non Repudiation, Key Encipherment 395s X509v3 Extended Key Usage: 395s TLS Web Client Authentication, E-mail Protection 395s X509v3 Subject Alternative Name: 395s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 395s Signature Algorithm: sha256WithRSAEncryption 395s Signature Value: 395s 45:d2:46:cb:9c:a5:85:25:94:6b:ee:30:1c:88:96:cf:5c:12: 395s ab:4f:69:f7:ea:6a:44:4e:7e:03:7e:09:25:6a:97:0b:a5:32: 395s 31:b9:ed:fc:44:6e:b8:d6:b1:9e:1d:82:30:bd:08:e8:58:61: 395s 72:16:fc:15:29:f4:77:d0:81:72:b6:e8:59:e8:3d:9e:4a:9b: 395s c4:ca:c8:5f:50:44:5d:ca:ae:f4:a2:31:6d:e7:30:60:34:47: 395s 5c:22:4e:63:fd:f1:51:a8:bc:b4:66:0c:89:ae:44:97:e5:95: 395s e9:7d:19:f8:12:09:53:45:03:a2:45:7b:12:30:2f:fd:bd:68: 395s 71:87 395s + local found_md5 expected_md5 395s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-OnwLCh/test-sub-intermediate-CA-trusted-certificate-0001.pem 396s + expected_md5=Modulus=B4A9668234E948817ED45E0CD4A5DEA3D64262F3007FE41D09C52738CD5A66F73339362E471DA0060D93AE4467B96F09794F4C33445CCC069D07B235158CDEE0952F249E5A8197CB39D04B5D6FB03AB8815EBB9C24E07EE2CB9CC7011111E9112AA8D28DDE1043AC9EE45A3B3C1D029D0A4B7A7DCA11BCA429737C003C7F3041 396s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-OnwLCh/SSSD-child-29854.pem 396s + found_md5=Modulus=B4A9668234E948817ED45E0CD4A5DEA3D64262F3007FE41D09C52738CD5A66F73339362E471DA0060D93AE4467B96F09794F4C33445CCC069D07B235158CDEE0952F249E5A8197CB39D04B5D6FB03AB8815EBB9C24E07EE2CB9CC7011111E9112AA8D28DDE1043AC9EE45A3B3C1D029D0A4B7A7DCA11BCA429737C003C7F3041 396s + '[' Modulus=B4A9668234E948817ED45E0CD4A5DEA3D64262F3007FE41D09C52738CD5A66F73339362E471DA0060D93AE4467B96F09794F4C33445CCC069D07B235158CDEE0952F249E5A8197CB39D04B5D6FB03AB8815EBB9C24E07EE2CB9CC7011111E9112AA8D28DDE1043AC9EE45A3B3C1D029D0A4B7A7DCA11BCA429737C003C7F3041 '!=' Modulus=B4A9668234E948817ED45E0CD4A5DEA3D64262F3007FE41D09C52738CD5A66F73339362E471DA0060D93AE4467B96F09794F4C33445CCC069D07B235158CDEE0952F249E5A8197CB39D04B5D6FB03AB8815EBB9C24E07EE2CB9CC7011111E9112AA8D28DDE1043AC9EE45A3B3C1D029D0A4B7A7DCA11BCA429737C003C7F3041 ']' 396s + output_file=/tmp/sssd-softhsm2-OnwLCh/SSSD-child-29854-auth.output 396s ++ basename /tmp/sssd-softhsm2-OnwLCh/SSSD-child-29854-auth.output .output 396s + output_cert_file=/tmp/sssd-softhsm2-OnwLCh/SSSD-child-29854-auth.pem 396s + echo -n 053350 396s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-OnwLCh/test-intermediate-sub-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Sub Int Token' --module_name /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so 396s [p11_child[3579]] [main] (0x0400): p11_child started. 396s [p11_child[3579]] [main] (0x2000): Running in [auth] mode. 396s [p11_child[3579]] [main] (0x2000): Running with effective IDs: [0][0]. 396s [p11_child[3579]] [main] (0x2000): Running with real IDs [0][0]. 396s [p11_child[3579]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 396s [p11_child[3579]] [do_card] (0x4000): Module List: 396s [p11_child[3579]] [do_card] (0x4000): common name: [softhsm2]. 396s [p11_child[3579]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 396s [p11_child[3579]] [do_card] (0x4000): Description [SoftHSM slot ID 0x8de8629] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 396s [p11_child[3579]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 396s [p11_child[3579]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x8de8629][148801065] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 396s [p11_child[3579]] [do_card] (0x4000): Login required. 396s [p11_child[3579]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 396s [p11_child[3579]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 396s [p11_child[3579]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so Test Organization Sub Int Token Test Organization Sub Int Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 396s [p11_child[3579]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x8de8629;slot-manufacturer=SoftHSM%20project;slot-id=148801065;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=30577e6308de8629;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 396s [p11_child[3579]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 396s [p11_child[3579]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 396s [p11_child[3579]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 396s [p11_child[3579]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 396s [p11_child[3579]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 396s [p11_child[3579]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 396s [p11_child[3579]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 396s [p11_child[3579]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 396s [p11_child[3579]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 396s [p11_child[3579]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 396s [p11_child[3579]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 396s [p11_child[3579]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 396s [p11_child[3579]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 396s [p11_child[3579]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 396s [p11_child[3579]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 396s [p11_child[3579]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 396s [p11_child[3579]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 396s [p11_child[3579]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 396s [p11_child[3579]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 396s [p11_child[3579]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 396s [p11_child[3579]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 396s [p11_child[3579]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 396s [p11_child[3579]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 396s [p11_child[3579]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 396s [p11_child[3579]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 396s [p11_child[3579]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 396s [p11_child[3579]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 396s [p11_child[3579]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 396s [p11_child[3579]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 396s [p11_child[3579]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 396s [p11_child[3579]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 396s [p11_child[3579]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 396s [p11_child[3579]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 396s [p11_child[3579]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 396s [p11_child[3579]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 396s [p11_child[3579]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 396s [p11_child[3579]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 396s [p11_child[3579]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 396s [p11_child[3579]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 396s [p11_child[3579]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 396s [p11_child[3579]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 396s [p11_child[3579]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 396s [p11_child[3579]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 396s [p11_child[3579]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 396s [p11_child[3579]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 396s [p11_child[3579]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 396s [p11_child[3579]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 396s [p11_child[3579]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 396s [p11_child[3579]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 396s [p11_child[3579]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 396s [p11_child[3579]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 396s [p11_child[3579]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 396s [p11_child[3579]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 396s [p11_child[3579]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 396s [p11_child[3579]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 396s [p11_child[3579]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 396s [p11_child[3579]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 396s [p11_child[3579]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 396s [p11_child[3579]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 396s [p11_child[3579]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 396s [p11_child[3579]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 396s [p11_child[3579]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 396s [p11_child[3579]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 396s [p11_child[3579]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 396s [p11_child[3579]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 396s [p11_child[3579]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 396s [p11_child[3579]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 396s [p11_child[3579]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 396s [p11_child[3579]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 396s [p11_child[3579]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 396s [p11_child[3579]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 396s [p11_child[3579]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 396s [p11_child[3579]] [do_card] (0x4000): Certificate verified and validated. 396s [p11_child[3579]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 396s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-OnwLCh/SSSD-child-29854-auth.output 396s + echo '-----BEGIN CERTIFICATE-----' 396s + tail -n1 /tmp/sssd-softhsm2-OnwLCh/SSSD-child-29854-auth.output 396s + echo '-----END CERTIFICATE-----' 396s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-OnwLCh/SSSD-child-29854-auth.pem 396s Certificate: 396s Data: 396s Version: 3 (0x2) 396s Serial Number: 5 (0x5) 396s Signature Algorithm: sha256WithRSAEncryption 396s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 396s Validity 396s Not Before: Mar 20 04:14:03 2024 GMT 396s Not After : Mar 20 04:14:03 2025 GMT 396s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 396s Subject Public Key Info: 396s Public Key Algorithm: rsaEncryption 396s Public-Key: (1024 bit) 396s Modulus: 396s 00:b4:a9:66:82:34:e9:48:81:7e:d4:5e:0c:d4:a5: 396s de:a3:d6:42:62:f3:00:7f:e4:1d:09:c5:27:38:cd: 396s 5a:66:f7:33:39:36:2e:47:1d:a0:06:0d:93:ae:44: 396s 67:b9:6f:09:79:4f:4c:33:44:5c:cc:06:9d:07:b2: 396s 35:15:8c:de:e0:95:2f:24:9e:5a:81:97:cb:39:d0: 396s 4b:5d:6f:b0:3a:b8:81:5e:bb:9c:24:e0:7e:e2:cb: 396s 9c:c7:01:11:11:e9:11:2a:a8:d2:8d:de:10:43:ac: 396s 9e:e4:5a:3b:3c:1d:02:9d:0a:4b:7a:7d:ca:11:bc: 396s a4:29:73:7c:00:3c:7f:30:41 396s Exponent: 65537 (0x10001) 396s X509v3 extensions: 396s X509v3 Authority Key Identifier: 396s 45:E0:C3:E1:3A:E0:9B:CD:DD:20:F7:3F:52:AB:59:04:57:EF:2F:A3 396s X509v3 Basic Constraints: 396s CA:FALSE 396s Netscape Cert Type: 396s SSL Client, S/MIME 396s Netscape Comment: 396s Test Organization Sub Intermediate CA trusted Certificate 396s X509v3 Subject Key Identifier: 396s 6E:66:4D:15:EB:5E:66:11:17:D1:E3:3B:AC:B3:F7:54:C8:22:F1:55 396s X509v3 Key Usage: critical 396s Digital Signature, Non Repudiation, Key Encipherment 396s X509v3 Extended Key Usage: 396s TLS Web Client Authentication, E-mail Protection 396s X509v3 Subject Alternative Name: 396s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 396s Signature Algorithm: sha256WithRSAEncryption 396s Signature Value: 396s 45:d2:46:cb:9c:a5:85:25:94:6b:ee:30:1c:88:96:cf:5c:12: 396s ab:4f:69:f7:ea:6a:44:4e:7e:03:7e:09:25:6a:97:0b:a5:32: 396s 31:b9:ed:fc:44:6e:b8:d6:b1:9e:1d:82:30:bd:08:e8:58:61: 396s 72:16:fc:15:29:f4:77:d0:81:72:b6:e8:59:e8:3d:9e:4a:9b: 396s c4:ca:c8:5f:50:44:5d:ca:ae:f4:a2:31:6d:e7:30:60:34:47: 396s 5c:22:4e:63:fd:f1:51:a8:bc:b4:66:0c:89:ae:44:97:e5:95: 396s e9:7d:19:f8:12:09:53:45:03:a2:45:7b:12:30:2f:fd:bd:68: 396s 71:87 396s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-OnwLCh/SSSD-child-29854-auth.pem 396s + found_md5=Modulus=B4A9668234E948817ED45E0CD4A5DEA3D64262F3007FE41D09C52738CD5A66F73339362E471DA0060D93AE4467B96F09794F4C33445CCC069D07B235158CDEE0952F249E5A8197CB39D04B5D6FB03AB8815EBB9C24E07EE2CB9CC7011111E9112AA8D28DDE1043AC9EE45A3B3C1D029D0A4B7A7DCA11BCA429737C003C7F3041 396s + '[' Modulus=B4A9668234E948817ED45E0CD4A5DEA3D64262F3007FE41D09C52738CD5A66F73339362E471DA0060D93AE4467B96F09794F4C33445CCC069D07B235158CDEE0952F249E5A8197CB39D04B5D6FB03AB8815EBB9C24E07EE2CB9CC7011111E9112AA8D28DDE1043AC9EE45A3B3C1D029D0A4B7A7DCA11BCA429737C003C7F3041 '!=' Modulus=B4A9668234E948817ED45E0CD4A5DEA3D64262F3007FE41D09C52738CD5A66F73339362E471DA0060D93AE4467B96F09794F4C33445CCC069D07B235158CDEE0952F249E5A8197CB39D04B5D6FB03AB8815EBB9C24E07EE2CB9CC7011111E9112AA8D28DDE1043AC9EE45A3B3C1D029D0A4B7A7DCA11BCA429737C003C7F3041 ']' 396s + set +x 396s 396s Test completed, Root CA and intermediate issued certificates verified! 396s autopkgtest [04:14:10]: test sssd-softhism2-certificates-tests.sh: -----------------------] 397s sssd-softhism2-certificates-tests.sh PASS 397s autopkgtest [04:14:11]: test sssd-softhism2-certificates-tests.sh: - - - - - - - - - - results - - - - - - - - - - 397s autopkgtest [04:14:11]: test sssd-smart-card-pam-auth-configs: preparing testbed 398s Reading package lists... 398s Building dependency tree... 398s Reading state information... 399s Starting pkgProblemResolver with broken count: 0 399s Starting 2 pkgProblemResolver with broken count: 0 399s Done 399s The following additional packages will be installed: 399s pamtester 399s The following NEW packages will be installed: 399s autopkgtest-satdep pamtester 399s 0 upgraded, 2 newly installed, 0 to remove and 237 not upgraded. 399s Need to get 14.6 kB/15.4 kB of archives. 399s After this operation, 86.0 kB of additional disk space will be used. 399s Get:1 /tmp/autopkgtest.wAitdz/4-autopkgtest-satdep.deb autopkgtest-satdep ppc64el 0 [764 B] 399s Get:2 http://ftpmaster.internal/ubuntu noble/universe ppc64el pamtester ppc64el 0.1.2-4 [14.6 kB] 399s Fetched 14.6 kB in 0s (68.4 kB/s) 399s Selecting previously unselected package pamtester. 399s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 70728 files and directories currently installed.) 399s Preparing to unpack .../pamtester_0.1.2-4_ppc64el.deb ... 399s Unpacking pamtester (0.1.2-4) ... 400s Selecting previously unselected package autopkgtest-satdep. 400s Preparing to unpack .../4-autopkgtest-satdep.deb ... 400s Unpacking autopkgtest-satdep (0) ... 400s Setting up pamtester (0.1.2-4) ... 400s Setting up autopkgtest-satdep (0) ... 400s Processing triggers for man-db (2.12.0-3) ... 402s (Reading database ... 70734 files and directories currently installed.) 402s Removing autopkgtest-satdep (0) ... 403s autopkgtest [04:14:17]: test sssd-smart-card-pam-auth-configs: env OFFLINE_MODE=1 bash debian/tests/sssd-smart-card-pam-auth-configs-tester.sh 403s autopkgtest [04:14:17]: test sssd-smart-card-pam-auth-configs: [----------------------- 403s + '[' -z ubuntu ']' 403s + export DEBIAN_FRONTEND=noninteractive 403s + DEBIAN_FRONTEND=noninteractive 403s + required_tools=(pamtester softhsm2-util sssd) 403s + [[ ! -v OFFLINE_MODE ]] 403s + for cmd in "${required_tools[@]}" 403s + command -v pamtester 403s + for cmd in "${required_tools[@]}" 403s + command -v softhsm2-util 403s + for cmd in "${required_tools[@]}" 403s + command -v sssd 403s + PIN=123456 403s ++ mktemp -d -t sssd-softhsm2-certs-XXXXXX 403s + tmpdir=/tmp/sssd-softhsm2-certs-is1S7D 403s + backupsdir= 403s + alternative_pam_configs=(sss-smart-card-optional sss-smart-card-required) 403s + declare -a restore_paths 403s + declare -a delete_paths 403s + trap handle_exit EXIT 403s ++ dirname debian/tests/sssd-smart-card-pam-auth-configs-tester.sh 403s + tester=debian/tests/sssd-softhism2-certificates-tests.sh 403s + '[' '!' -e debian/tests/sssd-softhism2-certificates-tests.sh ']' 403s + '[' '!' -e debian/tests/sssd-softhism2-certificates-tests.sh ']' 403s + export PIN TEST_TMPDIR=/tmp/sssd-softhsm2-certs-is1S7D GENERATE_SMART_CARDS=1 KEEP_TEMPORARY_FILES=1 NO_SSSD_TESTS=1 403s + TEST_TMPDIR=/tmp/sssd-softhsm2-certs-is1S7D 403s + GENERATE_SMART_CARDS=1 403s + KEEP_TEMPORARY_FILES=1 403s + NO_SSSD_TESTS=1 403s + bash debian/tests/sssd-softhism2-certificates-tests.sh 403s + '[' -z ubuntu ']' 403s + required_tools=(p11tool openssl softhsm2-util) 403s + for cmd in "${required_tools[@]}" 403s + command -v p11tool 403s + for cmd in "${required_tools[@]}" 403s + command -v openssl 403s + for cmd in "${required_tools[@]}" 403s + command -v softhsm2-util 403s + PIN=123456 403s +++ find /usr/lib/softhsm/libsofthsm2.so 403s +++ head -n 1 403s ++ realpath /usr/lib/softhsm/libsofthsm2.so 403s + SOFTHSM2_MODULE=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so 403s + SSSD_P11_CHILD=/usr/libexec/sssd/p11_child 403s + TOKEN_ID=00112233445566778899FFAABBCCDDEEFF012345 403s + '[' '!' -v NO_SSSD_TESTS ']' 403s + '[' '!' -e /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so ']' 403s + tmpdir=/tmp/sssd-softhsm2-certs-is1S7D 403s + keys_size=1024 403s + [[ ! -v KEEP_TEMPORARY_FILES ]] 403s + trap 'set +x; echo -e "\nUnexpected failure!!!"' ERR 403s + echo -n 01 403s + touch /tmp/sssd-softhsm2-certs-is1S7D/index.txt 403s + mkdir -p /tmp/sssd-softhsm2-certs-is1S7D/new_certs 403s + cat 403s + root_ca_key_pass=pass:random-root-CA-password-2798 403s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-certs-is1S7D/test-root-CA-key.pem -passout pass:random-root-CA-password-2798 1024 403s + openssl req -passin pass:random-root-CA-password-2798 -batch -config /tmp/sssd-softhsm2-certs-is1S7D/test-root-CA.config -x509 -new -nodes -key /tmp/sssd-softhsm2-certs-is1S7D/test-root-CA-key.pem -sha256 -days 1024 -set_serial 0 -extensions v3_ca -out /tmp/sssd-softhsm2-certs-is1S7D/test-root-CA.pem 403s + openssl x509 -noout -in /tmp/sssd-softhsm2-certs-is1S7D/test-root-CA.pem 403s + cat 403s + intermediate_ca_key_pass=pass:random-intermediate-CA-password-28739 403s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-certs-is1S7D/test-intermediate-CA-key.pem -passout pass:random-intermediate-CA-password-28739 1024 403s + openssl req -batch -new -nodes -passin pass:random-intermediate-CA-password-28739 -config /tmp/sssd-softhsm2-certs-is1S7D/test-intermediate-CA.config -key /tmp/sssd-softhsm2-certs-is1S7D/test-intermediate-CA-key.pem -passout pass:random-root-CA-password-2798 -sha256 -extensions v3_ca -out /tmp/sssd-softhsm2-certs-is1S7D/test-intermediate-CA-certificate-request.pem 403s + openssl req -text -noout -in /tmp/sssd-softhsm2-certs-is1S7D/test-intermediate-CA-certificate-request.pem 403s Certificate Request: 403s Data: 403s Version: 1 (0x0) 403s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 403s Subject Public Key Info: 403s Public Key Algorithm: rsaEncryption 403s Public-Key: (1024 bit) 403s Modulus: 403s 00:e1:df:6e:bf:ca:da:ce:2e:b0:54:b8:14:35:ee: 403s 6a:90:25:e6:27:5a:bf:0b:a1:e4:b1:5a:b8:bf:c9: 403s 6c:7c:64:1b:50:97:b1:3f:43:3e:08:e0:37:e9:64: 403s c2:1c:e6:2d:4c:a7:df:e2:2d:73:c6:82:50:63:97: 403s 3b:f1:3e:0a:04:a3:23:f4:77:d4:38:f2:8a:c1:1e: 403s ee:c6:29:c7:cf:e8:d6:47:7c:4e:b3:63:e7:dc:02: 403s f8:e7:5a:de:b8:57:3a:af:b7:24:9c:75:86:77:5b: 403s ed:01:b6:b0:64:10:e1:3b:e5:b8:a3:81:6d:a7:06: 403s 38:69:9d:a6:b2:25:7c:0f:6d 403s Exponent: 65537 (0x10001) 403s Attributes: 403s (none) 403s Requested Extensions: 403s Signature Algorithm: sha256WithRSAEncryption 403s Signature Value: 403s 8c:a2:7c:84:1f:1c:21:27:6b:2b:3b:a9:d8:d0:53:40:f7:26: 403s a1:33:9a:31:25:2d:4a:5a:c2:87:8c:93:fd:d3:46:30:06:dd: 403s 5c:c4:42:6e:ad:3a:91:ce:84:17:3a:c7:13:88:76:bc:c1:97: 403s 31:91:16:4d:99:32:7c:32:ec:3c:8a:77:69:9e:ad:49:49:af: 403s 50:54:30:d2:83:b4:b1:f5:a7:67:ab:94:bb:e5:fa:f9:2d:be: 403s b4:eb:a7:94:57:e8:ff:97:7f:dc:64:f8:97:06:10:95:3e:7a: 403s 54:0d:97:88:3d:1e:6b:78:53:2f:24:82:bd:a7:9c:71:7d:08: 403s dd:16 403s + openssl ca -batch -notext -config /tmp/sssd-softhsm2-certs-is1S7D/test-root-CA.config -passin pass:random-root-CA-password-2798 -keyfile /tmp/sssd-softhsm2-certs-is1S7D/test-root-CA-key.pem -in /tmp/sssd-softhsm2-certs-is1S7D/test-intermediate-CA-certificate-request.pem -days 365 -extensions v3_intermediate_ca -out /tmp/sssd-softhsm2-certs-is1S7D/test-intermediate-CA.pem 403s Using configuration from /tmp/sssd-softhsm2-certs-is1S7D/test-root-CA.config 403s Check that the request matches the signature 403s Signature ok 403s Certificate Details: 403s Serial Number: 1 (0x1) 403s Validity 403s Not Before: Mar 20 04:14:17 2024 GMT 403s Not After : Mar 20 04:14:17 2025 GMT 403s Subject: 403s organizationName = Test Organization 403s organizationalUnitName = Test Organization Unit 403s commonName = Test Organization Intermediate CA 403s X509v3 extensions: 403s X509v3 Subject Key Identifier: 403s 43:1A:85:F5:E6:AF:30:D0:33:50:19:01:C2:3E:47:D5:B9:99:24:D2 403s X509v3 Authority Key Identifier: 403s keyid:58:EA:58:CE:0E:6F:0D:33:10:07:14:F8:A1:DD:B8:27:94:2D:68:9D 403s DirName:/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root CA 403s serial:00 403s X509v3 Basic Constraints: 403s CA:TRUE 403s X509v3 Key Usage: critical 403s Digital Signature, Certificate Sign, CRL Sign 403s Certificate is to be certified until Mar 20 04:14:17 2025 GMT (365 days) 403s 403s Write out database with 1 new entries 403s Database updated 403s + openssl x509 -noout -in /tmp/sssd-softhsm2-certs-is1S7D/test-intermediate-CA.pem 403s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-is1S7D/test-root-CA.pem /tmp/sssd-softhsm2-certs-is1S7D/test-intermediate-CA.pem 403s /tmp/sssd-softhsm2-certs-is1S7D/test-intermediate-CA.pem: OK 403s + cat 403s + sub_intermediate_ca_key_pass=pass:random-sub-intermediate-CA-password-2575 403s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-certs-is1S7D/test-sub-intermediate-CA-key.pem -passout pass:random-sub-intermediate-CA-password-2575 1024 403s + openssl req -batch -new -nodes -passin pass:random-sub-intermediate-CA-password-2575 -config /tmp/sssd-softhsm2-certs-is1S7D/test-sub-intermediate-CA.config -key /tmp/sssd-softhsm2-certs-is1S7D/test-sub-intermediate-CA-key.pem -passout pass:random-intermediate-CA-password-28739 -sha256 -extensions v3_ca -out /tmp/sssd-softhsm2-certs-is1S7D/test-sub-intermediate-CA-certificate-request.pem 403s + openssl req -text -noout -in /tmp/sssd-softhsm2-certs-is1S7D/test-sub-intermediate-CA-certificate-request.pem 403s Certificate Request: 403s Data: 403s Version: 1 (0x0) 403s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 403s Subject Public Key Info: 403s Public Key Algorithm: rsaEncryption 403s Public-Key: (1024 bit) 403s Modulus: 403s 00:be:3f:d1:0f:e9:86:96:6b:9c:aa:ed:a9:a5:2d: 403s 62:88:ad:b5:a8:af:65:d8:56:bf:98:65:8a:84:60: 403s 0c:24:05:1f:c1:4c:77:87:0c:61:c2:99:ab:7e:e3: 403s 77:d0:8a:5e:28:65:2e:f2:85:94:9b:ae:b5:2c:9c: 403s d3:a1:31:13:98:fe:24:a0:b3:c4:9f:ac:dc:46:57: 403s c2:39:f8:00:c3:f2:f8:61:70:8b:ec:e6:82:9d:69: 403s 1b:35:36:cb:f9:d3:23:d5:a5:6a:1a:af:8e:a1:8a: 403s 23:92:4e:85:28:b3:85:39:9c:b3:5d:b6:8e:8f:c6: 403s bd:e2:79:3f:67:11:5b:f6:af 403s Exponent: 65537 (0x10001) 403s Attributes: 403s (none) 403s Requested Extensions: 403s Signature Algorithm: sha256WithRSAEncryption 403s Signature Value: 403s 97:96:ae:05:60:d1:8a:0b:48:0a:63:03:bf:9d:24:b0:6d:69: 403s ed:40:82:60:1c:a9:a1:24:d9:d5:21:38:3c:2c:8b:49:17:72: 403s 76:ca:ed:2e:01:50:ce:90:7f:f5:5c:f8:04:e8:61:05:04:09: 403s b7:1e:56:70:55:7d:3d:88:e9:80:df:92:82:46:ef:30:44:57: 403s 1f:a7:17:bd:11:b7:76:9d:13:61:af:7f:f6:1b:a3:f3:23:51: 403s 35:b2:3f:38:51:aa:6b:3b:5a:d7:e6:bb:8d:aa:d2:54:47:3c: 403s 16:4f:f4:e5:79:e9:65:ef:54:19:0e:1a:cc:7e:b2:9a:58:68: 403s 41:04 403s + openssl ca -batch -notext -config /tmp/sssd-softhsm2-certs-is1S7D/test-intermediate-CA.config -passin pass:random-intermediate-CA-password-28739 -keyfile /tmp/sssd-softhsm2-certs-is1S7D/test-intermediate-CA-key.pem -in /tmp/sssd-softhsm2-certs-is1S7D/test-sub-intermediate-CA-certificate-request.pem -days 365 -extensions v3_intermediate_ca -out /tmp/sssd-softhsm2-certs-is1S7D/test-sub-intermediate-CA.pem 403s Using configuration from /tmp/sssd-softhsm2-certs-is1S7D/test-intermediate-CA.config 403s Check that the request matches the signature 403s Signature ok 403s Certificate Details: 403s Serial Number: 2 (0x2) 403s Validity 403s Not Before: Mar 20 04:14:17 2024 GMT 403s Not After : Mar 20 04:14:17 2025 GMT 403s Subject: 403s organizationName = Test Organization 403s organizationalUnitName = Test Organization Unit 403s commonName = Test Organization Sub Intermediate CA 403s X509v3 extensions: 403s X509v3 Subject Key Identifier: 403s B7:E3:ED:0C:97:A9:D3:4F:31:9F:78:E1:5C:5C:F3:80:1F:39:2E:E1 403s X509v3 Authority Key Identifier: 403s keyid:43:1A:85:F5:E6:AF:30:D0:33:50:19:01:C2:3E:47:D5:B9:99:24:D2 403s DirName:/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root CA 403s serial:01 403s X509v3 Basic Constraints: 403s CA:TRUE 403s X509v3 Key Usage: critical 403s Digital Signature, Certificate Sign, CRL Sign 403s Certificate is to be certified until Mar 20 04:14:17 2025 GMT (365 days) 403s 403s Write out database with 1 new entries 403s Database updated 403s + openssl x509 -noout -in /tmp/sssd-softhsm2-certs-is1S7D/test-sub-intermediate-CA.pem 403s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-certs-is1S7D/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-is1S7D/test-sub-intermediate-CA.pem 403s /tmp/sssd-softhsm2-certs-is1S7D/test-sub-intermediate-CA.pem: OK 403s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-certs-is1S7D/test-root-CA.pem /tmp/sssd-softhsm2-certs-is1S7D/test-sub-intermediate-CA.pem 403s + local cmd=openssl 403s + shift 403s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-is1S7D/test-root-CA.pem /tmp/sssd-softhsm2-certs-is1S7D/test-sub-intermediate-CA.pem 403s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 403s error 20 at 0 depth lookup: unable to get local issuer certificate 403s error /tmp/sssd-softhsm2-certs-is1S7D/test-sub-intermediate-CA.pem: verification failed 403s + cat 403s + root_ca_trusted_cert_0001_key_pass=pass:random-root-ca-trusted-cert-0001-31638 403s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-certs-is1S7D/test-root-CA-trusted-certificate-0001-key.pem -passout pass:random-root-ca-trusted-cert-0001-31638 1024 403s + openssl req -new -nodes -reqexts req_exts -passin pass:random-root-ca-trusted-cert-0001-31638 -key /tmp/sssd-softhsm2-certs-is1S7D/test-root-CA-trusted-certificate-0001-key.pem -config /tmp/sssd-softhsm2-certs-is1S7D/test-root-CA-trusted-certificate-0001.config -out /tmp/sssd-softhsm2-certs-is1S7D/test-root-CA-trusted-certificate-0001-request.pem 403s + openssl req -text -noout -in /tmp/sssd-softhsm2-certs-is1S7D/test-root-CA-trusted-certificate-0001-request.pem 403s + openssl ca -batch -notext -config /tmp/sssd-softhsm2-certs-is1S7D/test-root-CA.config -passin pass:random-root-CA-password-2798 -keyfile /tmp/sssd-softhsm2-certs-is1S7D/test-root-CA-key.pem -in /tmp/sssd-softhsm2-certs-is1S7D/test-root-CA-trusted-certificate-0001-request.pem -days 365 -extensions usr_cert -out /tmp/sssd-softhsm2-certs-is1S7D/test-root-CA-trusted-certificate-0001.pem 403s Certificate Request: 403s Data: 403s Version: 1 (0x0) 403s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 403s Subject Public Key Info: 403s Public Key Algorithm: rsaEncryption 403s Public-Key: (1024 bit) 403s Modulus: 403s 00:b4:fb:f8:37:9b:fb:6d:ea:a0:97:30:d1:39:1d: 403s e7:89:bc:4c:d9:c9:2b:7e:9b:7a:03:87:8b:f1:df: 403s fd:aa:34:73:08:a0:f0:6a:b4:88:69:7b:24:11:2d: 403s c0:f0:bf:70:68:1d:31:39:16:b1:5c:2c:48:7e:92: 403s 85:d1:29:13:c0:dd:05:c6:27:71:79:f0:2b:97:21: 403s 34:d8:c3:83:61:40:c4:23:62:f7:77:81:20:48:49: 403s be:4d:9f:fd:cf:ce:55:7e:bb:26:e8:95:af:0f:de: 403s d6:12:dd:5b:17:48:43:94:dd:d3:8c:85:5f:51:bd: 403s bf:d7:86:db:ef:06:18:b3:45 403s Exponent: 65537 (0x10001) 403s Attributes: 403s Requested Extensions: 403s X509v3 Basic Constraints: 403s CA:FALSE 403s Netscape Cert Type: 403s SSL Client, S/MIME 403s Netscape Comment: 403s Test Organization Root CA trusted Certificate 403s X509v3 Subject Key Identifier: 403s A5:91:C4:C4:09:F6:9C:8F:C5:B7:B4:2B:56:C6:32:C8:60:6C:80:42 403s X509v3 Key Usage: critical 403s Digital Signature, Non Repudiation, Key Encipherment 403s X509v3 Extended Key Usage: 403s TLS Web Client Authentication, E-mail Protection 403s X509v3 Subject Alternative Name: 403s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 403s Signature Algorithm: sha256WithRSAEncryption 403s Signature Value: 403s 7b:01:74:19:00:77:a3:88:44:19:fe:c7:ff:2f:63:b8:63:2a: 403s cc:5e:e7:b6:28:bf:ab:64:e8:1e:f9:6f:19:41:2b:80:ad:61: 403s 0d:2c:67:9c:6d:95:0f:23:9a:e7:a2:c3:5d:51:92:ec:4e:16: 403s 43:06:95:93:49:fd:0a:a9:93:ee:ec:0b:43:c4:d3:48:43:7c: 403s 85:e7:00:b3:18:92:61:d5:18:5b:e7:65:a6:b2:96:df:8c:20: 403s 5a:83:83:12:ac:47:ea:b5:0f:34:69:d8:b3:32:e5:89:9d:00: 403s a6:74:59:df:72:28:1f:9c:57:4a:04:0c:44:a0:60:82:d1:f2: 403s d1:f8 403s Using configuration from /tmp/sssd-softhsm2-certs-is1S7D/test-root-CA.config 403s Check that the request matches the signature 403s Signature ok 403s Certificate Details: 403s Serial Number: 3 (0x3) 403s Validity 403s Not Before: Mar 20 04:14:17 2024 GMT 403s Not After : Mar 20 04:14:17 2025 GMT 403s Subject: 403s organizationName = Test Organization 403s organizationalUnitName = Test Organization Unit 403s commonName = Test Organization Root Trusted Certificate 0001 403s X509v3 extensions: 403s X509v3 Authority Key Identifier: 403s 58:EA:58:CE:0E:6F:0D:33:10:07:14:F8:A1:DD:B8:27:94:2D:68:9D 403s X509v3 Basic Constraints: 403s CA:FALSE 403s Netscape Cert Type: 403s SSL Client, S/MIME 403s Netscape Comment: 403s Test Organization Root CA trusted Certificate 403s X509v3 Subject Key Identifier: 403s A5:91:C4:C4:09:F6:9C:8F:C5:B7:B4:2B:56:C6:32:C8:60:6C:80:42 403s X509v3 Key Usage: critical 403s Digital Signature, Non Repudiation, Key Encipherment 403s X509v3 Extended Key Usage: 403s TLS Web Client Authentication, E-mail Protection 403s X509v3 Subject Alternative Name: 403s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 403s Certificate is to be certified until Mar 20 04:14:17 2025 GMT (365 days) 403s 403s Write out database with 1 new entries 403s Database updated 403s + openssl x509 -noout -in /tmp/sssd-softhsm2-certs-is1S7D/test-root-CA-trusted-certificate-0001.pem 403s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-is1S7D/test-root-CA.pem /tmp/sssd-softhsm2-certs-is1S7D/test-root-CA-trusted-certificate-0001.pem 403s /tmp/sssd-softhsm2-certs-is1S7D/test-root-CA-trusted-certificate-0001.pem: OK 403s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-certs-is1S7D/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-is1S7D/test-root-CA-trusted-certificate-0001.pem 403s + local cmd=openssl 403s + shift 403s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-is1S7D/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-is1S7D/test-root-CA-trusted-certificate-0001.pem 403s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 403s error 20 at 0 depth lookup: unable to get local issuer certificate 403s error /tmp/sssd-softhsm2-certs-is1S7D/test-root-CA-trusted-certificate-0001.pem: verification failed 403s + cat 403s + intermediate_ca_trusted_cert_0001_key_pass=pass:random-intermediate-ca-trusted-cert-0001-26656 403s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-certs-is1S7D/test-intermediate-CA-trusted-certificate-0001-key.pem -passout pass:random-intermediate-ca-trusted-cert-0001-26656 1024 404s + openssl req -new -nodes -reqexts req_exts -passin pass:random-intermediate-ca-trusted-cert-0001-26656 -key /tmp/sssd-softhsm2-certs-is1S7D/test-intermediate-CA-trusted-certificate-0001-key.pem -config /tmp/sssd-softhsm2-certs-is1S7D/test-intermediate-CA-trusted-certificate-0001.config -out /tmp/sssd-softhsm2-certs-is1S7D/test-intermediate-CA-trusted-certificate-0001-request.pem 404s + openssl req -text -noout -in /tmp/sssd-softhsm2-certs-is1S7D/test-intermediate-CA-trusted-certificate-0001-request.pem 404s Certificate Request: 404s Data: 404s Version: 1 (0x0) 404s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 404s Subject Public Key Info: 404s Public Key Algorithm: rsaEncryption 404s Public-Key: (1024 bit) 404s Modulus: 404s 00:b1:31:37:08:16:90:95:31:7a:4d:e5:b2:40:e6: 404s af:89:a0:15:9b:44:1c:1d:bd:48:76:f9:40:78:91: 404s 2b:4e:e3:f3:11:9c:39:6c:96:d6:93:5a:35:6a:8d: 404s 44:3f:36:3a:e6:5a:db:86:41:97:f2:f6:49:7e:59: 404s 44:c1:96:51:64:e3:3b:eb:06:84:34:67:1e:cd:d7: 404s 03:71:d7:95:9b:7e:17:b6:65:13:0e:dd:86:fd:14: 404s 7c:ea:24:dd:5a:f8:68:53:28:fe:30:cb:76:f7:56: 404s 02:87:75:4f:17:00:83:f7:2e:4d:85:08:71:3b:eb: 404s 66:2a:a7:0c:01:e4:9b:cd:2d 404s Exponent: 65537 (0x10001) 404s Attributes: 404s Requested Extensions: 404s X509v3 Basic Constraints: 404s CA:FALSE 404s Netscape Cert Type: 404s SSL Client, S/MIME 404s Netscape Comment: 404s Test Organization Intermediate CA trusted Certificate 404s X509v3 Subject Key Identifier: 404s EE:6C:81:9C:D3:7D:EB:55:C1:A5:E5:18:ED:78:51:90:CA:07:8B:33 404s X509v3 Key Usage: critical 404s Digital Signature, Non Repudiation, Key Encipherment 404s X509v3 Extended Key Usage: 404s TLS Web Client Authentication, E-mail Protection 404s X509v3 Subject Alternative Name: 404s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 404s Signature Algorithm: sha256WithRSAEncryption 404s Signature Value: 404s 14:d5:92:32:b8:13:ca:f5:27:06:67:29:95:0e:76:c5:96:67: 404s 9e:86:d4:74:1c:3e:bb:9f:13:be:bb:e7:de:99:29:98:22:50: 404s 80:4b:78:50:40:e6:59:ec:76:c6:46:cd:07:91:e9:7f:2c:56: 404s 7a:0d:7c:57:c9:ae:82:d9:7e:c6:a0:76:2d:ff:10:36:3c:41: 404s c7:b9:7c:ee:bf:d9:47:14:7f:dd:c2:e1:f8:70:3a:64:ec:04: 404s 32:7e:c1:f5:6b:6a:9a:c0:bb:b8:75:b1:f8:43:fc:1d:a8:ca: 404s ec:13:96:f2:fe:a0:5e:79:8b:29:db:aa:b3:c0:98:54:a4:ce: 404s 20:af 404s + openssl ca -passin pass:random-intermediate-CA-password-28739 -config /tmp/sssd-softhsm2-certs-is1S7D/test-intermediate-CA.config -batch -notext -keyfile /tmp/sssd-softhsm2-certs-is1S7D/test-intermediate-CA-key.pem -in /tmp/sssd-softhsm2-certs-is1S7D/test-intermediate-CA-trusted-certificate-0001-request.pem -days 365 -extensions usr_cert -out /tmp/sssd-softhsm2-certs-is1S7D/test-intermediate-CA-trusted-certificate-0001.pem 404s Using configuration from /tmp/sssd-softhsm2-certs-is1S7D/test-intermediate-CA.config 404s Check that the request matches the signature 404s Signature ok 404s Certificate Details: 404s Serial Number: 4 (0x4) 404s Validity 404s Not Before: Mar 20 04:14:18 2024 GMT 404s Not After : Mar 20 04:14:18 2025 GMT 404s Subject: 404s organizationName = Test Organization 404s organizationalUnitName = Test Organization Unit 404s commonName = Test Organization Intermediate Trusted Certificate 0001 404s X509v3 extensions: 404s X509v3 Authority Key Identifier: 404s 43:1A:85:F5:E6:AF:30:D0:33:50:19:01:C2:3E:47:D5:B9:99:24:D2 404s X509v3 Basic Constraints: 404s CA:FALSE 404s Netscape Cert Type: 404s SSL Client, S/MIME 404s Netscape Comment: 404s Test Organization Intermediate CA trusted Certificate 404s X509v3 Subject Key Identifier: 404s EE:6C:81:9C:D3:7D:EB:55:C1:A5:E5:18:ED:78:51:90:CA:07:8B:33 404s X509v3 Key Usage: critical 404s Digital Signature, Non Repudiation, Key Encipherment 404s X509v3 Extended Key Usage: 404s TLS Web Client Authentication, E-mail Protection 404s X509v3 Subject Alternative Name: 404s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 404s Certificate is to be certified until Mar 20 04:14:18 2025 GMT (365 days) 404s 404s Write out database with 1 new entries 404s Database updated 404s + openssl x509 -noout -in /tmp/sssd-softhsm2-certs-is1S7D/test-intermediate-CA-trusted-certificate-0001.pem 404s This certificate should not be trusted fully 404s + echo 'This certificate should not be trusted fully' 404s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-certs-is1S7D/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-is1S7D/test-intermediate-CA-trusted-certificate-0001.pem 404s + local cmd=openssl 404s + shift 404s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-is1S7D/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-is1S7D/test-intermediate-CA-trusted-certificate-0001.pem 404s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 404s error 2 at 1 depth lookup: unable to get issuer certificate 404s error /tmp/sssd-softhsm2-certs-is1S7D/test-intermediate-CA-trusted-certificate-0001.pem: verification failed 404s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-certs-is1S7D/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-is1S7D/test-intermediate-CA-trusted-certificate-0001.pem 404s /tmp/sssd-softhsm2-certs-is1S7D/test-intermediate-CA-trusted-certificate-0001.pem: OK 404s + cat 404s + sub_intermediate_ca_trusted_cert_0001_key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-20111 404s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-certs-is1S7D/test-sub-intermediate-CA-trusted-certificate-0001-key.pem -passout pass:random-sub-intermediate-ca-trusted-cert-0001-20111 1024 404s + openssl req -new -nodes -reqexts req_exts -passin pass:random-sub-intermediate-ca-trusted-cert-0001-20111 -key /tmp/sssd-softhsm2-certs-is1S7D/test-sub-intermediate-CA-trusted-certificate-0001-key.pem -config /tmp/sssd-softhsm2-certs-is1S7D/test-sub-intermediate-CA-trusted-certificate-0001.config -out /tmp/sssd-softhsm2-certs-is1S7D/test-sub-intermediate-CA-trusted-certificate-0001-request.pem 404s + openssl req -text -noout -in /tmp/sssd-softhsm2-certs-is1S7D/test-sub-intermediate-CA-trusted-certificate-0001-request.pem 404s Certificate Request: 404s Data: 404s Version: 1 (0x0) 404s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 404s Subject Public Key Info: 404s Public Key Algorithm: rsaEncryption 404s Public-Key: (1024 bit) 404s Modulus: 404s 00:cd:fe:ae:cb:4a:ac:5c:8e:84:cf:4e:53:81:05: 404s c8:96:39:46:61:f4:51:e5:08:6c:62:34:0f:96:79: 404s 10:2a:cc:ca:e1:aa:f5:12:e7:a6:0f:a1:7f:2e:87: 404s dc:ca:6c:ea:5a:e4:bf:63:58:5a:d8:13:00:2c:b5: 404s df:f2:dc:28:7e:98:12:99:ea:b6:d5:2b:c6:33:c1: 404s c2:5e:6a:27:a2:b3:4e:fc:cb:4a:0a:73:95:77:45: 404s f2:6a:9c:61:9b:51:ad:e8:a1:35:f9:76:13:b0:fe: 404s 87:e6:0c:86:f0:12:e8:bd:e5:ad:b0:a7:87:fd:1d: 404s b6:ba:eb:9a:57:96:b8:5c:27 404s Exponent: 65537 (0x10001) 404s Attributes: 404s Requested Extensions: 404s X509v3 Basic Constraints: 404s CA:FALSE 404s Netscape Cert Type: 404s SSL Client, S/MIME 404s Netscape Comment: 404s Test Organization Sub Intermediate CA trusted Certificate 404s X509v3 Subject Key Identifier: 404s B1:D9:46:E2:CD:C2:E8:DD:97:D4:09:70:56:A2:F7:15:09:31:DD:69 404s X509v3 Key Usage: critical 404s Digital Signature, Non Repudiation, Key Encipherment 404s X509v3 Extended Key Usage: 404s TLS Web Client Authentication, E-mail Protection 404s X509v3 Subject Alternative Name: 404s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 404s Signature Algorithm: sha256WithRSAEncryption 404s Signature Value: 404s 0e:23:d8:4f:e0:04:c8:3c:74:80:2a:c1:69:df:ac:f9:c8:ea: 404s ba:91:43:d1:b3:6c:0a:5e:89:a3:3e:f7:6a:56:36:8d:ff:79: 404s c9:c9:b6:bd:12:9e:b4:1f:4b:0d:4b:26:d4:b1:63:63:18:93: 404s 46:b4:55:1e:f2:b5:8d:1c:47:18:b2:2f:60:ac:3a:c4:d8:78: 404s c4:e7:9f:3f:f2:82:ad:b1:e3:5c:63:21:56:f0:bf:31:ee:e7: 404s 9e:9c:69:f4:70:8e:8d:f7:fe:bd:f1:e0:c2:b1:95:ed:4a:e3: 404s df:06:d9:d0:16:80:16:45:40:39:4a:25:92:b2:2b:a3:26:39: 404s e3:3b 404s + openssl ca -passin pass:random-sub-intermediate-CA-password-2575 -config /tmp/sssd-softhsm2-certs-is1S7D/test-sub-intermediate-CA.config -batch -notext -keyfile /tmp/sssd-softhsm2-certs-is1S7D/test-sub-intermediate-CA-key.pem -in /tmp/sssd-softhsm2-certs-is1S7D/test-sub-intermediate-CA-trusted-certificate-0001-request.pem -days 365 -extensions usr_cert -out /tmp/sssd-softhsm2-certs-is1S7D/test-sub-intermediate-CA-trusted-certificate-0001.pem 404s Using configuration from /tmp/sssd-softhsm2-certs-is1S7D/test-sub-intermediate-CA.config 404s Check that the request matches the signature 404s Signature ok 404s Certificate Details: 404s Serial Number: 5 (0x5) 404s Validity 404s Not Before: Mar 20 04:14:18 2024 GMT 404s Not After : Mar 20 04:14:18 2025 GMT 404s Subject: 404s organizationName = Test Organization 404s organizationalUnitName = Test Organization Unit 404s commonName = Test Organization Sub Intermediate Trusted Certificate 0001 404s X509v3 extensions: 404s X509v3 Authority Key Identifier: 404s B7:E3:ED:0C:97:A9:D3:4F:31:9F:78:E1:5C:5C:F3:80:1F:39:2E:E1 404s X509v3 Basic Constraints: 404s CA:FALSE 404s Netscape Cert Type: 404s SSL Client, S/MIME 404s Netscape Comment: 404s Test Organization Sub Intermediate CA trusted Certificate 404s X509v3 Subject Key Identifier: 404s B1:D9:46:E2:CD:C2:E8:DD:97:D4:09:70:56:A2:F7:15:09:31:DD:69 404s X509v3 Key Usage: critical 404s Digital Signature, Non Repudiation, Key Encipherment 404s X509v3 Extended Key Usage: 404s TLS Web Client Authentication, E-mail Protection 404s X509v3 Subject Alternative Name: 404s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 404s Certificate is to be certified until Mar 20 04:14:18 2025 GMT (365 days) 404s 404s Write out database with 1 new entries 404s Database updated 404s + openssl x509 -noout -in /tmp/sssd-softhsm2-certs-is1S7D/test-sub-intermediate-CA-trusted-certificate-0001.pem 404s + echo 'This certificate should not be trusted fully' 404s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-certs-is1S7D/test-sub-intermediate-CA.pem /tmp/sssd-softhsm2-certs-is1S7D/test-sub-intermediate-CA-trusted-certificate-0001.pem 404s + local cmd=openssl 404s + shift 404s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-is1S7D/test-sub-intermediate-CA.pem /tmp/sssd-softhsm2-certs-is1S7D/test-sub-intermediate-CA-trusted-certificate-0001.pem 404s This certificate should not be trusted fully 404s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 404s error 2 at 1 depth lookup: unable to get issuer certificate 404s error /tmp/sssd-softhsm2-certs-is1S7D/test-sub-intermediate-CA-trusted-certificate-0001.pem: verification failed 404s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-certs-is1S7D/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-is1S7D/test-sub-intermediate-CA-trusted-certificate-0001.pem 404s + local cmd=openssl 404s + shift 404s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-is1S7D/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-is1S7D/test-sub-intermediate-CA-trusted-certificate-0001.pem 404s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 404s error 20 at 0 depth lookup: unable to get local issuer certificate 404s error /tmp/sssd-softhsm2-certs-is1S7D/test-sub-intermediate-CA-trusted-certificate-0001.pem: verification failed 404s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-certs-is1S7D/test-sub-intermediate-CA.pem /tmp/sssd-softhsm2-certs-is1S7D/test-sub-intermediate-CA-trusted-certificate-0001.pem 404s /tmp/sssd-softhsm2-certs-is1S7D/test-sub-intermediate-CA-trusted-certificate-0001.pem: OK 404s + expect_fail openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-certs-is1S7D/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-is1S7D/test-sub-intermediate-CA-trusted-certificate-0001.pem 404s + local cmd=openssl 404s + shift 404s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-certs-is1S7D/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-is1S7D/test-sub-intermediate-CA-trusted-certificate-0001.pem 404s O = TBuilding a the full-chain CA file... 404s est Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 404s error 20 at 0 depth lookup: unable to get local issuer certificate 404s error /tmp/sssd-softhsm2-certs-is1S7D/test-sub-intermediate-CA-trusted-certificate-0001.pem: verification failed 404s + echo 'Building a the full-chain CA file...' 404s + cat /tmp/sssd-softhsm2-certs-is1S7D/test-root-CA.pem /tmp/sssd-softhsm2-certs-is1S7D/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-is1S7D/test-sub-intermediate-CA.pem 404s + cat /tmp/sssd-softhsm2-certs-is1S7D/test-root-CA.pem /tmp/sssd-softhsm2-certs-is1S7D/test-intermediate-CA.pem 404s + cat /tmp/sssd-softhsm2-certs-is1S7D/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-is1S7D/test-sub-intermediate-CA.pem 404s + openssl crl2pkcs7 -nocrl -certfile /tmp/sssd-softhsm2-certs-is1S7D/test-full-chain-CA.pem 404s + openssl pkcs7 -print_certs -noout 404s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-is1S7D/test-full-chain-CA.pem /tmp/sssd-softhsm2-certs-is1S7D/test-intermediate-CA.pem 404s subject=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 404s issuer=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 404s 404s subject=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 404s issuer=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 404s 404s subject=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 404s issuer=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 404s 404s /tmp/sssd-softhsm2-certs-is1S7D/test-intermediate-CA.pem: OK 404s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-is1S7D/test-full-chain-CA.pem /tmp/sssd-softhsm2-certs-is1S7D/test-root-CA-trusted-certificate-0001.pem 404s /tmp/sssd-softhsm2-certs-is1S7D/test-root-CA-trusted-certificate-0001.pem: OK 404s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-is1S7D/test-full-chain-CA.pem /tmp/sssd-softhsm2-certs-is1S7D/test-intermediate-CA-trusted-certificate-0001.pem 404s /tmp/sssd-softhsm2-certs-is1S7D/test-intermediate-CA-trusted-certificate-0001.pem: OK 404s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-is1S7D/test-full-chain-CA.pem /tmp/sssd-softhsm2-certs-is1S7D/test-root-intermediate-chain-CA.pem 404s /tmp/sssd-softhsm2-certs-is1S7D/test-root-intermediate-chain-CA.pem: OK 404s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-is1S7D/test-full-chain-CA.pem /tmp/sssd-softhsm2-certs-is1S7D/test-sub-intermediate-CA-trusted-certificate-0001.pem 404s /tmp/sssd-softhsm2-certs-is1S7D/test-sub-intermediate-CA-trusted-certificate-0001.pem: OK 404s Certificates generation completed! 404s + echo 'Certificates generation completed!' 404s + [[ -v NO_SSSD_TESTS ]] 404s + [[ -v GENERATE_SMART_CARDS ]] 404s + prepare_softhsm2_card /tmp/sssd-softhsm2-certs-is1S7D/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-31638 404s + local certificate=/tmp/sssd-softhsm2-certs-is1S7D/test-root-CA-trusted-certificate-0001.pem 404s + local key_pass=pass:random-root-ca-trusted-cert-0001-31638 404s + local key_cn 404s + local key_name 404s + local tokens_dir 404s + local output_cert_file 404s + token_name= 404s ++ basename /tmp/sssd-softhsm2-certs-is1S7D/test-root-CA-trusted-certificate-0001.pem .pem 404s + key_name=test-root-CA-trusted-certificate-0001 404s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-certs-is1S7D/test-root-CA-trusted-certificate-0001.pem 404s ++ sed -n 's/ *commonName *= //p' 404s + key_cn='Test Organization Root Trusted Certificate 0001' 404s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 404s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-certs-is1S7D/softhsm2-test-root-CA-trusted-certificate-0001.conf 404s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-certs-is1S7D/softhsm2-test-root-CA-trusted-certificate-0001.conf 404s ++ basename /tmp/sssd-softhsm2-certs-is1S7D/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 404s + tokens_dir=/tmp/sssd-softhsm2-certs-is1S7D/softhsm2-test-root-CA-trusted-certificate-0001 404s + token_name='Test Organization Root Tr Token' 404s + '[' '!' -e /tmp/sssd-softhsm2-certs-is1S7D/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 404s + local key_file 404s + local decrypted_key 404s + mkdir -p /tmp/sssd-softhsm2-certs-is1S7D/softhsm2-test-root-CA-trusted-certificate-0001 404s + key_file=/tmp/sssd-softhsm2-certs-is1S7D/test-root-CA-trusted-certificate-0001-key.pem 404s + decrypted_key=/tmp/sssd-softhsm2-certs-is1S7D/test-root-CA-trusted-certificate-0001-key-decrypted.pem 404s + cat 404s + softhsm2-util --init-token --label 'Test Organization Root Tr Token' --pin 123456 --so-pin 123456 --free 404s Slot 0 has a free/uninitialized token. 404s The token has been initialized and is reassigned to slot 2117682504 404s + softhsm2-util --show-slots 404s Available slots: 404s Slot 2117682504 404s Slot info: 404s Description: SoftHSM slot ID 0x7e394548 404s Manufacturer ID: SoftHSM project 404s Hardware version: 2.6 404s Firmware version: 2.6 404s Token present: yes 404s Token info: 404s Manufacturer ID: SoftHSM project 404s Model: SoftHSM v2 404s Hardware version: 2.6 404s Firmware version: 2.6 404s Serial number: aa18a1c67e394548 404s Initialized: yes 404s User PIN init.: yes 404s Label: Test Organization Root Tr Token 404s Slot 1 404s Slot info: 404s Description: SoftHSM slot ID 0x1 404s Manufacturer ID: SoftHSM project 404s Hardware version: 2.6 404s Firmware version: 2.6 404s Token present: yes 404s Token info: 404s Manufacturer ID: SoftHSM project 404s Model: SoftHSM v2 404s Hardware version: 2.6 404s Firmware version: 2.6 404s Serial number: 404s Initialized: no 404s User PIN init.: no 404s Label: 404s + p11tool --provider=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --write --no-mark-private --load-certificate=/tmp/sssd-softhsm2-certs-is1S7D/test-root-CA-trusted-certificate-0001.pem --login --set-pin=123456 --label 'Test Organization Root Trusted Certificate 0001' --id 00112233445566778899FFAABBCCDDEEFF012345 404s + openssl rsa -passin pass:random-root-ca-trusted-cert-0001-31638 -in /tmp/sssd-softhsm2-certs-is1S7D/test-root-CA-trusted-certificate-0001-key.pem -out /tmp/sssd-softhsm2-certs-is1S7D/test-root-CA-trusted-certificate-0001-key-decrypted.pem 404s writing RSA key 404s + p11tool --provider=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --write --load-privkey=/tmp/sssd-softhsm2-certs-is1S7D/test-root-CA-trusted-certificate-0001-key-decrypted.pem --login --set-pin=123456 --label 'Test Organization Root Trusted Certificate 0001 Key' --id 00112233445566778899FFAABBCCDDEEFF012345 404s + rm /tmp/sssd-softhsm2-certs-is1S7D/test-root-CA-trusted-certificate-0001-key-decrypted.pem 404s + p11tool --provider=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --list-all 404s Object 0: 404s URL: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=aa18a1c67e394548;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert 404s Type: X.509 Certificate (RSA-1024) 404s Expires: Thu Mar 20 04:14:17 2025 404s Label: Test Organization Root Trusted Certificate 0001 404s ID: 00:11:22:33:44:55:66:77:88:99:ff:aa:bb:cc:dd:ee:ff:01:23:45 404s 404s Test Organization Root Tr Token 404s + echo 'Test Organization Root Tr Token' 404s + prepare_softhsm2_card /tmp/sssd-softhsm2-certs-is1S7D/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-26656 404s + local certificate=/tmp/sssd-softhsm2-certs-is1S7D/test-intermediate-CA-trusted-certificate-0001.pem 404s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-26656 404s + local key_cn 404s + local key_name 404s + local tokens_dir 404s + local output_cert_file 404s + token_name= 404s ++ basename /tmp/sssd-softhsm2-certs-is1S7D/test-intermediate-CA-trusted-certificate-0001.pem .pem 404s + key_name=test-intermediate-CA-trusted-certificate-0001 404s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-certs-is1S7D/test-intermediate-CA-trusted-certificate-0001.pem 404s ++ sed -n 's/ *commonName *= //p' 404s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 404s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 404s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-certs-is1S7D/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 404s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-certs-is1S7D/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 404s ++ basename /tmp/sssd-softhsm2-certs-is1S7D/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 404s + tokens_dir=/tmp/sssd-softhsm2-certs-is1S7D/softhsm2-test-intermediate-CA-trusted-certificate-0001 404s + token_name='Test Organization Interme Token' 404s + '[' '!' -e /tmp/sssd-softhsm2-certs-is1S7D/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 404s + local key_file 404s + local decrypted_key 404s + mkdir -p /tmp/sssd-softhsm2-certs-is1S7D/softhsm2-test-intermediate-CA-trusted-certificate-0001 404s + key_file=/tmp/sssd-softhsm2-certs-is1S7D/test-intermediate-CA-trusted-certificate-0001-key.pem 404s + decrypted_key=/tmp/sssd-softhsm2-certs-is1S7D/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 404s + cat 404s + softhsm2-util --init-token --label 'Test Organization Interme Token' --pin 123456 --so-pin 123456 --free 404s Slot 0 has a free/uninitialized token. 404s The token has been initialized and is reassigned to slot 914238466 404s + softhsm2-util --show-slots 404s Available slots: 404s Slot 914238466 404s Slot info: 404s Description: SoftHSM slot ID 0x367e2c02 404s Manufacturer ID: SoftHSM project 404s Hardware version: 2.6 404s Firmware version: 2.6 404s Token present: yes 404s Token info: 404s Manufacturer ID: SoftHSM project 404s Model: SoftHSM v2 404s Hardware version: 2.6 404s Firmware version: 2.6 404s Serial number: fd8ad678367e2c02 404s Initialized: yes 404s User PIN init.: yes 404s Label: Test Organization Interme Token 404s Slot 1 404s Slot info: 404s Description: SoftHSM slot ID 0x1 404s Manufacturer ID: SoftHSM project 404s Hardware version: 2.6 404s Firmware version: 2.6 404s Token present: yes 404s Token info: 404s Manufacturer ID: SoftHSM project 404s Model: SoftHSM v2 404s Hardware version: 2.6 404s Firmware version: 2.6 404s Serial number: 404s Initialized: no 404s User PIN init.: no 404s Label: 404s + p11tool --provider=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --write --no-mark-private --load-certificate=/tmp/sssd-softhsm2-certs-is1S7D/test-intermediate-CA-trusted-certificate-0001.pem --login --set-pin=123456 --label 'Test Organization Intermediate Trusted Certificate 0001' --id 00112233445566778899FFAABBCCDDEEFF012345 404s + openssl rsa -passin pass:random-intermediate-ca-trusted-cert-0001-26656 -in /tmp/sssd-softhsm2-certs-is1S7D/test-intermediate-CA-trusted-certificate-0001-key.pem -out /tmp/sssd-softhsm2-certs-is1S7D/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 404s writing RSA key 404s + p11tool --provider=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --write --load-privkey=/tmp/sssd-softhsm2-certs-is1S7D/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem --login --set-pin=123456 --label 'Test Organization Intermediate Trusted Certificate 0001 Key' --id 00112233445566778899FFAABBCCDDEEFF012345 404s + rm /tmp/sssd-softhsm2-certs-is1S7D/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 404s + p11tool --provider=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --list-all 404s Object 0: 404s URL: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fd8ad678367e2c02;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert 404s Type: X.509 Certificate (RSA-1024) 404s Expires: Thu Mar 20 04:14:18 2025 404s Label: Test Organization Intermediate Trusted Certificate 0001 404s ID: 00:11:22:33:44:55:66:77:88:99:ff:aa:bb:cc:dd:ee:ff:01:23:45 404s 404s + echo 'Test Organization Interme Token' 404s Test Organization Interme Token 404s + prepare_softhsm2_card /tmp/sssd-softhsm2-certs-is1S7D/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-20111 404s + local certificate=/tmp/sssd-softhsm2-certs-is1S7D/test-sub-intermediate-CA-trusted-certificate-0001.pem 404s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-20111 404s + local key_cn 404s + local key_name 404s + local tokens_dir 404s + local output_cert_file 404s + token_name= 404s ++ basename /tmp/sssd-softhsm2-certs-is1S7D/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 404s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 404s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-certs-is1S7D/test-sub-intermediate-CA-trusted-certificate-0001.pem 404s ++ sed -n 's/ *commonName *= //p' 404s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 404s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 404s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-certs-is1S7D/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 404s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-certs-is1S7D/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 404s ++ basename /tmp/sssd-softhsm2-certs-is1S7D/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 404s + tokens_dir=/tmp/sssd-softhsm2-certs-is1S7D/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 404s + token_name='Test Organization Sub Int Token' 404s + '[' '!' -e /tmp/sssd-softhsm2-certs-is1S7D/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 404s + local key_file 404s + local decrypted_key 404s + mkdir -p /tmp/sssd-softhsm2-certs-is1S7D/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 404s + key_file=/tmp/sssd-softhsm2-certs-is1S7D/test-sub-intermediate-CA-trusted-certificate-0001-key.pem 404s + decrypted_key=/tmp/sssd-softhsm2-certs-is1S7D/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 404s + cat 404s + softhsm2-util --init-token --label 'Test Organization Sub Int Token' --pin 123456 --so-pin 123456 --free 404s Slot 0 has a free/uninitialized token. 404s The token has been initialized and is reassigned to slot 630492402 404s + softhsm2-util --show-slots 404s Available slots: 404s Slot 630492402 404s Slot info: 404s Description: SoftHSM slot ID 0x25948cf2 404s Manufacturer ID: SoftHSM project 404s Hardware version: 2.6 404s Firmware version: 2.6 404s Token present: yes 404s Token info: 404s Manufacturer ID: SoftHSM project 404s Model: SoftHSM v2 404s Hardware version: 2.6 404s Firmware version: 2.6 404s Serial number: eb8b82fda5948cf2 404s Initialized: yes 404s User PIN init.: yes 404s Label: Test Organization Sub Int Token 404s Slot 1 404s Slot info: 404s Description: SoftHSM slot ID 0x1 404s Manufacturer ID: SoftHSM project 404s Hardware version: 2.6 404s Firmware version: 2.6 404s Token present: yes 404s Token info: 404s Manufacturer ID: SoftHSM project 404s Model: SoftHSM v2 404s Hardware version: 2.6 404s Firmware version: 2.6 404s Serial number: 404s Initialized: no 404s User PIN init.: no 404s Label: 404s + p11tool --provider=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --write --no-mark-private --load-certificate=/tmp/sssd-softhsm2-certs-is1S7D/test-sub-intermediate-CA-trusted-certificate-0001.pem --login --set-pin=123456 --label 'Test Organization Sub Intermediate Trusted Certificate 0001' --id 00112233445566778899FFAABBCCDDEEFF012345 404s + openssl rsa -passin pass:random-sub-intermediate-ca-trusted-cert-0001-20111 -in /tmp/sssd-softhsm2-certs-is1S7D/test-sub-intermediate-CA-trusted-certificate-0001-key.pem -out /tmp/sssd-softhsm2-certs-is1S7D/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 404s writing RSA key 404s + p11tool --provider=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --write --load-privkey=/tmp/sssd-softhsm2-certs-is1S7D/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem --login --set-pin=123456 --label 'Test Organization Sub Intermediate Trusted Certificate 0001 Key' --id 00112233445566778899FFAABBCCDDEEFF012345 404s + rm /tmp/sssd-softhsm2-certs-is1S7D/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 404s + p11tool --provider=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --list-all 404s Object 0: 404s URL: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=eb8b82fda5948cf2;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert 404s Type: X.509 Certificate (RSA-1024) 404s Expires: Thu Mar 20 04:14:18 2025 404s Label: Test Organization Sub Intermediate Trusted Certificate 0001 404s ID: 00:11:22:33:44:55:66:77:88:99:ff:aa:bb:cc:dd:ee:ff:01:23:45 404s 404s Test Organization Sub Int Token 404s Certificates generation completed! 404s + echo 'Test Organization Sub Int Token' 404s + echo 'Certificates generation completed!' 404s + exit 0 404s + find /tmp/sssd-softhsm2-certs-is1S7D -type d -exec chmod 777 '{}' ';' 404s + find /tmp/sssd-softhsm2-certs-is1S7D -type f -exec chmod 666 '{}' ';' 404s + backup_file /etc/sssd/sssd.conf 404s + '[' -z '' ']' 404s ++ mktemp -d -t sssd-softhsm2-backups-XXXXXX 404s + backupsdir=/tmp/sssd-softhsm2-backups-vWDzSH 404s + '[' -e /etc/sssd/sssd.conf ']' 404s + delete_paths+=("$1") 404s + rm -f /etc/sssd/sssd.conf 404s ++ runuser -u ubuntu -- sh -c 'echo ~' 404s + user_home=/home/ubuntu 404s + mkdir -p /home/ubuntu 404s + chown ubuntu:ubuntu /home/ubuntu 404s ++ runuser -u ubuntu -- sh -c 'echo ${XDG_CONFIG_HOME:-~/.config}' 404s + user_config=/home/ubuntu/.config 404s + system_config=/etc 404s + softhsm2_conf_paths=("${AUTOPKGTEST_NORMAL_USER}:$user_config/softhsm2/softhsm2.conf" "root:$system_config/softhsm/softhsm2.conf") 404s + for path_pair in "${softhsm2_conf_paths[@]}" 404s + IFS=: 404s + read -r -a path 404s + path=/home/ubuntu/.config/softhsm2/softhsm2.conf 404s + backup_file /home/ubuntu/.config/softhsm2/softhsm2.conf 404s + '[' -z /tmp/sssd-softhsm2-backups-vWDzSH ']' 404s + '[' -e /home/ubuntu/.config/softhsm2/softhsm2.conf ']' 404s + delete_paths+=("$1") 404s + rm -f /home/ubuntu/.config/softhsm2/softhsm2.conf 404s + for path_pair in "${softhsm2_conf_paths[@]}" 404s + IFS=: 404s + read -r -a path 404s + path=/etc/softhsm/softhsm2.conf 404s + backup_file /etc/softhsm/softhsm2.conf 404s + '[' -z /tmp/sssd-softhsm2-backups-vWDzSH ']' 404s + '[' -e /etc/softhsm/softhsm2.conf ']' 404s ++ dirname /etc/softhsm/softhsm2.conf 404s + local back_dir=/tmp/sssd-softhsm2-backups-vWDzSH//etc/softhsm 404s ++ basename /etc/softhsm/softhsm2.conf 404s + local back_path=/tmp/sssd-softhsm2-backups-vWDzSH//etc/softhsm/softhsm2.conf 404s + '[' '!' -e /tmp/sssd-softhsm2-backups-vWDzSH//etc/softhsm/softhsm2.conf ']' 404s + mkdir -p /tmp/sssd-softhsm2-backups-vWDzSH//etc/softhsm 404s + cp -a /etc/softhsm/softhsm2.conf /tmp/sssd-softhsm2-backups-vWDzSH//etc/softhsm/softhsm2.conf 404s + restore_paths+=("$back_path") 404s + rm -f /etc/softhsm/softhsm2.conf 404s + test_authentication login /tmp/sssd-softhsm2-certs-is1S7D/softhsm2-test-root-CA-trusted-certificate-0001.conf /tmp/sssd-softhsm2-certs-is1S7D/test-full-chain-CA.pem 404s + pam_service=login 404s + certificate_config=/tmp/sssd-softhsm2-certs-is1S7D/softhsm2-test-root-CA-trusted-certificate-0001.conf 404s + ca_db=/tmp/sssd-softhsm2-certs-is1S7D/test-full-chain-CA.pem 404s + verification_options= 404s + mkdir -p -m 700 /etc/sssd 404s + echo 'Using CA DB '\''/tmp/sssd-softhsm2-certs-is1S7D/test-full-chain-CA.pem'\'' with verification options: '\'''\''' 404s + cat 404s Using CA DB '/tmp/sssd-softhsm2-certs-is1S7D/test-full-chain-CA.pem' with verification options: '' 404s + chmod 600 /etc/sssd/sssd.conf 404s + for path_pair in "${softhsm2_conf_paths[@]}" 404s + IFS=: 404s + read -r -a path 404s + user=ubuntu 404s + path=/home/ubuntu/.config/softhsm2/softhsm2.conf 404s ++ dirname /home/ubuntu/.config/softhsm2/softhsm2.conf 404s + runuser -u ubuntu -- mkdir -p /home/ubuntu/.config/softhsm2 404s + runuser -u ubuntu -- ln -sf /tmp/sssd-softhsm2-certs-is1S7D/softhsm2-test-root-CA-trusted-certificate-0001.conf /home/ubuntu/.config/softhsm2/softhsm2.conf 404s + runuser -u ubuntu -- softhsm2-util --show-slots 404s + grep 'Test Organization' 404s + for path_pair in "${softhsm2_conf_paths[@]}" 404s + IFS=: 404s + read -r -a path 404s + user=root 404s + path=/etc/softhsm/softhsm2.conf 404s ++ dirname /etc/softhsm/softhsm2.conf 404s Label: Test Organization Root Tr Token 404s + runuser -u root -- mkdir -p /etc/softhsm 404s + runuser -u root -- ln -sf /tmp/sssd-softhsm2-certs-is1S7D/softhsm2-test-root-CA-trusted-certificate-0001.conf /etc/softhsm/softhsm2.conf 404s + runuser -u root -- softhsm2-util --show-slots 404s + grep 'Test Organization' 404s Label: Test Organization Root Tr Token 404s + systemctl restart sssd 404s + pam-auth-update --disable sss-smart-card-optional sss-smart-card-required 405s + for alternative in "${alternative_pam_configs[@]}" 405s + pam-auth-update --enable sss-smart-card-optional 405s + cat /etc/pam.d/common-auth 405s # 405s # /etc/pam.d/common-auth - authentication settings common to all services 405s # 405s # This file is included from other service-specific PAM config files, 405s # and should contain a list of the authentication modules that define 405s # the central authentication scheme for use on the system 405s # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the 405s # traditional Unix authentication mechanisms. 405s # 405s # As of pam 1.0.1-6, this file is managed by pam-auth-update by default. 405s # To take advantage of this, it is recommended that you configure any 405s # local modules either before or after the default block, and use 405s # pam-auth-update to manage selection of other modules. See 405s # pam-auth-update(8) for details. 405s 405s # here are the per-package modules (the "Primary" block) 405s auth [success=3 default=ignore] pam_sss.so allow_missing_name try_cert_auth 405s auth [success=2 default=ignore] pam_unix.so nullok try_first_pass 405s auth [success=1 default=ignore] pam_sss.so use_first_pass 405s # here's the fallback if no module succeeds 405s auth requisite pam_deny.so 405s # prime the stack with a positive return value if there isn't one already; 405s # this avoids us returning an error just because nothing sets a success code 405s # since the modules above will each just jump around 405s auth required pam_permit.so 405s # and here are more per-package modules (the "Additional" block) 405s auth optional pam_cap.so 405s # end of pam-auth-update config 405s + echo -n -e 123456 405s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 405s pamtester: invoking pam_start(login, ubuntu, ...) 405s pamtester: performing operation - authenticate 405s PIN for Test Organization Root Tr Token: pamtester: successfully authenticated 405s + echo -n -e 123456 405s + runuser -u ubuntu -- pamtester -v login '' authenticate 405s pamtester: invoking pam_start(login, , ...) 405s pamtester: performing operation - authenticate 405s PIN for Test Organization Root Tr Token: pamtester: successfully authenticated 405s + echo -n -e wrong123456 405s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 405s pamtester: invoking pam_start(login, ubuntu, ...) 405s pamtester: performing operation - authenticate 408s PIN for Test Organization Root Tr Token: Password: pamtester: Authentication failure 408s + echo -n -e wrong123456 408s + runuser -u ubuntu -- pamtester -v login '' authenticate 408s pamtester: invoking pam_start(login, , ...) 408s pamtester: performing operation - authenticate 411s PIN for Test Organization Root Tr Token: Password: pamtester: Authentication failure 411s + echo -n -e 123456 411s + pamtester -v login root authenticate 411s pamtester: invoking pam_start(login, root, ...) 411s pamtester: performing operation - authenticate 414s Password: pamtester: Authentication failure 414s + for alternative in "${alternative_pam_configs[@]}" 414s + pam-auth-update --enable sss-smart-card-required 414s PAM configuration 414s ----------------- 414s 414s Incompatible PAM profiles selected. 414s 414s The following PAM profiles cannot be used together: 414s 414s SSS required smart card authentication, SSS optional smart card 414s authentication 414s 414s Please select a different set of modules to enable. 414s 414s + cat /etc/pam.d/common-auth 414s # 414s # /etc/pam.d/common-auth - authentication settings common to all services 414s # 414s # This file is included from other service-specific PAM config files, 414s # and should contain a list of the authentication modules that define 414s # the central authentication scheme for use on the system 414s # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the 414s # traditional Unix authentication mechanisms. 414s # 414s # As of pam 1.0.1-6, this file is managed by pam-auth-update by default. 414s # To take advantage of this, it is recommended that you configure any 414s # local modules either before or after the default block, and use 414s # pam-auth-update to manage selection of other modules. See 414s # pam-auth-update(8) for details. 414s 414s # here are the per-package modules (the "Primary" block) 414s auth [success=3 ignore=ignore default=die] pam_sss.so allow_missing_name require_cert_auth 414s auth [success=2 default=ignore] pam_unix.so nullok try_first_pass 414s auth [success=1 default=ignore] pam_sss.so use_first_pass 414s # here's the fallback if no module succeeds 414s auth requisite pam_deny.so 414s # prime the stack with a positive return value if there isn't one already; 414s # this avoids us returning an error just because nothing sets a success code 414s # since the modules above will each just jump around 414s auth required pam_permit.so 414s # and here are more per-package modules (the "Additional" block) 414s auth optional pam_cap.so 414s # end of pam-auth-update config 414s + echo -n -e 123456 414s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 414s pamtester: invoking pam_start(login, ubuntu, ...) 414s pamtester: performing operation - authenticate 414s PIN for Test Organization Root Tr Token: pamtester: successfully authenticated 414s + echo -n -e 123456 414s + runuser -u ubuntu -- pamtester -v login '' authenticate 414s pamtester: invoking pam_start(login, , ...) 414s pamtester: performing operation - authenticate 414s PIN for Test Organization Root Tr Token: pamtester: successfully authenticated 414s + echo -n -e wrong123456 414s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 414s pamtester: invoking pam_start(login, ubuntu, ...) 414s pamtester: performing operation - authenticate 416s PIN for Test Organization Root Tr Token: pamtester: Authentication failure 416s + echo -n -e wrong123456 416s + runuser -u ubuntu -- pamtester -v login '' authenticate 416s pamtester: invoking pam_start(login, , ...) 416s pamtester: performing operation - authenticate 419s PIN for Test Organization Root Tr Token: pamtester: Authentication failure 419s + echo -n -e 123456 419s + pamtester -v login root authenticate 419s pamtester: invoking pam_start(login, root, ...) 419s pamtester: performing operation - authenticate 422s Using CA DB '/tmp/sssd-softhsm2-certs-is1S7D/test-full-chain-CA.pem' with verification options: '' 422s pamtester: Authentication service cannot retrieve authentication info 422s + test_authentication login /tmp/sssd-softhsm2-certs-is1S7D/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf /tmp/sssd-softhsm2-certs-is1S7D/test-full-chain-CA.pem 422s + pam_service=login 422s + certificate_config=/tmp/sssd-softhsm2-certs-is1S7D/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 422s + ca_db=/tmp/sssd-softhsm2-certs-is1S7D/test-full-chain-CA.pem 422s + verification_options= 422s + mkdir -p -m 700 /etc/sssd 422s + echo 'Using CA DB '\''/tmp/sssd-softhsm2-certs-is1S7D/test-full-chain-CA.pem'\'' with verification options: '\'''\''' 422s + cat 422s + chmod 600 /etc/sssd/sssd.conf 422s + for path_pair in "${softhsm2_conf_paths[@]}" 422s + IFS=: 422s + read -r -a path 422s + user=ubuntu 422s + path=/home/ubuntu/.config/softhsm2/softhsm2.conf 422s Label: Test Organization Sub Int Token 422s Label: Test Organization Sub Int Token 422s ++ dirname /home/ubuntu/.config/softhsm2/softhsm2.conf 422s + runuser -u ubuntu -- mkdir -p /home/ubuntu/.config/softhsm2 422s + runuser -u ubuntu -- ln -sf /tmp/sssd-softhsm2-certs-is1S7D/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf /home/ubuntu/.config/softhsm2/softhsm2.conf 422s + runuser -u ubuntu -- softhsm2-util --show-slots 422s + grep 'Test Organization' 422s + for path_pair in "${softhsm2_conf_paths[@]}" 422s + IFS=: 422s + read -r -a path 422s + user=root 422s + path=/etc/softhsm/softhsm2.conf 422s ++ dirname /etc/softhsm/softhsm2.conf 422s + runuser -u root -- mkdir -p /etc/softhsm 422s + runuser -u root -- ln -sf /tmp/sssd-softhsm2-certs-is1S7D/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf /etc/softhsm/softhsm2.conf 422s + runuser -u root -- softhsm2-util --show-slots 422s + grep 'Test Organization' 422s + systemctl restart sssd 422s + pam-auth-update --disable sss-smart-card-optional sss-smart-card-required 423s + for alternative in "${alternative_pam_configs[@]}" 423s + pam-auth-update --enable sss-smart-card-optional 423s # 423s # /etc/pam.d/common-auth - authentication settings common to all services 423s # 423s # This file is included from other service-specific PAM config files, 423s # and should contain a list of the authentication modules that define 423s # the central authentication scheme for use on the system 423s # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the 423s # traditional Unix authentication mechanisms. 423s # 423s # As of pam 1.0.1-6, this file is managed by pam-auth-update by default. 423s # To take advantage of this, it is recommended that you configure any 423s # local modules either before or after the default block, and use 423s # pam-auth-update to manage selection of other modules. See 423s # pam-auth-update(8) for details. 423s 423s # here are the per-package modules (the "Primary" block) 423s auth [success=3 default=ignore] pam_sss.so allow_missing_name try_cert_auth 423s auth [success=2 default=ignore] pam_unix.so nullok try_first_pass 423s auth [success=1 default=ignore] pam_sss.so use_first_pass 423s # here's the fallback if no module succeeds 423s auth requisite pam_deny.so 423s # prime the stack with a positive return value if there isn't one already; 423s # this avoids us returning an error just because nothing sets a success code 423s # since the modules above will each just jump around 423s auth required pam_permit.so 423s # and here are more per-package modules (the "Additional" block) 423s auth optional pam_cap.so 423s # end of pam-auth-update config 423s + cat /etc/pam.d/common-auth 423s + echo -n -e 123456 423s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 423s pamtester: invoking pam_start(login, ubuntu, ...) 423s pamtester: performing operation - authenticate 423s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 423s + echo -n -e 123456 423s + runuser -u ubuntu -- pamtester -v login '' authenticate 423s pamtester: invoking pam_start(login, , ...) 423s pamtester: performing operation - authenticate 423s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 423s + echo -n -e wrong123456 423s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 423s pamtester: invoking pam_start(login, ubuntu, ...) 423s pamtester: performing operation - authenticate 425s PIN for Test Organization Sub Int Token: Password: pamtester: Authentication failure 425s + echo -n -e wrong123456 425s + runuser -u ubuntu -- pamtester -v login '' authenticate 425s pamtester: invoking pam_start(login, , ...) 425s pamtester: performing operation - authenticate 429s PIN for Test Organization Sub Int Token: Password: pamtester: Authentication failure 429s + echo -n -e 123456 429s + pamtester -v login root authenticate 429s pamtester: invoking pam_start(login, root, ...) 429s pamtester: performing operation - authenticate 432s Password: pamtester: Authentication failure 432s + for alternative in "${alternative_pam_configs[@]}" 432s + pam-auth-update --enable sss-smart-card-required 432s PAM configuration 432s ----------------- 432s 432s Incompatible PAM profiles selected. 432s 432s The following PAM profiles cannot be used together: 432s 432s SSS required smart card authentication, SSS optional smart card 432s authentication 432s 432s Please select a different set of modules to enable. 432s 432s + cat /etc/pam.d/common-auth 432s # 432s # /etc/pam.d/common-auth - authentication settings common to all services 432s # 432s # This file is included from other service-specific PAM config files, 432s # and should contain a list of the authentication modules that define 432s # the central authentication scheme for use on the system 432s # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the 432s # traditional Unix authentication mechanisms. 432s # 432s # As of pam 1.0.1-6, this file is managed by pam-auth-update by default. 432s # To take advantage of this, it is recommended that you configure any 432s # local modules either before or after the default block, and use 432s # pam-auth-update to manage selection of other modules. See 432s # pam-auth-update(8) for details. 432s 432s # here are the per-package modules (the "Primary" block) 432s auth [success=3 ignore=ignore default=die] pam_sss.so allow_missing_name require_cert_auth 432s auth [success=2 default=ignore] pam_unix.so nullok try_first_pass 432s auth [success=1 default=ignore] pam_sss.so use_first_pass 432s # here's the fallback if no module succeeds 432s auth requisite pam_deny.so 432s # prime the stack with a positive return value if there isn't one already; 432s # this avoids us returning an error just because nothing sets a success code 432s # since the modules above will each just jump around 432s auth required pam_permit.so 432s # and here are more per-package modules (the "Additional" block) 432s auth optional pam_cap.so 432s # end of pam-auth-update config 432s + echo -n -e 123456 432s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 432s pamtester: invoking pam_start(login, ubuntu, ...) 432s pamtester: performing operation - authenticate 432s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 432s + echo -n -e 123456 432s + runuser -u ubuntu -- pamtester -v login '' authenticate 432s pamtester: invoking pam_start(login, , ...) 432s pamtester: performing operation - authenticate 432s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 432s + echo -n -e wrong123456 432s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 432s pamtester: invoking pam_start(login, ubuntu, ...) 432s pamtester: performing operation - authenticate 435s PIN for Test Organization Sub Int Token: pamtester: Authentication failure 435s + echo -n -e wrong123456 435s + runuser -u ubuntu -- pamtester -v login '' authenticate 435s pamtester: invoking pam_start(login, , ...) 435s pamtester: performing operation - authenticate 438s PIN for Test Organization Sub Int Token: pamtester: Authentication failure 438s + echo -n -e 123456 438s + pamtester -v login root authenticate 438s pamtester: invoking pam_start(login, root, ...) 438s pamtester: performing operation - authenticate 440s pamtester: Authentication service cannot retrieve authentication info 440s + test_authentication login /tmp/sssd-softhsm2-certs-is1S7D/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf /tmp/sssd-softhsm2-certs-is1S7D/test-sub-intermediate-CA.pem partial_chain 440s + pam_service=login 440s + certificate_config=/tmp/sssd-softhsm2-certs-is1S7D/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 440s + ca_db=/tmp/sssd-softhsm2-certs-is1S7D/test-sub-intermediate-CA.pem 440s + verification_options=partial_chain 440s + mkdir -p -m 700 /etc/sssd 440s + echo 'Using CA DB '\''/tmp/sssd-softhsm2-certs-is1S7D/test-sub-intermediate-CA.pem'\'' with verification options: '\''partial_chain'\''' 440s Using CA DB '/tmp/sssd-softhsm2-certs-is1S7D/test-sub-intermediate-CA.pem' with verification options: 'partial_chain' 440s + cat 440s + chmod 600 /etc/sssd/sssd.conf 440s + for path_pair in "${softhsm2_conf_paths[@]}" 440s + IFS=: 440s + read -r -a path 440s Label: Test Organization Sub Int Token 440s Label: Test Organization Sub Int Token 440s + user=ubuntu 440s + path=/home/ubuntu/.config/softhsm2/softhsm2.conf 440s ++ dirname /home/ubuntu/.config/softhsm2/softhsm2.conf 440s + runuser -u ubuntu -- mkdir -p /home/ubuntu/.config/softhsm2 440s + runuser -u ubuntu -- ln -sf /tmp/sssd-softhsm2-certs-is1S7D/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf /home/ubuntu/.config/softhsm2/softhsm2.conf 440s + runuser -u ubuntu -- softhsm2-util --show-slots 440s + grep 'Test Organization' 440s + for path_pair in "${softhsm2_conf_paths[@]}" 440s + IFS=: 440s + read -r -a path 440s + user=root 440s + path=/etc/softhsm/softhsm2.conf 440s ++ dirname /etc/softhsm/softhsm2.conf 440s + runuser -u root -- mkdir -p /etc/softhsm 440s + runuser -u root -- ln -sf /tmp/sssd-softhsm2-certs-is1S7D/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf /etc/softhsm/softhsm2.conf 440s + runuser -u root -- softhsm2-util --show-slots 440s + grep 'Test Organization' 440s + systemctl restart sssd 441s + pam-auth-update --disable sss-smart-card-optional sss-smart-card-required 441s + for alternative in "${alternative_pam_configs[@]}" 441s + pam-auth-update --enable sss-smart-card-optional 441s + cat /etc/pam.d/common-auth 441s # 441s # /etc/pam.d/common-auth - authentication settings common to all services 441s # 441s # This file is included from other service-specific PAM config files, 441s # and should contain a list of the authentication modules that define 441s # the central authentication scheme for use on the system 441s # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the 441s # traditional Unix authentication mechanisms. 441s # 441s # As of pam 1.0.1-6, this file is managed by pam-auth-update by default. 441s # To take advantage of this, it is recommended that you configure any 441s # local modules either before or after the default block, and use 441s # pam-auth-update to manage selection of other modules. See 441s # pam-auth-update(8) for details. 441s 441s # here are the per-package modules (the "Primary" block) 441s auth [success=3 default=ignore] pam_sss.so allow_missing_name try_cert_auth 441s auth [success=2 default=ignore] pam_unix.so nullok try_first_pass 441s auth [success=1 default=ignore] pam_sss.so use_first_pass 441s # here's the fallback if no module succeeds 441s auth requisite pam_deny.so 441s # prime the stack with a positive return value if there isn't one already; 441s # this avoids us returning an error just because nothing sets a success code 441s # since the modules above will each just jump around 441s auth required pam_permit.so 441s # and here are more per-package modules (the "Additional" block) 441s auth optional pam_cap.so 441s # end of pam-auth-update config 441s + echo -n -e 123456 441s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 441s pamtester: invoking pam_start(login, ubuntu, ...) 441s pamtester: performing operation - authenticate 441s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 441s + echo -n -e 123456 441s + runuser -u ubuntu -- pamtester -v login '' authenticate 441s pamtester: invoking pam_start(login, , ...) 441s pamtester: performing operation - authenticate 441s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 441s + echo -n -e wrong123456 441s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 441s pamtester: invoking pam_start(login, ubuntu, ...) 441s pamtester: performing operation - authenticate 444s PIN for Test Organization Sub Int Token: Password: pamtester: Authentication failure 444s + echo -n -e wrong123456 444s + runuser -u ubuntu -- pamtester -v login '' authenticate 444s pamtester: invoking pam_start(login, , ...) 444s pamtester: performing operation - authenticate 447s PIN for Test Organization Sub Int Token: Password: pamtester: Authentication failure 447s + echo -n -e 123456 447s + pamtester -v login root authenticate 447s pamtester: invoking pam_start(login, root, ...) 447s pamtester: performing operation - authenticate 450s Password: pamtester: Authentication failure 450s + for alternative in "${alternative_pam_configs[@]}" 450s + pam-auth-update --enable sss-smart-card-required 450s PAM configuration 450s ----------------- 450s 450s Incompatible PAM profiles selected. 450s 450s The following PAM profiles cannot be used together: 450s 450s SSS required smart card authentication, SSS optional smart card 450s authentication 450s 450s Please select a different set of modules to enable. 450s 450s + cat /etc/pam.d/common-auth 450s # 450s # /etc/pam.d/common-auth - authentication settings common to all services 450s # 450s # This file is included from other service-specific PAM config files, 450s # and should contain a list of the authentication modules that define 450s # the central authentication scheme for use on the system 450s # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the 450s # traditional Unix authentication mechanisms. 450s # 450s # As of pam 1.0.1-6, this file is managed by pam-auth-update by default. 450s # To take advantage of this, it is recommended that you configure any 450s # local modules either before or after the default block, and use 450s # pam-auth-update to manage selection of other modules. See 450s # pam-auth-update(8) for details. 450s 450s # here are the per-package modules (the "Primary" block) 450s auth [success=3 ignore=ignore default=die] pam_sss.so allow_missing_name require_cert_auth 450s auth [success=2 default=ignore] pam_unix.so nullok try_first_pass 450s auth [success=1 default=ignore] pam_sss.so use_first_pass 450s # here's the fallback if no module succeeds 450s auth requisite pam_deny.so 450s # prime the stack with a positive return value if there isn't one already; 450s # this avoids us returning an error just because nothing sets a success code 450s # since the modules above will each just jump around 450s auth required pam_permit.so 450s # and here are more per-package modules (the "Additional" block) 450s auth optional pam_cap.so 450s # end of pam-auth-update config 450s + echo -n -e 123456 450s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 450s pamtester: invoking pam_start(login, ubuntu, ...) 450s pamtester: performing operation - authenticate 450s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 450s + echo -n -e 123456 450s + runuser -u ubuntu -- pamtester -v login '' authenticate 450s pamtester: invoking pam_start(login, , ...) 450s pamtester: performing operation - authenticate 450s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 450s + echo -n -e wrong123456 450s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 450s pamtester: invoking pam_start(login, ubuntu, ...) 450s pamtester: performing operation - authenticate 453s PIN for Test Organization Sub Int Token: pamtester: Authentication failure 453s + echo -n -e wrong123456 453s + runuser -u ubuntu -- pamtester -v login '' authenticate 453s pamtester: invoking pam_start(login, , ...) 453s pamtester: performing operation - authenticate 456s PIN for Test Organization Sub Int Token: pamtester: Authentication failure 456s + echo -n -e 123456 456s + pamtester -v login root authenticate 456s pamtester: invoking pam_start(login, root, ...) 456s pamtester: performing operation - authenticate 458s pamtester: Authentication service cannot retrieve authentication info 458s + handle_exit 458s + exit_code=0 458s + restore_changes 458s + for path in "${restore_paths[@]}" 458s + local original_path 458s ++ realpath --strip --relative-base=/tmp/sssd-softhsm2-backups-vWDzSH /tmp/sssd-softhsm2-backups-vWDzSH//etc/softhsm/softhsm2.conf 458s + original_path=/etc/softhsm/softhsm2.conf 458s + rm /etc/softhsm/softhsm2.conf 458s + mv /tmp/sssd-softhsm2-backups-vWDzSH//etc/softhsm/softhsm2.conf /etc/softhsm/softhsm2.conf 458s + for path in "${delete_paths[@]}" 458s + rm -f /etc/sssd/sssd.conf 458s + for path in "${delete_paths[@]}" 459s + rm -f /home/ubuntu/.config/softhsm2/softhsm2.conf 459s + pam-auth-update --disable sss-smart-card-optional sss-smart-card-required 459s + '[' -e /etc/sssd/sssd.conf ']' 459s + systemctl stop sssd 459s + '[' -e /etc/softhsm/softhsm2.conf ']' 459s + chmod 600 /etc/softhsm/softhsm2.conf 459s + rm -rf /tmp/sssd-softhsm2-certs-is1S7D 459s Script completed successfully! 459s + '[' 0 = 0 ']' 459s + rm -rf /tmp/sssd-softhsm2-backups-vWDzSH 459s + set +x 459s autopkgtest [04:15:13]: test sssd-smart-card-pam-auth-configs: -----------------------] 460s autopkgtest [04:15:14]: test sssd-smart-card-pam-auth-configs: - - - - - - - - - - results - - - - - - - - - - 460s sssd-smart-card-pam-auth-configs PASS 460s autopkgtest [04:15:14]: @@@@@@@@@@@@@@@@@@@@ summary 460s ldap-user-group-ldap-auth PASS 460s ldap-user-group-krb5-auth PASS 460s sssd-softhism2-certificates-tests.sh PASS 460s sssd-smart-card-pam-auth-configs PASS 486s Creating nova instance adt-noble-ppc64el-sssd-20240320-040733-juju-7f2275-prod-proposed-migration-environment-2 from image adt/ubuntu-noble-ppc64el-server-20240320.img (UUID 1c7ceb83-4842-4144-a3c9-88510cdc9534)... 486s Creating nova instance adt-noble-ppc64el-sssd-20240320-040733-juju-7f2275-prod-proposed-migration-environment-2 from image adt/ubuntu-noble-ppc64el-server-20240320.img (UUID 1c7ceb83-4842-4144-a3c9-88510cdc9534)...