0s autopkgtest [14:19:18]: starting date and time: 2024-03-24 14:19:18+0000 0s autopkgtest [14:19:18]: git checkout: 4a1cd702 l/adt_testbed: don't blame the testbed for unsolvable build deps 0s autopkgtest [14:19:18]: host juju-7f2275-prod-proposed-migration-environment-3; command line: /home/ubuntu/autopkgtest/runner/autopkgtest --output-dir /tmp/autopkgtest-work.8ngq6d07/out --timeout-copy=6000 --setup-commands /home/ubuntu/autopkgtest-cloud/worker-config-production/setup-canonical.sh --setup-commands /home/ubuntu/autopkgtest/setup-commands/setup-testbed --apt-pocket=proposed=src:krb5,src:glib2.0,src:libverto,src:openssl --apt-upgrade sssd --timeout-short=300 --timeout-copy=20000 --timeout-build=20000 '--env=ADT_TEST_TRIGGERS=krb5/1.20.1-6ubuntu1 glib2.0/2.79.3-3ubuntu5 libverto/0.3.1-1.2ubuntu1 openssl/3.0.13-0ubuntu2' -- ssh -s /home/ubuntu/autopkgtest/ssh-setup/nova -- --flavor autopkgtest --security-groups autopkgtest-juju-7f2275-prod-proposed-migration-environment-3@bos02-ppc64el-7.secgroup --name adt-noble-ppc64el-sssd-20240324-141918-juju-7f2275-prod-proposed-migration-environment-3 --image adt/ubuntu-noble-ppc64el-server --keyname testbed-juju-7f2275-prod-proposed-migration-environment-3 --net-id=net_prod-proposed-migration -e TERM=linux -e ''"'"'http_proxy=http://squid.internal:3128'"'"'' -e ''"'"'https_proxy=http://squid.internal:3128'"'"'' -e ''"'"'no_proxy=127.0.0.1,127.0.1.1,login.ubuntu.com,localhost,localdomain,novalocal,internal,archive.ubuntu.com,ports.ubuntu.com,security.ubuntu.com,ddebs.ubuntu.com,changelogs.ubuntu.com,launchpadlibrarian.net,launchpadcontent.net,launchpad.net,10.24.0.0/24,keystone.ps5.canonical.com,objectstorage.prodstack5.canonical.com'"'"'' --mirror=http://ftpmaster.internal/ubuntu/ 170s autopkgtest [14:22:08]: testbed dpkg architecture: ppc64el 170s autopkgtest [14:22:08]: testbed apt version: 2.7.12 170s autopkgtest [14:22:08]: @@@@@@@@@@@@@@@@@@@@ test bed setup 171s Get:1 http://ftpmaster.internal/ubuntu noble-proposed InRelease [117 kB] 171s Get:2 http://ftpmaster.internal/ubuntu noble-proposed/restricted Sources [6540 B] 172s Get:3 http://ftpmaster.internal/ubuntu noble-proposed/multiverse Sources [57.3 kB] 172s Get:4 http://ftpmaster.internal/ubuntu noble-proposed/main Sources [539 kB] 172s Get:5 http://ftpmaster.internal/ubuntu noble-proposed/universe Sources [4028 kB] 172s Get:6 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el Packages [726 kB] 172s Get:7 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el c-n-f Metadata [3116 B] 173s Get:8 http://ftpmaster.internal/ubuntu noble-proposed/restricted ppc64el Packages [1372 B] 173s Get:9 http://ftpmaster.internal/ubuntu noble-proposed/restricted ppc64el c-n-f Metadata [116 B] 173s Get:10 http://ftpmaster.internal/ubuntu noble-proposed/universe ppc64el Packages [4266 kB] 173s Get:11 http://ftpmaster.internal/ubuntu noble-proposed/universe ppc64el c-n-f Metadata [8652 B] 173s Get:12 http://ftpmaster.internal/ubuntu noble-proposed/multiverse ppc64el Packages [61.1 kB] 173s Get:13 http://ftpmaster.internal/ubuntu noble-proposed/multiverse ppc64el c-n-f Metadata [116 B] 176s Fetched 9814 kB in 3s (3445 kB/s) 176s Reading package lists... 179s Reading package lists... 179s Building dependency tree... 179s Reading state information... 179s Calculating upgrade... 179s The following packages will be REMOVED: 179s libglib2.0-0 libssl3 179s The following NEW packages will be installed: 179s libglib2.0-0t64 libssl3t64 xdg-user-dirs 179s The following packages will be upgraded: 179s gir1.2-glib-2.0 krb5-locales libglib2.0-data libgssapi-krb5-2 libk5crypto3 179s libkrb5-3 libkrb5support0 openssl 179s 8 upgraded, 3 newly installed, 2 to remove and 0 not upgraded. 179s Need to get 5951 kB of archives. 179s After this operation, 409 kB of additional disk space will be used. 179s Get:1 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el gir1.2-glib-2.0 ppc64el 2.79.3-3ubuntu5 [182 kB] 180s Get:2 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libglib2.0-0t64 ppc64el 2.79.3-3ubuntu5 [1773 kB] 180s Get:3 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el openssl ppc64el 3.0.13-0ubuntu2 [1026 kB] 180s Get:4 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libk5crypto3 ppc64el 1.20.1-6ubuntu1 [108 kB] 180s Get:5 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libgssapi-krb5-2 ppc64el 1.20.1-6ubuntu1 [185 kB] 180s Get:6 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libkrb5support0 ppc64el 1.20.1-6ubuntu1 [38.5 kB] 180s Get:7 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libkrb5-3 ppc64el 1.20.1-6ubuntu1 [432 kB] 180s Get:8 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libssl3t64 ppc64el 3.0.13-0ubuntu2 [2125 kB] 180s Get:9 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el krb5-locales all 1.20.1-6ubuntu1 [13.8 kB] 180s Get:10 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libglib2.0-data all 2.79.3-3ubuntu5 [46.6 kB] 180s Get:11 http://ftpmaster.internal/ubuntu noble/main ppc64el xdg-user-dirs ppc64el 0.18-1 [20.0 kB] 181s Fetched 5951 kB in 1s (5505 kB/s) 181s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 70156 files and directories currently installed.) 181s Preparing to unpack .../gir1.2-glib-2.0_2.79.3-3ubuntu5_ppc64el.deb ... 181s Unpacking gir1.2-glib-2.0:ppc64el (2.79.3-3ubuntu5) over (2.79.2-1~ubuntu1) ... 181s dpkg: libglib2.0-0:ppc64el: dependency problems, but removing anyway as you requested: 181s udisks2 depends on libglib2.0-0 (>= 2.77.0). 181s shared-mime-info depends on libglib2.0-0 (>= 2.75.3). 181s python3-gi depends on libglib2.0-0 (>= 2.77.0). 181s python3-dbus depends on libglib2.0-0 (>= 2.16.0). 181s netplan.io depends on libglib2.0-0 (>= 2.70.0). 181s netplan-generator depends on libglib2.0-0 (>= 2.70.0). 181s libxmlb2:ppc64el depends on libglib2.0-0 (>= 2.54.0). 181s libvolume-key1:ppc64el depends on libglib2.0-0 (>= 2.18.0). 181s libudisks2-0:ppc64el depends on libglib2.0-0 (>= 2.75.3). 181s libqrtr-glib0:ppc64el depends on libglib2.0-0 (>= 2.56). 181s libqmi-proxy depends on libglib2.0-0 (>= 2.30.0). 181s libqmi-glib5:ppc64el depends on libglib2.0-0 (>= 2.54.0). 181s libpolkit-gobject-1-0:ppc64el depends on libglib2.0-0 (>= 2.38.0). 181s libpolkit-agent-1-0:ppc64el depends on libglib2.0-0 (>= 2.38.0). 181s libnetplan0:ppc64el depends on libglib2.0-0 (>= 2.75.3). 181s libmm-glib0:ppc64el depends on libglib2.0-0 (>= 2.62.0). 181s libmbim-proxy depends on libglib2.0-0 (>= 2.56). 181s libmbim-glib4:ppc64el depends on libglib2.0-0 (>= 2.56). 181s libjson-glib-1.0-0:ppc64el depends on libglib2.0-0 (>= 2.75.3). 181s libjcat1:ppc64el depends on libglib2.0-0 (>= 2.75.3). 181s libgusb2:ppc64el depends on libglib2.0-0 (>= 2.75.3). 181s libgudev-1.0-0:ppc64el depends on libglib2.0-0 (>= 2.38.0). 181s libgirepository-1.0-1:ppc64el depends on libglib2.0-0 (>= 2.79.0). 181s libfwupd2:ppc64el depends on libglib2.0-0 (>= 2.79.0). 181s libblockdev3:ppc64el depends on libglib2.0-0 (>= 2.42.2). 181s libblockdev-utils3:ppc64el depends on libglib2.0-0 (>= 2.75.3). 181s libblockdev-swap3:ppc64el depends on libglib2.0-0 (>= 2.42.2). 181s libblockdev-part3:ppc64el depends on libglib2.0-0 (>= 2.42.2). 181s libblockdev-nvme3:ppc64el depends on libglib2.0-0 (>= 2.42.2). 181s libblockdev-mdraid3:ppc64el depends on libglib2.0-0 (>= 2.42.2). 181s libblockdev-loop3:ppc64el depends on libglib2.0-0 (>= 2.42.2). 181s libblockdev-fs3:ppc64el depends on libglib2.0-0 (>= 2.42.2). 181s libblockdev-crypto3:ppc64el depends on libglib2.0-0 (>= 2.42.2). 181s fwupd depends on libglib2.0-0 (>= 2.79.0). 181s bolt depends on libglib2.0-0 (>= 2.56.0). 181s 181s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 70156 files and directories currently installed.) 181s Removing libglib2.0-0:ppc64el (2.79.2-1~ubuntu1) ... 181s Selecting previously unselected package libglib2.0-0t64:ppc64el. 181s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 70131 files and directories currently installed.) 181s Preparing to unpack .../0-libglib2.0-0t64_2.79.3-3ubuntu5_ppc64el.deb ... 181s libglib2.0-0t64.preinst: Removing /var/lib/dpkg/info/libglib2.0-0:ppc64el.postrm to avoid loss of /usr/share/glib-2.0/schemas/gschemas.compiled... 181s removed '/var/lib/dpkg/info/libglib2.0-0:ppc64el.postrm' 181s Unpacking libglib2.0-0t64:ppc64el (2.79.3-3ubuntu5) ... 181s Preparing to unpack .../1-openssl_3.0.13-0ubuntu2_ppc64el.deb ... 181s Unpacking openssl (3.0.13-0ubuntu2) over (3.0.10-1ubuntu4) ... 181s Preparing to unpack .../2-libk5crypto3_1.20.1-6ubuntu1_ppc64el.deb ... 181s Unpacking libk5crypto3:ppc64el (1.20.1-6ubuntu1) over (1.20.1-5build1) ... 181s Preparing to unpack .../3-libgssapi-krb5-2_1.20.1-6ubuntu1_ppc64el.deb ... 181s Unpacking libgssapi-krb5-2:ppc64el (1.20.1-6ubuntu1) over (1.20.1-5build1) ... 181s Preparing to unpack .../4-libkrb5support0_1.20.1-6ubuntu1_ppc64el.deb ... 181s Unpacking libkrb5support0:ppc64el (1.20.1-6ubuntu1) over (1.20.1-5build1) ... 181s Preparing to unpack .../5-libkrb5-3_1.20.1-6ubuntu1_ppc64el.deb ... 181s Unpacking libkrb5-3:ppc64el (1.20.1-6ubuntu1) over (1.20.1-5build1) ... 181s dpkg: libssl3:ppc64el: dependency problems, but removing anyway as you requested: 181s wget depends on libssl3 (>= 3.0.0). 181s tnftp depends on libssl3 (>= 3.0.0). 181s tcpdump depends on libssl3 (>= 3.0.0). 181s systemd-resolved depends on libssl3 (>= 3.0.0). 181s systemd depends on libssl3 (>= 3.0.0). 181s sudo depends on libssl3 (>= 3.0.0). 181s rsync depends on libssl3 (>= 3.0.0). 181s python3-cryptography depends on libssl3 (>= 3.0.0). 181s openssh-server depends on libssl3 (>= 3.0.10). 181s openssh-client depends on libssl3 (>= 3.0.10). 181s linux-headers-6.8.0-11-generic depends on libssl3 (>= 3.0.0). 181s libsystemd-shared:ppc64el depends on libssl3 (>= 3.0.0). 181s libssh-4:ppc64el depends on libssl3 (>= 3.0.0). 181s libsasl2-modules:ppc64el depends on libssl3 (>= 3.0.0). 181s libsasl2-2:ppc64el depends on libssl3 (>= 3.0.0). 181s libpython3.12-minimal:ppc64el depends on libssl3 (>= 3.0.0). 181s libpython3.11-minimal:ppc64el depends on libssl3 (>= 3.0.0). 181s libnvme1 depends on libssl3 (>= 3.0.0). 181s libkmod2:ppc64el depends on libssl3 (>= 3.0.0). 181s libfido2-1:ppc64el depends on libssl3 (>= 3.0.0). 181s libcurl4:ppc64el depends on libssl3 (>= 3.0.0). 181s libcryptsetup12:ppc64el depends on libssl3 (>= 3.0.0). 181s kmod depends on libssl3 (>= 3.0.0). 181s dhcpcd-base depends on libssl3 (>= 3.0.0). 181s bind9-libs:ppc64el depends on libssl3 (>= 3.0.0). 181s 181s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 70156 files and directories currently installed.) 181s Removing libssl3:ppc64el (3.0.10-1ubuntu4) ... 181s Selecting previously unselected package libssl3t64:ppc64el. 181s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 70145 files and directories currently installed.) 181s Preparing to unpack .../libssl3t64_3.0.13-0ubuntu2_ppc64el.deb ... 181s Unpacking libssl3t64:ppc64el (3.0.13-0ubuntu2) ... 181s Preparing to unpack .../krb5-locales_1.20.1-6ubuntu1_all.deb ... 181s Unpacking krb5-locales (1.20.1-6ubuntu1) over (1.20.1-5build1) ... 181s Preparing to unpack .../libglib2.0-data_2.79.3-3ubuntu5_all.deb ... 181s Unpacking libglib2.0-data (2.79.3-3ubuntu5) over (2.79.2-1~ubuntu1) ... 181s Selecting previously unselected package xdg-user-dirs. 181s Preparing to unpack .../xdg-user-dirs_0.18-1_ppc64el.deb ... 181s Unpacking xdg-user-dirs (0.18-1) ... 181s Setting up xdg-user-dirs (0.18-1) ... 181s Setting up libssl3t64:ppc64el (3.0.13-0ubuntu2) ... 181s Setting up krb5-locales (1.20.1-6ubuntu1) ... 181s Setting up libkrb5support0:ppc64el (1.20.1-6ubuntu1) ... 181s Setting up libglib2.0-0t64:ppc64el (2.79.3-3ubuntu5) ... 181s No schema files found: doing nothing. 181s Setting up libglib2.0-data (2.79.3-3ubuntu5) ... 181s Setting up gir1.2-glib-2.0:ppc64el (2.79.3-3ubuntu5) ... 181s Setting up libk5crypto3:ppc64el (1.20.1-6ubuntu1) ... 181s Setting up libkrb5-3:ppc64el (1.20.1-6ubuntu1) ... 181s Setting up openssl (3.0.13-0ubuntu2) ... 181s Setting up libgssapi-krb5-2:ppc64el (1.20.1-6ubuntu1) ... 181s Processing triggers for man-db (2.12.0-3) ... 182s Processing triggers for libc-bin (2.39-0ubuntu6) ... 182s Reading package lists... 182s Building dependency tree... 182s Reading state information... 183s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 183s sh: Attempting to set up Debian/Ubuntu apt sources automatically 183s sh: Distribution appears to be Ubuntu 184s Reading package lists... 184s Building dependency tree... 184s Reading state information... 184s eatmydata is already the newest version (131-1). 184s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 184s Reading package lists... 184s Building dependency tree... 184s Reading state information... 185s dbus is already the newest version (1.14.10-4ubuntu1). 185s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 185s Reading package lists... 185s Building dependency tree... 185s Reading state information... 185s rng-tools-debian is already the newest version (2.4). 185s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 185s Reading package lists... 185s Building dependency tree... 185s Reading state information... 185s The following packages will be REMOVED: 185s cloud-init* python3-configobj* python3-debconf* 186s 0 upgraded, 0 newly installed, 3 to remove and 0 not upgraded. 186s After this operation, 3256 kB disk space will be freed. 186s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 70172 files and directories currently installed.) 186s Removing cloud-init (24.1.2-0ubuntu1) ... 186s Removing python3-configobj (5.0.8-3) ... 186s Removing python3-debconf (1.5.86) ... 186s Processing triggers for man-db (2.12.0-3) ... 187s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 69783 files and directories currently installed.) 187s Purging configuration files for cloud-init (24.1.2-0ubuntu1) ... 187s dpkg: warning: while removing cloud-init, directory '/etc/cloud/cloud.cfg.d' not empty so not removed 187s Processing triggers for rsyslog (8.2312.0-3ubuntu3) ... 187s invoke-rc.d: policy-rc.d denied execution of try-restart. 187s Reading package lists... 187s Building dependency tree... 187s Reading state information... 188s linux-generic is already the newest version (6.8.0-11.11+1). 188s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 188s Hit:1 http://ftpmaster.internal/ubuntu noble InRelease 188s Hit:2 http://ftpmaster.internal/ubuntu noble-updates InRelease 188s Hit:3 http://ftpmaster.internal/ubuntu noble-security InRelease 190s Reading package lists... 190s Reading package lists... 191s Building dependency tree... 191s Reading state information... 191s Calculating upgrade... 191s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 191s Reading package lists... 191s Building dependency tree... 191s Reading state information... 191s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 192s autopkgtest [14:22:30]: rebooting testbed after setup commands that affected boot 262s autopkgtest [14:23:40]: testbed running kernel: Linux 6.8.0-11-generic #11-Ubuntu SMP Wed Feb 14 00:33:03 UTC 2024 265s autopkgtest [14:23:43]: @@@@@@@@@@@@@@@@@@@@ apt-source sssd 282s Get:1 http://ftpmaster.internal/ubuntu noble/main sssd 2.9.4-1ubuntu1 (dsc) [5269 B] 282s Get:2 http://ftpmaster.internal/ubuntu noble/main sssd 2.9.4-1ubuntu1 (tar) [7983 kB] 282s Get:3 http://ftpmaster.internal/ubuntu noble/main sssd 2.9.4-1ubuntu1 (asc) [833 B] 282s Get:4 http://ftpmaster.internal/ubuntu noble/main sssd 2.9.4-1ubuntu1 (diff) [48.4 kB] 282s gpgv: Signature made Mon Feb 26 21:56:54 2024 UTC 282s gpgv: using RSA key E92FD0B36B14F1F4D8E0EB2F106DA1C8C3CBBF14 282s gpgv: Can't check signature: No public key 282s dpkg-source: warning: cannot verify inline signature for ./sssd_2.9.4-1ubuntu1.dsc: no acceptable signature found 283s autopkgtest [14:24:01]: testing package sssd version 2.9.4-1ubuntu1 283s autopkgtest [14:24:01]: build not needed 286s autopkgtest [14:24:04]: test ldap-user-group-ldap-auth: preparing testbed 289s Reading package lists... 289s Building dependency tree... 289s Reading state information... 289s Starting pkgProblemResolver with broken count: 0 289s Starting 2 pkgProblemResolver with broken count: 0 289s Done 289s The following additional packages will be installed: 289s expect ldap-utils libavahi-client3 libavahi-common-data libavahi-common3 289s libbasicobjects0 libc-ares2 libcollection4 libcrack2 libdhash1 289s libevent-2.1-7 libini-config5 libipa-hbac-dev libipa-hbac0 libjose0 libkrad0 289s libldb2 libltdl7 libnfsidmap1 libnss-sss libnss-sudo libodbc2 289s libpam-pwquality libpam-sss libpath-utils1 libpwquality-common libpwquality1 289s libref-array1 libsmbclient libsss-certmap-dev libsss-certmap0 289s libsss-idmap-dev libsss-idmap0 libsss-nss-idmap-dev libsss-nss-idmap0 289s libsss-sudo libtalloc2 libtcl8.6 libtdb1 libtevent0 libverto-libevent1 289s libverto1 libwbclient0 python3-libipa-hbac python3-libsss-nss-idmap 289s python3-sss samba-libs slapd sssd sssd-ad sssd-ad-common sssd-common 289s sssd-dbus sssd-idp sssd-ipa sssd-kcm sssd-krb5 sssd-krb5-common sssd-ldap 289s sssd-passkey sssd-proxy sssd-tools tcl-expect tcl8.6 289s Suggested packages: 289s tk8.6 libsasl2-modules-gssapi-mit | libsasl2-modules-gssapi-heimdal 289s odbc-postgresql tdsodbc adcli libsasl2-modules-ldap tcl-tclreadline 289s Recommended packages: 289s cracklib-runtime libsasl2-modules-gssapi-mit 289s | libsasl2-modules-gssapi-heimdal 289s The following NEW packages will be installed: 289s autopkgtest-satdep expect ldap-utils libavahi-client3 libavahi-common-data 289s libavahi-common3 libbasicobjects0 libc-ares2 libcollection4 libcrack2 289s libdhash1 libevent-2.1-7 libini-config5 libipa-hbac-dev libipa-hbac0 289s libjose0 libkrad0 libldb2 libltdl7 libnfsidmap1 libnss-sss libnss-sudo 289s libodbc2 libpam-pwquality libpam-sss libpath-utils1 libpwquality-common 289s libpwquality1 libref-array1 libsmbclient libsss-certmap-dev libsss-certmap0 289s libsss-idmap-dev libsss-idmap0 libsss-nss-idmap-dev libsss-nss-idmap0 289s libsss-sudo libtalloc2 libtcl8.6 libtdb1 libtevent0 libverto-libevent1 289s libverto1 libwbclient0 python3-libipa-hbac python3-libsss-nss-idmap 289s python3-sss samba-libs slapd sssd sssd-ad sssd-ad-common sssd-common 289s sssd-dbus sssd-idp sssd-ipa sssd-kcm sssd-krb5 sssd-krb5-common sssd-ldap 289s sssd-passkey sssd-proxy sssd-tools tcl-expect tcl8.6 289s 0 upgraded, 65 newly installed, 0 to remove and 0 not upgraded. 289s Need to get 14.3 MB/14.3 MB of archives. 289s After this operation, 69.9 MB of additional disk space will be used. 289s Get:1 /tmp/autopkgtest.rakP4F/1-autopkgtest-satdep.deb autopkgtest-satdep ppc64el 0 [868 B] 289s Get:2 http://ftpmaster.internal/ubuntu noble/main ppc64el libltdl7 ppc64el 2.4.7-7 [48.0 kB] 289s Get:3 http://ftpmaster.internal/ubuntu noble/main ppc64el libodbc2 ppc64el 2.3.12-1 [187 kB] 290s Get:4 http://ftpmaster.internal/ubuntu noble/main ppc64el slapd ppc64el 2.6.7+dfsg-1~exp1ubuntu1 [1768 kB] 290s Get:5 http://ftpmaster.internal/ubuntu noble/main ppc64el libtcl8.6 ppc64el 8.6.13+dfsg-2 [1179 kB] 290s Get:6 http://ftpmaster.internal/ubuntu noble/main ppc64el tcl8.6 ppc64el 8.6.13+dfsg-2 [14.8 kB] 290s Get:7 http://ftpmaster.internal/ubuntu noble/universe ppc64el tcl-expect ppc64el 5.45.4-2build1 [112 kB] 290s Get:8 http://ftpmaster.internal/ubuntu noble/universe ppc64el expect ppc64el 5.45.4-2build1 [137 kB] 290s Get:9 http://ftpmaster.internal/ubuntu noble/main ppc64el ldap-utils ppc64el 2.6.7+dfsg-1~exp1ubuntu1 [154 kB] 290s Get:10 http://ftpmaster.internal/ubuntu noble/main ppc64el libavahi-common-data ppc64el 0.8-13ubuntu2 [29.5 kB] 290s Get:11 http://ftpmaster.internal/ubuntu noble/main ppc64el libavahi-common3 ppc64el 0.8-13ubuntu2 [25.8 kB] 290s Get:12 http://ftpmaster.internal/ubuntu noble/main ppc64el libavahi-client3 ppc64el 0.8-13ubuntu2 [30.6 kB] 290s Get:13 http://ftpmaster.internal/ubuntu noble/main ppc64el libcrack2 ppc64el 2.9.6-5.1 [30.9 kB] 290s Get:14 http://ftpmaster.internal/ubuntu noble/main ppc64el libevent-2.1-7 ppc64el 2.1.12-stable-9 [169 kB] 290s Get:15 http://ftpmaster.internal/ubuntu noble/universe ppc64el libjose0 ppc64el 11-3 [50.3 kB] 290s Get:16 http://ftpmaster.internal/ubuntu noble/main ppc64el libverto-libevent1 ppc64el 0.3.1-1ubuntu5 [5960 B] 290s Get:17 http://ftpmaster.internal/ubuntu noble/main ppc64el libverto1 ppc64el 0.3.1-1ubuntu5 [11.6 kB] 290s Get:18 http://ftpmaster.internal/ubuntu noble/main ppc64el libkrad0 ppc64el 1.20.1-5build1 [24.3 kB] 290s Get:19 http://ftpmaster.internal/ubuntu noble/main ppc64el libtalloc2 ppc64el 2.4.2-1 [36.6 kB] 290s Get:20 http://ftpmaster.internal/ubuntu noble/main ppc64el libtdb1 ppc64el 1.4.10-1 [62.7 kB] 290s Get:21 http://ftpmaster.internal/ubuntu noble/main ppc64el libtevent0 ppc64el 0.16.1-1 [50.8 kB] 290s Get:22 http://ftpmaster.internal/ubuntu noble/main ppc64el libldb2 ppc64el 2:2.8.0+samba4.19.5+dfsg-1ubuntu1 [219 kB] 290s Get:23 http://ftpmaster.internal/ubuntu noble/main ppc64el libnfsidmap1 ppc64el 1:2.6.3-3ubuntu1 [53.0 kB] 290s Get:24 http://ftpmaster.internal/ubuntu noble/universe ppc64el libnss-sudo all 1.9.15p5-3ubuntu1 [14.9 kB] 290s Get:25 http://ftpmaster.internal/ubuntu noble/main ppc64el libpwquality-common all 1.4.5-3 [7658 B] 290s Get:26 http://ftpmaster.internal/ubuntu noble/main ppc64el libpwquality1 ppc64el 1.4.5-3 [16.9 kB] 290s Get:27 http://ftpmaster.internal/ubuntu noble/main ppc64el libpam-pwquality ppc64el 1.4.5-3 [12.5 kB] 290s Get:28 http://ftpmaster.internal/ubuntu noble/main ppc64el libwbclient0 ppc64el 2:4.19.5+dfsg-1ubuntu1 [76.5 kB] 290s Get:29 http://ftpmaster.internal/ubuntu noble/main ppc64el samba-libs ppc64el 2:4.19.5+dfsg-1ubuntu1 [6674 kB] 291s Get:30 http://ftpmaster.internal/ubuntu noble/main ppc64el libnss-sss ppc64el 2.9.4-1ubuntu1 [36.3 kB] 291s Get:31 http://ftpmaster.internal/ubuntu noble/main ppc64el libpam-sss ppc64el 2.9.4-1ubuntu1 [56.4 kB] 291s Get:32 http://ftpmaster.internal/ubuntu noble/main ppc64el python3-sss ppc64el 2.9.4-1ubuntu1 [48.0 kB] 291s Get:33 http://ftpmaster.internal/ubuntu noble/main ppc64el libc-ares2 ppc64el 1.27.0-1 [99.0 kB] 291s Get:34 http://ftpmaster.internal/ubuntu noble/main ppc64el libdhash1 ppc64el 0.6.2-2 [9830 B] 291s Get:35 http://ftpmaster.internal/ubuntu noble/main ppc64el libbasicobjects0 ppc64el 0.6.2-2 [5806 B] 291s Get:36 http://ftpmaster.internal/ubuntu noble/main ppc64el libcollection4 ppc64el 0.6.2-2 [35.3 kB] 291s Get:37 http://ftpmaster.internal/ubuntu noble/main ppc64el libpath-utils1 ppc64el 0.6.2-2 [10.2 kB] 291s Get:38 http://ftpmaster.internal/ubuntu noble/main ppc64el libref-array1 ppc64el 0.6.2-2 [7724 B] 291s Get:39 http://ftpmaster.internal/ubuntu noble/main ppc64el libini-config5 ppc64el 0.6.2-2 [53.9 kB] 291s Get:40 http://ftpmaster.internal/ubuntu noble/main ppc64el libsss-certmap0 ppc64el 2.9.4-1ubuntu1 [53.6 kB] 291s Get:41 http://ftpmaster.internal/ubuntu noble/main ppc64el libsss-idmap0 ppc64el 2.9.4-1ubuntu1 [24.7 kB] 291s Get:42 http://ftpmaster.internal/ubuntu noble/main ppc64el libsss-nss-idmap0 ppc64el 2.9.4-1ubuntu1 [37.4 kB] 291s Get:43 http://ftpmaster.internal/ubuntu noble/main ppc64el sssd-common ppc64el 2.9.4-1ubuntu1 [1280 kB] 291s Get:44 http://ftpmaster.internal/ubuntu noble/universe ppc64el sssd-idp ppc64el 2.9.4-1ubuntu1 [30.8 kB] 291s Get:45 http://ftpmaster.internal/ubuntu noble/universe ppc64el sssd-passkey ppc64el 2.9.4-1ubuntu1 [35.4 kB] 291s Get:46 http://ftpmaster.internal/ubuntu noble/main ppc64el sssd-ad-common ppc64el 2.9.4-1ubuntu1 [88.6 kB] 291s Get:47 http://ftpmaster.internal/ubuntu noble/main ppc64el sssd-krb5-common ppc64el 2.9.4-1ubuntu1 [103 kB] 291s Get:48 http://ftpmaster.internal/ubuntu noble/main ppc64el libsmbclient ppc64el 2:4.19.5+dfsg-1ubuntu1 [70.4 kB] 291s Get:49 http://ftpmaster.internal/ubuntu noble/main ppc64el sssd-ad ppc64el 2.9.4-1ubuntu1 [147 kB] 291s Get:50 http://ftpmaster.internal/ubuntu noble/main ppc64el libipa-hbac0 ppc64el 2.9.4-1ubuntu1 [17.4 kB] 291s Get:51 http://ftpmaster.internal/ubuntu noble/main ppc64el sssd-ipa ppc64el 2.9.4-1ubuntu1 [240 kB] 291s Get:52 http://ftpmaster.internal/ubuntu noble/main ppc64el sssd-krb5 ppc64el 2.9.4-1ubuntu1 [14.4 kB] 291s Get:53 http://ftpmaster.internal/ubuntu noble/main ppc64el sssd-ldap ppc64el 2.9.4-1ubuntu1 [31.6 kB] 291s Get:54 http://ftpmaster.internal/ubuntu noble/main ppc64el sssd-proxy ppc64el 2.9.4-1ubuntu1 [48.0 kB] 291s Get:55 http://ftpmaster.internal/ubuntu noble/main ppc64el sssd ppc64el 2.9.4-1ubuntu1 [4124 B] 291s Get:56 http://ftpmaster.internal/ubuntu noble/main ppc64el sssd-dbus ppc64el 2.9.4-1ubuntu1 [122 kB] 292s Get:57 http://ftpmaster.internal/ubuntu noble/universe ppc64el sssd-kcm ppc64el 2.9.4-1ubuntu1 [160 kB] 292s Get:58 http://ftpmaster.internal/ubuntu noble/main ppc64el sssd-tools ppc64el 2.9.4-1ubuntu1 [108 kB] 292s Get:59 http://ftpmaster.internal/ubuntu noble/main ppc64el libipa-hbac-dev ppc64el 2.9.4-1ubuntu1 [6666 B] 292s Get:60 http://ftpmaster.internal/ubuntu noble/main ppc64el libsss-certmap-dev ppc64el 2.9.4-1ubuntu1 [5734 B] 292s Get:61 http://ftpmaster.internal/ubuntu noble/main ppc64el libsss-idmap-dev ppc64el 2.9.4-1ubuntu1 [8380 B] 292s Get:62 http://ftpmaster.internal/ubuntu noble/main ppc64el libsss-nss-idmap-dev ppc64el 2.9.4-1ubuntu1 [6722 B] 292s Get:63 http://ftpmaster.internal/ubuntu noble/universe ppc64el libsss-sudo ppc64el 2.9.4-1ubuntu1 [22.4 kB] 292s Get:64 http://ftpmaster.internal/ubuntu noble/universe ppc64el python3-libipa-hbac ppc64el 2.9.4-1ubuntu1 [19.2 kB] 292s Get:65 http://ftpmaster.internal/ubuntu noble/universe ppc64el python3-libsss-nss-idmap ppc64el 2.9.4-1ubuntu1 [9542 B] 292s Preconfiguring packages ... 292s Fetched 14.3 MB in 3s (5643 kB/s) 292s Selecting previously unselected package libltdl7:ppc64el. 292s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 69728 files and directories currently installed.) 292s Preparing to unpack .../00-libltdl7_2.4.7-7_ppc64el.deb ... 292s Unpacking libltdl7:ppc64el (2.4.7-7) ... 292s Selecting previously unselected package libodbc2:ppc64el. 292s Preparing to unpack .../01-libodbc2_2.3.12-1_ppc64el.deb ... 292s Unpacking libodbc2:ppc64el (2.3.12-1) ... 292s Selecting previously unselected package slapd. 292s Preparing to unpack .../02-slapd_2.6.7+dfsg-1~exp1ubuntu1_ppc64el.deb ... 292s Unpacking slapd (2.6.7+dfsg-1~exp1ubuntu1) ... 292s Selecting previously unselected package libtcl8.6:ppc64el. 292s Preparing to unpack .../03-libtcl8.6_8.6.13+dfsg-2_ppc64el.deb ... 292s Unpacking libtcl8.6:ppc64el (8.6.13+dfsg-2) ... 292s Selecting previously unselected package tcl8.6. 292s Preparing to unpack .../04-tcl8.6_8.6.13+dfsg-2_ppc64el.deb ... 292s Unpacking tcl8.6 (8.6.13+dfsg-2) ... 292s Selecting previously unselected package tcl-expect:ppc64el. 292s Preparing to unpack .../05-tcl-expect_5.45.4-2build1_ppc64el.deb ... 292s Unpacking tcl-expect:ppc64el (5.45.4-2build1) ... 292s Selecting previously unselected package expect. 292s Preparing to unpack .../06-expect_5.45.4-2build1_ppc64el.deb ... 292s Unpacking expect (5.45.4-2build1) ... 292s Selecting previously unselected package ldap-utils. 292s Preparing to unpack .../07-ldap-utils_2.6.7+dfsg-1~exp1ubuntu1_ppc64el.deb ... 292s Unpacking ldap-utils (2.6.7+dfsg-1~exp1ubuntu1) ... 292s Selecting previously unselected package libavahi-common-data:ppc64el. 292s Preparing to unpack .../08-libavahi-common-data_0.8-13ubuntu2_ppc64el.deb ... 292s Unpacking libavahi-common-data:ppc64el (0.8-13ubuntu2) ... 293s Selecting previously unselected package libavahi-common3:ppc64el. 293s Preparing to unpack .../09-libavahi-common3_0.8-13ubuntu2_ppc64el.deb ... 293s Unpacking libavahi-common3:ppc64el (0.8-13ubuntu2) ... 293s Selecting previously unselected package libavahi-client3:ppc64el. 293s Preparing to unpack .../10-libavahi-client3_0.8-13ubuntu2_ppc64el.deb ... 293s Unpacking libavahi-client3:ppc64el (0.8-13ubuntu2) ... 293s Selecting previously unselected package libcrack2:ppc64el. 293s Preparing to unpack .../11-libcrack2_2.9.6-5.1_ppc64el.deb ... 293s Unpacking libcrack2:ppc64el (2.9.6-5.1) ... 293s Selecting previously unselected package libevent-2.1-7:ppc64el. 293s Preparing to unpack .../12-libevent-2.1-7_2.1.12-stable-9_ppc64el.deb ... 293s Unpacking libevent-2.1-7:ppc64el (2.1.12-stable-9) ... 293s Selecting previously unselected package libjose0:ppc64el. 293s Preparing to unpack .../13-libjose0_11-3_ppc64el.deb ... 293s Unpacking libjose0:ppc64el (11-3) ... 293s Selecting previously unselected package libverto-libevent1:ppc64el. 293s Preparing to unpack .../14-libverto-libevent1_0.3.1-1ubuntu5_ppc64el.deb ... 293s Unpacking libverto-libevent1:ppc64el (0.3.1-1ubuntu5) ... 293s Selecting previously unselected package libverto1:ppc64el. 293s Preparing to unpack .../15-libverto1_0.3.1-1ubuntu5_ppc64el.deb ... 293s Unpacking libverto1:ppc64el (0.3.1-1ubuntu5) ... 293s Selecting previously unselected package libkrad0:ppc64el. 293s Preparing to unpack .../16-libkrad0_1.20.1-5build1_ppc64el.deb ... 293s Unpacking libkrad0:ppc64el (1.20.1-5build1) ... 293s Selecting previously unselected package libtalloc2:ppc64el. 293s Preparing to unpack .../17-libtalloc2_2.4.2-1_ppc64el.deb ... 293s Unpacking libtalloc2:ppc64el (2.4.2-1) ... 293s Selecting previously unselected package libtdb1:ppc64el. 293s Preparing to unpack .../18-libtdb1_1.4.10-1_ppc64el.deb ... 293s Unpacking libtdb1:ppc64el (1.4.10-1) ... 293s Selecting previously unselected package libtevent0:ppc64el. 293s Preparing to unpack .../19-libtevent0_0.16.1-1_ppc64el.deb ... 293s Unpacking libtevent0:ppc64el (0.16.1-1) ... 293s Selecting previously unselected package libldb2:ppc64el. 293s Preparing to unpack .../20-libldb2_2%3a2.8.0+samba4.19.5+dfsg-1ubuntu1_ppc64el.deb ... 293s Unpacking libldb2:ppc64el (2:2.8.0+samba4.19.5+dfsg-1ubuntu1) ... 293s Selecting previously unselected package libnfsidmap1:ppc64el. 293s Preparing to unpack .../21-libnfsidmap1_1%3a2.6.3-3ubuntu1_ppc64el.deb ... 293s Unpacking libnfsidmap1:ppc64el (1:2.6.3-3ubuntu1) ... 293s Selecting previously unselected package libnss-sudo. 293s Preparing to unpack .../22-libnss-sudo_1.9.15p5-3ubuntu1_all.deb ... 293s Unpacking libnss-sudo (1.9.15p5-3ubuntu1) ... 293s Selecting previously unselected package libpwquality-common. 293s Preparing to unpack .../23-libpwquality-common_1.4.5-3_all.deb ... 293s Unpacking libpwquality-common (1.4.5-3) ... 293s Selecting previously unselected package libpwquality1:ppc64el. 293s Preparing to unpack .../24-libpwquality1_1.4.5-3_ppc64el.deb ... 293s Unpacking libpwquality1:ppc64el (1.4.5-3) ... 293s Selecting previously unselected package libpam-pwquality:ppc64el. 293s Preparing to unpack .../25-libpam-pwquality_1.4.5-3_ppc64el.deb ... 293s Unpacking libpam-pwquality:ppc64el (1.4.5-3) ... 293s Selecting previously unselected package libwbclient0:ppc64el. 293s Preparing to unpack .../26-libwbclient0_2%3a4.19.5+dfsg-1ubuntu1_ppc64el.deb ... 293s Unpacking libwbclient0:ppc64el (2:4.19.5+dfsg-1ubuntu1) ... 293s Selecting previously unselected package samba-libs:ppc64el. 293s Preparing to unpack .../27-samba-libs_2%3a4.19.5+dfsg-1ubuntu1_ppc64el.deb ... 293s Unpacking samba-libs:ppc64el (2:4.19.5+dfsg-1ubuntu1) ... 293s Selecting previously unselected package libnss-sss:ppc64el. 293s Preparing to unpack .../28-libnss-sss_2.9.4-1ubuntu1_ppc64el.deb ... 293s Unpacking libnss-sss:ppc64el (2.9.4-1ubuntu1) ... 293s Selecting previously unselected package libpam-sss:ppc64el. 293s Preparing to unpack .../29-libpam-sss_2.9.4-1ubuntu1_ppc64el.deb ... 293s Unpacking libpam-sss:ppc64el (2.9.4-1ubuntu1) ... 293s Selecting previously unselected package python3-sss. 293s Preparing to unpack .../30-python3-sss_2.9.4-1ubuntu1_ppc64el.deb ... 293s Unpacking python3-sss (2.9.4-1ubuntu1) ... 293s Selecting previously unselected package libc-ares2:ppc64el. 293s Preparing to unpack .../31-libc-ares2_1.27.0-1_ppc64el.deb ... 293s Unpacking libc-ares2:ppc64el (1.27.0-1) ... 293s Selecting previously unselected package libdhash1:ppc64el. 293s Preparing to unpack .../32-libdhash1_0.6.2-2_ppc64el.deb ... 293s Unpacking libdhash1:ppc64el (0.6.2-2) ... 293s Selecting previously unselected package libbasicobjects0:ppc64el. 293s Preparing to unpack .../33-libbasicobjects0_0.6.2-2_ppc64el.deb ... 293s Unpacking libbasicobjects0:ppc64el (0.6.2-2) ... 293s Selecting previously unselected package libcollection4:ppc64el. 293s Preparing to unpack .../34-libcollection4_0.6.2-2_ppc64el.deb ... 293s Unpacking libcollection4:ppc64el (0.6.2-2) ... 293s Selecting previously unselected package libpath-utils1:ppc64el. 293s Preparing to unpack .../35-libpath-utils1_0.6.2-2_ppc64el.deb ... 293s Unpacking libpath-utils1:ppc64el (0.6.2-2) ... 293s Selecting previously unselected package libref-array1:ppc64el. 293s Preparing to unpack .../36-libref-array1_0.6.2-2_ppc64el.deb ... 293s Unpacking libref-array1:ppc64el (0.6.2-2) ... 293s Selecting previously unselected package libini-config5:ppc64el. 293s Preparing to unpack .../37-libini-config5_0.6.2-2_ppc64el.deb ... 293s Unpacking libini-config5:ppc64el (0.6.2-2) ... 293s Selecting previously unselected package libsss-certmap0. 293s Preparing to unpack .../38-libsss-certmap0_2.9.4-1ubuntu1_ppc64el.deb ... 293s Unpacking libsss-certmap0 (2.9.4-1ubuntu1) ... 293s Selecting previously unselected package libsss-idmap0. 293s Preparing to unpack .../39-libsss-idmap0_2.9.4-1ubuntu1_ppc64el.deb ... 293s Unpacking libsss-idmap0 (2.9.4-1ubuntu1) ... 293s Selecting previously unselected package libsss-nss-idmap0. 293s Preparing to unpack .../40-libsss-nss-idmap0_2.9.4-1ubuntu1_ppc64el.deb ... 293s Unpacking libsss-nss-idmap0 (2.9.4-1ubuntu1) ... 293s Selecting previously unselected package sssd-common. 293s Preparing to unpack .../41-sssd-common_2.9.4-1ubuntu1_ppc64el.deb ... 293s Unpacking sssd-common (2.9.4-1ubuntu1) ... 293s Selecting previously unselected package sssd-idp. 293s Preparing to unpack .../42-sssd-idp_2.9.4-1ubuntu1_ppc64el.deb ... 293s Unpacking sssd-idp (2.9.4-1ubuntu1) ... 293s Selecting previously unselected package sssd-passkey. 293s Preparing to unpack .../43-sssd-passkey_2.9.4-1ubuntu1_ppc64el.deb ... 293s Unpacking sssd-passkey (2.9.4-1ubuntu1) ... 293s Selecting previously unselected package sssd-ad-common. 293s Preparing to unpack .../44-sssd-ad-common_2.9.4-1ubuntu1_ppc64el.deb ... 293s Unpacking sssd-ad-common (2.9.4-1ubuntu1) ... 293s Selecting previously unselected package sssd-krb5-common. 293s Preparing to unpack .../45-sssd-krb5-common_2.9.4-1ubuntu1_ppc64el.deb ... 293s Unpacking sssd-krb5-common (2.9.4-1ubuntu1) ... 293s Selecting previously unselected package libsmbclient:ppc64el. 293s Preparing to unpack .../46-libsmbclient_2%3a4.19.5+dfsg-1ubuntu1_ppc64el.deb ... 293s Unpacking libsmbclient:ppc64el (2:4.19.5+dfsg-1ubuntu1) ... 293s Selecting previously unselected package sssd-ad. 293s Preparing to unpack .../47-sssd-ad_2.9.4-1ubuntu1_ppc64el.deb ... 293s Unpacking sssd-ad (2.9.4-1ubuntu1) ... 293s Selecting previously unselected package libipa-hbac0. 293s Preparing to unpack .../48-libipa-hbac0_2.9.4-1ubuntu1_ppc64el.deb ... 293s Unpacking libipa-hbac0 (2.9.4-1ubuntu1) ... 293s Selecting previously unselected package sssd-ipa. 293s Preparing to unpack .../49-sssd-ipa_2.9.4-1ubuntu1_ppc64el.deb ... 293s Unpacking sssd-ipa (2.9.4-1ubuntu1) ... 293s Selecting previously unselected package sssd-krb5. 293s Preparing to unpack .../50-sssd-krb5_2.9.4-1ubuntu1_ppc64el.deb ... 293s Unpacking sssd-krb5 (2.9.4-1ubuntu1) ... 293s Selecting previously unselected package sssd-ldap. 293s Preparing to unpack .../51-sssd-ldap_2.9.4-1ubuntu1_ppc64el.deb ... 293s Unpacking sssd-ldap (2.9.4-1ubuntu1) ... 293s Selecting previously unselected package sssd-proxy. 293s Preparing to unpack .../52-sssd-proxy_2.9.4-1ubuntu1_ppc64el.deb ... 293s Unpacking sssd-proxy (2.9.4-1ubuntu1) ... 293s Selecting previously unselected package sssd. 293s Preparing to unpack .../53-sssd_2.9.4-1ubuntu1_ppc64el.deb ... 293s Unpacking sssd (2.9.4-1ubuntu1) ... 294s Selecting previously unselected package sssd-dbus. 294s Preparing to unpack .../54-sssd-dbus_2.9.4-1ubuntu1_ppc64el.deb ... 294s Unpacking sssd-dbus (2.9.4-1ubuntu1) ... 294s Selecting previously unselected package sssd-kcm. 294s Preparing to unpack .../55-sssd-kcm_2.9.4-1ubuntu1_ppc64el.deb ... 294s Unpacking sssd-kcm (2.9.4-1ubuntu1) ... 294s Selecting previously unselected package sssd-tools. 294s Preparing to unpack .../56-sssd-tools_2.9.4-1ubuntu1_ppc64el.deb ... 294s Unpacking sssd-tools (2.9.4-1ubuntu1) ... 294s Selecting previously unselected package libipa-hbac-dev. 294s Preparing to unpack .../57-libipa-hbac-dev_2.9.4-1ubuntu1_ppc64el.deb ... 294s Unpacking libipa-hbac-dev (2.9.4-1ubuntu1) ... 294s Selecting previously unselected package libsss-certmap-dev. 294s Preparing to unpack .../58-libsss-certmap-dev_2.9.4-1ubuntu1_ppc64el.deb ... 294s Unpacking libsss-certmap-dev (2.9.4-1ubuntu1) ... 294s Selecting previously unselected package libsss-idmap-dev. 294s Preparing to unpack .../59-libsss-idmap-dev_2.9.4-1ubuntu1_ppc64el.deb ... 294s Unpacking libsss-idmap-dev (2.9.4-1ubuntu1) ... 294s Selecting previously unselected package libsss-nss-idmap-dev. 294s Preparing to unpack .../60-libsss-nss-idmap-dev_2.9.4-1ubuntu1_ppc64el.deb ... 294s Unpacking libsss-nss-idmap-dev (2.9.4-1ubuntu1) ... 294s Selecting previously unselected package libsss-sudo. 294s Preparing to unpack .../61-libsss-sudo_2.9.4-1ubuntu1_ppc64el.deb ... 294s Unpacking libsss-sudo (2.9.4-1ubuntu1) ... 294s Selecting previously unselected package python3-libipa-hbac. 294s Preparing to unpack .../62-python3-libipa-hbac_2.9.4-1ubuntu1_ppc64el.deb ... 294s Unpacking python3-libipa-hbac (2.9.4-1ubuntu1) ... 294s Selecting previously unselected package python3-libsss-nss-idmap. 294s Preparing to unpack .../63-python3-libsss-nss-idmap_2.9.4-1ubuntu1_ppc64el.deb ... 294s Unpacking python3-libsss-nss-idmap (2.9.4-1ubuntu1) ... 294s Selecting previously unselected package autopkgtest-satdep. 294s Preparing to unpack .../64-1-autopkgtest-satdep.deb ... 294s Unpacking autopkgtest-satdep (0) ... 294s Setting up libpwquality-common (1.4.5-3) ... 294s Setting up libpath-utils1:ppc64el (0.6.2-2) ... 294s Setting up libnfsidmap1:ppc64el (1:2.6.3-3ubuntu1) ... 294s Setting up libsss-idmap0 (2.9.4-1ubuntu1) ... 294s Setting up libbasicobjects0:ppc64el (0.6.2-2) ... 294s Setting up libsss-idmap-dev (2.9.4-1ubuntu1) ... 294s Setting up libtdb1:ppc64el (1.4.10-1) ... 294s Setting up libc-ares2:ppc64el (1.27.0-1) ... 294s Setting up ldap-utils (2.6.7+dfsg-1~exp1ubuntu1) ... 294s Setting up libjose0:ppc64el (11-3) ... 294s Setting up libwbclient0:ppc64el (2:4.19.5+dfsg-1ubuntu1) ... 294s Setting up libtalloc2:ppc64el (2.4.2-1) ... 294s Setting up libdhash1:ppc64el (0.6.2-2) ... 294s Setting up libtevent0:ppc64el (0.16.1-1) ... 294s Setting up libavahi-common-data:ppc64el (0.8-13ubuntu2) ... 294s Setting up libevent-2.1-7:ppc64el (2.1.12-stable-9) ... 294s Setting up libtcl8.6:ppc64el (8.6.13+dfsg-2) ... 294s Setting up libltdl7:ppc64el (2.4.7-7) ... 294s Setting up libcrack2:ppc64el (2.9.6-5.1) ... 294s Setting up libcollection4:ppc64el (0.6.2-2) ... 294s Setting up libodbc2:ppc64el (2.3.12-1) ... 294s Setting up libipa-hbac0 (2.9.4-1ubuntu1) ... 294s Setting up python3-libipa-hbac (2.9.4-1ubuntu1) ... 294s Setting up libref-array1:ppc64el (0.6.2-2) ... 294s Setting up libnss-sudo (1.9.15p5-3ubuntu1) ... 294s Setting up libldb2:ppc64el (2:2.8.0+samba4.19.5+dfsg-1ubuntu1) ... 294s Setting up libsss-nss-idmap0 (2.9.4-1ubuntu1) ... 294s Setting up libnss-sss:ppc64el (2.9.4-1ubuntu1) ... 294s Setting up slapd (2.6.7+dfsg-1~exp1ubuntu1) ... 294s Creating new user openldap... done. 294s Creating initial configuration... done. 294s Creating LDAP directory... done. 295s Setting up tcl8.6 (8.6.13+dfsg-2) ... 295s Setting up libsss-sudo (2.9.4-1ubuntu1) ... 295s Setting up libsss-nss-idmap-dev (2.9.4-1ubuntu1) ... 295s Setting up libipa-hbac-dev (2.9.4-1ubuntu1) ... 295s Setting up libini-config5:ppc64el (0.6.2-2) ... 295s Setting up libavahi-common3:ppc64el (0.8-13ubuntu2) ... 295s Setting up tcl-expect:ppc64el (5.45.4-2build1) ... 295s Setting up python3-sss (2.9.4-1ubuntu1) ... 295s Setting up libsss-certmap0 (2.9.4-1ubuntu1) ... 295s Setting up libpwquality1:ppc64el (1.4.5-3) ... 295s Setting up python3-libsss-nss-idmap (2.9.4-1ubuntu1) ... 295s Setting up libavahi-client3:ppc64el (0.8-13ubuntu2) ... 295s Setting up expect (5.45.4-2build1) ... 295s Setting up libpam-pwquality:ppc64el (1.4.5-3) ... 295s Setting up samba-libs:ppc64el (2:4.19.5+dfsg-1ubuntu1) ... 295s Setting up libsss-certmap-dev (2.9.4-1ubuntu1) ... 295s Setting up libsmbclient:ppc64el (2:4.19.5+dfsg-1ubuntu1) ... 295s Setting up libpam-sss:ppc64el (2.9.4-1ubuntu1) ... 295s Setting up sssd-common (2.9.4-1ubuntu1) ... 295s Creating SSSD system user & group... 295s warn: The home directory `/var/lib/sss' already exists. Not touching this directory. 295s warn: Warning: The home directory `/var/lib/sss' does not belong to the user you are currently creating. 295s Warning: found usr.sbin.sssd in /etc/apparmor.d/force-complain, forcing complain mode 295s Warning from /etc/apparmor.d/usr.sbin.sssd (/etc/apparmor.d/usr.sbin.sssd line 63): Caching disabled for: 'usr.sbin.sssd' due to force complain 296s Created symlink /etc/systemd/system/sssd.service.wants/sssd-autofs.socket → /usr/lib/systemd/system/sssd-autofs.socket. 296s Created symlink /etc/systemd/system/sssd.service.wants/sssd-nss.socket → /usr/lib/systemd/system/sssd-nss.socket. 296s Created symlink /etc/systemd/system/sssd.service.wants/sssd-pam-priv.socket → /usr/lib/systemd/system/sssd-pam-priv.socket. 296s Created symlink /etc/systemd/system/sssd.service.wants/sssd-pam.socket → /usr/lib/systemd/system/sssd-pam.socket. 297s Created symlink /etc/systemd/system/sssd.service.wants/sssd-ssh.socket → /usr/lib/systemd/system/sssd-ssh.socket. 297s Created symlink /etc/systemd/system/sssd.service.wants/sssd-sudo.socket → /usr/lib/systemd/system/sssd-sudo.socket. 297s Created symlink /etc/systemd/system/multi-user.target.wants/sssd.service → /usr/lib/systemd/system/sssd.service. 298s sssd-autofs.service is a disabled or a static unit, not starting it. 298s sssd-nss.service is a disabled or a static unit, not starting it. 298s sssd-pam.service is a disabled or a static unit, not starting it. 298s sssd-ssh.service is a disabled or a static unit, not starting it. 298s sssd-sudo.service is a disabled or a static unit, not starting it. 298s Could not execute systemctl: at /usr/bin/deb-systemd-invoke line 148. 298s Setting up sssd-proxy (2.9.4-1ubuntu1) ... 298s Setting up sssd-kcm (2.9.4-1ubuntu1) ... 298s Created symlink /etc/systemd/system/sockets.target.wants/sssd-kcm.socket → /usr/lib/systemd/system/sssd-kcm.socket. 298s sssd-kcm.service is a disabled or a static unit, not starting it. 298s Setting up sssd-dbus (2.9.4-1ubuntu1) ... 299s sssd-ifp.service is a disabled or a static unit, not starting it. 299s Setting up sssd-ad-common (2.9.4-1ubuntu1) ... 299s Created symlink /etc/systemd/system/sssd.service.wants/sssd-pac.socket → /usr/lib/systemd/system/sssd-pac.socket. 299s sssd-pac.service is a disabled or a static unit, not starting it. 299s Could not execute systemctl: at /usr/bin/deb-systemd-invoke line 148. 299s Setting up sssd-krb5-common (2.9.4-1ubuntu1) ... 299s Setting up sssd-krb5 (2.9.4-1ubuntu1) ... 299s Setting up sssd-ldap (2.9.4-1ubuntu1) ... 299s Setting up sssd-ad (2.9.4-1ubuntu1) ... 299s Setting up sssd-tools (2.9.4-1ubuntu1) ... 299s Setting up sssd-ipa (2.9.4-1ubuntu1) ... 299s Setting up sssd (2.9.4-1ubuntu1) ... 299s Setting up libverto-libevent1:ppc64el (0.3.1-1ubuntu5) ... 299s Setting up libverto1:ppc64el (0.3.1-1ubuntu5) ... 299s Setting up libkrad0:ppc64el (1.20.1-5build1) ... 299s Setting up sssd-passkey (2.9.4-1ubuntu1) ... 299s Setting up sssd-idp (2.9.4-1ubuntu1) ... 299s Setting up autopkgtest-satdep (0) ... 299s Processing triggers for libc-bin (2.39-0ubuntu6) ... 299s Processing triggers for ufw (0.36.2-5) ... 299s Processing triggers for man-db (2.12.0-3) ... 300s Processing triggers for dbus (1.14.10-4ubuntu1) ... 309s (Reading database ... 71013 files and directories currently installed.) 309s Removing autopkgtest-satdep (0) ... 310s autopkgtest [14:24:28]: test ldap-user-group-ldap-auth: [----------------------- 310s + . debian/tests/util 310s + . debian/tests/common-tests 310s + mydomain=example.com 310s + myhostname=ldap.example.com 310s + mysuffix=dc=example,dc=com 310s + admin_dn=cn=admin,dc=example,dc=com 310s + admin_pw=secret 310s + ldap_user=testuser1 310s + ldap_user_pw=testuser1secret 310s + ldap_group=ldapusers 310s + adjust_hostname ldap.example.com 310s + local myhostname=ldap.example.com 310s + echo ldap.example.com 310s + hostname ldap.example.com 310s + grep -qE ldap.example.com /etc/hosts 310s + echo 127.0.1.10 ldap.example.com 310s + reconfigure_slapd 310s + debconf-set-selections 310s + rm -rf /var/backups/*slapd* /var/backups/unknown*ldapdb 310s + dpkg-reconfigure -fnoninteractive -pcritical slapd 310s Backing up /etc/ldap/slapd.d in /var/backups/slapd-2.6.7+dfsg-1~exp1ubuntu1... done. 310s Moving old database directory to /var/backups: 310s - directory unknown... done. 310s Creating initial configuration... done. 310s Creating LDAP directory... done. 311s + generate_certs ldap.example.com 311s + local cn=ldap.example.com 311s + local cert=/etc/ldap/server.pem 311s + local key=/etc/ldap/server.key 311s + local cnf=/etc/ldap/openssl.cnf 311s + cat 311s + openssl req -new -x509 -nodes -out /etc/ldap/server.pem -keyout /etc/ldap/server.key -config /etc/ldap/openssl.cnf 311s .......................++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ 311s ......................++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ 311s ----- 311s + chmod 0640 /etc/ldap/server.key 311s + chgrp openldap /etc/ldap/server.key 311s + [ ! -f /etc/ldap/server.pem ] 311s + [ ! -f /etc/ldap/server.key ] 311s + enable_ldap_ssl 311s + cat 311s + cat 311s + ldapmodify -H ldapi:/// -Y EXTERNAL -Q 311s + populate_ldap_rfc2307 311s + cat 311s + ldapadd -x -D cn=admin,dc=example,dc=com -w secret 311s + configure_sssd_ldap_rfc2307 311s + cat 311s + chmod 0600 /etc/sssd/sssd.conf 311s + systemctl restart sssd 311s modifying entry "cn=config" 311s 311s adding new entry "ou=People,dc=example,dc=com" 311s 311s adding new entry "ou=Group,dc=example,dc=com" 311s 311s adding new entry "uid=testuser1,ou=People,dc=example,dc=com" 311s 311s adding new entry "cn=testuser1,ou=Group,dc=example,dc=com" 311s 311s adding new entry "cn=ldapusers,ou=Group,dc=example,dc=com" 311s 311s + enable_pam_mkhomedir 311s + grep -qE ^session.*pam_mkhomedir\.so /etc/pam.d/common-session 311s + echo session optional pam_mkhomedir.so 311s + run_common_testsAssert local user databases do not have our LDAP test data 311s 311s + echo Assert local user databases do not have our LDAP test data 311s + check_local_user testuser1 311s + local local_user=testuser1 311s + grep -q ^testuser1 /etc/passwd 311s + check_local_group testuser1 311s + local local_group=testuser1 311s + grep -q ^testuser1 /etc/group 311s + check_local_group ldapusers 311s + local local_group=ldapusers 311s + grep -q ^ldapusers /etc/group 311s + echoThe LDAP user is known to the system via getent 311s The LDAP user is known to the system via getent 311s + check_getent_user testuser1 311s + local getent_user=testuser1 311s + local output 311s + getent passwd testuser1 311s + output=testuser1:*:10001:10001:testuser1:/home/testuser1:/bin/bash 311s + [ -z testuser1:*:10001:10001:testuser1:/home/testuser1:/bin/bash ] 311s + echo The LDAP user's private group is known to the system via getent 311s + check_getent_groupThe LDAP user's private group is known to the system via getent 311s testuser1 311s + local getent_group=testuser1 311s + local output 311s + getent group testuser1 311s The LDAP group ldapusers is known to the system via getent 311s + output=testuser1:*:10001:testuser1 311s + [ -z testuser1:*:10001:testuser1 ] 311s + echo The LDAP group ldapusers is known to the system via getent 311s + check_getent_group ldapusers 311s + local getent_group=ldapusers 311s + local output 311s + getent group ldapusers 311s + output=ldapusers:*:10100:testuser1 311s + [ -zThe id(1) command can resolve the group membership of the LDAP user 311s ldapusers:*:10100:testuser1 ] 311s + echo The id(1) command can resolve the group membership of the LDAP user 311s + id -Gn testuser1 311s + output=testuser1 ldapusers 311s + [ testuser1 ldapusers != testuser1 ldapusers ] 311s + echo The LDAP user can login on a terminal 311s The LDAP user can login on a terminal 311s + /usr/bin/expect -f debian/tests/login.exp testuser1 testuser1secret 311s spawn login 311s ldap.example.com login: testuser1 311s Password: 311s Welcome to Ubuntu Noble Numbat (development branch) (GNU/Linux 6.8.0-11-generic ppc64le) 311s 311s * Documentation: https://help.ubuntu.com 311s * Management: https://landscape.canonical.com 311s * Support: https://ubuntu.com/pro 311s 311s 311s The programs included with the Ubuntu system are free software; 311s the exact distribution terms for each program are described in the 311s individual files in /usr/share/doc/*/copyright. 311s 311s Ubuntu comes with ABSOLUTELY NO WARRANTY, to the extent permitted by 311s applicable law. 311s 311s 311s The programs included with the Ubuntu system are free software; 311s the exact distribution terms for each program are described in the 311s individual files in /usr/share/doc/*/copyright. 311s 311s Ubuntu comes with ABSOLUTELY NO WARRANTY, to the extent permitted by 311s applicable law. 311s 311s Creating directory '/home/testuser1'. 311s [?2004htestuser1@ldap:~$ id -un 311s [?2004l testuser1 311s [?2004htestuser1@ldap:~$ autopkgtest [14:24:29]: test ldap-user-group-ldap-auth: -----------------------] 312s autopkgtest [14:24:30]: test ldap-user-group-ldap-auth: - - - - - - - - - - results - - - - - - - - - - 312s ldap-user-group-ldap-auth PASS 312s autopkgtest [14:24:30]: test ldap-user-group-krb5-auth: preparing testbed 317s Reading package lists... 317s Building dependency tree... 317s Reading state information... 317s Starting pkgProblemResolver with broken count: 3 317s Starting 2 pkgProblemResolver with broken count: 3 317s Investigating (0) krb5-user:ppc64el < none -> 1.20.1-5build1 @un pumN Ib > 317s Broken krb5-user:ppc64el Depends on libkrb5-3:ppc64el < 1.20.1-6ubuntu1 @ii pmK > (= 1.20.1-5build1) 317s Considering libkrb5-3:ppc64el 55 as a solution to krb5-user:ppc64el 2 317s Broken krb5-user:ppc64el Depends on libkadm5clnt-mit12:ppc64el < none | 1.20.1-5build1 @un uH > (>= 1.18.2) 317s Considering libkadm5clnt-mit12:ppc64el 0 as a solution to krb5-user:ppc64el 2 317s Re-Instated libgssrpc4:ppc64el 317s Reinst Failed because of protected libkrb5support0:ppc64el 317s Broken krb5-user:ppc64el Depends on libkadm5srv-mit12:ppc64el < none | 1.20.1-5build1 @un uH > (>= 1.18.2) 317s Considering libkadm5srv-mit12:ppc64el 0 as a solution to krb5-user:ppc64el 2 317s Reinst Failed because of protected libkrb5support0:ppc64el 317s Reinst Failed because of libkdb5-10:ppc64el 317s Broken krb5-user:ppc64el Depends on libkdb5-10:ppc64el < none | 1.20.1-5build1 @un uH > (>= 1.20.1) 317s Considering libkdb5-10:ppc64el 0 as a solution to krb5-user:ppc64el 2 317s Broken krb5-user:ppc64el Depends on libkrb5support0:ppc64el < 1.20.1-6ubuntu1 @ii pmK > (= 1.20.1-5build1) 317s Considering libkrb5support0:ppc64el 25 as a solution to krb5-user:ppc64el 2 317s Investigating (0) krb5-kdc:ppc64el < none -> 1.20.1-5build1 @un puN Ib > 317s Broken krb5-kdc:ppc64el Depends on krb5-config:ppc64el < none | 2.7 @un uH > 317s Considering krb5-config:ppc64el 2 as a solution to krb5-kdc:ppc64el 1 317s Re-Instated krb5-config:ppc64el 317s Broken krb5-kdc:ppc64el Depends on libkadm5srv-mit12:ppc64el < none | 1.20.1-5build1 @un uH > (>= 1.18.2) 317s Considering libkadm5srv-mit12:ppc64el 0 as a solution to krb5-kdc:ppc64el 1 317s Broken krb5-kdc:ppc64el Depends on libkdb5-10:ppc64el < none | 1.20.1-5build1 @un uH > (>= 1.20.1) 317s Considering libkdb5-10:ppc64el 0 as a solution to krb5-kdc:ppc64el 1 317s Broken krb5-kdc:ppc64el Depends on libkrb5-3:ppc64el < 1.20.1-6ubuntu1 @ii pmK > (= 1.20.1-5build1) 317s Considering libkrb5-3:ppc64el 55 as a solution to krb5-kdc:ppc64el 1 317s Broken krb5-kdc:ppc64el Depends on libkrb5support0:ppc64el < 1.20.1-6ubuntu1 @ii pmK > (= 1.20.1-5build1) 317s Considering libkrb5support0:ppc64el 25 as a solution to krb5-kdc:ppc64el 1 317s Investigating (0) krb5-admin-server:ppc64el < none -> 1.20.1-5build1 @un puN Ib > 317s Broken krb5-admin-server:ppc64el Depends on libkrb5-3:ppc64el < 1.20.1-6ubuntu1 @ii pmK > (= 1.20.1-5build1) 317s Considering libkrb5-3:ppc64el 55 as a solution to krb5-admin-server:ppc64el 0 317s Broken krb5-admin-server:ppc64el Depends on libkadm5srv-mit12:ppc64el < none | 1.20.1-5build1 @un uH > (>= 1.18.2) 317s Considering libkadm5srv-mit12:ppc64el 0 as a solution to krb5-admin-server:ppc64el 0 317s Broken krb5-admin-server:ppc64el Depends on libkdb5-10:ppc64el < none | 1.20.1-5build1 @un uH > (>= 1.20.1) 317s Considering libkdb5-10:ppc64el 0 as a solution to krb5-admin-server:ppc64el 0 317s Broken krb5-admin-server:ppc64el Depends on libkrb5support0:ppc64el < 1.20.1-6ubuntu1 @ii pmK > (= 1.20.1-5build1) 317s Considering libkrb5support0:ppc64el 25 as a solution to krb5-admin-server:ppc64el 0 317s Done 317s Some packages could not be installed. This may mean that you have 317s requested an impossible situation or if you are using the unstable 317s distribution that some required packages have not yet been created 317s or been moved out of Incoming. 317s The following information may help to resolve the situation: 317s 317s The following packages have unmet dependencies: 317s krb5-admin-server : Depends: libkrb5-3 (= 1.20.1-5build1) but 1.20.1-6ubuntu1 is to be installed 317s Depends: libkadm5srv-mit12 (>= 1.18.2) but it is not going to be installed 317s Depends: libkdb5-10 (>= 1.20.1) but it is not going to be installed 317s Depends: libkrb5support0 (= 1.20.1-5build1) but 1.20.1-6ubuntu1 is to be installed 317s krb5-kdc : Depends: libkadm5srv-mit12 (>= 1.18.2) but it is not going to be installed 317s Depends: libkdb5-10 (>= 1.20.1) but it is not going to be installed 317s Depends: libkrb5-3 (= 1.20.1-5build1) but 1.20.1-6ubuntu1 is to be installed 317s Depends: libkrb5support0 (= 1.20.1-5build1) but 1.20.1-6ubuntu1 is to be installed 317s krb5-user : Depends: libkrb5-3 (= 1.20.1-5build1) but 1.20.1-6ubuntu1 is to be installed 317s Depends: libkadm5clnt-mit12 (>= 1.18.2) but it is not going to be installed 317s Depends: libkadm5srv-mit12 (>= 1.18.2) but it is not going to be installed 317s Depends: libkdb5-10 (>= 1.20.1) but it is not going to be installed 317s Depends: libkrb5support0 (= 1.20.1-5build1) but 1.20.1-6ubuntu1 is to be installed 317s E: Unable to correct problems, you have held broken packages. 317s autopkgtest: WARNING: Test dependencies are unsatisfiable with using apt pinning. Retrying with using all packages from noble-proposed 318s Reading package lists... 318s Building dependency tree... 318s Reading state information... 318s Starting pkgProblemResolver with broken count: 3 318s Starting 2 pkgProblemResolver with broken count: 3 318s Investigating (0) krb5-user:ppc64el < none -> 1.20.1-5build1 @un pumN Ib > 318s Broken krb5-user:ppc64el Depends on libkrb5-3:ppc64el < 1.20.1-6ubuntu1 @ii pmK > (= 1.20.1-5build1) 318s Considering libkrb5-3:ppc64el 55 as a solution to krb5-user:ppc64el 2 318s Broken krb5-user:ppc64el Depends on libkadm5clnt-mit12:ppc64el < none | 1.20.1-5build1 @un uH > (>= 1.18.2) 318s Considering libkadm5clnt-mit12:ppc64el 0 as a solution to krb5-user:ppc64el 2 318s Re-Instated libgssrpc4:ppc64el 318s Reinst Failed because of protected libkrb5support0:ppc64el 318s Broken krb5-user:ppc64el Depends on libkadm5srv-mit12:ppc64el < none | 1.20.1-5build1 @un uH > (>= 1.18.2) 318s Considering libkadm5srv-mit12:ppc64el 0 as a solution to krb5-user:ppc64el 2 318s Reinst Failed because of protected libkrb5support0:ppc64el 318s Reinst Failed because of libkdb5-10:ppc64el 318s Broken krb5-user:ppc64el Depends on libkdb5-10:ppc64el < none | 1.20.1-5build1 @un uH > (>= 1.20.1) 318s Considering libkdb5-10:ppc64el 0 as a solution to krb5-user:ppc64el 2 318s Broken krb5-user:ppc64el Depends on libkrb5support0:ppc64el < 1.20.1-6ubuntu1 @ii pmK > (= 1.20.1-5build1) 318s Considering libkrb5support0:ppc64el 25 as a solution to krb5-user:ppc64el 2 318s Investigating (0) krb5-kdc:ppc64el < none -> 1.20.1-5build1 @un puN Ib > 318s Broken krb5-kdc:ppc64el Depends on krb5-config:ppc64el < none | 2.7 @un uH > 318s Considering krb5-config:ppc64el 2 as a solution to krb5-kdc:ppc64el 1 318s Re-Instated krb5-config:ppc64el 318s Broken krb5-kdc:ppc64el Depends on libkadm5srv-mit12:ppc64el < none | 1.20.1-5build1 @un uH > (>= 1.18.2) 318s Considering libkadm5srv-mit12:ppc64el 0 as a solution to krb5-kdc:ppc64el 1 318s Broken krb5-kdc:ppc64el Depends on libkdb5-10:ppc64el < none | 1.20.1-5build1 @un uH > (>= 1.20.1) 318s Considering libkdb5-10:ppc64el 0 as a solution to krb5-kdc:ppc64el 1 318s Broken krb5-kdc:ppc64el Depends on libkrb5-3:ppc64el < 1.20.1-6ubuntu1 @ii pmK > (= 1.20.1-5build1) 318s Considering libkrb5-3:ppc64el 55 as a solution to krb5-kdc:ppc64el 1 318s Broken krb5-kdc:ppc64el Depends on libkrb5support0:ppc64el < 1.20.1-6ubuntu1 @ii pmK > (= 1.20.1-5build1) 318s Considering libkrb5support0:ppc64el 25 as a solution to krb5-kdc:ppc64el 1 318s Investigating (0) krb5-admin-server:ppc64el < none -> 1.20.1-5build1 @un puN Ib > 318s Broken krb5-admin-server:ppc64el Depends on libkrb5-3:ppc64el < 1.20.1-6ubuntu1 @ii pmK > (= 1.20.1-5build1) 318s Considering libkrb5-3:ppc64el 55 as a solution to krb5-admin-server:ppc64el 0 318s Broken krb5-admin-server:ppc64el Depends on libkadm5srv-mit12:ppc64el < none | 1.20.1-5build1 @un uH > (>= 1.18.2) 318s Considering libkadm5srv-mit12:ppc64el 0 as a solution to krb5-admin-server:ppc64el 0 318s Broken krb5-admin-server:ppc64el Depends on libkdb5-10:ppc64el < none | 1.20.1-5build1 @un uH > (>= 1.20.1) 318s Considering libkdb5-10:ppc64el 0 as a solution to krb5-admin-server:ppc64el 0 318s Broken krb5-admin-server:ppc64el Depends on libkrb5support0:ppc64el < 1.20.1-6ubuntu1 @ii pmK > (= 1.20.1-5build1) 318s Considering libkrb5support0:ppc64el 25 as a solution to krb5-admin-server:ppc64el 0 318s Done 318s Some packages could not be installed. This may mean that you have 318s requested an impossible situation or if you are using the unstable 318s distribution that some required packages have not yet been created 318s or been moved out of Incoming. 318s The following information may help to resolve the situation: 318s 318s The following packages have unmet dependencies: 318s krb5-admin-server : Depends: libkrb5-3 (= 1.20.1-5build1) but 1.20.1-6ubuntu1 is to be installed 318s Depends: libkadm5srv-mit12 (>= 1.18.2) but it is not going to be installed 318s Depends: libkdb5-10 (>= 1.20.1) but it is not going to be installed 318s Depends: libkrb5support0 (= 1.20.1-5build1) but 1.20.1-6ubuntu1 is to be installed 318s krb5-kdc : Depends: libkadm5srv-mit12 (>= 1.18.2) but it is not going to be installed 318s Depends: libkdb5-10 (>= 1.20.1) but it is not going to be installed 318s Depends: libkrb5-3 (= 1.20.1-5build1) but 1.20.1-6ubuntu1 is to be installed 318s Depends: libkrb5support0 (= 1.20.1-5build1) but 1.20.1-6ubuntu1 is to be installed 318s krb5-user : Depends: libkrb5-3 (= 1.20.1-5build1) but 1.20.1-6ubuntu1 is to be installed 318s Depends: libkadm5clnt-mit12 (>= 1.18.2) but it is not going to be installed 318s Depends: libkadm5srv-mit12 (>= 1.18.2) but it is not going to be installed 318s Depends: libkdb5-10 (>= 1.20.1) but it is not going to be installed 318s Depends: libkrb5support0 (= 1.20.1-5build1) but 1.20.1-6ubuntu1 is to be installed 318s E: Unable to correct problems, you have held broken packages. 318s autopkgtest: WARNING: Test dependencies are unsatisfiable - calling apt install on test deps directly for further data about failing dependencies in test logs 318s Reading package lists... 319s Building dependency tree... 319s Reading state information... 319s Starting pkgProblemResolver with broken count: 3 319s Starting 2 pkgProblemResolver with broken count: 3 319s Investigating (0) krb5-kdc:ppc64el < none -> 1.20.1-5build1 @un puN Ib > 319s Broken krb5-kdc:ppc64el Depends on krb5-config:ppc64el < none | 2.7 @un uH > 319s Considering krb5-config:ppc64el 2 as a solution to krb5-kdc:ppc64el 10000 319s Re-Instated krb5-config:ppc64el 319s Broken krb5-kdc:ppc64el Depends on libkadm5srv-mit12:ppc64el < none | 1.20.1-5build1 @un uH > (>= 1.18.2) 319s Considering libkadm5srv-mit12:ppc64el 0 as a solution to krb5-kdc:ppc64el 10000 319s Re-Instated libgssrpc4:ppc64el 319s Reinst Failed because of protected libkrb5support0:ppc64el 319s Reinst Failed because of libkdb5-10:ppc64el 319s Broken krb5-kdc:ppc64el Depends on libkdb5-10:ppc64el < none | 1.20.1-5build1 @un uH > (>= 1.20.1) 319s Considering libkdb5-10:ppc64el 0 as a solution to krb5-kdc:ppc64el 10000 319s Broken krb5-kdc:ppc64el Depends on libkrb5-3:ppc64el < 1.20.1-6ubuntu1 @ii pmK > (= 1.20.1-5build1) 319s Considering libkrb5-3:ppc64el 49 as a solution to krb5-kdc:ppc64el 10000 319s Broken krb5-kdc:ppc64el Depends on libkrb5support0:ppc64el < 1.20.1-6ubuntu1 @ii pmK > (= 1.20.1-5build1) 319s Considering libkrb5support0:ppc64el 23 as a solution to krb5-kdc:ppc64el 10000 319s Investigating (0) krb5-user:ppc64el < none -> 1.20.1-5build1 @un pumN Ib > 319s Broken krb5-user:ppc64el Depends on libkrb5-3:ppc64el < 1.20.1-6ubuntu1 @ii pmK > (= 1.20.1-5build1) 319s Considering libkrb5-3:ppc64el 49 as a solution to krb5-user:ppc64el 10000 319s Broken krb5-user:ppc64el Depends on libkadm5clnt-mit12:ppc64el < none | 1.20.1-5build1 @un uH > (>= 1.18.2) 319s Considering libkadm5clnt-mit12:ppc64el 0 as a solution to krb5-user:ppc64el 10000 319s Reinst Failed because of protected libkrb5support0:ppc64el 319s Broken krb5-user:ppc64el Depends on libkadm5srv-mit12:ppc64el < none | 1.20.1-5build1 @un uH > (>= 1.18.2) 319s Considering libkadm5srv-mit12:ppc64el 0 as a solution to krb5-user:ppc64el 10000 319s Broken krb5-user:ppc64el Depends on libkdb5-10:ppc64el < none | 1.20.1-5build1 @un uH > (>= 1.20.1) 319s Considering libkdb5-10:ppc64el 0 as a solution to krb5-user:ppc64el 10000 319s Broken krb5-user:ppc64el Depends on libkrb5support0:ppc64el < 1.20.1-6ubuntu1 @ii pmK > (= 1.20.1-5build1) 319s Considering libkrb5support0:ppc64el 23 as a solution to krb5-user:ppc64el 10000 319s Investigating (0) krb5-admin-server:ppc64el < none -> 1.20.1-5build1 @un puN Ib > 319s Broken krb5-admin-server:ppc64el Depends on libkrb5-3:ppc64el < 1.20.1-6ubuntu1 @ii pmK > (= 1.20.1-5build1) 319s Considering libkrb5-3:ppc64el 49 as a solution to krb5-admin-server:ppc64el 9999 319s Broken krb5-admin-server:ppc64el Depends on libkadm5srv-mit12:ppc64el < none | 1.20.1-5build1 @un uH > (>= 1.18.2) 319s Considering libkadm5srv-mit12:ppc64el 0 as a solution to krb5-admin-server:ppc64el 9999 319s Broken krb5-admin-server:ppc64el Depends on libkdb5-10:ppc64el < none | 1.20.1-5build1 @un uH > (>= 1.20.1) 319s Considering libkdb5-10:ppc64el 0 as a solution to krb5-admin-server:ppc64el 9999 319s Broken krb5-admin-server:ppc64el Depends on libkrb5support0:ppc64el < 1.20.1-6ubuntu1 @ii pmK > (= 1.20.1-5build1) 319s Considering libkrb5support0:ppc64el 23 as a solution to krb5-admin-server:ppc64el 9999 319s Done 319s sssd is already the newest version (2.9.4-1ubuntu1). 319s sssd-common is already the newest version (2.9.4-1ubuntu1). 319s sssd-ad is already the newest version (2.9.4-1ubuntu1). 319s sssd-ad-common is already the newest version (2.9.4-1ubuntu1). 319s sssd-dbus is already the newest version (2.9.4-1ubuntu1). 319s sssd-idp is already the newest version (2.9.4-1ubuntu1). 319s sssd-ipa is already the newest version (2.9.4-1ubuntu1). 319s sssd-kcm is already the newest version (2.9.4-1ubuntu1). 319s sssd-krb5 is already the newest version (2.9.4-1ubuntu1). 319s sssd-krb5-common is already the newest version (2.9.4-1ubuntu1). 319s sssd-ldap is already the newest version (2.9.4-1ubuntu1). 319s sssd-passkey is already the newest version (2.9.4-1ubuntu1). 319s sssd-proxy is already the newest version (2.9.4-1ubuntu1). 319s sssd-tools is already the newest version (2.9.4-1ubuntu1). 319s libnss-sss is already the newest version (2.9.4-1ubuntu1). 319s libpam-sss is already the newest version (2.9.4-1ubuntu1). 319s libipa-hbac0 is already the newest version (2.9.4-1ubuntu1). 319s libipa-hbac-dev is already the newest version (2.9.4-1ubuntu1). 319s libsss-certmap0 is already the newest version (2.9.4-1ubuntu1). 319s libsss-certmap-dev is already the newest version (2.9.4-1ubuntu1). 319s libsss-idmap0 is already the newest version (2.9.4-1ubuntu1). 319s libsss-idmap-dev is already the newest version (2.9.4-1ubuntu1). 319s libsss-nss-idmap0 is already the newest version (2.9.4-1ubuntu1). 319s libsss-nss-idmap-dev is already the newest version (2.9.4-1ubuntu1). 319s libsss-sudo is already the newest version (2.9.4-1ubuntu1). 319s python3-libipa-hbac is already the newest version (2.9.4-1ubuntu1). 319s python3-libsss-nss-idmap is already the newest version (2.9.4-1ubuntu1). 319s python3-sss is already the newest version (2.9.4-1ubuntu1). 319s slapd is already the newest version (2.6.7+dfsg-1~exp1ubuntu1). 319s ldap-utils is already the newest version (2.6.7+dfsg-1~exp1ubuntu1). 319s openssl is already the newest version (3.0.13-0ubuntu2). 319s openssl set to manually installed. 319s expect is already the newest version (5.45.4-2build1). 319s lsb-release is already the newest version (12.0-2). 319s lsb-release set to manually installed. 319s Some packages could not be installed. This may mean that you have 319s requested an impossible situation or if you are using the unstable 319s distribution that some required packages have not yet been created 319s or been moved out of Incoming. 319s The following information may help to resolve the situation: 319s 319s The following packages have unmet dependencies: 319s krb5-admin-server : Depends: libkrb5-3 (= 1.20.1-5build1) but 1.20.1-6ubuntu1 is to be installed 319s Depends: libkadm5srv-mit12 (>= 1.18.2) but it is not going to be installed 319s Depends: libkdb5-10 (>= 1.20.1) but it is not going to be installed 319s Depends: libkrb5support0 (= 1.20.1-5build1) but 1.20.1-6ubuntu1 is to be installed 319s krb5-kdc : Depends: libkadm5srv-mit12 (>= 1.18.2) but it is not going to be installed 319s Depends: libkdb5-10 (>= 1.20.1) but it is not going to be installed 319s Depends: libkrb5-3 (= 1.20.1-5build1) but 1.20.1-6ubuntu1 is to be installed 319s Depends: libkrb5support0 (= 1.20.1-5build1) but 1.20.1-6ubuntu1 is to be installed 319s krb5-user : Depends: libkrb5-3 (= 1.20.1-5build1) but 1.20.1-6ubuntu1 is to be installed 319s Depends: libkadm5clnt-mit12 (>= 1.18.2) but it is not going to be installed 319s Depends: libkadm5srv-mit12 (>= 1.18.2) but it is not going to be installed 319s Depends: libkdb5-10 (>= 1.20.1) but it is not going to be installed 319s Depends: libkrb5support0 (= 1.20.1-5build1) but 1.20.1-6ubuntu1 is to be installed 319s E: Unable to correct problems, you have held broken packages. 319s ldap-user-group-krb5-auth FAIL badpkg 319s blame: sssd 319s badpkg: Test dependencies are unsatisfiable. A common reason is that your testbed is out of date with respect to the archive, and you need to use a current testbed or run apt-get update or use -U. 319s autopkgtest [14:24:37]: test sssd-softhism2-certificates-tests.sh: preparing testbed 438s autopkgtest [14:26:36]: testbed dpkg architecture: ppc64el 438s autopkgtest [14:26:36]: testbed apt version: 2.7.12 438s autopkgtest [14:26:36]: @@@@@@@@@@@@@@@@@@@@ test bed setup 440s Get:1 http://ftpmaster.internal/ubuntu noble-proposed InRelease [117 kB] 440s Get:2 http://ftpmaster.internal/ubuntu noble-proposed/main Sources [539 kB] 440s Get:3 http://ftpmaster.internal/ubuntu noble-proposed/multiverse Sources [57.3 kB] 440s Get:4 http://ftpmaster.internal/ubuntu noble-proposed/restricted Sources [6540 B] 440s Get:5 http://ftpmaster.internal/ubuntu noble-proposed/universe Sources [4028 kB] 440s Get:6 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el Packages [726 kB] 440s Get:7 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el c-n-f Metadata [3116 B] 440s Get:8 http://ftpmaster.internal/ubuntu noble-proposed/restricted ppc64el Packages [1372 B] 440s Get:9 http://ftpmaster.internal/ubuntu noble-proposed/restricted ppc64el c-n-f Metadata [116 B] 440s Get:10 http://ftpmaster.internal/ubuntu noble-proposed/universe ppc64el Packages [4266 kB] 440s Get:11 http://ftpmaster.internal/ubuntu noble-proposed/universe ppc64el c-n-f Metadata [8652 B] 440s Get:12 http://ftpmaster.internal/ubuntu noble-proposed/multiverse ppc64el Packages [61.1 kB] 440s Get:13 http://ftpmaster.internal/ubuntu noble-proposed/multiverse ppc64el c-n-f Metadata [116 B] 443s Fetched 9814 kB in 2s (4216 kB/s) 443s Reading package lists... 446s Reading package lists... 446s Building dependency tree... 446s Reading state information... 446s Calculating upgrade... 446s The following packages will be REMOVED: 446s libglib2.0-0 libssl3 446s The following NEW packages will be installed: 446s libglib2.0-0t64 libssl3t64 xdg-user-dirs 446s The following packages will be upgraded: 446s gir1.2-glib-2.0 krb5-locales libglib2.0-data libgssapi-krb5-2 libk5crypto3 446s libkrb5-3 libkrb5support0 openssl 446s 8 upgraded, 3 newly installed, 2 to remove and 0 not upgraded. 446s Need to get 5951 kB of archives. 446s After this operation, 409 kB of additional disk space will be used. 446s Get:1 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el gir1.2-glib-2.0 ppc64el 2.79.3-3ubuntu5 [182 kB] 447s Get:2 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libglib2.0-0t64 ppc64el 2.79.3-3ubuntu5 [1773 kB] 447s Get:3 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el openssl ppc64el 3.0.13-0ubuntu2 [1026 kB] 447s Get:4 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libk5crypto3 ppc64el 1.20.1-6ubuntu1 [108 kB] 447s Get:5 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libgssapi-krb5-2 ppc64el 1.20.1-6ubuntu1 [185 kB] 447s Get:6 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libkrb5support0 ppc64el 1.20.1-6ubuntu1 [38.5 kB] 447s Get:7 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libkrb5-3 ppc64el 1.20.1-6ubuntu1 [432 kB] 447s Get:8 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libssl3t64 ppc64el 3.0.13-0ubuntu2 [2125 kB] 447s Get:9 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el krb5-locales all 1.20.1-6ubuntu1 [13.8 kB] 447s Get:10 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libglib2.0-data all 2.79.3-3ubuntu5 [46.6 kB] 447s Get:11 http://ftpmaster.internal/ubuntu noble/main ppc64el xdg-user-dirs ppc64el 0.18-1 [20.0 kB] 448s Fetched 5951 kB in 1s (5100 kB/s) 448s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 70156 files and directories currently installed.) 448s Preparing to unpack .../gir1.2-glib-2.0_2.79.3-3ubuntu5_ppc64el.deb ... 448s Unpacking gir1.2-glib-2.0:ppc64el (2.79.3-3ubuntu5) over (2.79.2-1~ubuntu1) ... 448s dpkg: libglib2.0-0:ppc64el: dependency problems, but removing anyway as you requested: 448s udisks2 depends on libglib2.0-0 (>= 2.77.0). 448s shared-mime-info depends on libglib2.0-0 (>= 2.75.3). 448s python3-gi depends on libglib2.0-0 (>= 2.77.0). 448s python3-dbus depends on libglib2.0-0 (>= 2.16.0). 448s netplan.io depends on libglib2.0-0 (>= 2.70.0). 448s netplan-generator depends on libglib2.0-0 (>= 2.70.0). 448s libxmlb2:ppc64el depends on libglib2.0-0 (>= 2.54.0). 448s libvolume-key1:ppc64el depends on libglib2.0-0 (>= 2.18.0). 448s libudisks2-0:ppc64el depends on libglib2.0-0 (>= 2.75.3). 448s libqrtr-glib0:ppc64el depends on libglib2.0-0 (>= 2.56). 448s libqmi-proxy depends on libglib2.0-0 (>= 2.30.0). 448s libqmi-glib5:ppc64el depends on libglib2.0-0 (>= 2.54.0). 448s libpolkit-gobject-1-0:ppc64el depends on libglib2.0-0 (>= 2.38.0). 448s libpolkit-agent-1-0:ppc64el depends on libglib2.0-0 (>= 2.38.0). 448s libnetplan0:ppc64el depends on libglib2.0-0 (>= 2.75.3). 448s libmm-glib0:ppc64el depends on libglib2.0-0 (>= 2.62.0). 448s libmbim-proxy depends on libglib2.0-0 (>= 2.56). 448s libmbim-glib4:ppc64el depends on libglib2.0-0 (>= 2.56). 448s libjson-glib-1.0-0:ppc64el depends on libglib2.0-0 (>= 2.75.3). 448s libjcat1:ppc64el depends on libglib2.0-0 (>= 2.75.3). 448s libgusb2:ppc64el depends on libglib2.0-0 (>= 2.75.3). 448s libgudev-1.0-0:ppc64el depends on libglib2.0-0 (>= 2.38.0). 448s libgirepository-1.0-1:ppc64el depends on libglib2.0-0 (>= 2.79.0). 448s libfwupd2:ppc64el depends on libglib2.0-0 (>= 2.79.0). 448s libblockdev3:ppc64el depends on libglib2.0-0 (>= 2.42.2). 448s libblockdev-utils3:ppc64el depends on libglib2.0-0 (>= 2.75.3). 448s libblockdev-swap3:ppc64el depends on libglib2.0-0 (>= 2.42.2). 448s libblockdev-part3:ppc64el depends on libglib2.0-0 (>= 2.42.2). 448s libblockdev-nvme3:ppc64el depends on libglib2.0-0 (>= 2.42.2). 448s libblockdev-mdraid3:ppc64el depends on libglib2.0-0 (>= 2.42.2). 448s libblockdev-loop3:ppc64el depends on libglib2.0-0 (>= 2.42.2). 448s libblockdev-fs3:ppc64el depends on libglib2.0-0 (>= 2.42.2). 448s libblockdev-crypto3:ppc64el depends on libglib2.0-0 (>= 2.42.2). 448s fwupd depends on libglib2.0-0 (>= 2.79.0). 448s bolt depends on libglib2.0-0 (>= 2.56.0). 448s 448s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 70156 files and directories currently installed.) 448s Removing libglib2.0-0:ppc64el (2.79.2-1~ubuntu1) ... 448s Selecting previously unselected package libglib2.0-0t64:ppc64el. 448s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 70131 files and directories currently installed.) 448s Preparing to unpack .../0-libglib2.0-0t64_2.79.3-3ubuntu5_ppc64el.deb ... 448s libglib2.0-0t64.preinst: Removing /var/lib/dpkg/info/libglib2.0-0:ppc64el.postrm to avoid loss of /usr/share/glib-2.0/schemas/gschemas.compiled... 448s removed '/var/lib/dpkg/info/libglib2.0-0:ppc64el.postrm' 448s Unpacking libglib2.0-0t64:ppc64el (2.79.3-3ubuntu5) ... 448s Preparing to unpack .../1-openssl_3.0.13-0ubuntu2_ppc64el.deb ... 448s Unpacking openssl (3.0.13-0ubuntu2) over (3.0.10-1ubuntu4) ... 448s Preparing to unpack .../2-libk5crypto3_1.20.1-6ubuntu1_ppc64el.deb ... 448s Unpacking libk5crypto3:ppc64el (1.20.1-6ubuntu1) over (1.20.1-5build1) ... 448s Preparing to unpack .../3-libgssapi-krb5-2_1.20.1-6ubuntu1_ppc64el.deb ... 448s Unpacking libgssapi-krb5-2:ppc64el (1.20.1-6ubuntu1) over (1.20.1-5build1) ... 448s Preparing to unpack .../4-libkrb5support0_1.20.1-6ubuntu1_ppc64el.deb ... 448s Unpacking libkrb5support0:ppc64el (1.20.1-6ubuntu1) over (1.20.1-5build1) ... 448s Preparing to unpack .../5-libkrb5-3_1.20.1-6ubuntu1_ppc64el.deb ... 448s Unpacking libkrb5-3:ppc64el (1.20.1-6ubuntu1) over (1.20.1-5build1) ... 448s dpkg: libssl3:ppc64el: dependency problems, but removing anyway as you requested: 448s wget depends on libssl3 (>= 3.0.0). 448s tnftp depends on libssl3 (>= 3.0.0). 448s tcpdump depends on libssl3 (>= 3.0.0). 448s systemd-resolved depends on libssl3 (>= 3.0.0). 448s systemd depends on libssl3 (>= 3.0.0). 448s sudo depends on libssl3 (>= 3.0.0). 448s rsync depends on libssl3 (>= 3.0.0). 448s python3-cryptography depends on libssl3 (>= 3.0.0). 448s openssh-server depends on libssl3 (>= 3.0.10). 448s openssh-client depends on libssl3 (>= 3.0.10). 448s linux-headers-6.8.0-11-generic depends on libssl3 (>= 3.0.0). 448s libsystemd-shared:ppc64el depends on libssl3 (>= 3.0.0). 448s libssh-4:ppc64el depends on libssl3 (>= 3.0.0). 448s libsasl2-modules:ppc64el depends on libssl3 (>= 3.0.0). 448s libsasl2-2:ppc64el depends on libssl3 (>= 3.0.0). 448s libpython3.12-minimal:ppc64el depends on libssl3 (>= 3.0.0). 448s libpython3.11-minimal:ppc64el depends on libssl3 (>= 3.0.0). 448s libnvme1 depends on libssl3 (>= 3.0.0). 448s libkmod2:ppc64el depends on libssl3 (>= 3.0.0). 448s libfido2-1:ppc64el depends on libssl3 (>= 3.0.0). 448s libcurl4:ppc64el depends on libssl3 (>= 3.0.0). 448s libcryptsetup12:ppc64el depends on libssl3 (>= 3.0.0). 448s kmod depends on libssl3 (>= 3.0.0). 448s dhcpcd-base depends on libssl3 (>= 3.0.0). 448s bind9-libs:ppc64el depends on libssl3 (>= 3.0.0). 448s 448s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 70156 files and directories currently installed.) 448s Removing libssl3:ppc64el (3.0.10-1ubuntu4) ... 448s Selecting previously unselected package libssl3t64:ppc64el. 448s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 70145 files and directories currently installed.) 448s Preparing to unpack .../libssl3t64_3.0.13-0ubuntu2_ppc64el.deb ... 448s Unpacking libssl3t64:ppc64el (3.0.13-0ubuntu2) ... 448s Preparing to unpack .../krb5-locales_1.20.1-6ubuntu1_all.deb ... 448s Unpacking krb5-locales (1.20.1-6ubuntu1) over (1.20.1-5build1) ... 448s Preparing to unpack .../libglib2.0-data_2.79.3-3ubuntu5_all.deb ... 448s Unpacking libglib2.0-data (2.79.3-3ubuntu5) over (2.79.2-1~ubuntu1) ... 448s Selecting previously unselected package xdg-user-dirs. 448s Preparing to unpack .../xdg-user-dirs_0.18-1_ppc64el.deb ... 448s Unpacking xdg-user-dirs (0.18-1) ... 448s Setting up xdg-user-dirs (0.18-1) ... 448s Setting up libssl3t64:ppc64el (3.0.13-0ubuntu2) ... 448s Setting up krb5-locales (1.20.1-6ubuntu1) ... 448s Setting up libkrb5support0:ppc64el (1.20.1-6ubuntu1) ... 448s Setting up libglib2.0-0t64:ppc64el (2.79.3-3ubuntu5) ... 448s No schema files found: doing nothing. 448s Setting up libglib2.0-data (2.79.3-3ubuntu5) ... 448s Setting up gir1.2-glib-2.0:ppc64el (2.79.3-3ubuntu5) ... 448s Setting up libk5crypto3:ppc64el (1.20.1-6ubuntu1) ... 448s Setting up libkrb5-3:ppc64el (1.20.1-6ubuntu1) ... 448s Setting up openssl (3.0.13-0ubuntu2) ... 448s Setting up libgssapi-krb5-2:ppc64el (1.20.1-6ubuntu1) ... 448s Processing triggers for man-db (2.12.0-3) ... 449s Processing triggers for libc-bin (2.39-0ubuntu6) ... 449s Reading package lists... 449s Building dependency tree... 449s Reading state information... 449s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 450s sh: Attempting to set up Debian/Ubuntu apt sources automatically 450s sh: Distribution appears to be Ubuntu 451s Reading package lists... 451s Building dependency tree... 451s Reading state information... 451s eatmydata is already the newest version (131-1). 451s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 451s Reading package lists... 451s Building dependency tree... 451s Reading state information... 451s dbus is already the newest version (1.14.10-4ubuntu1). 451s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 452s Reading package lists... 452s Building dependency tree... 452s Reading state information... 452s rng-tools-debian is already the newest version (2.4). 452s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 452s Reading package lists... 452s Building dependency tree... 452s Reading state information... 452s The following packages will be REMOVED: 452s cloud-init* python3-configobj* python3-debconf* 452s 0 upgraded, 0 newly installed, 3 to remove and 0 not upgraded. 452s After this operation, 3256 kB disk space will be freed. 452s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 70172 files and directories currently installed.) 452s Removing cloud-init (24.1.2-0ubuntu1) ... 453s Removing python3-configobj (5.0.8-3) ... 453s Removing python3-debconf (1.5.86) ... 453s Processing triggers for man-db (2.12.0-3) ... 454s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 69783 files and directories currently installed.) 454s Purging configuration files for cloud-init (24.1.2-0ubuntu1) ... 455s dpkg: warning: while removing cloud-init, directory '/etc/cloud/cloud.cfg.d' not empty so not removed 455s Processing triggers for rsyslog (8.2312.0-3ubuntu3) ... 455s invoke-rc.d: policy-rc.d denied execution of try-restart. 455s Reading package lists... 455s Building dependency tree... 455s Reading state information... 455s linux-generic is already the newest version (6.8.0-11.11+1). 455s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 456s Hit:1 http://ftpmaster.internal/ubuntu noble InRelease 456s Hit:2 http://ftpmaster.internal/ubuntu noble-updates InRelease 456s Hit:3 http://ftpmaster.internal/ubuntu noble-security InRelease 458s Reading package lists... 458s Reading package lists... 458s Building dependency tree... 458s Reading state information... 458s Calculating upgrade... 458s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 458s Reading package lists... 459s Building dependency tree... 459s Reading state information... 459s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 459s autopkgtest [14:26:57]: rebooting testbed after setup commands that affected boot 632s Reading package lists... 632s Building dependency tree... 632s Reading state information... 633s Starting pkgProblemResolver with broken count: 0 633s Starting 2 pkgProblemResolver with broken count: 0 633s Done 633s The following additional packages will be installed: 633s gnutls-bin libavahi-client3 libavahi-common-data libavahi-common3 633s libbasicobjects0 libc-ares2 libcollection4 libcrack2 libdhash1 633s libevent-2.1-7 libgnutls-dane0 libini-config5 libipa-hbac0 libldb2 633s libnfsidmap1 libnss-sss libpam-pwquality libpam-sss libpath-utils1 633s libpwquality-common libpwquality1 libref-array1 libsmbclient libsofthsm2 633s libsss-certmap0 libsss-idmap0 libsss-nss-idmap0 libtalloc2 libtdb1 633s libtevent0 libunbound8 libwbclient0 python3-sss samba-libs softhsm2 633s softhsm2-common sssd sssd-ad sssd-ad-common sssd-common sssd-ipa sssd-krb5 633s sssd-krb5-common sssd-ldap sssd-proxy 633s Suggested packages: 633s dns-root-data adcli libsss-sudo sssd-tools libsasl2-modules-ldap 633s Recommended packages: 633s cracklib-runtime libsasl2-modules-gssapi-mit 633s | libsasl2-modules-gssapi-heimdal ldap-utils 633s The following NEW packages will be installed: 633s autopkgtest-satdep gnutls-bin libavahi-client3 libavahi-common-data 633s libavahi-common3 libbasicobjects0 libc-ares2 libcollection4 libcrack2 633s libdhash1 libevent-2.1-7 libgnutls-dane0 libini-config5 libipa-hbac0 libldb2 633s libnfsidmap1 libnss-sss libpam-pwquality libpam-sss libpath-utils1 633s libpwquality-common libpwquality1 libref-array1 libsmbclient libsofthsm2 633s libsss-certmap0 libsss-idmap0 libsss-nss-idmap0 libtalloc2 libtdb1 633s libtevent0 libunbound8 libwbclient0 python3-sss samba-libs softhsm2 633s softhsm2-common sssd sssd-ad sssd-ad-common sssd-common sssd-ipa sssd-krb5 633s sssd-krb5-common sssd-ldap sssd-proxy 633s 0 upgraded, 46 newly installed, 0 to remove and 0 not upgraded. 633s Need to get 11.4 MB/11.4 MB of archives. 633s After this operation, 56.9 MB of additional disk space will be used. 633s Get:1 /tmp/autopkgtest.rakP4F/3-autopkgtest-satdep.deb autopkgtest-satdep ppc64el 0 [744 B] 633s Get:2 http://ftpmaster.internal/ubuntu noble/main ppc64el libevent-2.1-7 ppc64el 2.1.12-stable-9 [169 kB] 633s Get:3 http://ftpmaster.internal/ubuntu noble/main ppc64el libunbound8 ppc64el 1.19.1-1ubuntu1 [537 kB] 633s Get:4 http://ftpmaster.internal/ubuntu noble/main ppc64el libgnutls-dane0 ppc64el 3.8.3-1ubuntu1 [24.5 kB] 633s Get:5 http://ftpmaster.internal/ubuntu noble/universe ppc64el gnutls-bin ppc64el 3.8.3-1ubuntu1 [290 kB] 633s Get:6 http://ftpmaster.internal/ubuntu noble/main ppc64el libavahi-common-data ppc64el 0.8-13ubuntu2 [29.5 kB] 633s Get:7 http://ftpmaster.internal/ubuntu noble/main ppc64el libavahi-common3 ppc64el 0.8-13ubuntu2 [25.8 kB] 633s Get:8 http://ftpmaster.internal/ubuntu noble/main ppc64el libavahi-client3 ppc64el 0.8-13ubuntu2 [30.6 kB] 633s Get:9 http://ftpmaster.internal/ubuntu noble/main ppc64el libcrack2 ppc64el 2.9.6-5.1 [30.9 kB] 633s Get:10 http://ftpmaster.internal/ubuntu noble/main ppc64el libtalloc2 ppc64el 2.4.2-1 [36.6 kB] 633s Get:11 http://ftpmaster.internal/ubuntu noble/main ppc64el libtdb1 ppc64el 1.4.10-1 [62.7 kB] 633s Get:12 http://ftpmaster.internal/ubuntu noble/main ppc64el libtevent0 ppc64el 0.16.1-1 [50.8 kB] 634s Get:13 http://ftpmaster.internal/ubuntu noble/main ppc64el libldb2 ppc64el 2:2.8.0+samba4.19.5+dfsg-1ubuntu1 [219 kB] 634s Get:14 http://ftpmaster.internal/ubuntu noble/main ppc64el libnfsidmap1 ppc64el 1:2.6.3-3ubuntu1 [53.0 kB] 634s Get:15 http://ftpmaster.internal/ubuntu noble/main ppc64el libpwquality-common all 1.4.5-3 [7658 B] 634s Get:16 http://ftpmaster.internal/ubuntu noble/main ppc64el libpwquality1 ppc64el 1.4.5-3 [16.9 kB] 634s Get:17 http://ftpmaster.internal/ubuntu noble/main ppc64el libpam-pwquality ppc64el 1.4.5-3 [12.5 kB] 634s Get:18 http://ftpmaster.internal/ubuntu noble/main ppc64el libwbclient0 ppc64el 2:4.19.5+dfsg-1ubuntu1 [76.5 kB] 634s Get:19 http://ftpmaster.internal/ubuntu noble/main ppc64el samba-libs ppc64el 2:4.19.5+dfsg-1ubuntu1 [6674 kB] 634s Get:20 http://ftpmaster.internal/ubuntu noble/universe ppc64el softhsm2-common ppc64el 2.6.1-2.2 [5810 B] 634s Get:21 http://ftpmaster.internal/ubuntu noble/universe ppc64el libsofthsm2 ppc64el 2.6.1-2.2 [294 kB] 634s Get:22 http://ftpmaster.internal/ubuntu noble/universe ppc64el softhsm2 ppc64el 2.6.1-2.2 [196 kB] 634s Get:23 http://ftpmaster.internal/ubuntu noble/main ppc64el python3-sss ppc64el 2.9.4-1ubuntu1 [48.0 kB] 634s Get:24 http://ftpmaster.internal/ubuntu noble/main ppc64el libsss-idmap0 ppc64el 2.9.4-1ubuntu1 [24.7 kB] 634s Get:25 http://ftpmaster.internal/ubuntu noble/main ppc64el libnss-sss ppc64el 2.9.4-1ubuntu1 [36.3 kB] 634s Get:26 http://ftpmaster.internal/ubuntu noble/main ppc64el libpam-sss ppc64el 2.9.4-1ubuntu1 [56.4 kB] 634s Get:27 http://ftpmaster.internal/ubuntu noble/main ppc64el libc-ares2 ppc64el 1.27.0-1 [99.0 kB] 634s Get:28 http://ftpmaster.internal/ubuntu noble/main ppc64el libdhash1 ppc64el 0.6.2-2 [9830 B] 634s Get:29 http://ftpmaster.internal/ubuntu noble/main ppc64el libbasicobjects0 ppc64el 0.6.2-2 [5806 B] 634s Get:30 http://ftpmaster.internal/ubuntu noble/main ppc64el libcollection4 ppc64el 0.6.2-2 [35.3 kB] 634s Get:31 http://ftpmaster.internal/ubuntu noble/main ppc64el libpath-utils1 ppc64el 0.6.2-2 [10.2 kB] 634s Get:32 http://ftpmaster.internal/ubuntu noble/main ppc64el libref-array1 ppc64el 0.6.2-2 [7724 B] 634s Get:33 http://ftpmaster.internal/ubuntu noble/main ppc64el libini-config5 ppc64el 0.6.2-2 [53.9 kB] 634s Get:34 http://ftpmaster.internal/ubuntu noble/main ppc64el libsss-certmap0 ppc64el 2.9.4-1ubuntu1 [53.6 kB] 634s Get:35 http://ftpmaster.internal/ubuntu noble/main ppc64el libsss-nss-idmap0 ppc64el 2.9.4-1ubuntu1 [37.4 kB] 634s Get:36 http://ftpmaster.internal/ubuntu noble/main ppc64el sssd-common ppc64el 2.9.4-1ubuntu1 [1280 kB] 634s Get:37 http://ftpmaster.internal/ubuntu noble/main ppc64el sssd-ad-common ppc64el 2.9.4-1ubuntu1 [88.6 kB] 634s Get:38 http://ftpmaster.internal/ubuntu noble/main ppc64el sssd-krb5-common ppc64el 2.9.4-1ubuntu1 [103 kB] 634s Get:39 http://ftpmaster.internal/ubuntu noble/main ppc64el libsmbclient ppc64el 2:4.19.5+dfsg-1ubuntu1 [70.4 kB] 634s Get:40 http://ftpmaster.internal/ubuntu noble/main ppc64el sssd-ad ppc64el 2.9.4-1ubuntu1 [147 kB] 634s Get:41 http://ftpmaster.internal/ubuntu noble/main ppc64el libipa-hbac0 ppc64el 2.9.4-1ubuntu1 [17.4 kB] 634s Get:42 http://ftpmaster.internal/ubuntu noble/main ppc64el sssd-ipa ppc64el 2.9.4-1ubuntu1 [240 kB] 634s Get:43 http://ftpmaster.internal/ubuntu noble/main ppc64el sssd-krb5 ppc64el 2.9.4-1ubuntu1 [14.4 kB] 634s Get:44 http://ftpmaster.internal/ubuntu noble/main ppc64el sssd-ldap ppc64el 2.9.4-1ubuntu1 [31.6 kB] 634s Get:45 http://ftpmaster.internal/ubuntu noble/main ppc64el sssd-proxy ppc64el 2.9.4-1ubuntu1 [48.0 kB] 634s Get:46 http://ftpmaster.internal/ubuntu noble/main ppc64el sssd ppc64el 2.9.4-1ubuntu1 [4124 B] 635s Fetched 11.4 MB in 1s (8955 kB/s) 635s Selecting previously unselected package libevent-2.1-7:ppc64el. 635s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 69728 files and directories currently installed.) 635s Preparing to unpack .../00-libevent-2.1-7_2.1.12-stable-9_ppc64el.deb ... 635s Unpacking libevent-2.1-7:ppc64el (2.1.12-stable-9) ... 635s Selecting previously unselected package libunbound8:ppc64el. 635s Preparing to unpack .../01-libunbound8_1.19.1-1ubuntu1_ppc64el.deb ... 635s Unpacking libunbound8:ppc64el (1.19.1-1ubuntu1) ... 635s Selecting previously unselected package libgnutls-dane0:ppc64el. 635s Preparing to unpack .../02-libgnutls-dane0_3.8.3-1ubuntu1_ppc64el.deb ... 635s Unpacking libgnutls-dane0:ppc64el (3.8.3-1ubuntu1) ... 635s Selecting previously unselected package gnutls-bin. 635s Preparing to unpack .../03-gnutls-bin_3.8.3-1ubuntu1_ppc64el.deb ... 635s Unpacking gnutls-bin (3.8.3-1ubuntu1) ... 635s Selecting previously unselected package libavahi-common-data:ppc64el. 635s Preparing to unpack .../04-libavahi-common-data_0.8-13ubuntu2_ppc64el.deb ... 635s Unpacking libavahi-common-data:ppc64el (0.8-13ubuntu2) ... 635s Selecting previously unselected package libavahi-common3:ppc64el. 635s Preparing to unpack .../05-libavahi-common3_0.8-13ubuntu2_ppc64el.deb ... 635s Unpacking libavahi-common3:ppc64el (0.8-13ubuntu2) ... 635s Selecting previously unselected package libavahi-client3:ppc64el. 635s Preparing to unpack .../06-libavahi-client3_0.8-13ubuntu2_ppc64el.deb ... 635s Unpacking libavahi-client3:ppc64el (0.8-13ubuntu2) ... 635s Selecting previously unselected package libcrack2:ppc64el. 635s Preparing to unpack .../07-libcrack2_2.9.6-5.1_ppc64el.deb ... 635s Unpacking libcrack2:ppc64el (2.9.6-5.1) ... 635s Selecting previously unselected package libtalloc2:ppc64el. 635s Preparing to unpack .../08-libtalloc2_2.4.2-1_ppc64el.deb ... 635s Unpacking libtalloc2:ppc64el (2.4.2-1) ... 635s Selecting previously unselected package libtdb1:ppc64el. 635s Preparing to unpack .../09-libtdb1_1.4.10-1_ppc64el.deb ... 635s Unpacking libtdb1:ppc64el (1.4.10-1) ... 635s Selecting previously unselected package libtevent0:ppc64el. 635s Preparing to unpack .../10-libtevent0_0.16.1-1_ppc64el.deb ... 635s Unpacking libtevent0:ppc64el (0.16.1-1) ... 635s Selecting previously unselected package libldb2:ppc64el. 635s Preparing to unpack .../11-libldb2_2%3a2.8.0+samba4.19.5+dfsg-1ubuntu1_ppc64el.deb ... 635s Unpacking libldb2:ppc64el (2:2.8.0+samba4.19.5+dfsg-1ubuntu1) ... 635s Selecting previously unselected package libnfsidmap1:ppc64el. 635s Preparing to unpack .../12-libnfsidmap1_1%3a2.6.3-3ubuntu1_ppc64el.deb ... 635s Unpacking libnfsidmap1:ppc64el (1:2.6.3-3ubuntu1) ... 635s Selecting previously unselected package libpwquality-common. 635s Preparing to unpack .../13-libpwquality-common_1.4.5-3_all.deb ... 635s Unpacking libpwquality-common (1.4.5-3) ... 635s Selecting previously unselected package libpwquality1:ppc64el. 635s Preparing to unpack .../14-libpwquality1_1.4.5-3_ppc64el.deb ... 635s Unpacking libpwquality1:ppc64el (1.4.5-3) ... 635s Selecting previously unselected package libpam-pwquality:ppc64el. 635s Preparing to unpack .../15-libpam-pwquality_1.4.5-3_ppc64el.deb ... 635s Unpacking libpam-pwquality:ppc64el (1.4.5-3) ... 635s Selecting previously unselected package libwbclient0:ppc64el. 635s Preparing to unpack .../16-libwbclient0_2%3a4.19.5+dfsg-1ubuntu1_ppc64el.deb ... 635s Unpacking libwbclient0:ppc64el (2:4.19.5+dfsg-1ubuntu1) ... 635s Selecting previously unselected package samba-libs:ppc64el. 635s Preparing to unpack .../17-samba-libs_2%3a4.19.5+dfsg-1ubuntu1_ppc64el.deb ... 635s Unpacking samba-libs:ppc64el (2:4.19.5+dfsg-1ubuntu1) ... 635s Selecting previously unselected package softhsm2-common. 635s Preparing to unpack .../18-softhsm2-common_2.6.1-2.2_ppc64el.deb ... 635s Unpacking softhsm2-common (2.6.1-2.2) ... 635s Selecting previously unselected package libsofthsm2. 635s Preparing to unpack .../19-libsofthsm2_2.6.1-2.2_ppc64el.deb ... 635s Unpacking libsofthsm2 (2.6.1-2.2) ... 635s Selecting previously unselected package softhsm2. 635s Preparing to unpack .../20-softhsm2_2.6.1-2.2_ppc64el.deb ... 635s Unpacking softhsm2 (2.6.1-2.2) ... 635s Selecting previously unselected package python3-sss. 635s Preparing to unpack .../21-python3-sss_2.9.4-1ubuntu1_ppc64el.deb ... 635s Unpacking python3-sss (2.9.4-1ubuntu1) ... 635s Selecting previously unselected package libsss-idmap0. 635s Preparing to unpack .../22-libsss-idmap0_2.9.4-1ubuntu1_ppc64el.deb ... 635s Unpacking libsss-idmap0 (2.9.4-1ubuntu1) ... 635s Selecting previously unselected package libnss-sss:ppc64el. 635s Preparing to unpack .../23-libnss-sss_2.9.4-1ubuntu1_ppc64el.deb ... 635s Unpacking libnss-sss:ppc64el (2.9.4-1ubuntu1) ... 635s Selecting previously unselected package libpam-sss:ppc64el. 635s Preparing to unpack .../24-libpam-sss_2.9.4-1ubuntu1_ppc64el.deb ... 635s Unpacking libpam-sss:ppc64el (2.9.4-1ubuntu1) ... 635s Selecting previously unselected package libc-ares2:ppc64el. 635s Preparing to unpack .../25-libc-ares2_1.27.0-1_ppc64el.deb ... 635s Unpacking libc-ares2:ppc64el (1.27.0-1) ... 635s Selecting previously unselected package libdhash1:ppc64el. 635s Preparing to unpack .../26-libdhash1_0.6.2-2_ppc64el.deb ... 635s Unpacking libdhash1:ppc64el (0.6.2-2) ... 635s Selecting previously unselected package libbasicobjects0:ppc64el. 635s Preparing to unpack .../27-libbasicobjects0_0.6.2-2_ppc64el.deb ... 635s Unpacking libbasicobjects0:ppc64el (0.6.2-2) ... 635s Selecting previously unselected package libcollection4:ppc64el. 635s Preparing to unpack .../28-libcollection4_0.6.2-2_ppc64el.deb ... 635s Unpacking libcollection4:ppc64el (0.6.2-2) ... 635s Selecting previously unselected package libpath-utils1:ppc64el. 635s Preparing to unpack .../29-libpath-utils1_0.6.2-2_ppc64el.deb ... 635s Unpacking libpath-utils1:ppc64el (0.6.2-2) ... 635s Selecting previously unselected package libref-array1:ppc64el. 635s Preparing to unpack .../30-libref-array1_0.6.2-2_ppc64el.deb ... 635s Unpacking libref-array1:ppc64el (0.6.2-2) ... 635s Selecting previously unselected package libini-config5:ppc64el. 635s Preparing to unpack .../31-libini-config5_0.6.2-2_ppc64el.deb ... 635s Unpacking libini-config5:ppc64el (0.6.2-2) ... 635s Selecting previously unselected package libsss-certmap0. 635s Preparing to unpack .../32-libsss-certmap0_2.9.4-1ubuntu1_ppc64el.deb ... 635s Unpacking libsss-certmap0 (2.9.4-1ubuntu1) ... 635s Selecting previously unselected package libsss-nss-idmap0. 635s Preparing to unpack .../33-libsss-nss-idmap0_2.9.4-1ubuntu1_ppc64el.deb ... 635s Unpacking libsss-nss-idmap0 (2.9.4-1ubuntu1) ... 635s Selecting previously unselected package sssd-common. 635s Preparing to unpack .../34-sssd-common_2.9.4-1ubuntu1_ppc64el.deb ... 635s Unpacking sssd-common (2.9.4-1ubuntu1) ... 635s Selecting previously unselected package sssd-ad-common. 635s Preparing to unpack .../35-sssd-ad-common_2.9.4-1ubuntu1_ppc64el.deb ... 635s Unpacking sssd-ad-common (2.9.4-1ubuntu1) ... 635s Selecting previously unselected package sssd-krb5-common. 635s Preparing to unpack .../36-sssd-krb5-common_2.9.4-1ubuntu1_ppc64el.deb ... 635s Unpacking sssd-krb5-common (2.9.4-1ubuntu1) ... 636s Selecting previously unselected package libsmbclient:ppc64el. 636s Preparing to unpack .../37-libsmbclient_2%3a4.19.5+dfsg-1ubuntu1_ppc64el.deb ... 636s Unpacking libsmbclient:ppc64el (2:4.19.5+dfsg-1ubuntu1) ... 636s Selecting previously unselected package sssd-ad. 636s Preparing to unpack .../38-sssd-ad_2.9.4-1ubuntu1_ppc64el.deb ... 636s Unpacking sssd-ad (2.9.4-1ubuntu1) ... 636s Selecting previously unselected package libipa-hbac0. 636s Preparing to unpack .../39-libipa-hbac0_2.9.4-1ubuntu1_ppc64el.deb ... 636s Unpacking libipa-hbac0 (2.9.4-1ubuntu1) ... 636s Selecting previously unselected package sssd-ipa. 636s Preparing to unpack .../40-sssd-ipa_2.9.4-1ubuntu1_ppc64el.deb ... 636s Unpacking sssd-ipa (2.9.4-1ubuntu1) ... 636s Selecting previously unselected package sssd-krb5. 636s Preparing to unpack .../41-sssd-krb5_2.9.4-1ubuntu1_ppc64el.deb ... 636s Unpacking sssd-krb5 (2.9.4-1ubuntu1) ... 636s Selecting previously unselected package sssd-ldap. 636s Preparing to unpack .../42-sssd-ldap_2.9.4-1ubuntu1_ppc64el.deb ... 636s Unpacking sssd-ldap (2.9.4-1ubuntu1) ... 636s Selecting previously unselected package sssd-proxy. 636s Preparing to unpack .../43-sssd-proxy_2.9.4-1ubuntu1_ppc64el.deb ... 636s Unpacking sssd-proxy (2.9.4-1ubuntu1) ... 636s Selecting previously unselected package sssd. 636s Preparing to unpack .../44-sssd_2.9.4-1ubuntu1_ppc64el.deb ... 636s Unpacking sssd (2.9.4-1ubuntu1) ... 636s Selecting previously unselected package autopkgtest-satdep. 636s Preparing to unpack .../45-3-autopkgtest-satdep.deb ... 636s Unpacking autopkgtest-satdep (0) ... 636s Setting up libpwquality-common (1.4.5-3) ... 636s Setting up libpath-utils1:ppc64el (0.6.2-2) ... 636s Setting up softhsm2-common (2.6.1-2.2) ... 636s 636s Creating config file /etc/softhsm/softhsm2.conf with new version 636s Setting up libnfsidmap1:ppc64el (1:2.6.3-3ubuntu1) ... 636s Setting up libsss-idmap0 (2.9.4-1ubuntu1) ... 636s Setting up libbasicobjects0:ppc64el (0.6.2-2) ... 636s Setting up libtdb1:ppc64el (1.4.10-1) ... 636s Setting up libc-ares2:ppc64el (1.27.0-1) ... 636s Setting up libwbclient0:ppc64el (2:4.19.5+dfsg-1ubuntu1) ... 636s Setting up libtalloc2:ppc64el (2.4.2-1) ... 636s Setting up libdhash1:ppc64el (0.6.2-2) ... 636s Setting up libtevent0:ppc64el (0.16.1-1) ... 636s Setting up libavahi-common-data:ppc64el (0.8-13ubuntu2) ... 636s Setting up libevent-2.1-7:ppc64el (2.1.12-stable-9) ... 636s Setting up libcrack2:ppc64el (2.9.6-5.1) ... 636s Setting up libcollection4:ppc64el (0.6.2-2) ... 636s Setting up libipa-hbac0 (2.9.4-1ubuntu1) ... 636s Setting up libref-array1:ppc64el (0.6.2-2) ... 636s Setting up libldb2:ppc64el (2:2.8.0+samba4.19.5+dfsg-1ubuntu1) ... 636s Setting up libsss-nss-idmap0 (2.9.4-1ubuntu1) ... 636s Setting up libnss-sss:ppc64el (2.9.4-1ubuntu1) ... 636s Setting up libsofthsm2 (2.6.1-2.2) ... 636s Setting up softhsm2 (2.6.1-2.2) ... 636s Setting up libini-config5:ppc64el (0.6.2-2) ... 636s Setting up libavahi-common3:ppc64el (0.8-13ubuntu2) ... 636s Setting up python3-sss (2.9.4-1ubuntu1) ... 636s Setting up libsss-certmap0 (2.9.4-1ubuntu1) ... 636s Setting up libunbound8:ppc64el (1.19.1-1ubuntu1) ... 636s Setting up libpwquality1:ppc64el (1.4.5-3) ... 636s Setting up libavahi-client3:ppc64el (0.8-13ubuntu2) ... 636s Setting up libgnutls-dane0:ppc64el (3.8.3-1ubuntu1) ... 636s Setting up libpam-pwquality:ppc64el (1.4.5-3) ... 636s Setting up samba-libs:ppc64el (2:4.19.5+dfsg-1ubuntu1) ... 636s Setting up libsmbclient:ppc64el (2:4.19.5+dfsg-1ubuntu1) ... 636s Setting up libpam-sss:ppc64el (2.9.4-1ubuntu1) ... 636s Setting up gnutls-bin (3.8.3-1ubuntu1) ... 636s Setting up sssd-common (2.9.4-1ubuntu1) ... 636s Creating SSSD system user & group... 636s warn: The home directory `/var/lib/sss' already exists. Not touching this directory. 636s warn: Warning: The home directory `/var/lib/sss' does not belong to the user you are currently creating. 637s Warning: found usr.sbin.sssd in /etc/apparmor.d/force-complain, forcing complain mode 637s Warning from /etc/apparmor.d/usr.sbin.sssd (/etc/apparmor.d/usr.sbin.sssd line 63): Caching disabled for: 'usr.sbin.sssd' due to force complain 637s Created symlink /etc/systemd/system/sssd.service.wants/sssd-autofs.socket → /usr/lib/systemd/system/sssd-autofs.socket. 637s Created symlink /etc/systemd/system/sssd.service.wants/sssd-nss.socket → /usr/lib/systemd/system/sssd-nss.socket. 640s Created symlink /etc/systemd/system/sssd.service.wants/sssd-pam-priv.socket → /usr/lib/systemd/system/sssd-pam-priv.socket. 640s Created symlink /etc/systemd/system/sssd.service.wants/sssd-pam.socket → /usr/lib/systemd/system/sssd-pam.socket. 640s Created symlink /etc/systemd/system/sssd.service.wants/sssd-ssh.socket → /usr/lib/systemd/system/sssd-ssh.socket. 640s Created symlink /etc/systemd/system/sssd.service.wants/sssd-sudo.socket → /usr/lib/systemd/system/sssd-sudo.socket. 640s Created symlink /etc/systemd/system/multi-user.target.wants/sssd.service → /usr/lib/systemd/system/sssd.service. 640s sssd-autofs.service is a disabled or a static unit, not starting it. 640s sssd-nss.service is a disabled or a static unit, not starting it. 640s sssd-pam.service is a disabled or a static unit, not starting it. 640s sssd-ssh.service is a disabled or a static unit, not starting it. 640s sssd-sudo.service is a disabled or a static unit, not starting it. 640s Could not execute systemctl: at /usr/bin/deb-systemd-invoke line 148. 640s Setting up sssd-proxy (2.9.4-1ubuntu1) ... 640s Setting up sssd-ad-common (2.9.4-1ubuntu1) ... 640s Created symlink /etc/systemd/system/sssd.service.wants/sssd-pac.socket → /usr/lib/systemd/system/sssd-pac.socket. 640s sssd-pac.service is a disabled or a static unit, not starting it. 640s Could not execute systemctl: at /usr/bin/deb-systemd-invoke line 148. 640s Setting up sssd-krb5-common (2.9.4-1ubuntu1) ... 640s Setting up sssd-krb5 (2.9.4-1ubuntu1) ... 640s Setting up sssd-ldap (2.9.4-1ubuntu1) ... 640s Setting up sssd-ad (2.9.4-1ubuntu1) ... 640s Setting up sssd-ipa (2.9.4-1ubuntu1) ... 640s Setting up sssd (2.9.4-1ubuntu1) ... 640s Setting up autopkgtest-satdep (0) ... 640s Processing triggers for man-db (2.12.0-3) ... 641s Processing triggers for libc-bin (2.39-0ubuntu6) ... 644s (Reading database ... 70316 files and directories currently installed.) 644s Removing autopkgtest-satdep (0) ... 654s autopkgtest [14:30:12]: test sssd-softhism2-certificates-tests.sh: [----------------------- 654s + '[' -z ubuntu ']' 654s + required_tools=(p11tool openssl softhsm2-util) 654s + for cmd in "${required_tools[@]}" 654s + command -v p11tool 654s + for cmd in "${required_tools[@]}" 654s + command -v openssl 654s + for cmd in "${required_tools[@]}" 654s + command -v softhsm2-util 654s + PIN=053350 654s +++ find /usr/lib/softhsm/libsofthsm2.so 654s +++ head -n 1 654s ++ realpath /usr/lib/softhsm/libsofthsm2.so 654s + SOFTHSM2_MODULE=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so 654s + SSSD_P11_CHILD=/usr/libexec/sssd/p11_child 654s + TOKEN_ID=00112233445566778899FFAABBCCDDEEFF012345 654s + '[' '!' -v NO_SSSD_TESTS ']' 654s + '[' '!' -x /usr/libexec/sssd/p11_child ']' 654s + ca_db_arg=ca_db 654s ++ /usr/libexec/sssd/p11_child --help 654s + p11_child_help='Usage: p11_child [OPTION...] 654s -d, --debug-level=INT Debug level 654s --debug-timestamps=INT Add debug timestamps 654s --debug-microseconds=INT Show timestamps with microseconds 654s --dumpable=INT Allow core dumps 654s --debug-fd=INT An open file descriptor for the debug 654s logs 654s --logger=stderr|files|journald Set logger 654s --auth Run in auth mode 654s --pre Run in pre-auth mode 654s --wait_for_card Wait until card is available 654s --verification Run in verification mode 654s --pin Expect PIN on stdin 654s --keypad Expect PIN on keypad 654s --verify=STRING Tune validation 654s --ca_db=STRING CA DB to use 654s --module_name=STRING Module name for authentication 654s --token_name=STRING Token name for authentication 654s --key_id=STRING Key ID for authentication 654s --label=STRING Label for authentication 654s --certificate=STRING certificate to verify, base64 encoded 654s --uri=STRING PKCS#11 URI to restrict selection 654s --chain-id=LONG Tevent chain ID used for logging 654s purposes 654s 654s Help options: 654s -?, --help Show this help message 654s --usage Display brief usage message' 654s + echo 'Usage: p11_child [OPTION...] 654s -d, --debug-level=INT Debug level 654s --debug-timestamps=INT Add debug timestamps 654s --debug-microseconds=INT Show timestamps with microseconds 654s --dumpable=INT Allow core dumps 654s --debug-fd=INT An open file descriptor for the debug 654s logs 654s --logger=stderr|files|journald Set logger 654s --auth Run in auth mode 654s --pre Run in pre-auth mode 654s --wait_for_card Wait until card is available 654s --verification Run in verification mode 654s --pin Expect PIN on stdin 654s --keypad Expect PIN on keypad 654s --verify=STRING Tune validation 654s --ca_db=STRING CA DB to use 654s --module_name=STRING Module name for authentication 654s --token_name=STRING Token name for authentication 654s --key_id=STRING Key ID for authentication 654s --label=STRING Label for authentication 654s --certificate=STRING certificate to verify, base64 encoded 654s --uri=STRING PKCS#11 URI to restrict selection 654s --chain-id=LONG Tevent chain ID used for logging 654s purposes 654s 654s Help options: 654s -?, --help Show this help message 654s --usage Display brief usage message' 654s + grep nssdb -qs 654s + echo 'Usage: p11_child [OPTION...] 654s -d, --debug-level=INT Debug level 654s + grep -qs -- --ca_db 654s --debug-timestamps=INT Add debug timestamps 654s --debug-microseconds=INT Show timestamps with microseconds 654s --dumpable=INT Allow core dumps 654s --debug-fd=INT An open file descriptor for the debug 654s logs 654s --logger=stderr|files|journald Set logger 654s --auth Run in auth mode 654s --pre Run in pre-auth mode 654s --wait_for_card Wait until card is available 654s --verification Run in verification mode 654s --pin Expect PIN on stdin 654s --keypad Expect PIN on keypad 654s --verify=STRING Tune validation 654s --ca_db=STRING CA DB to use 654s --module_name=STRING Module name for authentication 654s --token_name=STRING Token name for authentication 654s --key_id=STRING Key ID for authentication 654s --label=STRING Label for authentication 654s --certificate=STRING certificate to verify, base64 encoded 654s --uri=STRING PKCS#11 URI to restrict selection 654s --chain-id=LONG Tevent chain ID used for logging 654s purposes 654s 654s Help options: 654s -?, --help Show this help message 654s --usage Display brief usage message' 654s + '[' '!' -e /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so ']' 654s ++ mktemp -d -t sssd-softhsm2-XXXXXX 654s + tmpdir=/tmp/sssd-softhsm2-aGaR2m 654s + keys_size=1024 654s + [[ ! -v KEEP_TEMPORARY_FILES ]] 654s + trap 'rm -rf "$tmpdir"' EXIT 654s + trap 'set +x; echo -e "\nUnexpected failure!!!"' ERR 654s + echo -n 01 654s + touch /tmp/sssd-softhsm2-aGaR2m/index.txt 654s + mkdir -p /tmp/sssd-softhsm2-aGaR2m/new_certs 654s + cat 654s + root_ca_key_pass=pass:random-root-CA-password-13254 654s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-aGaR2m/test-root-CA-key.pem -passout pass:random-root-CA-password-13254 1024 654s + openssl req -passin pass:random-root-CA-password-13254 -batch -config /tmp/sssd-softhsm2-aGaR2m/test-root-CA.config -x509 -new -nodes -key /tmp/sssd-softhsm2-aGaR2m/test-root-CA-key.pem -sha256 -days 1024 -set_serial 0 -extensions v3_ca -out /tmp/sssd-softhsm2-aGaR2m/test-root-CA.pem 654s + openssl x509 -noout -in /tmp/sssd-softhsm2-aGaR2m/test-root-CA.pem 654s + cat 654s + intermediate_ca_key_pass=pass:random-intermediate-CA-password-10972 654s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA-key.pem -passout pass:random-intermediate-CA-password-10972 1024 654s + openssl req -batch -new -nodes -passin pass:random-intermediate-CA-password-10972 -config /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA.config -key /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA-key.pem -passout pass:random-root-CA-password-13254 -sha256 -extensions v3_ca -out /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA-certificate-request.pem 654s + openssl req -text -noout -in /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA-certificate-request.pem 654s + openssl ca -batch -notext -config /tmp/sssd-softhsm2-aGaR2m/test-root-CA.config -passin pass:random-root-CA-password-13254 -keyfile /tmp/sssd-softhsm2-aGaR2m/test-root-CA-key.pem -in /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA-certificate-request.pem -days 365 -extensions v3_intermediate_ca -out /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA.pem 654s Certificate Request: 654s Data: 654s Version: 1 (0x0) 654s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 654s Subject Public Key Info: 654s Public Key Algorithm: rsaEncryption 654s Public-Key: (1024 bit) 654s Modulus: 654s 00:a8:97:40:1c:88:47:f7:40:06:12:ed:37:6b:91: 654s 54:5a:a9:e7:57:56:4a:81:11:bf:8f:63:f7:03:90: 654s 0a:ce:ca:a0:c6:da:3c:ec:ce:21:16:2b:e1:21:c9: 654s ec:e3:76:c0:d3:bd:b5:e9:b2:fa:c1:c6:66:40:1d: 654s d6:c8:0c:86:49:49:f5:9b:39:58:e2:da:2f:af:04: 654s 46:8e:e0:2b:2c:a4:6d:91:bb:4c:f5:58:b3:1b:8c: 654s 6a:2e:16:b4:c7:37:6f:d1:f1:20:35:bf:69:fd:2d: 654s d7:45:18:83:27:ea:01:78:83:cb:06:7d:cc:c2:db: 654s 26:e9:f9:97:5c:e8:89:f2:69 654s Exponent: 65537 (0x10001) 654s Attributes: 654s (none) 654s Requested Extensions: 654s Signature Algorithm: sha256WithRSAEncryption 654s Signature Value: 654s 8c:c7:26:d8:9a:ba:e6:42:78:22:eb:a1:c4:3b:c3:45:32:87: 654s ca:0c:e8:9f:75:a5:75:fa:ed:ff:7c:4a:62:7b:a5:68:f8:dd: 654s 76:f0:09:d7:63:09:27:a7:33:72:b4:df:59:9c:16:2a:d1:26: 654s 75:9f:81:50:c8:1c:66:cd:ab:cc:10:d4:c3:b2:99:47:79:ef: 654s 8a:ac:d9:22:53:61:50:61:35:b8:1b:06:cc:90:20:b5:7e:1b: 654s 6d:4e:81:42:cf:f4:10:2f:83:77:8a:18:7e:6d:02:a3:a3:5e: 654s 1b:fb:02:6e:e1:3d:83:61:0c:33:7b:9e:96:58:f4:ec:18:8f: 654s 52:47 654s Using configuration from /tmp/sssd-softhsm2-aGaR2m/test-root-CA.config 654s Check that the request matches the signature 654s Signature ok 654s Certificate Details: 654s Serial Number: 1 (0x1) 654s Validity 654s Not Before: Mar 24 14:30:12 2024 GMT 654s Not After : Mar 24 14:30:12 2025 GMT 654s Subject: 654s organizationName = Test Organization 654s organizationalUnitName = Test Organization Unit 654s commonName = Test Organization Intermediate CA 654s X509v3 extensions: 654s X509v3 Subject Key Identifier: 654s 31:FC:B0:C0:3B:5E:07:29:56:E3:5F:CB:E4:72:5A:3C:C9:4C:88:73 654s X509v3 Authority Key Identifier: 654s keyid:DE:A9:E7:5A:01:45:EC:58:E0:3F:9B:48:BC:A0:2D:8C:9F:F6:B6:2B 654s DirName:/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root CA 654s serial:00 654s X509v3 Basic Constraints: 654s CA:TRUE 654s X509v3 Key Usage: critical 654s Digital Signature, Certificate Sign, CRL Sign 654s Certificate is to be certified until Mar 24 14:30:12 2025 GMT (365 days) 654s 654s Write out database with 1 new entries 654s Database updated 654s + openssl x509 -noout -in /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA.pem 654s + openssl verify -CAfile /tmp/sssd-softhsm2-aGaR2m/test-root-CA.pem /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA.pem 654s /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA.pem: OK 654s + cat 654s + sub_intermediate_ca_key_pass=pass:random-sub-intermediate-CA-password-22078 654s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-key.pem -passout pass:random-sub-intermediate-CA-password-22078 1024 654s + openssl req -batch -new -nodes -passin pass:random-sub-intermediate-CA-password-22078 -config /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA.config -key /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-key.pem -passout pass:random-intermediate-CA-password-10972 -sha256 -extensions v3_ca -out /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-certificate-request.pem 654s + openssl req -text -noout -in /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-certificate-request.pem 654s Certificate Request: 654s Data: 654s Version: 1 (0x0) 654s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 654s Subject Public Key Info: 654s Public Key Algorithm: rsaEncryption 654s Public-Key: (1024 bit) 654s Modulus: 654s 00:e2:cb:82:8e:16:66:c2:a4:e9:1c:01:aa:74:30: 654s 34:8d:10:30:0a:cb:92:99:15:e3:58:e6:ec:46:13: 654s db:fc:1f:70:28:74:9d:21:9c:9a:4e:96:26:51:c1: 654s 79:54:9e:ce:ab:3d:1c:63:5a:56:5f:9d:27:55:b1: 654s 33:68:38:9e:ba:50:68:b2:ce:13:0d:e8:12:52:35: 654s 47:67:8d:b1:a0:6b:33:e5:2f:94:ad:9f:2d:ec:c7: 654s 19:75:e4:02:db:e8:0a:3e:41:27:27:89:f1:51:6b: 654s 56:ab:7d:02:58:c4:a0:9b:0d:59:03:c4:39:1a:9b: 654s 91:11:bf:d2:3b:bc:75:5d:15 654s Exponent: 65537 (0x10001) 654s Attributes: 654s (none) 654s Requested Extensions: 654s Signature Algorithm: sha256WithRSAEncryption 654s Signature Value: 654s 3e:9e:96:1b:3f:ad:eb:56:57:66:49:5f:35:7a:d5:e1:5f:59: 654s ad:a7:a8:8a:fd:e3:68:ee:9e:54:99:ff:20:99:ec:40:fe:ab: 654s 1c:53:f9:10:62:57:8b:8e:20:c3:a2:2e:da:0d:09:50:9a:c2: 654s 6e:d1:05:2f:e6:41:8d:b7:f3:89:4e:29:54:cb:7e:76:71:32: 654s f9:ef:82:7c:9e:f6:93:03:72:76:fa:45:5b:c9:a0:b6:c0:38: 654s 3e:8d:a7:80:82:80:61:b5:a4:c1:0c:97:07:04:84:27:ef:c8: 654s 58:f9:f4:c8:24:c6:1c:aa:8c:c8:df:af:a6:ca:40:68:df:9f: 654s 51:e7 654s + openssl ca -batch -notext -config /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA.config -passin pass:random-intermediate-CA-password-10972 -keyfile /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA-key.pem -in /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-certificate-request.pem -days 365 -extensions v3_intermediate_ca -out /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA.pem 654s Using configuration from /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA.config 654s Check that the request matches the signature 654s Signature ok 654s Certificate Details: 654s Serial Number: 2 (0x2) 654s Validity 654s Not Before: Mar 24 14:30:12 2024 GMT 654s Not After : Mar 24 14:30:12 2025 GMT 654s Subject: 654s organizationName = Test Organization 654s organizationalUnitName = Test Organization Unit 654s commonName = Test Organization Sub Intermediate CA 654s X509v3 extensions: 654s X509v3 Subject Key Identifier: 654s 5A:CC:9F:9F:88:9C:44:29:40:06:6B:A7:1C:C2:ED:65:BE:8F:AC:4D 654s X509v3 Authority Key Identifier: 654s keyid:31:FC:B0:C0:3B:5E:07:29:56:E3:5F:CB:E4:72:5A:3C:C9:4C:88:73 654s DirName:/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root CA 654s serial:01 654s X509v3 Basic Constraints: 654s CA:TRUE 654s X509v3 Key Usage: critical 654s Digital Signature, Certificate Sign, CRL Sign 654s Certificate is to be certified until Mar 24 14:30:12 2025 GMT (365 days) 654s 654s Write out database with 1 new entries 654s Database updated 654s + openssl x509 -noout -in /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA.pem 654s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA.pem /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA.pem 654s /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA.pem: OK 654s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-aGaR2m/test-root-CA.pem /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA.pem 654s + local cmd=openssl 654s + shift 654s + openssl verify -CAfile /tmp/sssd-softhsm2-aGaR2m/test-root-CA.pem /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA.pem 654s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 654s error 20 at 0 depth lookup: unable to get local issuer certificate 654s error /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA.pem: verification failed 654s + cat 654s + root_ca_trusted_cert_0001_key_pass=pass:random-root-ca-trusted-cert-0001-9351 654s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-aGaR2m/test-root-CA-trusted-certificate-0001-key.pem -passout pass:random-root-ca-trusted-cert-0001-9351 1024 654s + openssl req -new -nodes -reqexts req_exts -passin pass:random-root-ca-trusted-cert-0001-9351 -key /tmp/sssd-softhsm2-aGaR2m/test-root-CA-trusted-certificate-0001-key.pem -config /tmp/sssd-softhsm2-aGaR2m/test-root-CA-trusted-certificate-0001.config -out /tmp/sssd-softhsm2-aGaR2m/test-root-CA-trusted-certificate-0001-request.pem 655s + openssl req -text -noout -in /tmp/sssd-softhsm2-aGaR2m/test-root-CA-trusted-certificate-0001-request.pem 655s Certificate Request: 655s Data: 655s Version: 1 (0x0) 655s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 655s Subject Public Key Info: 655s Public Key Algorithm: rsaEncryption 655s Public-Key: (1024 bit) 655s Modulus: 655s 00:d1:a7:fe:ec:26:d0:a6:f7:d6:da:99:24:6f:c6: 655s 66:12:f6:68:79:fc:0b:5d:1a:75:b2:cc:12:74:4d: 655s 47:25:db:4d:bf:1b:3e:35:00:50:00:c6:c5:57:95: 655s 17:e5:b6:44:35:a0:a5:bf:50:64:b3:d9:23:db:54: 655s 4c:96:13:8a:3d:01:a2:a0:6f:e2:6a:d3:8c:12:1f: 655s cd:36:1b:64:75:48:83:72:10:ed:45:5b:0d:42:64: 655s 69:b7:99:4f:3d:10:16:44:f9:1c:c3:7d:74:f3:b4: 655s 5b:1b:df:2c:b0:a1:8c:99:34:88:a1:12:35:a9:52: 655s 64:c8:69:aa:0e:a8:bf:27:53 655s Exponent: 65537 (0x10001) 655s Attributes: 655s Requested Extensions: 655s X509v3 Basic Constraints: 655s CA:FALSE 655s Netscape Cert Type: 655s SSL Client, S/MIME 655s Netscape Comment: 655s Test Organization Root CA trusted Certificate 655s X509v3 Subject Key Identifier: 655s 34:85:7C:7C:7A:3E:65:0C:A4:E6:0F:18:92:37:5E:B3:EF:E1:15:B6 655s X509v3 Key Usage: critical 655s Digital Signature, Non Repudiation, Key Encipherment 655s X509v3 Extended Key Usage: 655s TLS Web Client Authentication, E-mail Protection 655s X509v3 Subject Alternative Name: 655s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 655s Signature Algorithm: sha256WithRSAEncryption 655s Signature Value: 655s 15:68:a8:79:e8:2c:78:1d:3a:5e:0b:47:a6:b4:6e:45:6d:92: 655s 2a:8c:85:cd:5a:90:08:0f:a1:e8:7a:e0:58:ab:84:21:ad:f2: 655s ce:ed:79:42:dd:af:44:eb:40:5b:8c:97:d2:37:86:aa:b7:98: 655s c2:d4:8c:cf:68:b9:75:2f:f7:22:c8:16:cd:f5:77:7d:d0:32: 655s 99:77:e9:1e:f5:47:a1:85:75:91:9c:51:7c:60:7b:53:3c:bc: 655s 5c:54:cd:aa:89:a8:17:a8:04:8d:19:7c:a4:7f:9e:4f:70:fc: 655s c5:75:48:74:88:36:7d:3f:c0:ab:b3:33:07:82:cc:8f:ba:74: 655s 5b:cf 655s + openssl ca -batch -notext -config /tmp/sssd-softhsm2-aGaR2m/test-root-CA.config -passin pass:random-root-CA-password-13254 -keyfile /tmp/sssd-softhsm2-aGaR2m/test-root-CA-key.pem -in /tmp/sssd-softhsm2-aGaR2m/test-root-CA-trusted-certificate-0001-request.pem -days 365 -extensions usr_cert -out /tmp/sssd-softhsm2-aGaR2m/test-root-CA-trusted-certificate-0001.pem 655s Using configuration from /tmp/sssd-softhsm2-aGaR2m/test-root-CA.config 655s Check that the request matches the signature 655s Signature ok 655s Certificate Details: 655s Serial Number: 3 (0x3) 655s Validity 655s Not Before: Mar 24 14:30:12 2024 GMT 655s Not After : Mar 24 14:30:12 2025 GMT 655s Subject: 655s organizationName = Test Organization 655s organizationalUnitName = Test Organization Unit 655s commonName = Test Organization Root Trusted Certificate 0001 655s X509v3 extensions: 655s X509v3 Authority Key Identifier: 655s DE:A9:E7:5A:01:45:EC:58:E0:3F:9B:48:BC:A0:2D:8C:9F:F6:B6:2B 655s X509v3 Basic Constraints: 655s CA:FALSE 655s Netscape Cert Type: 655s SSL Client, S/MIME 655s Netscape Comment: 655s Test Organization Root CA trusted Certificate 655s X509v3 Subject Key Identifier: 655s 34:85:7C:7C:7A:3E:65:0C:A4:E6:0F:18:92:37:5E:B3:EF:E1:15:B6 655s X509v3 Key Usage: critical 655s Digital Signature, Non Repudiation, Key Encipherment 655s X509v3 Extended Key Usage: 655s TLS Web Client Authentication, E-mail Protection 655s X509v3 Subject Alternative Name: 655s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 655s Certificate is to be certified until Mar 24 14:30:12 2025 GMT (365 days) 655s 655s Write out database with 1 new entries 655s Database updated 655s + openssl x509 -noout -in /tmp/sssd-softhsm2-aGaR2m/test-root-CA-trusted-certificate-0001.pem 655s + openssl verify -CAfile /tmp/sssd-softhsm2-aGaR2m/test-root-CA.pem /tmp/sssd-softhsm2-aGaR2m/test-root-CA-trusted-certificate-0001.pem 655s /tmp/sssd-softhsm2-aGaR2m/test-root-CA-trusted-certificate-0001.pem: OK 655s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA.pem /tmp/sssd-softhsm2-aGaR2m/test-root-CA-trusted-certificate-0001.pem 655s + local cmd=openssl 655s + shift 655s + openssl verify -CAfile /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA.pem /tmp/sssd-softhsm2-aGaR2m/test-root-CA-trusted-certificate-0001.pem 655s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 655s error 20 at 0 depth lookup: unable to get local issuer certificate 655s error /tmp/sssd-softhsm2-aGaR2m/test-root-CA-trusted-certificate-0001.pem: verification failed 655s + cat 655s + intermediate_ca_trusted_cert_0001_key_pass=pass:random-intermediate-ca-trusted-cert-0001-12671 655s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA-trusted-certificate-0001-key.pem -passout pass:random-intermediate-ca-trusted-cert-0001-12671 1024 655s + openssl req -new -nodes -reqexts req_exts -passin pass:random-intermediate-ca-trusted-cert-0001-12671 -key /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA-trusted-certificate-0001-key.pem -config /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA-trusted-certificate-0001.config -out /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA-trusted-certificate-0001-request.pem 655s + openssl req -text -noout -in /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA-trusted-certificate-0001-request.pem 655s + openssl ca -passin pass:random-intermediate-CA-password-10972 -config /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA.config -batch -notext -keyfile /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA-key.pem -in /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA-trusted-certificate-0001-request.pem -days 365 -extensions usr_cert -out /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA-trusted-certificate-0001.pem 655s Certificate Request: 655s Data: 655s Version: 1 (0x0) 655s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 655s Subject Public Key Info: 655s Public Key Algorithm: rsaEncryption 655s Public-Key: (1024 bit) 655s Modulus: 655s 00:bc:67:b7:28:6d:81:07:a8:cc:92:a1:33:ed:b6: 655s 9c:87:15:d0:2b:20:29:8c:35:12:a7:29:e1:d3:40: 655s cd:c7:10:67:bb:61:bb:72:6b:d5:eb:35:16:22:40: 655s 4a:36:69:f8:0d:0d:61:9f:88:2f:d0:2d:bd:15:6f: 655s 0a:15:9f:0d:69:30:f7:03:d9:2e:21:65:b9:be:7d: 655s 18:52:3f:05:34:48:ab:2b:86:12:00:51:68:45:e5: 655s fb:27:0c:83:cc:d0:57:dd:ef:e6:a0:fb:b5:d3:ce: 655s 42:4e:77:19:1d:df:ba:be:dd:0a:b8:bc:07:82:d4: 655s 67:57:72:e9:66:d4:40:9b:a5 655s Exponent: 65537 (0x10001) 655s Attributes: 655s Requested Extensions: 655s X509v3 Basic Constraints: 655s CA:FALSE 655s Netscape Cert Type: 655s SSL Client, S/MIME 655s Netscape Comment: 655s Test Organization Intermediate CA trusted Certificate 655s X509v3 Subject Key Identifier: 655s 74:F8:D5:C2:3D:00:9E:7B:0E:C9:7C:DD:FA:B3:69:12:F2:DB:0E:3C 655s X509v3 Key Usage: critical 655s Digital Signature, Non Repudiation, Key Encipherment 655s X509v3 Extended Key Usage: 655s TLS Web Client Authentication, E-mail Protection 655s X509v3 Subject Alternative Name: 655s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 655s Signature Algorithm: sha256WithRSAEncryption 655s Signature Value: 655s 38:64:7f:3c:df:15:f4:c8:0e:be:6f:0d:68:14:82:df:51:c7: 655s 9a:9c:9f:fb:74:ec:13:24:dd:c3:48:01:64:dc:b9:07:71:71: 655s 24:ae:95:db:55:39:a3:70:e6:e3:b5:aa:e7:b9:3d:47:ab:d9: 655s c8:c5:43:54:9c:a3:09:bc:8e:17:09:83:b6:44:9c:17:46:1e: 655s b0:a9:6e:48:b4:5a:7c:39:d3:03:4b:e9:67:0e:22:d2:e3:03: 655s 0f:09:ce:ea:db:7c:9f:d9:df:5a:f7:6b:43:e3:8c:63:e1:1a: 655s 04:fb:50:0f:f2:f6:b6:a7:72:f9:13:2a:84:88:8c:35:7b:09: 655s 4c:1a 655s Using configuration from /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA.config 655s Check that the request matches the signature 655s Signature ok 655s Certificate Details: 655s Serial Number: 4 (0x4) 655s Validity 655s Not Before: Mar 24 14:30:13 2024 GMT 655s Not After : Mar 24 14:30:13 2025 GMT 655s Subject: 655s organizationName = Test Organization 655s organizationalUnitName = Test Organization Unit 655s commonName = Test Organization Intermediate Trusted Certificate 0001 655s X509v3 extensions: 655s X509v3 Authority Key Identifier: 655s 31:FC:B0:C0:3B:5E:07:29:56:E3:5F:CB:E4:72:5A:3C:C9:4C:88:73 655s X509v3 Basic Constraints: 655s CA:FALSE 655s Netscape Cert Type: 655s SSL Client, S/MIME 655s Netscape Comment: 655s Test Organization Intermediate CA trusted Certificate 655s X509v3 Subject Key Identifier: 655s 74:F8:D5:C2:3D:00:9E:7B:0E:C9:7C:DD:FA:B3:69:12:F2:DB:0E:3C 655s X509v3 Key Usage: critical 655s Digital Signature, Non Repudiation, Key Encipherment 655s X509v3 Extended Key Usage: 655s TLS Web Client Authentication, E-mail Protection 655s X509v3 Subject Alternative Name: 655s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 655s Certificate is to be certified until Mar 24 14:30:13 2025 GMT (365 days) 655s 655s Write out database with 1 new entries 655s Database updated 655s + openssl x509 -noout -in /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA-trusted-certificate-0001.pem 655s + echo 'This certificate should not be trusted fully' 655s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA.pem /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA-trusted-certificate-0001.pem 655s This certificate should not be trusted fully 655s + local cmd=openssl 655s + shift 655s + openssl verify -CAfile /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA.pem /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA-trusted-certificate-0001.pem 655s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 655s error 2 at 1 depth lookup: unable to get issuer certificate 655s error /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA-trusted-certificate-0001.pem: verification failed 655s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA.pem /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA-trusted-certificate-0001.pem 655s /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA-trusted-certificate-0001.pem: OK 655s + cat 655s + sub_intermediate_ca_trusted_cert_0001_key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-21502 655s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-trusted-certificate-0001-key.pem -passout pass:random-sub-intermediate-ca-trusted-cert-0001-21502 1024 655s + openssl req -new -nodes -reqexts req_exts -passin pass:random-sub-intermediate-ca-trusted-cert-0001-21502 -key /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-trusted-certificate-0001-key.pem -config /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-trusted-certificate-0001.config -out /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-trusted-certificate-0001-request.pem 655s + openssl req -text -noout -in /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-trusted-certificate-0001-request.pem 655s Certificate Request: 655s Data: 655s Version: 1 (0x0) 655s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 655s Subject Public Key Info: 655s Public Key Algorithm: rsaEncryption 655s Public-Key: (1024 bit) 655s Modulus: 655s 00:b4:5d:09:2d:64:33:ed:23:ae:89:5e:39:49:af: 655s 04:be:46:0f:69:7a:f6:3c:d0:31:a6:b7:72:35:a3: 655s a6:77:4c:94:cb:ef:e6:60:c9:fd:9a:be:39:4b:64: 655s ca:9e:98:b7:5a:f9:7b:a4:92:8b:b3:0f:94:da:f9: 655s 59:f3:a0:30:36:78:a8:52:21:ed:da:39:24:0d:1e: 655s 5e:2c:45:a3:a7:18:8a:05:ea:5a:70:4f:a0:84:e8: 655s ec:6d:70:d5:0f:1e:03:1c:28:1f:60:a4:1a:02:50: 655s cc:36:4b:7a:86:9d:bc:cc:21:c6:f4:d4:26:59:1f: 655s a1:c2:b3:0e:14:3a:16:b4:33 655s Exponent: 65537 (0x10001) 655s Attributes: 655s Requested Extensions: 655s X509v3 Basic Constraints: 655s CA:FALSE 655s Netscape Cert Type: 655s SSL Client, S/MIME 655s Netscape Comment: 655s Test Organization Sub Intermediate CA trusted Certificate 655s X509v3 Subject Key Identifier: 655s EA:AC:49:6C:AE:DC:32:E5:9C:AF:68:64:1D:2C:3E:E6:31:34:73:29 655s X509v3 Key Usage: critical 655s Digital Signature, Non Repudiation, Key Encipherment 655s X509v3 Extended Key Usage: 655s TLS Web Client Authentication, E-mail Protection 655s X509v3 Subject Alternative Name: 655s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 655s Signature Algorithm: sha256WithRSAEncryption 655s Signature Value: 655s b3:84:b1:70:af:e5:58:49:34:33:38:78:90:ca:2c:44:21:89: 655s 1b:a9:2f:df:9a:e8:77:4d:8f:67:79:2e:20:89:c9:38:ab:28: 655s 21:bc:6c:1b:01:4c:d7:1c:c9:08:06:51:5f:7f:ea:69:80:7d: 655s e8:8a:30:38:83:54:7b:5a:2c:7b:10:4f:fb:a5:74:fd:a2:5a: 655s a1:33:37:a8:7a:fc:1c:e5:32:6e:42:93:85:6a:13:eb:60:4c: 655s bc:19:5d:ab:9d:09:5c:69:84:95:82:24:14:de:71:e3:2b:39: 655s 2e:5e:3d:16:1c:ff:b3:e0:e3:a3:c4:ba:59:df:d1:6a:db:43: 655s 65:09 655s + openssl ca -passin pass:random-sub-intermediate-CA-password-22078 -config /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA.config -batch -notext -keyfile /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-key.pem -in /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-trusted-certificate-0001-request.pem -days 365 -extensions usr_cert -out /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-trusted-certificate-0001.pem 655s Using configuration from /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA.config 655s Check that the request matches the signature 655s Signature ok 655s Certificate Details: 655s Serial Number: 5 (0x5) 655s Validity 655s Not Before: Mar 24 14:30:13 2024 GMT 655s Not After : Mar 24 14:30:13 2025 GMT 655s Subject: 655s organizationName = Test Organization 655s organizationalUnitName = Test Organization Unit 655s commonName = Test Organization Sub Intermediate Trusted Certificate 0001 655s X509v3 extensions: 655s X509v3 Authority Key Identifier: 655s 5A:CC:9F:9F:88:9C:44:29:40:06:6B:A7:1C:C2:ED:65:BE:8F:AC:4D 655s X509v3 Basic Constraints: 655s CA:FALSE 655s Netscape Cert Type: 655s SSL Client, S/MIME 655s Netscape Comment: 655s Test Organization Sub Intermediate CA trusted Certificate 655s X509v3 Subject Key Identifier: 655s EA:AC:49:6C:AE:DC:32:E5:9C:AF:68:64:1D:2C:3E:E6:31:34:73:29 655s X509v3 Key Usage: critical 655s Digital Signature, Non Repudiation, Key Encipherment 655s X509v3 Extended Key Usage: 655s TLS Web Client Authentication, E-mail Protection 655s X509v3 Subject Alternative Name: 655s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 655s Certificate is to be certified until Mar 24 14:30:13 2025 GMT (365 days) 655s 655s Write out database with 1 new entries 655s Database updated 655s + openssl x509 -noout -in /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-trusted-certificate-0001.pem 655s + echo 'This certificate should not be trusted fully' 655s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA.pem /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-trusted-certificate-0001.pem 655s This certificate should not be trusted fully 655s + local cmd=openssl 655s + shift 655s + openssl verify -CAfile /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA.pem /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-trusted-certificate-0001.pem 655s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 655s error 2 at 1 depth lookup: unable to get issuer certificate 655s error /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-trusted-certificate-0001.pem: verification failed 655s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA.pem /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-trusted-certificate-0001.pem 655s + local cmd=openssl 655s + shift 655s + openssl verify -CAfile /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA.pem /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-trusted-certificate-0001.pem 655s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 655s error 20 at 0 depth lookup: unable to get local issuer certificate 655s error /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-trusted-certificate-0001.pem: verification failed 655s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA.pem /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-trusted-certificate-0001.pem 655s /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-trusted-certificate-0001.pem: OK 655s + expect_fail openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA.pem /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-trusted-certificate-0001.pem 655s + local cmd=openssl 655s + shift 655s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA.pem /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-trusted-certificate-0001.pem 655s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 655s error 20 at 0 depth lookup: unable to get local issuer certificate 655s error /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-trusted-certificate-0001.pem: verification failed 655s + echo 'Building a the full-chain CA file...' 655s Building a the full-chain CA file... 655s + cat /tmp/sssd-softhsm2-aGaR2m/test-root-CA.pem /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA.pem /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA.pem 655s + cat /tmp/sssd-softhsm2-aGaR2m/test-root-CA.pem /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA.pem 655s + cat /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA.pem /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA.pem 655s + openssl crl2pkcs7 -nocrl -certfile /tmp/sssd-softhsm2-aGaR2m/test-full-chain-CA.pem 655s + openssl pkcs7 -print_certs -noout 655s + openssl verify -CAfile /tmp/sssd-softhsm2-aGaR2m/test-full-chain-CA.pem /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA.pem 655s subject=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 655s issuer=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 655s 655s subject=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 655s issuer=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 655s 655s subject=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 655s issuer=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 655s 655s /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA.pem: OK 655s + openssl verify -CAfile /tmp/sssd-softhsm2-aGaR2m/test-full-chain-CA.pem /tmp/sssd-softhsm2-aGaR2m/test-root-CA-trusted-certificate-0001.pem 655s /tmp/sssd-softhsm2-aGaR2m/test-root-CA-trusted-certificate-0001.pem: OK 655s + openssl verify -CAfile /tmp/sssd-softhsm2-aGaR2m/test-full-chain-CA.pem /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA-trusted-certificate-0001.pem 655s /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA-trusted-certificate-0001.pem: OK 655s + openssl verify -CAfile /tmp/sssd-softhsm2-aGaR2m/test-full-chain-CA.pem /tmp/sssd-softhsm2-aGaR2m/test-root-intermediate-chain-CA.pem 655s /tmp/sssd-softhsm2-aGaR2m/test-root-intermediate-chain-CA.pem: OK 655s + openssl verify -CAfile /tmp/sssd-softhsm2-aGaR2m/test-full-chain-CA.pem /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-trusted-certificate-0001.pem 655s + echo 'Certificates generation completed!' 655s /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-trusted-certificate-0001.pem: OK 655s Certificates generation completed! 655s + [[ -v NO_SSSD_TESTS ]] 655s + invalid_certificate /tmp/sssd-softhsm2-aGaR2m/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-9351 /dev/null 655s + check_certificate /tmp/sssd-softhsm2-aGaR2m/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-9351 /dev/null 655s + local certificate=/tmp/sssd-softhsm2-aGaR2m/test-root-CA-trusted-certificate-0001.pem 655s + local key_pass=pass:random-root-ca-trusted-cert-0001-9351 655s + local key_ring=/dev/null 655s + local verify_option= 655s + prepare_softhsm2_card /tmp/sssd-softhsm2-aGaR2m/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-9351 655s + local certificate=/tmp/sssd-softhsm2-aGaR2m/test-root-CA-trusted-certificate-0001.pem 655s + local key_pass=pass:random-root-ca-trusted-cert-0001-9351 655s + local key_cn 655s + local key_name 655s + local tokens_dir 655s + local output_cert_file 655s + token_name= 655s ++ basename /tmp/sssd-softhsm2-aGaR2m/test-root-CA-trusted-certificate-0001.pem .pem 655s + key_name=test-root-CA-trusted-certificate-0001 655s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-aGaR2m/test-root-CA-trusted-certificate-0001.pem 655s ++ sed -n 's/ *commonName *= //p' 655s + key_cn='Test Organization Root Trusted Certificate 0001' 655s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 655s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-aGaR2m/softhsm2-test-root-CA-trusted-certificate-0001.conf 655s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-aGaR2m/softhsm2-test-root-CA-trusted-certificate-0001.conf 655s ++ basename /tmp/sssd-softhsm2-aGaR2m/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 655s + tokens_dir=/tmp/sssd-softhsm2-aGaR2m/softhsm2-test-root-CA-trusted-certificate-0001 655s + token_name='Test Organization Root Tr Token' 655s + '[' '!' -e /tmp/sssd-softhsm2-aGaR2m/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 655s + local key_file 655s + local decrypted_key 655s + mkdir -p /tmp/sssd-softhsm2-aGaR2m/softhsm2-test-root-CA-trusted-certificate-0001 655s + key_file=/tmp/sssd-softhsm2-aGaR2m/test-root-CA-trusted-certificate-0001-key.pem 655s + decrypted_key=/tmp/sssd-softhsm2-aGaR2m/test-root-CA-trusted-certificate-0001-key-decrypted.pem 655s + cat 655s + softhsm2-util --init-token --label 'Test Organization Root Tr Token' --pin 053350 --so-pin 053350 --free 655s Slot 0 has a free/uninitialized token. 655s The token has been initialized and is reassigned to slot 1330437457 655s + softhsm2-util --show-slots 655s Available slots: 655s Slot 1330437457 655s Slot info: 655s Description: SoftHSM slot ID 0x4f4cdd51 655s Manufacturer ID: SoftHSM project 655s Hardware version: 2.6 655s Firmware version: 2.6 655s Token present: yes 655s Token info: 655s Manufacturer ID: SoftHSM project 655s Model: SoftHSM v2 655s Hardware version: 2.6 655s Firmware version: 2.6 655s Serial number: 00131e104f4cdd51 655s Initialized: yes 655s User PIN init.: yes 655s Label: Test Organization Root Tr Token 655s Slot 1 655s Slot info: 655s Description: SoftHSM slot ID 0x1 655s Manufacturer ID: SoftHSM project 655s Hardware version: 2.6 655s Firmware version: 2.6 655s Token present: yes 655s Token info: 655s Manufacturer ID: SoftHSM project 655s Model: SoftHSM v2 655s Hardware version: 2.6 655s Firmware version: 2.6 655s Serial number: 655s Initialized: no 655s User PIN init.: no 655s Label: 655s + p11tool --provider=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --write --no-mark-private --load-certificate=/tmp/sssd-softhsm2-aGaR2m/test-root-CA-trusted-certificate-0001.pem --login --set-pin=053350 --label 'Test Organization Root Trusted Certificate 0001' --id 00112233445566778899FFAABBCCDDEEFF012345 655s + openssl rsa -passin pass:random-root-ca-trusted-cert-0001-9351 -in /tmp/sssd-softhsm2-aGaR2m/test-root-CA-trusted-certificate-0001-key.pem -out /tmp/sssd-softhsm2-aGaR2m/test-root-CA-trusted-certificate-0001-key-decrypted.pem 655s writing RSA key 655s + p11tool --provider=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --write --load-privkey=/tmp/sssd-softhsm2-aGaR2m/test-root-CA-trusted-certificate-0001-key-decrypted.pem --login --set-pin=053350 --label 'Test Organization Root Trusted Certificate 0001 Key' --id 00112233445566778899FFAABBCCDDEEFF012345 655s + rm /tmp/sssd-softhsm2-aGaR2m/test-root-CA-trusted-certificate-0001-key-decrypted.pem 655s + p11tool --provider=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --list-all 655s + echo 'Test Organization Root Tr Token' 655s Object 0: 655s URL: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=00131e104f4cdd51;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert 655s Type: X.509 Certificate (RSA-1024) 655s Expires: Mon Mar 24 14:30:12 2025 655s Label: Test Organization Root Trusted Certificate 0001 655s ID: 00:11:22:33:44:55:66:77:88:99:ff:aa:bb:cc:dd:ee:ff:01:23:45 655s 655s Test Organization Root Tr Token 655s + '[' -n '' ']' 655s + local output_base_name=SSSD-child-15345 655s + local output_file=/tmp/sssd-softhsm2-aGaR2m/SSSD-child-15345.output 655s + output_cert_file=/tmp/sssd-softhsm2-aGaR2m/SSSD-child-15345.pem 655s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/dev/null 655s [p11_child[2121]] [main] (0x0400): p11_child started. 655s [p11_child[2121]] [main] (0x2000): Running in [pre-auth] mode. 655s [p11_child[2121]] [main] (0x2000): Running with effective IDs: [0][0]. 655s [p11_child[2121]] [main] (0x2000): Running with real IDs [0][0]. 655s [p11_child[2121]] [init_verification] (0x0040): X509_LOOKUP_load_file [/dev/null] failed [92274824][error:05800088:x509 certificate routines::no certificate or crl found]. 655s [p11_child[2121]] [do_work] (0x0040): init_verification failed. 655s [p11_child[2121]] [main] (0x0020): p11_child failed (5) 655s + return 2 655s + valid_certificate /tmp/sssd-softhsm2-aGaR2m/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-9351 /dev/null no_verification 655s + check_certificate /tmp/sssd-softhsm2-aGaR2m/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-9351 /dev/null no_verification 655s + local certificate=/tmp/sssd-softhsm2-aGaR2m/test-root-CA-trusted-certificate-0001.pem 655s + local key_pass=pass:random-root-ca-trusted-cert-0001-9351 655s + local key_ring=/dev/null 655s + local verify_option=no_verification 655s + prepare_softhsm2_card /tmp/sssd-softhsm2-aGaR2m/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-9351 655s + local certificate=/tmp/sssd-softhsm2-aGaR2m/test-root-CA-trusted-certificate-0001.pem 655s + local key_pass=pass:random-root-ca-trusted-cert-0001-9351 655s + local key_cn 655s + local key_name 655s + local tokens_dir 655s + local output_cert_file 655s + token_name= 655s ++ basename /tmp/sssd-softhsm2-aGaR2m/test-root-CA-trusted-certificate-0001.pem .pem 655s + key_name=test-root-CA-trusted-certificate-0001 655s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-aGaR2m/test-root-CA-trusted-certificate-0001.pem 655s ++ sed -n 's/ *commonName *= //p' 655s + key_cn='Test Organization Root Trusted Certificate 0001' 655s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 655s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-aGaR2m/softhsm2-test-root-CA-trusted-certificate-0001.conf 655s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-aGaR2m/softhsm2-test-root-CA-trusted-certificate-0001.conf 655s ++ basename /tmp/sssd-softhsm2-aGaR2m/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 655s + tokens_dir=/tmp/sssd-softhsm2-aGaR2m/softhsm2-test-root-CA-trusted-certificate-0001 655s + token_name='Test Organization Root Tr Token' 655s + '[' '!' -e /tmp/sssd-softhsm2-aGaR2m/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 655s + '[' '!' -d /tmp/sssd-softhsm2-aGaR2m/softhsm2-test-root-CA-trusted-certificate-0001 ']' 655s + echo 'Test Organization Root Tr Token' 655s Test Organization Root Tr Token 655s + '[' -n no_verification ']' 655s + local verify_arg=--verify=no_verification 655s + local output_base_name=SSSD-child-9455 655s + local output_file=/tmp/sssd-softhsm2-aGaR2m/SSSD-child-9455.output 655s + output_cert_file=/tmp/sssd-softhsm2-aGaR2m/SSSD-child-9455.pem 655s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --verify=no_verification --ca_db=/dev/null 655s [p11_child[2127]] [main] (0x0400): p11_child started. 655s [p11_child[2127]] [main] (0x2000): Running in [pre-auth] mode. 655s [p11_child[2127]] [main] (0x2000): Running with effective IDs: [0][0]. 655s [p11_child[2127]] [main] (0x2000): Running with real IDs [0][0]. 655s [p11_child[2127]] [parse_cert_verify_opts] (0x0020): Found 'no_verification' option, disabling verification completely. This should not be used in production. 655s [p11_child[2127]] [do_card] (0x4000): Module List: 655s [p11_child[2127]] [do_card] (0x4000): common name: [softhsm2]. 655s [p11_child[2127]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 655s [p11_child[2127]] [do_card] (0x4000): Description [SoftHSM slot ID 0x4f4cdd51] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 655s [p11_child[2127]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 655s [p11_child[2127]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x4f4cdd51][1330437457] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 655s [p11_child[2127]] [do_card] (0x4000): Login NOT required. 655s [p11_child[2127]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 655s [p11_child[2127]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Root Tr Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 655s [p11_child[2127]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x4f4cdd51;slot-manufacturer=SoftHSM%20project;slot-id=1330437457;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=00131e104f4cdd51;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 655s [p11_child[2127]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 655s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-aGaR2m/SSSD-child-9455.output 655s + echo '-----BEGIN CERTIFICATE-----' 655s + tail -n1 /tmp/sssd-softhsm2-aGaR2m/SSSD-child-9455.output 655s + echo '-----END CERTIFICATE-----' 655s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-aGaR2m/SSSD-child-9455.pem 655s Certificate: 655s Data: 655s Version: 3 (0x2) 655s Serial Number: 3 (0x3) 655s Signature Algorithm: sha256WithRSAEncryption 655s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 655s Validity 655s Not Before: Mar 24 14:30:12 2024 GMT 655s Not After : Mar 24 14:30:12 2025 GMT 655s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 655s Subject Public Key Info: 655s Public Key Algorithm: rsaEncryption 655s Public-Key: (1024 bit) 655s Modulus: 655s 00:d1:a7:fe:ec:26:d0:a6:f7:d6:da:99:24:6f:c6: 655s 66:12:f6:68:79:fc:0b:5d:1a:75:b2:cc:12:74:4d: 655s 47:25:db:4d:bf:1b:3e:35:00:50:00:c6:c5:57:95: 655s 17:e5:b6:44:35:a0:a5:bf:50:64:b3:d9:23:db:54: 655s 4c:96:13:8a:3d:01:a2:a0:6f:e2:6a:d3:8c:12:1f: 655s cd:36:1b:64:75:48:83:72:10:ed:45:5b:0d:42:64: 655s 69:b7:99:4f:3d:10:16:44:f9:1c:c3:7d:74:f3:b4: 655s 5b:1b:df:2c:b0:a1:8c:99:34:88:a1:12:35:a9:52: 655s 64:c8:69:aa:0e:a8:bf:27:53 655s Exponent: 65537 (0x10001) 655s X509v3 extensions: 655s X509v3 Authority Key Identifier: 655s DE:A9:E7:5A:01:45:EC:58:E0:3F:9B:48:BC:A0:2D:8C:9F:F6:B6:2B 655s X509v3 Basic Constraints: 655s CA:FALSE 655s Netscape Cert Type: 655s SSL Client, S/MIME 655s Netscape Comment: 655s Test Organization Root CA trusted Certificate 655s X509v3 Subject Key Identifier: 655s 34:85:7C:7C:7A:3E:65:0C:A4:E6:0F:18:92:37:5E:B3:EF:E1:15:B6 655s X509v3 Key Usage: critical 655s Digital Signature, Non Repudiation, Key Encipherment 655s X509v3 Extended Key Usage: 655s TLS Web Client Authentication, E-mail Protection 655s X509v3 Subject Alternative Name: 655s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 655s Signature Algorithm: sha256WithRSAEncryption 655s Signature Value: 655s 7a:28:b9:1f:e7:38:17:f8:b1:40:04:8d:1c:85:0e:1c:96:62: 655s 86:ca:42:84:48:a1:be:1f:02:43:37:54:57:7a:04:f3:5e:c5: 655s 3e:39:77:1a:12:76:ef:1f:e7:4b:ad:ea:c1:fb:05:34:b7:51: 655s ef:02:2c:7c:40:85:32:a6:51:24:e7:1b:f7:81:a1:d6:4b:31: 655s 10:30:09:a1:00:0f:03:61:b7:66:c2:90:95:8c:b8:1a:e8:a5: 655s 1c:34:86:c9:a1:14:f9:56:21:92:81:50:97:88:76:ae:20:29: 655s 91:ba:1c:da:64:03:79:1a:f3:e6:c1:2b:f5:8a:f2:b5:b8:f4: 655s b0:f2 655s + local found_md5 expected_md5 655s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-aGaR2m/test-root-CA-trusted-certificate-0001.pem 655s + expected_md5=Modulus=D1A7FEEC26D0A6F7D6DA99246FC66612F66879FC0B5D1A75B2CC12744D4725DB4DBF1B3E35005000C6C5579517E5B64435A0A5BF5064B3D923DB544C96138A3D01A2A06FE26AD38C121FCD361B647548837210ED455B0D426469B7994F3D101644F91CC37D74F3B45B1BDF2CB0A18C993488A11235A95264C869AA0EA8BF2753 655s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-aGaR2m/SSSD-child-9455.pem 655s + found_md5=Modulus=D1A7FEEC26D0A6F7D6DA99246FC66612F66879FC0B5D1A75B2CC12744D4725DB4DBF1B3E35005000C6C5579517E5B64435A0A5BF5064B3D923DB544C96138A3D01A2A06FE26AD38C121FCD361B647548837210ED455B0D426469B7994F3D101644F91CC37D74F3B45B1BDF2CB0A18C993488A11235A95264C869AA0EA8BF2753 655s + '[' Modulus=D1A7FEEC26D0A6F7D6DA99246FC66612F66879FC0B5D1A75B2CC12744D4725DB4DBF1B3E35005000C6C5579517E5B64435A0A5BF5064B3D923DB544C96138A3D01A2A06FE26AD38C121FCD361B647548837210ED455B0D426469B7994F3D101644F91CC37D74F3B45B1BDF2CB0A18C993488A11235A95264C869AA0EA8BF2753 '!=' Modulus=D1A7FEEC26D0A6F7D6DA99246FC66612F66879FC0B5D1A75B2CC12744D4725DB4DBF1B3E35005000C6C5579517E5B64435A0A5BF5064B3D923DB544C96138A3D01A2A06FE26AD38C121FCD361B647548837210ED455B0D426469B7994F3D101644F91CC37D74F3B45B1BDF2CB0A18C993488A11235A95264C869AA0EA8BF2753 ']' 655s + output_file=/tmp/sssd-softhsm2-aGaR2m/SSSD-child-9455-auth.output 655s ++ basename /tmp/sssd-softhsm2-aGaR2m/SSSD-child-9455-auth.output .output 655s + output_cert_file=/tmp/sssd-softhsm2-aGaR2m/SSSD-child-9455-auth.pem 655s + echo -n 053350 655s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/dev/null --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=no_verification --token_name 'Test Organization Root Tr Token' --module_name /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so 655s [p11_child[2135]] [main] (0x0400): p11_child started. 655s [p11_child[2135]] [main] (0x2000): Running in [auth] mode. 655s [p11_child[2135]] [main] (0x2000): Running with effective IDs: [0][0]. 655s [p11_child[2135]] [main] (0x2000): Running with real IDs [0][0]. 655s [p11_child[2135]] [parse_cert_verify_opts] (0x0020): Found 'no_verification' option, disabling verification completely. This should not be used in production. 655s [p11_child[2135]] [do_card] (0x4000): Module List: 655s [p11_child[2135]] [do_card] (0x4000): common name: [softhsm2]. 655s [p11_child[2135]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 655s [p11_child[2135]] [do_card] (0x4000): Description [SoftHSM slot ID 0x4f4cdd51] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 655s [p11_child[2135]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 655s [p11_child[2135]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x4f4cdd51][1330437457] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 655s [p11_child[2135]] [do_card] (0x4000): Login required. 655s [p11_child[2135]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 655s [p11_child[2135]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so Test Organization Root Tr Token Test Organization Root Tr Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 655s [p11_child[2135]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x4f4cdd51;slot-manufacturer=SoftHSM%20project;slot-id=1330437457;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=00131e104f4cdd51;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 655s [p11_child[2135]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 655s [p11_child[2135]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 655s [p11_child[2135]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 655s [p11_child[2135]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 655s [p11_child[2135]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 655s [p11_child[2135]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 655s [p11_child[2135]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 655s [p11_child[2135]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 655s [p11_child[2135]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 655s [p11_child[2135]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 655s [p11_child[2135]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 655s [p11_child[2135]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 655s [p11_child[2135]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 655s [p11_child[2135]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 655s [p11_child[2135]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 655s [p11_child[2135]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 655s [p11_child[2135]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 655s [p11_child[2135]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 655s [p11_child[2135]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 655s [p11_child[2135]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 655s [p11_child[2135]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 655s [p11_child[2135]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 655s [p11_child[2135]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 655s [p11_child[2135]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 655s [p11_child[2135]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 655s [p11_child[2135]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 655s [p11_child[2135]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 655s [p11_child[2135]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 655s [p11_child[2135]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 655s [p11_child[2135]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 655s [p11_child[2135]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 655s [p11_child[2135]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 655s [p11_child[2135]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 655s [p11_child[2135]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 655s [p11_child[2135]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 655s [p11_child[2135]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 655s [p11_child[2135]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 655s [p11_child[2135]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 655s [p11_child[2135]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 655s [p11_child[2135]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 655s [p11_child[2135]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 655s [p11_child[2135]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 655s [p11_child[2135]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 655s [p11_child[2135]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 655s [p11_child[2135]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 655s [p11_child[2135]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 655s [p11_child[2135]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 655s [p11_child[2135]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 655s [p11_child[2135]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 655s [p11_child[2135]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 655s [p11_child[2135]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 655s [p11_child[2135]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 655s [p11_child[2135]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 655s [p11_child[2135]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 655s [p11_child[2135]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 655s [p11_child[2135]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 655s [p11_child[2135]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 655s [p11_child[2135]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 655s [p11_child[2135]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 655s [p11_child[2135]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 655s [p11_child[2135]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 655s [p11_child[2135]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 655s [p11_child[2135]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 655s [p11_child[2135]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 655s [p11_child[2135]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 655s [p11_child[2135]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 655s [p11_child[2135]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 655s [p11_child[2135]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 655s [p11_child[2135]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 655s [p11_child[2135]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 655s [p11_child[2135]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 655s [p11_child[2135]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 655s [p11_child[2135]] [do_card] (0x4000): Certificate verified and validated. 655s [p11_child[2135]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 655s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-aGaR2m/SSSD-child-9455-auth.output 655s + echo '-----BEGIN CERTIFICATE-----' 655s + tail -n1 /tmp/sssd-softhsm2-aGaR2m/SSSD-child-9455-auth.output 655s + echo '-----END CERTIFICATE-----' 655s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-aGaR2m/SSSD-child-9455-auth.pem 655s Certificate: 655s Data: 655s Version: 3 (0x2) 655s Serial Number: 3 (0x3) 655s Signature Algorithm: sha256WithRSAEncryption 655s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 655s Validity 655s Not Before: Mar 24 14:30:12 2024 GMT 655s Not After : Mar 24 14:30:12 2025 GMT 655s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 655s Subject Public Key Info: 655s Public Key Algorithm: rsaEncryption 655s Public-Key: (1024 bit) 655s Modulus: 655s 00:d1:a7:fe:ec:26:d0:a6:f7:d6:da:99:24:6f:c6: 655s 66:12:f6:68:79:fc:0b:5d:1a:75:b2:cc:12:74:4d: 655s 47:25:db:4d:bf:1b:3e:35:00:50:00:c6:c5:57:95: 655s 17:e5:b6:44:35:a0:a5:bf:50:64:b3:d9:23:db:54: 655s 4c:96:13:8a:3d:01:a2:a0:6f:e2:6a:d3:8c:12:1f: 655s cd:36:1b:64:75:48:83:72:10:ed:45:5b:0d:42:64: 655s 69:b7:99:4f:3d:10:16:44:f9:1c:c3:7d:74:f3:b4: 655s 5b:1b:df:2c:b0:a1:8c:99:34:88:a1:12:35:a9:52: 655s 64:c8:69:aa:0e:a8:bf:27:53 655s Exponent: 65537 (0x10001) 655s X509v3 extensions: 655s X509v3 Authority Key Identifier: 655s DE:A9:E7:5A:01:45:EC:58:E0:3F:9B:48:BC:A0:2D:8C:9F:F6:B6:2B 655s X509v3 Basic Constraints: 655s CA:FALSE 655s Netscape Cert Type: 655s SSL Client, S/MIME 655s Netscape Comment: 655s Test Organization Root CA trusted Certificate 655s X509v3 Subject Key Identifier: 655s 34:85:7C:7C:7A:3E:65:0C:A4:E6:0F:18:92:37:5E:B3:EF:E1:15:B6 655s X509v3 Key Usage: critical 655s Digital Signature, Non Repudiation, Key Encipherment 655s X509v3 Extended Key Usage: 655s TLS Web Client Authentication, E-mail Protection 655s X509v3 Subject Alternative Name: 655s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 655s Signature Algorithm: sha256WithRSAEncryption 655s Signature Value: 655s 7a:28:b9:1f:e7:38:17:f8:b1:40:04:8d:1c:85:0e:1c:96:62: 655s 86:ca:42:84:48:a1:be:1f:02:43:37:54:57:7a:04:f3:5e:c5: 655s 3e:39:77:1a:12:76:ef:1f:e7:4b:ad:ea:c1:fb:05:34:b7:51: 655s ef:02:2c:7c:40:85:32:a6:51:24:e7:1b:f7:81:a1:d6:4b:31: 655s 10:30:09:a1:00:0f:03:61:b7:66:c2:90:95:8c:b8:1a:e8:a5: 655s 1c:34:86:c9:a1:14:f9:56:21:92:81:50:97:88:76:ae:20:29: 655s 91:ba:1c:da:64:03:79:1a:f3:e6:c1:2b:f5:8a:f2:b5:b8:f4: 655s b0:f2 655s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-aGaR2m/SSSD-child-9455-auth.pem 655s + found_md5=Modulus=D1A7FEEC26D0A6F7D6DA99246FC66612F66879FC0B5D1A75B2CC12744D4725DB4DBF1B3E35005000C6C5579517E5B64435A0A5BF5064B3D923DB544C96138A3D01A2A06FE26AD38C121FCD361B647548837210ED455B0D426469B7994F3D101644F91CC37D74F3B45B1BDF2CB0A18C993488A11235A95264C869AA0EA8BF2753 655s + '[' Modulus=D1A7FEEC26D0A6F7D6DA99246FC66612F66879FC0B5D1A75B2CC12744D4725DB4DBF1B3E35005000C6C5579517E5B64435A0A5BF5064B3D923DB544C96138A3D01A2A06FE26AD38C121FCD361B647548837210ED455B0D426469B7994F3D101644F91CC37D74F3B45B1BDF2CB0A18C993488A11235A95264C869AA0EA8BF2753 '!=' Modulus=D1A7FEEC26D0A6F7D6DA99246FC66612F66879FC0B5D1A75B2CC12744D4725DB4DBF1B3E35005000C6C5579517E5B64435A0A5BF5064B3D923DB544C96138A3D01A2A06FE26AD38C121FCD361B647548837210ED455B0D426469B7994F3D101644F91CC37D74F3B45B1BDF2CB0A18C993488A11235A95264C869AA0EA8BF2753 ']' 655s + valid_certificate /tmp/sssd-softhsm2-aGaR2m/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-9351 /tmp/sssd-softhsm2-aGaR2m/test-root-CA.pem 655s + check_certificate /tmp/sssd-softhsm2-aGaR2m/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-9351 /tmp/sssd-softhsm2-aGaR2m/test-root-CA.pem 655s + local certificate=/tmp/sssd-softhsm2-aGaR2m/test-root-CA-trusted-certificate-0001.pem 655s + local key_pass=pass:random-root-ca-trusted-cert-0001-9351 655s + local key_ring=/tmp/sssd-softhsm2-aGaR2m/test-root-CA.pem 655s + local verify_option= 655s + prepare_softhsm2_card /tmp/sssd-softhsm2-aGaR2m/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-9351 655s + local certificate=/tmp/sssd-softhsm2-aGaR2m/test-root-CA-trusted-certificate-0001.pem 655s + local key_pass=pass:random-root-ca-trusted-cert-0001-9351 655s + local key_cn 655s + local key_name 655s + local tokens_dir 655s + local output_cert_file 655s + token_name= 655s ++ basename /tmp/sssd-softhsm2-aGaR2m/test-root-CA-trusted-certificate-0001.pem .pem 655s + key_name=test-root-CA-trusted-certificate-0001 655s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-aGaR2m/test-root-CA-trusted-certificate-0001.pem 655s ++ sed -n 's/ *commonName *= //p' 655s + key_cn='Test Organization Root Trusted Certificate 0001' 655s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 655s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-aGaR2m/softhsm2-test-root-CA-trusted-certificate-0001.conf 655s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-aGaR2m/softhsm2-test-root-CA-trusted-certificate-0001.conf 655s ++ basename /tmp/sssd-softhsm2-aGaR2m/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 655s + tokens_dir=/tmp/sssd-softhsm2-aGaR2m/softhsm2-test-root-CA-trusted-certificate-0001 655s + token_name='Test Organization Root Tr Token' 655s + '[' '!' -e /tmp/sssd-softhsm2-aGaR2m/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 655s + '[' '!' -d /tmp/sssd-softhsm2-aGaR2m/softhsm2-test-root-CA-trusted-certificate-0001 ']' 655s + echo 'Test Organization Root Tr Token' 655s + '[' -n '' ']' 655s Test Organization Root Tr Token 655s + local output_base_name=SSSD-child-24685 655s + local output_file=/tmp/sssd-softhsm2-aGaR2m/SSSD-child-24685.output 655s + output_cert_file=/tmp/sssd-softhsm2-aGaR2m/SSSD-child-24685.pem 655s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-aGaR2m/test-root-CA.pem 655s [p11_child[2145]] [main] (0x0400): p11_child started. 655s [p11_child[2145]] [main] (0x2000): Running in [pre-auth] mode. 655s [p11_child[2145]] [main] (0x2000): Running with effective IDs: [0][0]. 655s [p11_child[2145]] [main] (0x2000): Running with real IDs [0][0]. 655s [p11_child[2145]] [do_card] (0x4000): Module List: 655s [p11_child[2145]] [do_card] (0x4000): common name: [softhsm2]. 655s [p11_child[2145]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 655s [p11_child[2145]] [do_card] (0x4000): Description [SoftHSM slot ID 0x4f4cdd51] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 655s [p11_child[2145]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 655s [p11_child[2145]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x4f4cdd51][1330437457] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 655s [p11_child[2145]] [do_card] (0x4000): Login NOT required. 655s [p11_child[2145]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 655s [p11_child[2145]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 655s [p11_child[2145]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Root Tr Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 655s [p11_child[2145]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x4f4cdd51;slot-manufacturer=SoftHSM%20project;slot-id=1330437457;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=00131e104f4cdd51;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 655s [p11_child[2145]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 655s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-aGaR2m/SSSD-child-24685.output 655s + echo '-----BEGIN CERTIFICATE-----' 655s + tail -n1 /tmp/sssd-softhsm2-aGaR2m/SSSD-child-24685.output 655s + echo '-----END CERTIFICATE-----' 655s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-aGaR2m/SSSD-child-24685.pem 656s + local found_md5 expected_md5 656s Certificate: 656s Data: 656s Version: 3 (0x2) 656s Serial Number: 3 (0x3) 656s Signature Algorithm: sha256WithRSAEncryption 656s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 656s Validity 656s Not Before: Mar 24 14:30:12 2024 GMT 656s Not After : Mar 24 14:30:12 2025 GMT 656s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 656s Subject Public Key Info: 656s Public Key Algorithm: rsaEncryption 656s Public-Key: (1024 bit) 656s Modulus: 656s 00:d1:a7:fe:ec:26:d0:a6:f7:d6:da:99:24:6f:c6: 656s 66:12:f6:68:79:fc:0b:5d:1a:75:b2:cc:12:74:4d: 656s 47:25:db:4d:bf:1b:3e:35:00:50:00:c6:c5:57:95: 656s 17:e5:b6:44:35:a0:a5:bf:50:64:b3:d9:23:db:54: 656s 4c:96:13:8a:3d:01:a2:a0:6f:e2:6a:d3:8c:12:1f: 656s cd:36:1b:64:75:48:83:72:10:ed:45:5b:0d:42:64: 656s 69:b7:99:4f:3d:10:16:44:f9:1c:c3:7d:74:f3:b4: 656s 5b:1b:df:2c:b0:a1:8c:99:34:88:a1:12:35:a9:52: 656s 64:c8:69:aa:0e:a8:bf:27:53 656s Exponent: 65537 (0x10001) 656s X509v3 extensions: 656s X509v3 Authority Key Identifier: 656s DE:A9:E7:5A:01:45:EC:58:E0:3F:9B:48:BC:A0:2D:8C:9F:F6:B6:2B 656s X509v3 Basic Constraints: 656s CA:FALSE 656s Netscape Cert Type: 656s SSL Client, S/MIME 656s Netscape Comment: 656s Test Organization Root CA trusted Certificate 656s X509v3 Subject Key Identifier: 656s 34:85:7C:7C:7A:3E:65:0C:A4:E6:0F:18:92:37:5E:B3:EF:E1:15:B6 656s X509v3 Key Usage: critical 656s Digital Signature, Non Repudiation, Key Encipherment 656s X509v3 Extended Key Usage: 656s TLS Web Client Authentication, E-mail Protection 656s X509v3 Subject Alternative Name: 656s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 656s Signature Algorithm: sha256WithRSAEncryption 656s Signature Value: 656s 7a:28:b9:1f:e7:38:17:f8:b1:40:04:8d:1c:85:0e:1c:96:62: 656s 86:ca:42:84:48:a1:be:1f:02:43:37:54:57:7a:04:f3:5e:c5: 656s 3e:39:77:1a:12:76:ef:1f:e7:4b:ad:ea:c1:fb:05:34:b7:51: 656s ef:02:2c:7c:40:85:32:a6:51:24:e7:1b:f7:81:a1:d6:4b:31: 656s 10:30:09:a1:00:0f:03:61:b7:66:c2:90:95:8c:b8:1a:e8:a5: 656s 1c:34:86:c9:a1:14:f9:56:21:92:81:50:97:88:76:ae:20:29: 656s 91:ba:1c:da:64:03:79:1a:f3:e6:c1:2b:f5:8a:f2:b5:b8:f4: 656s b0:f2 656s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-aGaR2m/test-root-CA-trusted-certificate-0001.pem 656s + expected_md5=Modulus=D1A7FEEC26D0A6F7D6DA99246FC66612F66879FC0B5D1A75B2CC12744D4725DB4DBF1B3E35005000C6C5579517E5B64435A0A5BF5064B3D923DB544C96138A3D01A2A06FE26AD38C121FCD361B647548837210ED455B0D426469B7994F3D101644F91CC37D74F3B45B1BDF2CB0A18C993488A11235A95264C869AA0EA8BF2753 656s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-aGaR2m/SSSD-child-24685.pem 656s + found_md5=Modulus=D1A7FEEC26D0A6F7D6DA99246FC66612F66879FC0B5D1A75B2CC12744D4725DB4DBF1B3E35005000C6C5579517E5B64435A0A5BF5064B3D923DB544C96138A3D01A2A06FE26AD38C121FCD361B647548837210ED455B0D426469B7994F3D101644F91CC37D74F3B45B1BDF2CB0A18C993488A11235A95264C869AA0EA8BF2753 656s + '[' Modulus=D1A7FEEC26D0A6F7D6DA99246FC66612F66879FC0B5D1A75B2CC12744D4725DB4DBF1B3E35005000C6C5579517E5B64435A0A5BF5064B3D923DB544C96138A3D01A2A06FE26AD38C121FCD361B647548837210ED455B0D426469B7994F3D101644F91CC37D74F3B45B1BDF2CB0A18C993488A11235A95264C869AA0EA8BF2753 '!=' Modulus=D1A7FEEC26D0A6F7D6DA99246FC66612F66879FC0B5D1A75B2CC12744D4725DB4DBF1B3E35005000C6C5579517E5B64435A0A5BF5064B3D923DB544C96138A3D01A2A06FE26AD38C121FCD361B647548837210ED455B0D426469B7994F3D101644F91CC37D74F3B45B1BDF2CB0A18C993488A11235A95264C869AA0EA8BF2753 ']' 656s + output_file=/tmp/sssd-softhsm2-aGaR2m/SSSD-child-24685-auth.output 656s ++ basename /tmp/sssd-softhsm2-aGaR2m/SSSD-child-24685-auth.output .output 656s + output_cert_file=/tmp/sssd-softhsm2-aGaR2m/SSSD-child-24685-auth.pem 656s + echo -n 053350 656s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-aGaR2m/test-root-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 '' --token_name 'Test Organization Root Tr Token' --module_name /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so 656s [p11_child[2153]] [main] (0x0400): p11_child started. 656s [p11_child[2153]] [main] (0x2000): Running in [auth] mode. 656s [p11_child[2153]] [main] (0x2000): Running with effective IDs: [0][0]. 656s [p11_child[2153]] [main] (0x2000): Running with real IDs [0][0]. 656s [p11_child[2153]] [do_card] (0x4000): Module List: 656s [p11_child[2153]] [do_card] (0x4000): common name: [softhsm2]. 656s [p11_child[2153]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 656s [p11_child[2153]] [do_card] (0x4000): Description [SoftHSM slot ID 0x4f4cdd51] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 656s [p11_child[2153]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 656s [p11_child[2153]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x4f4cdd51][1330437457] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 656s [p11_child[2153]] [do_card] (0x4000): Login required. 656s [p11_child[2153]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 656s [p11_child[2153]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 656s [p11_child[2153]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so Test Organization Root Tr Token Test Organization Root Tr Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 656s [p11_child[2153]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x4f4cdd51;slot-manufacturer=SoftHSM%20project;slot-id=1330437457;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=00131e104f4cdd51;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 656s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 656s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 656s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 656s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 656s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 656s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 656s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 656s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 656s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 656s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 656s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 656s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 656s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 656s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 656s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 656s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 656s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 656s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 656s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 656s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 656s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 656s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 656s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 656s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 656s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 656s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 656s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 656s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 656s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 656s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 656s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 656s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 656s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 656s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 656s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 656s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 656s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 656s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 656s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 656s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 656s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 656s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 656s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 656s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 656s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 656s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 656s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 656s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 656s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 656s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 656s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 656s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 656s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 656s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 656s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 656s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 656s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 656s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 656s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 656s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 656s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 656s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 656s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 656s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 656s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 656s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 656s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 656s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 656s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 656s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 656s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 656s [p11_child[2153]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 656s [p11_child[2153]] [do_card] (0x4000): Certificate verified and validated. 656s [p11_child[2153]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 656s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-aGaR2m/SSSD-child-24685-auth.output 656s + echo '-----BEGIN CERTIFICATE-----' 656s + tail -n1 /tmp/sssd-softhsm2-aGaR2m/SSSD-child-24685-auth.output 656s + echo '-----END CERTIFICATE-----' 656s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-aGaR2m/SSSD-child-24685-auth.pem 656s Certificate: 656s Data: 656s Version: 3 (0x2) 656s Serial Number: 3 (0x3) 656s Signature Algorithm: sha256WithRSAEncryption 656s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 656s Validity 656s Not Before: Mar 24 14:30:12 2024 GMT 656s Not After : Mar 24 14:30:12 2025 GMT 656s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 656s Subject Public Key Info: 656s Public Key Algorithm: rsaEncryption 656s Public-Key: (1024 bit) 656s Modulus: 656s 00:d1:a7:fe:ec:26:d0:a6:f7:d6:da:99:24:6f:c6: 656s 66:12:f6:68:79:fc:0b:5d:1a:75:b2:cc:12:74:4d: 656s 47:25:db:4d:bf:1b:3e:35:00:50:00:c6:c5:57:95: 656s 17:e5:b6:44:35:a0:a5:bf:50:64:b3:d9:23:db:54: 656s 4c:96:13:8a:3d:01:a2:a0:6f:e2:6a:d3:8c:12:1f: 656s cd:36:1b:64:75:48:83:72:10:ed:45:5b:0d:42:64: 656s 69:b7:99:4f:3d:10:16:44:f9:1c:c3:7d:74:f3:b4: 656s 5b:1b:df:2c:b0:a1:8c:99:34:88:a1:12:35:a9:52: 656s 64:c8:69:aa:0e:a8:bf:27:53 656s Exponent: 65537 (0x10001) 656s X509v3 extensions: 656s X509v3 Authority Key Identifier: 656s DE:A9:E7:5A:01:45:EC:58:E0:3F:9B:48:BC:A0:2D:8C:9F:F6:B6:2B 656s X509v3 Basic Constraints: 656s CA:FALSE 656s Netscape Cert Type: 656s SSL Client, S/MIME 656s Netscape Comment: 656s Test Organization Root CA trusted Certificate 656s X509v3 Subject Key Identifier: 656s 34:85:7C:7C:7A:3E:65:0C:A4:E6:0F:18:92:37:5E:B3:EF:E1:15:B6 656s X509v3 Key Usage: critical 656s Digital Signature, Non Repudiation, Key Encipherment 656s X509v3 Extended Key Usage: 656s TLS Web Client Authentication, E-mail Protection 656s X509v3 Subject Alternative Name: 656s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 656s Signature Algorithm: sha256WithRSAEncryption 656s Signature Value: 656s 7a:28:b9:1f:e7:38:17:f8:b1:40:04:8d:1c:85:0e:1c:96:62: 656s 86:ca:42:84:48:a1:be:1f:02:43:37:54:57:7a:04:f3:5e:c5: 656s 3e:39:77:1a:12:76:ef:1f:e7:4b:ad:ea:c1:fb:05:34:b7:51: 656s ef:02:2c:7c:40:85:32:a6:51:24:e7:1b:f7:81:a1:d6:4b:31: 656s 10:30:09:a1:00:0f:03:61:b7:66:c2:90:95:8c:b8:1a:e8:a5: 656s 1c:34:86:c9:a1:14:f9:56:21:92:81:50:97:88:76:ae:20:29: 656s 91:ba:1c:da:64:03:79:1a:f3:e6:c1:2b:f5:8a:f2:b5:b8:f4: 656s b0:f2 656s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-aGaR2m/SSSD-child-24685-auth.pem 656s + found_md5=Modulus=D1A7FEEC26D0A6F7D6DA99246FC66612F66879FC0B5D1A75B2CC12744D4725DB4DBF1B3E35005000C6C5579517E5B64435A0A5BF5064B3D923DB544C96138A3D01A2A06FE26AD38C121FCD361B647548837210ED455B0D426469B7994F3D101644F91CC37D74F3B45B1BDF2CB0A18C993488A11235A95264C869AA0EA8BF2753 656s + '[' Modulus=D1A7FEEC26D0A6F7D6DA99246FC66612F66879FC0B5D1A75B2CC12744D4725DB4DBF1B3E35005000C6C5579517E5B64435A0A5BF5064B3D923DB544C96138A3D01A2A06FE26AD38C121FCD361B647548837210ED455B0D426469B7994F3D101644F91CC37D74F3B45B1BDF2CB0A18C993488A11235A95264C869AA0EA8BF2753 '!=' Modulus=D1A7FEEC26D0A6F7D6DA99246FC66612F66879FC0B5D1A75B2CC12744D4725DB4DBF1B3E35005000C6C5579517E5B64435A0A5BF5064B3D923DB544C96138A3D01A2A06FE26AD38C121FCD361B647548837210ED455B0D426469B7994F3D101644F91CC37D74F3B45B1BDF2CB0A18C993488A11235A95264C869AA0EA8BF2753 ']' 656s + valid_certificate /tmp/sssd-softhsm2-aGaR2m/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-9351 /tmp/sssd-softhsm2-aGaR2m/test-root-CA.pem partial_chain 656s + check_certificate /tmp/sssd-softhsm2-aGaR2m/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-9351 /tmp/sssd-softhsm2-aGaR2m/test-root-CA.pem partial_chain 656s + local certificate=/tmp/sssd-softhsm2-aGaR2m/test-root-CA-trusted-certificate-0001.pem 656s + local key_pass=pass:random-root-ca-trusted-cert-0001-9351 656s + local key_ring=/tmp/sssd-softhsm2-aGaR2m/test-root-CA.pem 656s + local verify_option=partial_chain 656s + prepare_softhsm2_card /tmp/sssd-softhsm2-aGaR2m/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-9351 656s + local certificate=/tmp/sssd-softhsm2-aGaR2m/test-root-CA-trusted-certificate-0001.pem 656s + local key_pass=pass:random-root-ca-trusted-cert-0001-9351 656s + local key_cn 656s + local key_name 656s + local tokens_dir 656s + local output_cert_file 656s + token_name= 656s ++ basename /tmp/sssd-softhsm2-aGaR2m/test-root-CA-trusted-certificate-0001.pem .pem 656s + key_name=test-root-CA-trusted-certificate-0001 656s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-aGaR2m/test-root-CA-trusted-certificate-0001.pem 656s ++ sed -n 's/ *commonName *= //p' 656s + key_cn='Test Organization Root Trusted Certificate 0001' 656s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 656s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-aGaR2m/softhsm2-test-root-CA-trusted-certificate-0001.conf 656s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-aGaR2m/softhsm2-test-root-CA-trusted-certificate-0001.conf 656s ++ basename /tmp/sssd-softhsm2-aGaR2m/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 656s + tokens_dir=/tmp/sssd-softhsm2-aGaR2m/softhsm2-test-root-CA-trusted-certificate-0001 656s + token_name='Test Organization Root Tr Token' 656s + '[' '!' -e /tmp/sssd-softhsm2-aGaR2m/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 656s + '[' '!' -d /tmp/sssd-softhsm2-aGaR2m/softhsm2-test-root-CA-trusted-certificate-0001 ']' 656s + echo 'Test Organization Root Tr Token' 656s Test Organization Root Tr Token 656s + '[' -n partial_chain ']' 656s + local verify_arg=--verify=partial_chain 656s + local output_base_name=SSSD-child-20248 656s + local output_file=/tmp/sssd-softhsm2-aGaR2m/SSSD-child-20248.output 656s + output_cert_file=/tmp/sssd-softhsm2-aGaR2m/SSSD-child-20248.pem 656s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-aGaR2m/test-root-CA.pem 656s [p11_child[2163]] [main] (0x0400): p11_child started. 656s [p11_child[2163]] [main] (0x2000): Running in [pre-auth] mode. 656s [p11_child[2163]] [main] (0x2000): Running with effective IDs: [0][0]. 656s [p11_child[2163]] [main] (0x2000): Running with real IDs [0][0]. 656s [p11_child[2163]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 656s [p11_child[2163]] [do_card] (0x4000): Module List: 656s [p11_child[2163]] [do_card] (0x4000): common name: [softhsm2]. 656s [p11_child[2163]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 656s [p11_child[2163]] [do_card] (0x4000): Description [SoftHSM slot ID 0x4f4cdd51] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 656s [p11_child[2163]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 656s [p11_child[2163]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x4f4cdd51][1330437457] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 656s [p11_child[2163]] [do_card] (0x4000): Login NOT required. 656s [p11_child[2163]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 656s [p11_child[2163]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 656s [p11_child[2163]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Root Tr Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 656s [p11_child[2163]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x4f4cdd51;slot-manufacturer=SoftHSM%20project;slot-id=1330437457;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=00131e104f4cdd51;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 656s [p11_child[2163]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 656s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-aGaR2m/SSSD-child-20248.output 656s + echo '-----BEGIN CERTIFICATE-----' 656s + tail -n1 /tmp/sssd-softhsm2-aGaR2m/SSSD-child-20248.output 656s + echo '-----END CERTIFICATE-----' 656s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-aGaR2m/SSSD-child-20248.pem 656s Certificate: 656s Data: 656s Version: 3 (0x2) 656s Serial Number: 3 (0x3) 656s Signature Algorithm: sha256WithRSAEncryption 656s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 656s Validity 656s Not Before: Mar 24 14:30:12 2024 GMT 656s Not After : Mar 24 14:30:12 2025 GMT 656s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 656s Subject Public Key Info: 656s Public Key Algorithm: rsaEncryption 656s Public-Key: (1024 bit) 656s Modulus: 656s 00:d1:a7:fe:ec:26:d0:a6:f7:d6:da:99:24:6f:c6: 656s 66:12:f6:68:79:fc:0b:5d:1a:75:b2:cc:12:74:4d: 656s 47:25:db:4d:bf:1b:3e:35:00:50:00:c6:c5:57:95: 656s 17:e5:b6:44:35:a0:a5:bf:50:64:b3:d9:23:db:54: 656s 4c:96:13:8a:3d:01:a2:a0:6f:e2:6a:d3:8c:12:1f: 656s cd:36:1b:64:75:48:83:72:10:ed:45:5b:0d:42:64: 656s 69:b7:99:4f:3d:10:16:44:f9:1c:c3:7d:74:f3:b4: 656s 5b:1b:df:2c:b0:a1:8c:99:34:88:a1:12:35:a9:52: 656s 64:c8:69:aa:0e:a8:bf:27:53 656s Exponent: 65537 (0x10001) 656s X509v3 extensions: 656s X509v3 Authority Key Identifier: 656s DE:A9:E7:5A:01:45:EC:58:E0:3F:9B:48:BC:A0:2D:8C:9F:F6:B6:2B 656s X509v3 Basic Constraints: 656s CA:FALSE 656s Netscape Cert Type: 656s SSL Client, S/MIME 656s Netscape Comment: 656s Test Organization Root CA trusted Certificate 656s X509v3 Subject Key Identifier: 656s 34:85:7C:7C:7A:3E:65:0C:A4:E6:0F:18:92:37:5E:B3:EF:E1:15:B6 656s X509v3 Key Usage: critical 656s Digital Signature, Non Repudiation, Key Encipherment 656s X509v3 Extended Key Usage: 656s TLS Web Client Authentication, E-mail Protection 656s X509v3 Subject Alternative Name: 656s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 656s Signature Algorithm: sha256WithRSAEncryption 656s Signature Value: 656s 7a:28:b9:1f:e7:38:17:f8:b1:40:04:8d:1c:85:0e:1c:96:62: 656s 86:ca:42:84:48:a1:be:1f:02:43:37:54:57:7a:04:f3:5e:c5: 656s 3e:39:77:1a:12:76:ef:1f:e7:4b:ad:ea:c1:fb:05:34:b7:51: 656s ef:02:2c:7c:40:85:32:a6:51:24:e7:1b:f7:81:a1:d6:4b:31: 656s 10:30:09:a1:00:0f:03:61:b7:66:c2:90:95:8c:b8:1a:e8:a5: 656s 1c:34:86:c9:a1:14:f9:56:21:92:81:50:97:88:76:ae:20:29: 656s 91:ba:1c:da:64:03:79:1a:f3:e6:c1:2b:f5:8a:f2:b5:b8:f4: 656s b0:f2 656s + local found_md5 expected_md5 656s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-aGaR2m/test-root-CA-trusted-certificate-0001.pem 656s + expected_md5=Modulus=D1A7FEEC26D0A6F7D6DA99246FC66612F66879FC0B5D1A75B2CC12744D4725DB4DBF1B3E35005000C6C5579517E5B64435A0A5BF5064B3D923DB544C96138A3D01A2A06FE26AD38C121FCD361B647548837210ED455B0D426469B7994F3D101644F91CC37D74F3B45B1BDF2CB0A18C993488A11235A95264C869AA0EA8BF2753 656s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-aGaR2m/SSSD-child-20248.pem 656s + found_md5=Modulus=D1A7FEEC26D0A6F7D6DA99246FC66612F66879FC0B5D1A75B2CC12744D4725DB4DBF1B3E35005000C6C5579517E5B64435A0A5BF5064B3D923DB544C96138A3D01A2A06FE26AD38C121FCD361B647548837210ED455B0D426469B7994F3D101644F91CC37D74F3B45B1BDF2CB0A18C993488A11235A95264C869AA0EA8BF2753 656s + '[' Modulus=D1A7FEEC26D0A6F7D6DA99246FC66612F66879FC0B5D1A75B2CC12744D4725DB4DBF1B3E35005000C6C5579517E5B64435A0A5BF5064B3D923DB544C96138A3D01A2A06FE26AD38C121FCD361B647548837210ED455B0D426469B7994F3D101644F91CC37D74F3B45B1BDF2CB0A18C993488A11235A95264C869AA0EA8BF2753 '!=' Modulus=D1A7FEEC26D0A6F7D6DA99246FC66612F66879FC0B5D1A75B2CC12744D4725DB4DBF1B3E35005000C6C5579517E5B64435A0A5BF5064B3D923DB544C96138A3D01A2A06FE26AD38C121FCD361B647548837210ED455B0D426469B7994F3D101644F91CC37D74F3B45B1BDF2CB0A18C993488A11235A95264C869AA0EA8BF2753 ']' 656s + output_file=/tmp/sssd-softhsm2-aGaR2m/SSSD-child-20248-auth.output 656s ++ basename /tmp/sssd-softhsm2-aGaR2m/SSSD-child-20248-auth.output .output 656s + output_cert_file=/tmp/sssd-softhsm2-aGaR2m/SSSD-child-20248-auth.pem 656s + echo -n 053350 656s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-aGaR2m/test-root-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Root Tr Token' --module_name /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so 656s [p11_child[2171]] [main] (0x0400): p11_child started. 656s [p11_child[2171]] [main] (0x2000): Running in [auth] mode. 656s [p11_child[2171]] [main] (0x2000): Running with effective IDs: [0][0]. 656s [p11_child[2171]] [main] (0x2000): Running with real IDs [0][0]. 656s [p11_child[2171]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 656s [p11_child[2171]] [do_card] (0x4000): Module List: 656s [p11_child[2171]] [do_card] (0x4000): common name: [softhsm2]. 656s [p11_child[2171]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 656s [p11_child[2171]] [do_card] (0x4000): Description [SoftHSM slot ID 0x4f4cdd51] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 656s [p11_child[2171]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 656s [p11_child[2171]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x4f4cdd51][1330437457] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 656s [p11_child[2171]] [do_card] (0x4000): Login required. 656s [p11_child[2171]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 656s [p11_child[2171]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 656s [p11_child[2171]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so Test Organization Root Tr Token Test Organization Root Tr Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 656s [p11_child[2171]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x4f4cdd51;slot-manufacturer=SoftHSM%20project;slot-id=1330437457;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=00131e104f4cdd51;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 656s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 656s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 656s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 656s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 656s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 656s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 656s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 656s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 656s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 656s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 656s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 656s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 656s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 656s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 656s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 656s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 656s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 656s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 656s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 656s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 656s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 656s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 656s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 656s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 656s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 656s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 656s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 656s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 656s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 656s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 656s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 656s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 656s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 656s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 656s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 656s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 656s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 656s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 656s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 656s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 656s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 656s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 656s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 656s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 656s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 656s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 656s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 656s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 656s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 656s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 656s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 656s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 656s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 656s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 656s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 656s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 656s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 656s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 656s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 656s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 656s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 656s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 656s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 656s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 656s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 656s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 656s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 656s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 656s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 656s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 656s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 656s [p11_child[2171]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 656s [p11_child[2171]] [do_card] (0x4000): Certificate verified and validated. 656s [p11_child[2171]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 656s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-aGaR2m/SSSD-child-20248-auth.output 656s + echo '-----BEGIN CERTIFICATE-----' 656s + tail -n1 /tmp/sssd-softhsm2-aGaR2m/SSSD-child-20248-auth.output 656s + echo '-----END CERTIFICATE-----' 656s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-aGaR2m/SSSD-child-20248-auth.pem 656s Certificate: 656s Data: 656s Version: 3 (0x2) 656s Serial Number: 3 (0x3) 656s Signature Algorithm: sha256WithRSAEncryption 656s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 656s Validity 656s Not Before: Mar 24 14:30:12 2024 GMT 656s Not After : Mar 24 14:30:12 2025 GMT 656s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 656s Subject Public Key Info: 656s Public Key Algorithm: rsaEncryption 656s Public-Key: (1024 bit) 656s Modulus: 656s 00:d1:a7:fe:ec:26:d0:a6:f7:d6:da:99:24:6f:c6: 656s 66:12:f6:68:79:fc:0b:5d:1a:75:b2:cc:12:74:4d: 656s 47:25:db:4d:bf:1b:3e:35:00:50:00:c6:c5:57:95: 656s 17:e5:b6:44:35:a0:a5:bf:50:64:b3:d9:23:db:54: 656s 4c:96:13:8a:3d:01:a2:a0:6f:e2:6a:d3:8c:12:1f: 656s cd:36:1b:64:75:48:83:72:10:ed:45:5b:0d:42:64: 656s 69:b7:99:4f:3d:10:16:44:f9:1c:c3:7d:74:f3:b4: 656s 5b:1b:df:2c:b0:a1:8c:99:34:88:a1:12:35:a9:52: 656s 64:c8:69:aa:0e:a8:bf:27:53 656s Exponent: 65537 (0x10001) 656s X509v3 extensions: 656s X509v3 Authority Key Identifier: 656s DE:A9:E7:5A:01:45:EC:58:E0:3F:9B:48:BC:A0:2D:8C:9F:F6:B6:2B 656s X509v3 Basic Constraints: 656s CA:FALSE 656s Netscape Cert Type: 656s SSL Client, S/MIME 656s Netscape Comment: 656s Test Organization Root CA trusted Certificate 656s X509v3 Subject Key Identifier: 656s 34:85:7C:7C:7A:3E:65:0C:A4:E6:0F:18:92:37:5E:B3:EF:E1:15:B6 656s X509v3 Key Usage: critical 656s Digital Signature, Non Repudiation, Key Encipherment 656s X509v3 Extended Key Usage: 656s TLS Web Client Authentication, E-mail Protection 656s X509v3 Subject Alternative Name: 656s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 656s Signature Algorithm: sha256WithRSAEncryption 656s Signature Value: 656s 7a:28:b9:1f:e7:38:17:f8:b1:40:04:8d:1c:85:0e:1c:96:62: 656s 86:ca:42:84:48:a1:be:1f:02:43:37:54:57:7a:04:f3:5e:c5: 656s 3e:39:77:1a:12:76:ef:1f:e7:4b:ad:ea:c1:fb:05:34:b7:51: 656s ef:02:2c:7c:40:85:32:a6:51:24:e7:1b:f7:81:a1:d6:4b:31: 656s 10:30:09:a1:00:0f:03:61:b7:66:c2:90:95:8c:b8:1a:e8:a5: 656s 1c:34:86:c9:a1:14:f9:56:21:92:81:50:97:88:76:ae:20:29: 656s 91:ba:1c:da:64:03:79:1a:f3:e6:c1:2b:f5:8a:f2:b5:b8:f4: 656s b0:f2 656s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-aGaR2m/SSSD-child-20248-auth.pem 656s + found_md5=Modulus=D1A7FEEC26D0A6F7D6DA99246FC66612F66879FC0B5D1A75B2CC12744D4725DB4DBF1B3E35005000C6C5579517E5B64435A0A5BF5064B3D923DB544C96138A3D01A2A06FE26AD38C121FCD361B647548837210ED455B0D426469B7994F3D101644F91CC37D74F3B45B1BDF2CB0A18C993488A11235A95264C869AA0EA8BF2753 656s + '[' Modulus=D1A7FEEC26D0A6F7D6DA99246FC66612F66879FC0B5D1A75B2CC12744D4725DB4DBF1B3E35005000C6C5579517E5B64435A0A5BF5064B3D923DB544C96138A3D01A2A06FE26AD38C121FCD361B647548837210ED455B0D426469B7994F3D101644F91CC37D74F3B45B1BDF2CB0A18C993488A11235A95264C869AA0EA8BF2753 '!=' Modulus=D1A7FEEC26D0A6F7D6DA99246FC66612F66879FC0B5D1A75B2CC12744D4725DB4DBF1B3E35005000C6C5579517E5B64435A0A5BF5064B3D923DB544C96138A3D01A2A06FE26AD38C121FCD361B647548837210ED455B0D426469B7994F3D101644F91CC37D74F3B45B1BDF2CB0A18C993488A11235A95264C869AA0EA8BF2753 ']' 656s + valid_certificate /tmp/sssd-softhsm2-aGaR2m/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-9351 /tmp/sssd-softhsm2-aGaR2m/test-full-chain-CA.pem 656s + check_certificate /tmp/sssd-softhsm2-aGaR2m/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-9351 /tmp/sssd-softhsm2-aGaR2m/test-full-chain-CA.pem 656s + local certificate=/tmp/sssd-softhsm2-aGaR2m/test-root-CA-trusted-certificate-0001.pem 656s + local key_pass=pass:random-root-ca-trusted-cert-0001-9351 656s + local key_ring=/tmp/sssd-softhsm2-aGaR2m/test-full-chain-CA.pem 656s + local verify_option= 656s + prepare_softhsm2_card /tmp/sssd-softhsm2-aGaR2m/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-9351 656s + local certificate=/tmp/sssd-softhsm2-aGaR2m/test-root-CA-trusted-certificate-0001.pem 656s + local key_pass=pass:random-root-ca-trusted-cert-0001-9351 656s + local key_cn 656s + local key_name 656s + local tokens_dir 656s + local output_cert_file 656s + token_name= 656s ++ basename /tmp/sssd-softhsm2-aGaR2m/test-root-CA-trusted-certificate-0001.pem .pem 656s + key_name=test-root-CA-trusted-certificate-0001 656s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-aGaR2m/test-root-CA-trusted-certificate-0001.pem 656s ++ sed -n 's/ *commonName *= //p' 656s + key_cn='Test Organization Root Trusted Certificate 0001' 656s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 656s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-aGaR2m/softhsm2-test-root-CA-trusted-certificate-0001.conf 656s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-aGaR2m/softhsm2-test-root-CA-trusted-certificate-0001.conf 656s ++ basename /tmp/sssd-softhsm2-aGaR2m/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 656s + tokens_dir=/tmp/sssd-softhsm2-aGaR2m/softhsm2-test-root-CA-trusted-certificate-0001 656s + token_name='Test Organization Root Tr Token' 656s + '[' '!' -e /tmp/sssd-softhsm2-aGaR2m/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 656s + '[' '!' -d /tmp/sssd-softhsm2-aGaR2m/softhsm2-test-root-CA-trusted-certificate-0001 ']' 656s + echo 'Test Organization Root Tr Token' 656s Test Organization Root Tr Token 656s + '[' -n '' ']' 656s + local output_base_name=SSSD-child-15707 656s + local output_file=/tmp/sssd-softhsm2-aGaR2m/SSSD-child-15707.output 656s + output_cert_file=/tmp/sssd-softhsm2-aGaR2m/SSSD-child-15707.pem 656s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-aGaR2m/test-full-chain-CA.pem 656s [p11_child[2181]] [main] (0x0400): p11_child started. 656s [p11_child[2181]] [main] (0x2000): Running in [pre-auth] mode. 656s [p11_child[2181]] [main] (0x2000): Running with effective IDs: [0][0]. 656s [p11_child[2181]] [main] (0x2000): Running with real IDs [0][0]. 656s [p11_child[2181]] [do_card] (0x4000): Module List: 656s [p11_child[2181]] [do_card] (0x4000): common name: [softhsm2]. 656s [p11_child[2181]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 656s [p11_child[2181]] [do_card] (0x4000): Description [SoftHSM slot ID 0x4f4cdd51] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 656s [p11_child[2181]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 656s [p11_child[2181]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x4f4cdd51][1330437457] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 656s [p11_child[2181]] [do_card] (0x4000): Login NOT required. 656s [p11_child[2181]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 656s [p11_child[2181]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 656s [p11_child[2181]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Root Tr Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 656s [p11_child[2181]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x4f4cdd51;slot-manufacturer=SoftHSM%20project;slot-id=1330437457;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=00131e104f4cdd51;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 656s [p11_child[2181]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 656s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-aGaR2m/SSSD-child-15707.output 656s + echo '-----BEGIN CERTIFICATE-----' 656s + tail -n1 /tmp/sssd-softhsm2-aGaR2m/SSSD-child-15707.output 656s + echo '-----END CERTIFICATE-----' 656s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-aGaR2m/SSSD-child-15707.pem 656s + local found_md5 expected_md5 656s Certificate: 656s Data: 656s Version: 3 (0x2) 656s Serial Number: 3 (0x3) 656s Signature Algorithm: sha256WithRSAEncryption 656s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 656s Validity 656s Not Before: Mar 24 14:30:12 2024 GMT 656s Not After : Mar 24 14:30:12 2025 GMT 656s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 656s Subject Public Key Info: 656s Public Key Algorithm: rsaEncryption 656s Public-Key: (1024 bit) 656s Modulus: 656s 00:d1:a7:fe:ec:26:d0:a6:f7:d6:da:99:24:6f:c6: 656s 66:12:f6:68:79:fc:0b:5d:1a:75:b2:cc:12:74:4d: 656s 47:25:db:4d:bf:1b:3e:35:00:50:00:c6:c5:57:95: 656s 17:e5:b6:44:35:a0:a5:bf:50:64:b3:d9:23:db:54: 656s 4c:96:13:8a:3d:01:a2:a0:6f:e2:6a:d3:8c:12:1f: 656s cd:36:1b:64:75:48:83:72:10:ed:45:5b:0d:42:64: 656s 69:b7:99:4f:3d:10:16:44:f9:1c:c3:7d:74:f3:b4: 656s 5b:1b:df:2c:b0:a1:8c:99:34:88:a1:12:35:a9:52: 656s 64:c8:69:aa:0e:a8:bf:27:53 656s Exponent: 65537 (0x10001) 656s X509v3 extensions: 656s X509v3 Authority Key Identifier: 656s DE:A9:E7:5A:01:45:EC:58:E0:3F:9B:48:BC:A0:2D:8C:9F:F6:B6:2B 656s X509v3 Basic Constraints: 656s CA:FALSE 656s Netscape Cert Type: 656s SSL Client, S/MIME 656s Netscape Comment: 656s Test Organization Root CA trusted Certificate 656s X509v3 Subject Key Identifier: 656s 34:85:7C:7C:7A:3E:65:0C:A4:E6:0F:18:92:37:5E:B3:EF:E1:15:B6 656s X509v3 Key Usage: critical 656s Digital Signature, Non Repudiation, Key Encipherment 656s X509v3 Extended Key Usage: 656s TLS Web Client Authentication, E-mail Protection 656s X509v3 Subject Alternative Name: 656s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 656s Signature Algorithm: sha256WithRSAEncryption 656s Signature Value: 656s 7a:28:b9:1f:e7:38:17:f8:b1:40:04:8d:1c:85:0e:1c:96:62: 656s 86:ca:42:84:48:a1:be:1f:02:43:37:54:57:7a:04:f3:5e:c5: 656s 3e:39:77:1a:12:76:ef:1f:e7:4b:ad:ea:c1:fb:05:34:b7:51: 656s ef:02:2c:7c:40:85:32:a6:51:24:e7:1b:f7:81:a1:d6:4b:31: 656s 10:30:09:a1:00:0f:03:61:b7:66:c2:90:95:8c:b8:1a:e8:a5: 656s 1c:34:86:c9:a1:14:f9:56:21:92:81:50:97:88:76:ae:20:29: 656s 91:ba:1c:da:64:03:79:1a:f3:e6:c1:2b:f5:8a:f2:b5:b8:f4: 656s b0:f2 656s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-aGaR2m/test-root-CA-trusted-certificate-0001.pem 656s + expected_md5=Modulus=D1A7FEEC26D0A6F7D6DA99246FC66612F66879FC0B5D1A75B2CC12744D4725DB4DBF1B3E35005000C6C5579517E5B64435A0A5BF5064B3D923DB544C96138A3D01A2A06FE26AD38C121FCD361B647548837210ED455B0D426469B7994F3D101644F91CC37D74F3B45B1BDF2CB0A18C993488A11235A95264C869AA0EA8BF2753 656s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-aGaR2m/SSSD-child-15707.pem 656s + found_md5=Modulus=D1A7FEEC26D0A6F7D6DA99246FC66612F66879FC0B5D1A75B2CC12744D4725DB4DBF1B3E35005000C6C5579517E5B64435A0A5BF5064B3D923DB544C96138A3D01A2A06FE26AD38C121FCD361B647548837210ED455B0D426469B7994F3D101644F91CC37D74F3B45B1BDF2CB0A18C993488A11235A95264C869AA0EA8BF2753 656s + '[' Modulus=D1A7FEEC26D0A6F7D6DA99246FC66612F66879FC0B5D1A75B2CC12744D4725DB4DBF1B3E35005000C6C5579517E5B64435A0A5BF5064B3D923DB544C96138A3D01A2A06FE26AD38C121FCD361B647548837210ED455B0D426469B7994F3D101644F91CC37D74F3B45B1BDF2CB0A18C993488A11235A95264C869AA0EA8BF2753 '!=' Modulus=D1A7FEEC26D0A6F7D6DA99246FC66612F66879FC0B5D1A75B2CC12744D4725DB4DBF1B3E35005000C6C5579517E5B64435A0A5BF5064B3D923DB544C96138A3D01A2A06FE26AD38C121FCD361B647548837210ED455B0D426469B7994F3D101644F91CC37D74F3B45B1BDF2CB0A18C993488A11235A95264C869AA0EA8BF2753 ']' 656s + output_file=/tmp/sssd-softhsm2-aGaR2m/SSSD-child-15707-auth.output 656s ++ basename /tmp/sssd-softhsm2-aGaR2m/SSSD-child-15707-auth.output .output 656s + output_cert_file=/tmp/sssd-softhsm2-aGaR2m/SSSD-child-15707-auth.pem 656s + echo -n 053350 656s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-aGaR2m/test-full-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 '' --token_name 'Test Organization Root Tr Token' --module_name /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so 656s [p11_child[2189]] [main] (0x0400): p11_child started. 656s [p11_child[2189]] [main] (0x2000): Running in [auth] mode. 656s [p11_child[2189]] [main] (0x2000): Running with effective IDs: [0][0]. 656s [p11_child[2189]] [main] (0x2000): Running with real IDs [0][0]. 656s [p11_child[2189]] [do_card] (0x4000): Module List: 656s [p11_child[2189]] [do_card] (0x4000): common name: [softhsm2]. 656s [p11_child[2189]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 656s [p11_child[2189]] [do_card] (0x4000): Description [SoftHSM slot ID 0x4f4cdd51] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 656s [p11_child[2189]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 656s [p11_child[2189]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x4f4cdd51][1330437457] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 656s [p11_child[2189]] [do_card] (0x4000): Login required. 656s [p11_child[2189]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 656s [p11_child[2189]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 656s [p11_child[2189]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so Test Organization Root Tr Token Test Organization Root Tr Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 656s [p11_child[2189]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x4f4cdd51;slot-manufacturer=SoftHSM%20project;slot-id=1330437457;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=00131e104f4cdd51;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 656s [p11_child[2189]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 656s [p11_child[2189]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 656s [p11_child[2189]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 656s [p11_child[2189]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 656s [p11_child[2189]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 656s [p11_child[2189]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 656s [p11_child[2189]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 656s [p11_child[2189]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 656s [p11_child[2189]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 656s [p11_child[2189]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 656s [p11_child[2189]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 656s [p11_child[2189]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 656s [p11_child[2189]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 656s [p11_child[2189]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 656s [p11_child[2189]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 656s [p11_child[2189]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 656s [p11_child[2189]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 656s [p11_child[2189]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 656s [p11_child[2189]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 656s [p11_child[2189]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 656s [p11_child[2189]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 656s [p11_child[2189]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 656s [p11_child[2189]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 656s [p11_child[2189]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 656s [p11_child[2189]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 656s [p11_child[2189]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 656s [p11_child[2189]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 656s [p11_child[2189]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 656s [p11_child[2189]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 656s [p11_child[2189]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 656s [p11_child[2189]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 656s [p11_child[2189]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 656s [p11_child[2189]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 656s [p11_child[2189]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 656s [p11_child[2189]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 656s [p11_child[2189]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 656s [p11_child[2189]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 656s [p11_child[2189]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 656s [p11_child[2189]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 656s [p11_child[2189]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 656s [p11_child[2189]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 656s [p11_child[2189]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 656s [p11_child[2189]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 656s [p11_child[2189]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 656s [p11_child[2189]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 656s [p11_child[2189]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 656s [p11_child[2189]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 656s [p11_child[2189]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 656s [p11_child[2189]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 656s [p11_child[2189]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 656s [p11_child[2189]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 656s [p11_child[2189]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 656s [p11_child[2189]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 656s [p11_child[2189]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 656s [p11_child[2189]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 656s [p11_child[2189]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 656s [p11_child[2189]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 656s [p11_child[2189]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 656s [p11_child[2189]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 656s [p11_child[2189]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 656s [p11_child[2189]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 656s [p11_child[2189]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 656s [p11_child[2189]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 656s [p11_child[2189]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 656s [p11_child[2189]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 656s [p11_child[2189]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 656s [p11_child[2189]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 656s [p11_child[2189]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 656s [p11_child[2189]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 656s [p11_child[2189]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 656s [p11_child[2189]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 656s [p11_child[2189]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 656s [p11_child[2189]] [do_card] (0x4000): Certificate verified and validated. 656s [p11_child[2189]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 656s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-aGaR2m/SSSD-child-15707-auth.output 656s + echo '-----BEGIN CERTIFICATE-----' 656s + tail -n1 /tmp/sssd-softhsm2-aGaR2m/SSSD-child-15707-auth.output 656s + echo '-----END CERTIFICATE-----' 656s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-aGaR2m/SSSD-child-15707-auth.pem 656s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-aGaR2m/SSSD-child-15707-auth.pem 656s Certificate: 656s Data: 656s Version: 3 (0x2) 656s Serial Number: 3 (0x3) 656s Signature Algorithm: sha256WithRSAEncryption 656s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 656s Validity 656s Not Before: Mar 24 14:30:12 2024 GMT 656s Not After : Mar 24 14:30:12 2025 GMT 656s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 656s Subject Public Key Info: 656s Public Key Algorithm: rsaEncryption 656s Public-Key: (1024 bit) 656s Modulus: 656s 00:d1:a7:fe:ec:26:d0:a6:f7:d6:da:99:24:6f:c6: 656s 66:12:f6:68:79:fc:0b:5d:1a:75:b2:cc:12:74:4d: 656s 47:25:db:4d:bf:1b:3e:35:00:50:00:c6:c5:57:95: 656s 17:e5:b6:44:35:a0:a5:bf:50:64:b3:d9:23:db:54: 656s 4c:96:13:8a:3d:01:a2:a0:6f:e2:6a:d3:8c:12:1f: 656s cd:36:1b:64:75:48:83:72:10:ed:45:5b:0d:42:64: 656s 69:b7:99:4f:3d:10:16:44:f9:1c:c3:7d:74:f3:b4: 656s 5b:1b:df:2c:b0:a1:8c:99:34:88:a1:12:35:a9:52: 656s 64:c8:69:aa:0e:a8:bf:27:53 656s Exponent: 65537 (0x10001) 656s X509v3 extensions: 656s X509v3 Authority Key Identifier: 656s DE:A9:E7:5A:01:45:EC:58:E0:3F:9B:48:BC:A0:2D:8C:9F:F6:B6:2B 656s X509v3 Basic Constraints: 656s CA:FALSE 656s Netscape Cert Type: 656s SSL Client, S/MIME 656s Netscape Comment: 656s Test Organization Root CA trusted Certificate 656s X509v3 Subject Key Identifier: 656s 34:85:7C:7C:7A:3E:65:0C:A4:E6:0F:18:92:37:5E:B3:EF:E1:15:B6 656s X509v3 Key Usage: critical 656s Digital Signature, Non Repudiation, Key Encipherment 656s X509v3 Extended Key Usage: 656s TLS Web Client Authentication, E-mail Protection 656s X509v3 Subject Alternative Name: 656s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 656s Signature Algorithm: sha256WithRSAEncryption 656s Signature Value: 656s 7a:28:b9:1f:e7:38:17:f8:b1:40:04:8d:1c:85:0e:1c:96:62: 656s 86:ca:42:84:48:a1:be:1f:02:43:37:54:57:7a:04:f3:5e:c5: 656s 3e:39:77:1a:12:76:ef:1f:e7:4b:ad:ea:c1:fb:05:34:b7:51: 656s ef:02:2c:7c:40:85:32:a6:51:24:e7:1b:f7:81:a1:d6:4b:31: 656s 10:30:09:a1:00:0f:03:61:b7:66:c2:90:95:8c:b8:1a:e8:a5: 656s 1c:34:86:c9:a1:14:f9:56:21:92:81:50:97:88:76:ae:20:29: 656s 91:ba:1c:da:64:03:79:1a:f3:e6:c1:2b:f5:8a:f2:b5:b8:f4: 656s b0:f2 656s + found_md5=Modulus=D1A7FEEC26D0A6F7D6DA99246FC66612F66879FC0B5D1A75B2CC12744D4725DB4DBF1B3E35005000C6C5579517E5B64435A0A5BF5064B3D923DB544C96138A3D01A2A06FE26AD38C121FCD361B647548837210ED455B0D426469B7994F3D101644F91CC37D74F3B45B1BDF2CB0A18C993488A11235A95264C869AA0EA8BF2753 656s + '[' Modulus=D1A7FEEC26D0A6F7D6DA99246FC66612F66879FC0B5D1A75B2CC12744D4725DB4DBF1B3E35005000C6C5579517E5B64435A0A5BF5064B3D923DB544C96138A3D01A2A06FE26AD38C121FCD361B647548837210ED455B0D426469B7994F3D101644F91CC37D74F3B45B1BDF2CB0A18C993488A11235A95264C869AA0EA8BF2753 '!=' Modulus=D1A7FEEC26D0A6F7D6DA99246FC66612F66879FC0B5D1A75B2CC12744D4725DB4DBF1B3E35005000C6C5579517E5B64435A0A5BF5064B3D923DB544C96138A3D01A2A06FE26AD38C121FCD361B647548837210ED455B0D426469B7994F3D101644F91CC37D74F3B45B1BDF2CB0A18C993488A11235A95264C869AA0EA8BF2753 ']' 656s + valid_certificate /tmp/sssd-softhsm2-aGaR2m/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-9351 /tmp/sssd-softhsm2-aGaR2m/test-full-chain-CA.pem partial_chain 656s + check_certificate /tmp/sssd-softhsm2-aGaR2m/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-9351 /tmp/sssd-softhsm2-aGaR2m/test-full-chain-CA.pem partial_chain 656s + local certificate=/tmp/sssd-softhsm2-aGaR2m/test-root-CA-trusted-certificate-0001.pem 656s + local key_pass=pass:random-root-ca-trusted-cert-0001-9351 656s + local key_ring=/tmp/sssd-softhsm2-aGaR2m/test-full-chain-CA.pem 656s + local verify_option=partial_chain 656s + prepare_softhsm2_card /tmp/sssd-softhsm2-aGaR2m/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-9351 656s + local certificate=/tmp/sssd-softhsm2-aGaR2m/test-root-CA-trusted-certificate-0001.pem 656s + local key_pass=pass:random-root-ca-trusted-cert-0001-9351 656s + local key_cn 656s + local key_name 656s + local tokens_dir 656s + local output_cert_file 656s + token_name= 656s ++ basename /tmp/sssd-softhsm2-aGaR2m/test-root-CA-trusted-certificate-0001.pem .pem 656s + key_name=test-root-CA-trusted-certificate-0001 656s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-aGaR2m/test-root-CA-trusted-certificate-0001.pem 656s ++ sed -n 's/ *commonName *= //p' 657s + key_cn='Test Organization Root Trusted Certificate 0001' 657s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 657s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-aGaR2m/softhsm2-test-root-CA-trusted-certificate-0001.conf 657s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-aGaR2m/softhsm2-test-root-CA-trusted-certificate-0001.conf 657s ++ basename /tmp/sssd-softhsm2-aGaR2m/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 657s + tokens_dir=/tmp/sssd-softhsm2-aGaR2m/softhsm2-test-root-CA-trusted-certificate-0001 657s + token_name='Test Organization Root Tr Token' 657s + '[' '!' -e /tmp/sssd-softhsm2-aGaR2m/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 657s + '[' '!' -d /tmp/sssd-softhsm2-aGaR2m/softhsm2-test-root-CA-trusted-certificate-0001 ']' 657s + echo 'Test Organization Root Tr Token' 657s Test Organization Root Tr Token 657s + '[' -n partial_chain ']' 657s + local verify_arg=--verify=partial_chain 657s + local output_base_name=SSSD-child-29794 657s + local output_file=/tmp/sssd-softhsm2-aGaR2m/SSSD-child-29794.output 657s + output_cert_file=/tmp/sssd-softhsm2-aGaR2m/SSSD-child-29794.pem 657s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-aGaR2m/test-full-chain-CA.pem 657s [p11_child[2199]] [main] (0x0400): p11_child started. 657s [p11_child[2199]] [main] (0x2000): Running in [pre-auth] mode. 657s [p11_child[2199]] [main] (0x2000): Running with effective IDs: [0][0]. 657s [p11_child[2199]] [main] (0x2000): Running with real IDs [0][0]. 657s [p11_child[2199]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 657s [p11_child[2199]] [do_card] (0x4000): Module List: 657s [p11_child[2199]] [do_card] (0x4000): common name: [softhsm2]. 657s [p11_child[2199]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 657s [p11_child[2199]] [do_card] (0x4000): Description [SoftHSM slot ID 0x4f4cdd51] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 657s [p11_child[2199]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 657s [p11_child[2199]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x4f4cdd51][1330437457] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 657s [p11_child[2199]] [do_card] (0x4000): Login NOT required. 657s [p11_child[2199]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 657s [p11_child[2199]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 657s [p11_child[2199]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Root Tr Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 657s [p11_child[2199]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x4f4cdd51;slot-manufacturer=SoftHSM%20project;slot-id=1330437457;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=00131e104f4cdd51;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 657s [p11_child[2199]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 657s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-aGaR2m/SSSD-child-29794.output 657s + echo '-----BEGIN CERTIFICATE-----' 657s + tail -n1 /tmp/sssd-softhsm2-aGaR2m/SSSD-child-29794.output 657s + echo '-----END CERTIFICATE-----' 657s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-aGaR2m/SSSD-child-29794.pem 657s Certificate: 657s Data: 657s Version: 3 (0x2) 657s Serial Number: 3 (0x3) 657s Signature Algorithm: sha256WithRSAEncryption 657s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 657s Validity 657s Not Before: Mar 24 14:30:12 2024 GMT 657s Not After : Mar 24 14:30:12 2025 GMT 657s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 657s Subject Public Key Info: 657s Public Key Algorithm: rsaEncryption 657s Public-Key: (1024 bit) 657s Modulus: 657s 00:d1:a7:fe:ec:26:d0:a6:f7:d6:da:99:24:6f:c6: 657s 66:12:f6:68:79:fc:0b:5d:1a:75:b2:cc:12:74:4d: 657s 47:25:db:4d:bf:1b:3e:35:00:50:00:c6:c5:57:95: 657s 17:e5:b6:44:35:a0:a5:bf:50:64:b3:d9:23:db:54: 657s 4c:96:13:8a:3d:01:a2:a0:6f:e2:6a:d3:8c:12:1f: 657s cd:36:1b:64:75:48:83:72:10:ed:45:5b:0d:42:64: 657s 69:b7:99:4f:3d:10:16:44:f9:1c:c3:7d:74:f3:b4: 657s 5b:1b:df:2c:b0:a1:8c:99:34:88:a1:12:35:a9:52: 657s 64:c8:69:aa:0e:a8:bf:27:53 657s Exponent: 65537 (0x10001) 657s X509v3 extensions: 657s X509v3 Authority Key Identifier: 657s DE:A9:E7:5A:01:45:EC:58:E0:3F:9B:48:BC:A0:2D:8C:9F:F6:B6:2B 657s X509v3 Basic Constraints: 657s CA:FALSE 657s Netscape Cert Type: 657s SSL Client, S/MIME 657s Netscape Comment: 657s Test Organization Root CA trusted Certificate 657s X509v3 Subject Key Identifier: 657s 34:85:7C:7C:7A:3E:65:0C:A4:E6:0F:18:92:37:5E:B3:EF:E1:15:B6 657s X509v3 Key Usage: critical 657s Digital Signature, Non Repudiation, Key Encipherment 657s X509v3 Extended Key Usage: 657s TLS Web Client Authentication, E-mail Protection 657s X509v3 Subject Alternative Name: 657s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 657s Signature Algorithm: sha256WithRSAEncryption 657s Signature Value: 657s 7a:28:b9:1f:e7:38:17:f8:b1:40:04:8d:1c:85:0e:1c:96:62: 657s 86:ca:42:84:48:a1:be:1f:02:43:37:54:57:7a:04:f3:5e:c5: 657s 3e:39:77:1a:12:76:ef:1f:e7:4b:ad:ea:c1:fb:05:34:b7:51: 657s ef:02:2c:7c:40:85:32:a6:51:24:e7:1b:f7:81:a1:d6:4b:31: 657s 10:30:09:a1:00:0f:03:61:b7:66:c2:90:95:8c:b8:1a:e8:a5: 657s 1c:34:86:c9:a1:14:f9:56:21:92:81:50:97:88:76:ae:20:29: 657s 91:ba:1c:da:64:03:79:1a:f3:e6:c1:2b:f5:8a:f2:b5:b8:f4: 657s b0:f2 657s + local found_md5 expected_md5 657s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-aGaR2m/test-root-CA-trusted-certificate-0001.pem 657s + expected_md5=Modulus=D1A7FEEC26D0A6F7D6DA99246FC66612F66879FC0B5D1A75B2CC12744D4725DB4DBF1B3E35005000C6C5579517E5B64435A0A5BF5064B3D923DB544C96138A3D01A2A06FE26AD38C121FCD361B647548837210ED455B0D426469B7994F3D101644F91CC37D74F3B45B1BDF2CB0A18C993488A11235A95264C869AA0EA8BF2753 657s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-aGaR2m/SSSD-child-29794.pem 657s + found_md5=Modulus=D1A7FEEC26D0A6F7D6DA99246FC66612F66879FC0B5D1A75B2CC12744D4725DB4DBF1B3E35005000C6C5579517E5B64435A0A5BF5064B3D923DB544C96138A3D01A2A06FE26AD38C121FCD361B647548837210ED455B0D426469B7994F3D101644F91CC37D74F3B45B1BDF2CB0A18C993488A11235A95264C869AA0EA8BF2753 657s + '[' Modulus=D1A7FEEC26D0A6F7D6DA99246FC66612F66879FC0B5D1A75B2CC12744D4725DB4DBF1B3E35005000C6C5579517E5B64435A0A5BF5064B3D923DB544C96138A3D01A2A06FE26AD38C121FCD361B647548837210ED455B0D426469B7994F3D101644F91CC37D74F3B45B1BDF2CB0A18C993488A11235A95264C869AA0EA8BF2753 '!=' Modulus=D1A7FEEC26D0A6F7D6DA99246FC66612F66879FC0B5D1A75B2CC12744D4725DB4DBF1B3E35005000C6C5579517E5B64435A0A5BF5064B3D923DB544C96138A3D01A2A06FE26AD38C121FCD361B647548837210ED455B0D426469B7994F3D101644F91CC37D74F3B45B1BDF2CB0A18C993488A11235A95264C869AA0EA8BF2753 ']' 657s + output_file=/tmp/sssd-softhsm2-aGaR2m/SSSD-child-29794-auth.output 657s ++ basename /tmp/sssd-softhsm2-aGaR2m/SSSD-child-29794-auth.output .output 657s + output_cert_file=/tmp/sssd-softhsm2-aGaR2m/SSSD-child-29794-auth.pem 657s + echo -n 053350 657s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-aGaR2m/test-full-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Root Tr Token' --module_name /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so 657s [p11_child[2207]] [main] (0x0400): p11_child started. 657s [p11_child[2207]] [main] (0x2000): Running in [auth] mode. 657s [p11_child[2207]] [main] (0x2000): Running with effective IDs: [0][0]. 657s [p11_child[2207]] [main] (0x2000): Running with real IDs [0][0]. 657s [p11_child[2207]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 657s [p11_child[2207]] [do_card] (0x4000): Module List: 657s [p11_child[2207]] [do_card] (0x4000): common name: [softhsm2]. 657s [p11_child[2207]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 657s [p11_child[2207]] [do_card] (0x4000): Description [SoftHSM slot ID 0x4f4cdd51] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 657s [p11_child[2207]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 657s [p11_child[2207]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x4f4cdd51][1330437457] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 657s [p11_child[2207]] [do_card] (0x4000): Login required. 657s [p11_child[2207]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 657s [p11_child[2207]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 657s [p11_child[2207]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so Test Organization Root Tr Token Test Organization Root Tr Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 657s [p11_child[2207]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x4f4cdd51;slot-manufacturer=SoftHSM%20project;slot-id=1330437457;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=00131e104f4cdd51;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 657s [p11_child[2207]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 657s [p11_child[2207]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 657s [p11_child[2207]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 657s [p11_child[2207]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 657s [p11_child[2207]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 657s [p11_child[2207]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 657s [p11_child[2207]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 657s [p11_child[2207]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 657s [p11_child[2207]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 657s [p11_child[2207]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 657s [p11_child[2207]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 657s [p11_child[2207]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 657s [p11_child[2207]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 657s [p11_child[2207]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 657s [p11_child[2207]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 657s [p11_child[2207]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 657s [p11_child[2207]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 657s [p11_child[2207]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 657s [p11_child[2207]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 657s [p11_child[2207]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 657s [p11_child[2207]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 657s [p11_child[2207]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 657s [p11_child[2207]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 657s [p11_child[2207]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 657s [p11_child[2207]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 657s [p11_child[2207]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 657s [p11_child[2207]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 657s [p11_child[2207]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 657s [p11_child[2207]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 657s [p11_child[2207]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 657s [p11_child[2207]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 657s [p11_child[2207]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 657s [p11_child[2207]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 657s [p11_child[2207]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 657s [p11_child[2207]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 657s [p11_child[2207]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 657s [p11_child[2207]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 657s [p11_child[2207]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 657s [p11_child[2207]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 657s [p11_child[2207]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 657s [p11_child[2207]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 657s [p11_child[2207]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 657s [p11_child[2207]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 657s [p11_child[2207]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 657s [p11_child[2207]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 657s [p11_child[2207]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 657s [p11_child[2207]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 657s [p11_child[2207]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 657s [p11_child[2207]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 657s [p11_child[2207]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 657s [p11_child[2207]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 657s [p11_child[2207]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 657s [p11_child[2207]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 657s [p11_child[2207]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 657s [p11_child[2207]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 657s [p11_child[2207]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 657s [p11_child[2207]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 657s [p11_child[2207]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 657s [p11_child[2207]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 657s [p11_child[2207]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 657s [p11_child[2207]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 657s [p11_child[2207]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 657s [p11_child[2207]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 657s [p11_child[2207]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 657s [p11_child[2207]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 657s [p11_child[2207]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 657s [p11_child[2207]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 657s [p11_child[2207]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 657s [p11_child[2207]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 657s [p11_child[2207]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 657s [p11_child[2207]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 657s [p11_child[2207]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 657s [p11_child[2207]] [do_card] (0x4000): Certificate verified and validated. 657s [p11_child[2207]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 657s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-aGaR2m/SSSD-child-29794-auth.output 657s + echo '-----BEGIN CERTIFICATE-----' 657s + tail -n1 /tmp/sssd-softhsm2-aGaR2m/SSSD-child-29794-auth.output 657s + echo '-----END CERTIFICATE-----' 657s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-aGaR2m/SSSD-child-29794-auth.pem 657s Certificate: 657s Data: 657s Version: 3 (0x2) 657s Serial Number: 3 (0x3) 657s Signature Algorithm: sha256WithRSAEncryption 657s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 657s Validity 657s Not Before: Mar 24 14:30:12 2024 GMT 657s Not After : Mar 24 14:30:12 2025 GMT 657s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 657s Subject Public Key Info: 657s Public Key Algorithm: rsaEncryption 657s Public-Key: (1024 bit) 657s Modulus: 657s 00:d1:a7:fe:ec:26:d0:a6:f7:d6:da:99:24:6f:c6: 657s 66:12:f6:68:79:fc:0b:5d:1a:75:b2:cc:12:74:4d: 657s 47:25:db:4d:bf:1b:3e:35:00:50:00:c6:c5:57:95: 657s 17:e5:b6:44:35:a0:a5:bf:50:64:b3:d9:23:db:54: 657s 4c:96:13:8a:3d:01:a2:a0:6f:e2:6a:d3:8c:12:1f: 657s cd:36:1b:64:75:48:83:72:10:ed:45:5b:0d:42:64: 657s 69:b7:99:4f:3d:10:16:44:f9:1c:c3:7d:74:f3:b4: 657s 5b:1b:df:2c:b0:a1:8c:99:34:88:a1:12:35:a9:52: 657s 64:c8:69:aa:0e:a8:bf:27:53 657s Exponent: 65537 (0x10001) 657s X509v3 extensions: 657s X509v3 Authority Key Identifier: 657s DE:A9:E7:5A:01:45:EC:58:E0:3F:9B:48:BC:A0:2D:8C:9F:F6:B6:2B 657s X509v3 Basic Constraints: 657s CA:FALSE 657s Netscape Cert Type: 657s SSL Client, S/MIME 657s Netscape Comment: 657s Test Organization Root CA trusted Certificate 657s X509v3 Subject Key Identifier: 657s 34:85:7C:7C:7A:3E:65:0C:A4:E6:0F:18:92:37:5E:B3:EF:E1:15:B6 657s X509v3 Key Usage: critical 657s Digital Signature, Non Repudiation, Key Encipherment 657s X509v3 Extended Key Usage: 657s TLS Web Client Authentication, E-mail Protection 657s X509v3 Subject Alternative Name: 657s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 657s Signature Algorithm: sha256WithRSAEncryption 657s Signature Value: 657s 7a:28:b9:1f:e7:38:17:f8:b1:40:04:8d:1c:85:0e:1c:96:62: 657s 86:ca:42:84:48:a1:be:1f:02:43:37:54:57:7a:04:f3:5e:c5: 657s 3e:39:77:1a:12:76:ef:1f:e7:4b:ad:ea:c1:fb:05:34:b7:51: 657s ef:02:2c:7c:40:85:32:a6:51:24:e7:1b:f7:81:a1:d6:4b:31: 657s 10:30:09:a1:00:0f:03:61:b7:66:c2:90:95:8c:b8:1a:e8:a5: 657s 1c:34:86:c9:a1:14:f9:56:21:92:81:50:97:88:76:ae:20:29: 657s 91:ba:1c:da:64:03:79:1a:f3:e6:c1:2b:f5:8a:f2:b5:b8:f4: 657s b0:f2 657s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-aGaR2m/SSSD-child-29794-auth.pem 657s + found_md5=Modulus=D1A7FEEC26D0A6F7D6DA99246FC66612F66879FC0B5D1A75B2CC12744D4725DB4DBF1B3E35005000C6C5579517E5B64435A0A5BF5064B3D923DB544C96138A3D01A2A06FE26AD38C121FCD361B647548837210ED455B0D426469B7994F3D101644F91CC37D74F3B45B1BDF2CB0A18C993488A11235A95264C869AA0EA8BF2753 657s + '[' Modulus=D1A7FEEC26D0A6F7D6DA99246FC66612F66879FC0B5D1A75B2CC12744D4725DB4DBF1B3E35005000C6C5579517E5B64435A0A5BF5064B3D923DB544C96138A3D01A2A06FE26AD38C121FCD361B647548837210ED455B0D426469B7994F3D101644F91CC37D74F3B45B1BDF2CB0A18C993488A11235A95264C869AA0EA8BF2753 '!=' Modulus=D1A7FEEC26D0A6F7D6DA99246FC66612F66879FC0B5D1A75B2CC12744D4725DB4DBF1B3E35005000C6C5579517E5B64435A0A5BF5064B3D923DB544C96138A3D01A2A06FE26AD38C121FCD361B647548837210ED455B0D426469B7994F3D101644F91CC37D74F3B45B1BDF2CB0A18C993488A11235A95264C869AA0EA8BF2753 ']' 657s + invalid_certificate /tmp/sssd-softhsm2-aGaR2m/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-9351 /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA.pem 657s + check_certificate /tmp/sssd-softhsm2-aGaR2m/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-9351 /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA.pem 657s + local certificate=/tmp/sssd-softhsm2-aGaR2m/test-root-CA-trusted-certificate-0001.pem 657s + local key_pass=pass:random-root-ca-trusted-cert-0001-9351 657s + local key_ring=/tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA.pem 657s + local verify_option= 657s + prepare_softhsm2_card /tmp/sssd-softhsm2-aGaR2m/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-9351 657s + local certificate=/tmp/sssd-softhsm2-aGaR2m/test-root-CA-trusted-certificate-0001.pem 657s + local key_pass=pass:random-root-ca-trusted-cert-0001-9351 657s + local key_cn 657s + local key_name 657s + local tokens_dir 657s + local output_cert_file 657s + token_name= 657s ++ basename /tmp/sssd-softhsm2-aGaR2m/test-root-CA-trusted-certificate-0001.pem .pem 657s + key_name=test-root-CA-trusted-certificate-0001 657s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-aGaR2m/test-root-CA-trusted-certificate-0001.pem 657s ++ sed -n 's/ *commonName *= //p' 657s + key_cn='Test Organization Root Trusted Certificate 0001' 657s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 657s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-aGaR2m/softhsm2-test-root-CA-trusted-certificate-0001.conf 657s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-aGaR2m/softhsm2-test-root-CA-trusted-certificate-0001.conf 657s ++ basename /tmp/sssd-softhsm2-aGaR2m/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 657s + tokens_dir=/tmp/sssd-softhsm2-aGaR2m/softhsm2-test-root-CA-trusted-certificate-0001 657s + token_name='Test Organization Root Tr Token' 657s + '[' '!' -e /tmp/sssd-softhsm2-aGaR2m/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 657s + '[' '!' -d /tmp/sssd-softhsm2-aGaR2m/softhsm2-test-root-CA-trusted-certificate-0001 ']' 657s + echo 'Test Organization Root Tr Token' 657s Test Organization Root Tr Token 657s + '[' -n '' ']' 657s + local output_base_name=SSSD-child-3744 657s + local output_file=/tmp/sssd-softhsm2-aGaR2m/SSSD-child-3744.output 657s + output_cert_file=/tmp/sssd-softhsm2-aGaR2m/SSSD-child-3744.pem 657s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA.pem 657s [p11_child[2217]] [main] (0x0400): p11_child started. 657s [p11_child[2217]] [main] (0x2000): Running in [pre-auth] mode. 657s [p11_child[2217]] [main] (0x2000): Running with effective IDs: [0][0]. 657s [p11_child[2217]] [main] (0x2000): Running with real IDs [0][0]. 657s [p11_child[2217]] [do_card] (0x4000): Module List: 657s [p11_child[2217]] [do_card] (0x4000): common name: [softhsm2]. 657s [p11_child[2217]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 657s [p11_child[2217]] [do_card] (0x4000): Description [SoftHSM slot ID 0x4f4cdd51] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 657s [p11_child[2217]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 657s [p11_child[2217]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x4f4cdd51][1330437457] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 657s [p11_child[2217]] [do_card] (0x4000): Login NOT required. 657s [p11_child[2217]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 657s [p11_child[2217]] [do_verification] (0x0040): X509_verify_cert failed [0]. 657s [p11_child[2217]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 657s [p11_child[2217]] [read_certs] (0x0040): Certificate [Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] not valid, skipping. 657s [p11_child[2217]] [do_card] (0x4000): No certificate found. 657s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-aGaR2m/SSSD-child-3744.output 657s + return 2 657s + invalid_certificate /tmp/sssd-softhsm2-aGaR2m/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-9351 /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA.pem partial_chain 657s + check_certificate /tmp/sssd-softhsm2-aGaR2m/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-9351 /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA.pem partial_chain 657s + local certificate=/tmp/sssd-softhsm2-aGaR2m/test-root-CA-trusted-certificate-0001.pem 657s + local key_pass=pass:random-root-ca-trusted-cert-0001-9351 657s + local key_ring=/tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA.pem 657s + local verify_option=partial_chain 657s + prepare_softhsm2_card /tmp/sssd-softhsm2-aGaR2m/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-9351 657s + local certificate=/tmp/sssd-softhsm2-aGaR2m/test-root-CA-trusted-certificate-0001.pem 657s + local key_pass=pass:random-root-ca-trusted-cert-0001-9351 657s + local key_cn 657s + local key_name 657s + local tokens_dir 657s + local output_cert_file 657s + token_name= 657s ++ basename /tmp/sssd-softhsm2-aGaR2m/test-root-CA-trusted-certificate-0001.pem .pem 657s + key_name=test-root-CA-trusted-certificate-0001 657s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-aGaR2m/test-root-CA-trusted-certificate-0001.pem 657s ++ sed -n 's/ *commonName *= //p' 657s + key_cn='Test Organization Root Trusted Certificate 0001' 657s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 657s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-aGaR2m/softhsm2-test-root-CA-trusted-certificate-0001.conf 657s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-aGaR2m/softhsm2-test-root-CA-trusted-certificate-0001.conf 657s ++ basename /tmp/sssd-softhsm2-aGaR2m/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 657s + tokens_dir=/tmp/sssd-softhsm2-aGaR2m/softhsm2-test-root-CA-trusted-certificate-0001 657s + token_name='Test Organization Root Tr Token' 657s + '[' '!' -e /tmp/sssd-softhsm2-aGaR2m/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 657s + '[' '!' -d /tmp/sssd-softhsm2-aGaR2m/softhsm2-test-root-CA-trusted-certificate-0001 ']' 657s + echo 'Test Organization Root Tr Token' 657s Test Organization Root Tr Token 657s + '[' -n partial_chain ']' 657s + local verify_arg=--verify=partial_chain 657s + local output_base_name=SSSD-child-7377 657s + local output_file=/tmp/sssd-softhsm2-aGaR2m/SSSD-child-7377.output 657s + output_cert_file=/tmp/sssd-softhsm2-aGaR2m/SSSD-child-7377.pem 657s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA.pem 657s [p11_child[2224]] [main] (0x0400): p11_child started. 657s [p11_child[2224]] [main] (0x2000): Running in [pre-auth] mode. 657s [p11_child[2224]] [main] (0x2000): Running with effective IDs: [0][0]. 657s [p11_child[2224]] [main] (0x2000): Running with real IDs [0][0]. 657s [p11_child[2224]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 657s [p11_child[2224]] [do_card] (0x4000): Module List: 657s [p11_child[2224]] [do_card] (0x4000): common name: [softhsm2]. 657s [p11_child[2224]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 657s [p11_child[2224]] [do_card] (0x4000): Description [SoftHSM slot ID 0x4f4cdd51] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 657s [p11_child[2224]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 657s [p11_child[2224]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x4f4cdd51][1330437457] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 657s [p11_child[2224]] [do_card] (0x4000): Login NOT required. 657s [p11_child[2224]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 657s [p11_child[2224]] [do_verification] (0x0040): X509_verify_cert failed [0]. 657s [p11_child[2224]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 657s [p11_child[2224]] [read_certs] (0x0040): Certificate [Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] not valid, skipping. 657s [p11_child[2224]] [do_card] (0x4000): No certificate found. 657s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-aGaR2m/SSSD-child-7377.output 657s + return 2 657s + invalid_certificate /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-12671 /dev/null 657s + check_certificate /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-12671 /dev/null 657s + local certificate=/tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA-trusted-certificate-0001.pem 657s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-12671 657s + local key_ring=/dev/null 657s + local verify_option= 657s + prepare_softhsm2_card /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-12671 657s + local certificate=/tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA-trusted-certificate-0001.pem 657s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-12671 657s + local key_cn 657s + local key_name 657s + local tokens_dir 657s + local output_cert_file 657s + token_name= 657s ++ basename /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA-trusted-certificate-0001.pem .pem 657s + key_name=test-intermediate-CA-trusted-certificate-0001 657s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA-trusted-certificate-0001.pem 657s ++ sed -n 's/ *commonName *= //p' 657s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 657s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 657s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-aGaR2m/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 657s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-aGaR2m/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 657s ++ basename /tmp/sssd-softhsm2-aGaR2m/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 657s + tokens_dir=/tmp/sssd-softhsm2-aGaR2m/softhsm2-test-intermediate-CA-trusted-certificate-0001 657s + token_name='Test Organization Interme Token' 657s + '[' '!' -e /tmp/sssd-softhsm2-aGaR2m/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 657s + local key_file 657s + local decrypted_key 657s + mkdir -p /tmp/sssd-softhsm2-aGaR2m/softhsm2-test-intermediate-CA-trusted-certificate-0001 657s + key_file=/tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA-trusted-certificate-0001-key.pem 657s + decrypted_key=/tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 657s + cat 657s + softhsm2-util --init-token --label 'Test Organization Interme Token' --pin 053350 --so-pin 053350 --free 657s Slot 0 has a free/uninitialized token. 657s The token has been initialized and is reassigned to slot 1743353130 657s + softhsm2-util --show-slots 657s + p11tool --provider=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --write --no-mark-private --load-certificate=/tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA-trusted-certificate-0001.pem --login --set-pin=053350 --label 'Test Organization Intermediate Trusted Certificate 0001' --id 00112233445566778899FFAABBCCDDEEFF012345 657s Available slots: 657s Slot 1743353130 657s Slot info: 657s Description: SoftHSM slot ID 0x67e9752a 657s Manufacturer ID: SoftHSM project 657s Hardware version: 2.6 657s Firmware version: 2.6 657s Token present: yes 657s Token info: 657s Manufacturer ID: SoftHSM project 657s Model: SoftHSM v2 657s Hardware version: 2.6 657s Firmware version: 2.6 657s Serial number: d9f91ef067e9752a 657s Initialized: yes 657s User PIN init.: yes 657s Label: Test Organization Interme Token 657s Slot 1 657s Slot info: 657s Description: SoftHSM slot ID 0x1 657s Manufacturer ID: SoftHSM project 657s Hardware version: 2.6 657s Firmware version: 2.6 657s Token present: yes 657s Token info: 657s Manufacturer ID: SoftHSM project 657s Model: SoftHSM v2 657s Hardware version: 2.6 657s Firmware version: 2.6 657s Serial number: 657s Initialized: no 657s User PIN init.: no 657s Label: 657s + openssl rsa -passin pass:random-intermediate-ca-trusted-cert-0001-12671 -in /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA-trusted-certificate-0001-key.pem -out /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 657s writing RSA key 657s + p11tool --provider=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --write --load-privkey=/tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem --login --set-pin=053350 --label 'Test Organization Intermediate Trusted Certificate 0001 Key' --id 00112233445566778899FFAABBCCDDEEFF012345 657s + rm /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 657s + p11tool --provider=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --list-all 657s Object 0: 657s URL: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=d9f91ef067e9752a;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert 657s Type: X.509 Certificate (RSA-1024) 657s Expires: Mon Mar 24 14:30:13 2025 657s Label: Test Organization Intermediate Trusted Certificate 0001 657s ID: 00:11:22:33:44:55:66:77:88:99:ff:aa:bb:cc:dd:ee:ff:01:23:45 657s 657s Test Organization Interme Token 657s + echo 'Test Organization Interme Token' 657s + '[' -n '' ']' 657s + local output_base_name=SSSD-child-26448 657s + local output_file=/tmp/sssd-softhsm2-aGaR2m/SSSD-child-26448.output 657s + output_cert_file=/tmp/sssd-softhsm2-aGaR2m/SSSD-child-26448.pem 657s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/dev/null 657s [p11_child[2240]] [main] (0x0400): p11_child started. 657s [p11_child[2240]] [main] (0x2000): Running in [pre-auth] mode. 657s [p11_child[2240]] [main] (0x2000): Running with effective IDs: [0][0]. 657s [p11_child[2240]] [main] (0x2000): Running with real IDs [0][0]. 657s [p11_child[2240]] [init_verification] (0x0040): X509_LOOKUP_load_file [/dev/null] failed [92274824][error:05800088:x509 certificate routines::no certificate or crl found]. 657s [p11_child[2240]] [do_work] (0x0040): init_verification failed. 657s [p11_child[2240]] [main] (0x0020): p11_child failed (5) 657s + return 2 657s + valid_certificate /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-12671 /dev/null no_verification 657s + check_certificate /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-12671 /dev/null no_verification 657s + local certificate=/tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA-trusted-certificate-0001.pem 657s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-12671 657s + local key_ring=/dev/null 657s + local verify_option=no_verification 657s + prepare_softhsm2_card /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-12671 657s + local certificate=/tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA-trusted-certificate-0001.pem 657s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-12671 657s + local key_cn 657s + local key_name 657s + local tokens_dir 657s + local output_cert_file 657s + token_name= 657s ++ basename /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA-trusted-certificate-0001.pem .pem 657s + key_name=test-intermediate-CA-trusted-certificate-0001 657s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA-trusted-certificate-0001.pem 657s ++ sed -n 's/ *commonName *= //p' 657s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 657s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 657s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-aGaR2m/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 657s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-aGaR2m/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 657s ++ basename /tmp/sssd-softhsm2-aGaR2m/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 657s + tokens_dir=/tmp/sssd-softhsm2-aGaR2m/softhsm2-test-intermediate-CA-trusted-certificate-0001 657s + token_name='Test Organization Interme Token' 657s + '[' '!' -e /tmp/sssd-softhsm2-aGaR2m/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 657s + '[' '!' -d /tmp/sssd-softhsm2-aGaR2m/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 657s + echo 'Test Organization Interme Token' 657s + '[' -n no_verification ']' 657s + local verify_arg=--verify=no_verification 657s + local output_base_name=SSSD-child-19446 657s Test Organization Interme Token 657s + local output_file=/tmp/sssd-softhsm2-aGaR2m/SSSD-child-19446.output 657s + output_cert_file=/tmp/sssd-softhsm2-aGaR2m/SSSD-child-19446.pem 657s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --verify=no_verification --ca_db=/dev/null 657s [p11_child[2246]] [main] (0x0400): p11_child started. 657s [p11_child[2246]] [main] (0x2000): Running in [pre-auth] mode. 657s [p11_child[2246]] [main] (0x2000): Running with effective IDs: [0][0]. 657s [p11_child[2246]] [main] (0x2000): Running with real IDs [0][0]. 657s [p11_child[2246]] [parse_cert_verify_opts] (0x0020): Found 'no_verification' option, disabling verification completely. This should not be used in production. 657s [p11_child[2246]] [do_card] (0x4000): Module List: 657s [p11_child[2246]] [do_card] (0x4000): common name: [softhsm2]. 657s [p11_child[2246]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 657s [p11_child[2246]] [do_card] (0x4000): Description [SoftHSM slot ID 0x67e9752a] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 657s [p11_child[2246]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 657s [p11_child[2246]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x67e9752a][1743353130] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 657s [p11_child[2246]] [do_card] (0x4000): Login NOT required. 657s [p11_child[2246]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 657s [p11_child[2246]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Interme Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 657s [p11_child[2246]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x67e9752a;slot-manufacturer=SoftHSM%20project;slot-id=1743353130;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=d9f91ef067e9752a;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 657s [p11_child[2246]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 657s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-aGaR2m/SSSD-child-19446.output 657s + echo '-----BEGIN CERTIFICATE-----' 657s + tail -n1 /tmp/sssd-softhsm2-aGaR2m/SSSD-child-19446.output 657s + echo '-----END CERTIFICATE-----' 657s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-aGaR2m/SSSD-child-19446.pem 657s + local found_md5 expected_md5 657s Certificate: 657s Data: 657s Version: 3 (0x2) 657s Serial Number: 4 (0x4) 657s Signature Algorithm: sha256WithRSAEncryption 657s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 657s Validity 657s Not Before: Mar 24 14:30:13 2024 GMT 657s Not After : Mar 24 14:30:13 2025 GMT 657s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 657s Subject Public Key Info: 657s Public Key Algorithm: rsaEncryption 657s Public-Key: (1024 bit) 657s Modulus: 657s 00:bc:67:b7:28:6d:81:07:a8:cc:92:a1:33:ed:b6: 657s 9c:87:15:d0:2b:20:29:8c:35:12:a7:29:e1:d3:40: 657s cd:c7:10:67:bb:61:bb:72:6b:d5:eb:35:16:22:40: 657s 4a:36:69:f8:0d:0d:61:9f:88:2f:d0:2d:bd:15:6f: 657s 0a:15:9f:0d:69:30:f7:03:d9:2e:21:65:b9:be:7d: 657s 18:52:3f:05:34:48:ab:2b:86:12:00:51:68:45:e5: 657s fb:27:0c:83:cc:d0:57:dd:ef:e6:a0:fb:b5:d3:ce: 657s 42:4e:77:19:1d:df:ba:be:dd:0a:b8:bc:07:82:d4: 657s 67:57:72:e9:66:d4:40:9b:a5 657s Exponent: 65537 (0x10001) 657s X509v3 extensions: 657s X509v3 Authority Key Identifier: 657s 31:FC:B0:C0:3B:5E:07:29:56:E3:5F:CB:E4:72:5A:3C:C9:4C:88:73 657s X509v3 Basic Constraints: 657s CA:FALSE 657s Netscape Cert Type: 657s SSL Client, S/MIME 657s Netscape Comment: 657s Test Organization Intermediate CA trusted Certificate 657s X509v3 Subject Key Identifier: 657s 74:F8:D5:C2:3D:00:9E:7B:0E:C9:7C:DD:FA:B3:69:12:F2:DB:0E:3C 657s X509v3 Key Usage: critical 657s Digital Signature, Non Repudiation, Key Encipherment 657s X509v3 Extended Key Usage: 657s TLS Web Client Authentication, E-mail Protection 657s X509v3 Subject Alternative Name: 657s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 657s Signature Algorithm: sha256WithRSAEncryption 657s Signature Value: 657s 9d:33:07:e7:5b:fe:da:5e:32:e8:f4:bd:9f:9f:50:86:c6:2f: 657s 00:ac:15:55:16:2e:b9:f6:df:3f:a8:a6:18:be:46:ac:ab:27: 657s b1:72:af:41:76:32:c1:43:ab:da:4f:1c:90:69:35:d4:2e:87: 657s ee:e5:07:ff:f8:4f:cc:24:8e:ed:90:e5:b4:12:02:9f:f9:d6: 657s 3f:d7:7b:07:17:50:8b:f3:b1:0e:0a:44:47:df:31:91:90:ee: 657s 25:3d:d1:47:c3:61:67:55:1a:eb:42:8d:11:22:0e:d9:5b:6a: 657s 2d:fb:05:ad:ab:af:fc:42:8b:c7:3e:0b:7b:81:8e:7e:8f:73: 657s c6:df 657s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA-trusted-certificate-0001.pem 657s + expected_md5=Modulus=BC67B7286D8107A8CC92A133EDB69C8715D02B20298C3512A729E1D340CDC71067BB61BB726BD5EB351622404A3669F80D0D619F882FD02DBD156F0A159F0D6930F703D92E2165B9BE7D18523F053448AB2B861200516845E5FB270C83CCD057DDEFE6A0FBB5D3CE424E77191DDFBABEDD0AB8BC0782D4675772E966D4409BA5 657s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-aGaR2m/SSSD-child-19446.pem 657s + found_md5=Modulus=BC67B7286D8107A8CC92A133EDB69C8715D02B20298C3512A729E1D340CDC71067BB61BB726BD5EB351622404A3669F80D0D619F882FD02DBD156F0A159F0D6930F703D92E2165B9BE7D18523F053448AB2B861200516845E5FB270C83CCD057DDEFE6A0FBB5D3CE424E77191DDFBABEDD0AB8BC0782D4675772E966D4409BA5 657s + '[' Modulus=BC67B7286D8107A8CC92A133EDB69C8715D02B20298C3512A729E1D340CDC71067BB61BB726BD5EB351622404A3669F80D0D619F882FD02DBD156F0A159F0D6930F703D92E2165B9BE7D18523F053448AB2B861200516845E5FB270C83CCD057DDEFE6A0FBB5D3CE424E77191DDFBABEDD0AB8BC0782D4675772E966D4409BA5 '!=' Modulus=BC67B7286D8107A8CC92A133EDB69C8715D02B20298C3512A729E1D340CDC71067BB61BB726BD5EB351622404A3669F80D0D619F882FD02DBD156F0A159F0D6930F703D92E2165B9BE7D18523F053448AB2B861200516845E5FB270C83CCD057DDEFE6A0FBB5D3CE424E77191DDFBABEDD0AB8BC0782D4675772E966D4409BA5 ']' 657s + output_file=/tmp/sssd-softhsm2-aGaR2m/SSSD-child-19446-auth.output 657s ++ basename /tmp/sssd-softhsm2-aGaR2m/SSSD-child-19446-auth.output .output 657s + output_cert_file=/tmp/sssd-softhsm2-aGaR2m/SSSD-child-19446-auth.pem 657s + echo -n 053350 657s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/dev/null --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=no_verification --token_name 'Test Organization Interme Token' --module_name /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so 657s [p11_child[2254]] [main] (0x0400): p11_child started. 657s [p11_child[2254]] [main] (0x2000): Running in [auth] mode. 657s [p11_child[2254]] [main] (0x2000): Running with effective IDs: [0][0]. 657s [p11_child[2254]] [main] (0x2000): Running with real IDs [0][0]. 657s [p11_child[2254]] [parse_cert_verify_opts] (0x0020): Found 'no_verification' option, disabling verification completely. This should not be used in production. 657s [p11_child[2254]] [do_card] (0x4000): Module List: 657s [p11_child[2254]] [do_card] (0x4000): common name: [softhsm2]. 657s [p11_child[2254]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 657s [p11_child[2254]] [do_card] (0x4000): Description [SoftHSM slot ID 0x67e9752a] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 657s [p11_child[2254]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 657s [p11_child[2254]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x67e9752a][1743353130] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 657s [p11_child[2254]] [do_card] (0x4000): Login required. 657s [p11_child[2254]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 657s [p11_child[2254]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so Test Organization Interme Token Test Organization Interme Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 657s [p11_child[2254]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x67e9752a;slot-manufacturer=SoftHSM%20project;slot-id=1743353130;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=d9f91ef067e9752a;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 657s [p11_child[2254]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 657s [p11_child[2254]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 657s [p11_child[2254]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 657s [p11_child[2254]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 657s [p11_child[2254]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 657s [p11_child[2254]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 657s [p11_child[2254]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 657s [p11_child[2254]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 657s [p11_child[2254]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 657s [p11_child[2254]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 657s [p11_child[2254]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 657s [p11_child[2254]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 657s [p11_child[2254]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 657s [p11_child[2254]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 657s [p11_child[2254]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 657s [p11_child[2254]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 657s [p11_child[2254]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 657s [p11_child[2254]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 657s [p11_child[2254]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 657s [p11_child[2254]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 657s [p11_child[2254]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 657s [p11_child[2254]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 657s [p11_child[2254]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 657s [p11_child[2254]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 657s [p11_child[2254]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 657s [p11_child[2254]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 657s [p11_child[2254]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 657s [p11_child[2254]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 657s [p11_child[2254]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 657s [p11_child[2254]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 657s [p11_child[2254]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 657s [p11_child[2254]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 657s [p11_child[2254]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 657s [p11_child[2254]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 657s [p11_child[2254]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 657s [p11_child[2254]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 657s [p11_child[2254]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 657s [p11_child[2254]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 657s [p11_child[2254]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 657s [p11_child[2254]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 657s [p11_child[2254]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 657s [p11_child[2254]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 657s [p11_child[2254]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 657s [p11_child[2254]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 657s [p11_child[2254]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 657s [p11_child[2254]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 657s [p11_child[2254]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 657s [p11_child[2254]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 657s [p11_child[2254]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 657s [p11_child[2254]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 657s [p11_child[2254]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 657s [p11_child[2254]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 657s [p11_child[2254]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 657s [p11_child[2254]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 657s [p11_child[2254]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 657s [p11_child[2254]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 657s [p11_child[2254]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 657s [p11_child[2254]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 657s [p11_child[2254]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 657s [p11_child[2254]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 657s [p11_child[2254]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 657s [p11_child[2254]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 657s [p11_child[2254]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 657s [p11_child[2254]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 657s [p11_child[2254]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 657s [p11_child[2254]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 657s [p11_child[2254]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 657s [p11_child[2254]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 657s [p11_child[2254]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 657s [p11_child[2254]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 657s [p11_child[2254]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 657s [p11_child[2254]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 657s [p11_child[2254]] [do_card] (0x4000): Certificate verified and validated. 657s [p11_child[2254]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 657s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-aGaR2m/SSSD-child-19446-auth.output 657s + echo '-----BEGIN CERTIFICATE-----' 657s + tail -n1 /tmp/sssd-softhsm2-aGaR2m/SSSD-child-19446-auth.output 657s + echo '-----END CERTIFICATE-----' 657s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-aGaR2m/SSSD-child-19446-auth.pem 657s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-aGaR2m/SSSD-child-19446-auth.pem 657s Certificate: 657s Data: 657s Version: 3 (0x2) 657s Serial Number: 4 (0x4) 657s Signature Algorithm: sha256WithRSAEncryption 657s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 657s Validity 657s Not Before: Mar 24 14:30:13 2024 GMT 657s Not After : Mar 24 14:30:13 2025 GMT 657s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 657s Subject Public Key Info: 657s Public Key Algorithm: rsaEncryption 657s Public-Key: (1024 bit) 657s Modulus: 657s 00:bc:67:b7:28:6d:81:07:a8:cc:92:a1:33:ed:b6: 657s 9c:87:15:d0:2b:20:29:8c:35:12:a7:29:e1:d3:40: 657s cd:c7:10:67:bb:61:bb:72:6b:d5:eb:35:16:22:40: 657s 4a:36:69:f8:0d:0d:61:9f:88:2f:d0:2d:bd:15:6f: 657s 0a:15:9f:0d:69:30:f7:03:d9:2e:21:65:b9:be:7d: 657s 18:52:3f:05:34:48:ab:2b:86:12:00:51:68:45:e5: 657s fb:27:0c:83:cc:d0:57:dd:ef:e6:a0:fb:b5:d3:ce: 657s 42:4e:77:19:1d:df:ba:be:dd:0a:b8:bc:07:82:d4: 657s 67:57:72:e9:66:d4:40:9b:a5 657s Exponent: 65537 (0x10001) 657s X509v3 extensions: 657s X509v3 Authority Key Identifier: 657s 31:FC:B0:C0:3B:5E:07:29:56:E3:5F:CB:E4:72:5A:3C:C9:4C:88:73 657s X509v3 Basic Constraints: 657s CA:FALSE 657s Netscape Cert Type: 657s SSL Client, S/MIME 657s Netscape Comment: 657s Test Organization Intermediate CA trusted Certificate 657s X509v3 Subject Key Identifier: 657s 74:F8:D5:C2:3D:00:9E:7B:0E:C9:7C:DD:FA:B3:69:12:F2:DB:0E:3C 657s X509v3 Key Usage: critical 657s Digital Signature, Non Repudiation, Key Encipherment 657s X509v3 Extended Key Usage: 657s TLS Web Client Authentication, E-mail Protection 657s X509v3 Subject Alternative Name: 657s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 657s Signature Algorithm: sha256WithRSAEncryption 657s Signature Value: 657s 9d:33:07:e7:5b:fe:da:5e:32:e8:f4:bd:9f:9f:50:86:c6:2f: 657s 00:ac:15:55:16:2e:b9:f6:df:3f:a8:a6:18:be:46:ac:ab:27: 657s b1:72:af:41:76:32:c1:43:ab:da:4f:1c:90:69:35:d4:2e:87: 657s ee:e5:07:ff:f8:4f:cc:24:8e:ed:90:e5:b4:12:02:9f:f9:d6: 657s 3f:d7:7b:07:17:50:8b:f3:b1:0e:0a:44:47:df:31:91:90:ee: 657s 25:3d:d1:47:c3:61:67:55:1a:eb:42:8d:11:22:0e:d9:5b:6a: 657s 2d:fb:05:ad:ab:af:fc:42:8b:c7:3e:0b:7b:81:8e:7e:8f:73: 657s c6:df 657s + found_md5=Modulus=BC67B7286D8107A8CC92A133EDB69C8715D02B20298C3512A729E1D340CDC71067BB61BB726BD5EB351622404A3669F80D0D619F882FD02DBD156F0A159F0D6930F703D92E2165B9BE7D18523F053448AB2B861200516845E5FB270C83CCD057DDEFE6A0FBB5D3CE424E77191DDFBABEDD0AB8BC0782D4675772E966D4409BA5 657s + '[' Modulus=BC67B7286D8107A8CC92A133EDB69C8715D02B20298C3512A729E1D340CDC71067BB61BB726BD5EB351622404A3669F80D0D619F882FD02DBD156F0A159F0D6930F703D92E2165B9BE7D18523F053448AB2B861200516845E5FB270C83CCD057DDEFE6A0FBB5D3CE424E77191DDFBABEDD0AB8BC0782D4675772E966D4409BA5 '!=' Modulus=BC67B7286D8107A8CC92A133EDB69C8715D02B20298C3512A729E1D340CDC71067BB61BB726BD5EB351622404A3669F80D0D619F882FD02DBD156F0A159F0D6930F703D92E2165B9BE7D18523F053448AB2B861200516845E5FB270C83CCD057DDEFE6A0FBB5D3CE424E77191DDFBABEDD0AB8BC0782D4675772E966D4409BA5 ']' 657s + invalid_certificate /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-12671 /tmp/sssd-softhsm2-aGaR2m/test-root-CA.pem 657s + check_certificate /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-12671 /tmp/sssd-softhsm2-aGaR2m/test-root-CA.pem 657s + local certificate=/tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA-trusted-certificate-0001.pem 657s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-12671 657s + local key_ring=/tmp/sssd-softhsm2-aGaR2m/test-root-CA.pem 657s + local verify_option= 657s + prepare_softhsm2_card /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-12671 657s + local certificate=/tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA-trusted-certificate-0001.pem 657s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-12671 657s + local key_cn 657s + local key_name 657s + local tokens_dir 657s + local output_cert_file 657s + token_name= 657s ++ basename /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA-trusted-certificate-0001.pem .pem 657s + key_name=test-intermediate-CA-trusted-certificate-0001 657s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA-trusted-certificate-0001.pem 657s ++ sed -n 's/ *commonName *= //p' 657s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 657s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 657s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-aGaR2m/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 657s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-aGaR2m/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 657s ++ basename /tmp/sssd-softhsm2-aGaR2m/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 657s + tokens_dir=/tmp/sssd-softhsm2-aGaR2m/softhsm2-test-intermediate-CA-trusted-certificate-0001 657s + token_name='Test Organization Interme Token' 657s + '[' '!' -e /tmp/sssd-softhsm2-aGaR2m/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 657s + '[' '!' -d /tmp/sssd-softhsm2-aGaR2m/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 657s + echo 'Test Organization Interme Token' 657s Test Organization Interme Token 657s + '[' -n '' ']' 657s + local output_base_name=SSSD-child-30163 657s + local output_file=/tmp/sssd-softhsm2-aGaR2m/SSSD-child-30163.output 657s + output_cert_file=/tmp/sssd-softhsm2-aGaR2m/SSSD-child-30163.pem 657s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-aGaR2m/test-root-CA.pem 657s [p11_child[2264]] [main] (0x0400): p11_child started. 657s [p11_child[2264]] [main] (0x2000): Running in [pre-auth] mode. 657s [p11_child[2264]] [main] (0x2000): Running with effective IDs: [0][0]. 657s [p11_child[2264]] [main] (0x2000): Running with real IDs [0][0]. 658s [p11_child[2264]] [do_card] (0x4000): Module List: 658s [p11_child[2264]] [do_card] (0x4000): common name: [softhsm2]. 658s [p11_child[2264]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 658s [p11_child[2264]] [do_card] (0x4000): Description [SoftHSM slot ID 0x67e9752a] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 658s [p11_child[2264]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 658s [p11_child[2264]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x67e9752a][1743353130] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 658s [p11_child[2264]] [do_card] (0x4000): Login NOT required. 658s [p11_child[2264]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 658s [p11_child[2264]] [do_verification] (0x0040): X509_verify_cert failed [0]. 658s [p11_child[2264]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 658s [p11_child[2264]] [read_certs] (0x0040): Certificate [Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] not valid, skipping. 658s [p11_child[2264]] [do_card] (0x4000): No certificate found. 658s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-aGaR2m/SSSD-child-30163.output 658s + return 2 658s + invalid_certificate /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-12671 /tmp/sssd-softhsm2-aGaR2m/test-root-CA.pem partial_chain 658s + check_certificate /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-12671 /tmp/sssd-softhsm2-aGaR2m/test-root-CA.pem partial_chain 658s + local certificate=/tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA-trusted-certificate-0001.pem 658s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-12671 658s + local key_ring=/tmp/sssd-softhsm2-aGaR2m/test-root-CA.pem 658s + local verify_option=partial_chain 658s + prepare_softhsm2_card /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-12671 658s + local certificate=/tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA-trusted-certificate-0001.pem 658s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-12671 658s + local key_cn 658s + local key_name 658s + local tokens_dir 658s + local output_cert_file 658s + token_name= 658s ++ basename /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA-trusted-certificate-0001.pem .pem 658s + key_name=test-intermediate-CA-trusted-certificate-0001 658s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA-trusted-certificate-0001.pem 658s ++ sed -n 's/ *commonName *= //p' 658s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 658s Test Organization Interme Token 658s Test Organization Interme Token 658s Certificate: 658s Data: 658s Version: 3 (0x2) 658s Serial Number: 4 (0x4) 658s Signature Algorithm: sha256WithRSAEncryption 658s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 658s Validity 658s Not Before: Mar 24 14:30:13 2024 GMT 658s Not After : Mar 24 14:30:13 2025 GMT 658s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 658s Subject Public Key Info: 658s Public Key Algorithm: rsaEncryption 658s Public-Key: (1024 bit) 658s Modulus: 658s 00:bc:67:b7:28:6d:81:07:a8:cc:92:a1:33:ed:b6: 658s 9c:87:15:d0:2b:20:29:8c:35:12:a7:29:e1:d3:40: 658s cd:c7:10:67:bb:61:bb:72:6b:d5:eb:35:16:22:40: 658s 4a:36:69:f8:0d:0d:61:9f:88:2f:d0:2d:bd:15:6f: 658s 0a:15:9f:0d:69:30:f7:03:d9:2e:21:65:b9:be:7d: 658s 18:52:3f:05:34:48:ab:2b:86:12:00:51:68:45:e5: 658s fb:27:0c:83:cc:d0:57:dd:ef:e6:a0:fb:b5:d3:ce: 658s 42:4e:77:19:1d:df:ba:be:dd:0a:b8:bc:07:82:d4: 658s 67:57:72:e9:66:d4:40:9b:a5 658s Exponent: 65537 (0x10001) 658s X509v3 extensions: 658s X509v3 Authority Key Identifier: 658s 31:FC:B0:C0:3B:5E:07:29:56:E3:5F:CB:E4:72:5A:3C:C9:4C:88:73 658s X509v3 Basic Constraints: 658s CA:FALSE 658s Netscape Cert Type: 658s SSL Client, S/MIME 658s Netscape Comment: 658s Test Organization Intermediate CA trusted Certificate 658s X509v3 Subject Key Identifier: 658s 74:F8:D5:C2:3D:00:9E:7B:0E:C9:7C:DD:FA:B3:69:12:F2:DB:0E:3C 658s X509v3 Key Usage: critical 658s Digital Signature, Non Repudiation, Key Encipherment 658s X509v3 Extended Key Usage: 658s TLS Web Client Authentication, E-mail Protection 658s X509v3 Subject Alternative Name: 658s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 658s Signature Algorithm: sha256WithRSAEncryption 658s Signature Value: 658s 9d:33:07:e7:5b:fe:da:5e:32:e8:f4:bd:9f:9f:50:86:c6:2f: 658s 00:ac:15:55:16:2e:b9:f6:df:3f:a8:a6:18:be:46:ac:ab:27: 658s b1:72:af:41:76:32:c1:43:ab:da:4f:1c:90:69:35:d4:2e:87: 658s ee:e5:07:ff:f8:4f:cc:24:8e:ed:90:e5:b4:12:02:9f:f9:d6: 658s 3f:d7:7b:07:17:50:8b:f3:b1:0e:0a:44:47:df:31:91:90:ee: 658s 25:3d:d1:47:c3:61:67:55:1a:eb:42:8d:11:22:0e:d9:5b:6a: 658s 2d:fb:05:ad:ab:af:fc:42:8b:c7:3e:0b:7b:81:8e:7e:8f:73: 658s c6:df 658s Certificate: 658s Data: 658s Version: 3 (0x2) 658s Serial Number: 4 (0x4) 658s Signature Algorithm: sha256WithRSAEncryption 658s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 658s Validity 658s Not Before: Mar 24 14:30:13 2024 GMT 658s Not After : Mar 24 14:30:13 2025 GMT 658s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 658s Subject Public Key Info: 658s Public Key Algorithm: rsaEncryption 658s Public-Key: (1024 bit) 658s Modulus: 658s 00:bc:67:b7:28:6d:81:07:a8:cc:92:a1:33:ed:b6: 658s 9c:87:15:d0:2b:20:29:8c:35:12:a7:29:e1:d3:40: 658s cd:c7:10:67:bb:61:bb:72:6b:d5:eb:35:16:22:40: 658s 4a:36:69:f8:0d:0d:61:9f:88:2f:d0:2d:bd:15:6f: 658s 0a:15:9f:0d:69:30:f7:03:d9:2e:21:65:b9:be:7d: 658s 18:52:3f:05:34:48:ab:2b:86:12:00:51:68:45:e5: 658s fb:27:0c:83:cc:d0:57:dd:ef:e6:a0:fb:b5:d3:ce: 658s 42:4e:77:19:1d:df:ba:be:dd:0a:b8:bc:07:82:d4: 658s 67:57:72:e9:66:d4:40:9b:a5 658s Exponent: 65537 (0x10001) 658s X509v3 extensions: 658s X509v3 Authority Key Identifier: 658s 31:FC:B0:C0:3B:5E:07:29:56:E3:5F:CB:E4:72:5A:3C:C9:4C:88:73 658s X509v3 Basic Constraints: 658s CA:FALSE 658s Netscape Cert Type: 658s SSL Client, S/MIME 658s Netscape Comment: 658s Test Organization Intermediate CA trusted Certificate 658s X509v3 Subject Key Identifier: 658s 74:F8:D5:C2:3D:00:9E:7B:0E:C9:7C:DD:FA:B3:69:12:F2:DB:0E:3C 658s X509v3 Key Usage: critical 658s Digital Signature, Non Repudiation, Key Encipherment 658s X509v3 Extended Key Usage: 658s TLS Web Client Authentication, E-mail Protection 658s X509v3 Subject Alternative Name: 658s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 658s Signature Algorithm: sha256WithRSAEncryption 658s Signature Value: 658s 9d:33:07:e7:5b:fe:da:5e:32:e8:f4:bd:9f:9f:50:86:c6:2f: 658s 00:ac:15:55:16:2e:b9:f6:df:3f:a8:a6:18:be:46:ac:ab:27: 658s b1:72:af:41:76:32:c1:43:ab:da:4f:1c:90:69:35:d4:2e:87: 658s ee:e5:07:ff:f8:4f:cc:24:8e:ed:90:e5:b4:12:02:9f:f9:d6: 658s 3f:d7:7b:07:17:50:8b:f3:b1:0e:0a:44:47:df:31:91:90:ee: 658s 25:3d:d1:47:c3:61:67:55:1a:eb:42:8d:11:22:0e:d9:5b:6a: 658s 2d:fb:05:ad:ab:af:fc:42:8b:c7:3e:0b:7b:81:8e:7e:8f:73: 658s c6:df 658s Test Organization Interme Token 658s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 658s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-aGaR2m/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 658s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-aGaR2m/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 658s ++ basename /tmp/sssd-softhsm2-aGaR2m/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 658s + tokens_dir=/tmp/sssd-softhsm2-aGaR2m/softhsm2-test-intermediate-CA-trusted-certificate-0001 658s + token_name='Test Organization Interme Token' 658s + '[' '!' -e /tmp/sssd-softhsm2-aGaR2m/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 658s + '[' '!' -d /tmp/sssd-softhsm2-aGaR2m/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 658s + echo 'Test Organization Interme Token' 658s + '[' -n partial_chain ']' 658s + local verify_arg=--verify=partial_chain 658s + local output_base_name=SSSD-child-18545 658s + local output_file=/tmp/sssd-softhsm2-aGaR2m/SSSD-child-18545.output 658s + output_cert_file=/tmp/sssd-softhsm2-aGaR2m/SSSD-child-18545.pem 658s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-aGaR2m/test-root-CA.pem 658s [p11_child[2271]] [main] (0x0400): p11_child started. 658s [p11_child[2271]] [main] (0x2000): Running in [pre-auth] mode. 658s [p11_child[2271]] [main] (0x2000): Running with effective IDs: [0][0]. 658s [p11_child[2271]] [main] (0x2000): Running with real IDs [0][0]. 658s [p11_child[2271]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 658s [p11_child[2271]] [do_card] (0x4000): Module List: 658s [p11_child[2271]] [do_card] (0x4000): common name: [softhsm2]. 658s [p11_child[2271]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 658s [p11_child[2271]] [do_card] (0x4000): Description [SoftHSM slot ID 0x67e9752a] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 658s [p11_child[2271]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 658s [p11_child[2271]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x67e9752a][1743353130] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 658s [p11_child[2271]] [do_card] (0x4000): Login NOT required. 658s [p11_child[2271]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 658s [p11_child[2271]] [do_verification] (0x0040): X509_verify_cert failed [0]. 658s [p11_child[2271]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 658s [p11_child[2271]] [read_certs] (0x0040): Certificate [Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] not valid, skipping. 658s [p11_child[2271]] [do_card] (0x4000): No certificate found. 658s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-aGaR2m/SSSD-child-18545.output 658s + return 2 658s + valid_certificate /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-12671 /tmp/sssd-softhsm2-aGaR2m/test-full-chain-CA.pem 658s + check_certificate /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-12671 /tmp/sssd-softhsm2-aGaR2m/test-full-chain-CA.pem 658s + local certificate=/tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA-trusted-certificate-0001.pem 658s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-12671 658s + local key_ring=/tmp/sssd-softhsm2-aGaR2m/test-full-chain-CA.pem 658s + local verify_option= 658s + prepare_softhsm2_card /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-12671 658s + local certificate=/tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA-trusted-certificate-0001.pem 658s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-12671 658s + local key_cn 658s + local key_name 658s + local tokens_dir 658s + local output_cert_file 658s + token_name= 658s ++ basename /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA-trusted-certificate-0001.pem .pem 658s + key_name=test-intermediate-CA-trusted-certificate-0001 658s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA-trusted-certificate-0001.pem 658s ++ sed -n 's/ *commonName *= //p' 658s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 658s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 658s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-aGaR2m/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 658s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-aGaR2m/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 658s ++ basename /tmp/sssd-softhsm2-aGaR2m/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 658s + tokens_dir=/tmp/sssd-softhsm2-aGaR2m/softhsm2-test-intermediate-CA-trusted-certificate-0001 658s + token_name='Test Organization Interme Token' 658s + '[' '!' -e /tmp/sssd-softhsm2-aGaR2m/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 658s + '[' '!' -d /tmp/sssd-softhsm2-aGaR2m/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 658s + echo 'Test Organization Interme Token' 658s + '[' -n '' ']' 658s + local output_base_name=SSSD-child-20852 658s + local output_file=/tmp/sssd-softhsm2-aGaR2m/SSSD-child-20852.output 658s + output_cert_file=/tmp/sssd-softhsm2-aGaR2m/SSSD-child-20852.pem 658s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-aGaR2m/test-full-chain-CA.pem 658s [p11_child[2278]] [main] (0x0400): p11_child started. 658s [p11_child[2278]] [main] (0x2000): Running in [pre-auth] mode. 658s [p11_child[2278]] [main] (0x2000): Running with effective IDs: [0][0]. 658s [p11_child[2278]] [main] (0x2000): Running with real IDs [0][0]. 658s [p11_child[2278]] [do_card] (0x4000): Module List: 658s [p11_child[2278]] [do_card] (0x4000): common name: [softhsm2]. 658s [p11_child[2278]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 658s [p11_child[2278]] [do_card] (0x4000): Description [SoftHSM slot ID 0x67e9752a] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 658s [p11_child[2278]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 658s [p11_child[2278]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x67e9752a][1743353130] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 658s [p11_child[2278]] [do_card] (0x4000): Login NOT required. 658s [p11_child[2278]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 658s [p11_child[2278]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 658s [p11_child[2278]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Interme Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 658s [p11_child[2278]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x67e9752a;slot-manufacturer=SoftHSM%20project;slot-id=1743353130;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=d9f91ef067e9752a;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 658s [p11_child[2278]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 658s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-aGaR2m/SSSD-child-20852.output 658s + echo '-----BEGIN CERTIFICATE-----' 658s + tail -n1 /tmp/sssd-softhsm2-aGaR2m/SSSD-child-20852.output 658s + echo '-----END CERTIFICATE-----' 658s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-aGaR2m/SSSD-child-20852.pem 658s + local found_md5 expected_md5 658s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA-trusted-certificate-0001.pem 658s + expected_md5=Modulus=BC67B7286D8107A8CC92A133EDB69C8715D02B20298C3512A729E1D340CDC71067BB61BB726BD5EB351622404A3669F80D0D619F882FD02DBD156F0A159F0D6930F703D92E2165B9BE7D18523F053448AB2B861200516845E5FB270C83CCD057DDEFE6A0FBB5D3CE424E77191DDFBABEDD0AB8BC0782D4675772E966D4409BA5 658s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-aGaR2m/SSSD-child-20852.pem 658s + found_md5=Modulus=BC67B7286D8107A8CC92A133EDB69C8715D02B20298C3512A729E1D340CDC71067BB61BB726BD5EB351622404A3669F80D0D619F882FD02DBD156F0A159F0D6930F703D92E2165B9BE7D18523F053448AB2B861200516845E5FB270C83CCD057DDEFE6A0FBB5D3CE424E77191DDFBABEDD0AB8BC0782D4675772E966D4409BA5 658s + '[' Modulus=BC67B7286D8107A8CC92A133EDB69C8715D02B20298C3512A729E1D340CDC71067BB61BB726BD5EB351622404A3669F80D0D619F882FD02DBD156F0A159F0D6930F703D92E2165B9BE7D18523F053448AB2B861200516845E5FB270C83CCD057DDEFE6A0FBB5D3CE424E77191DDFBABEDD0AB8BC0782D4675772E966D4409BA5 '!=' Modulus=BC67B7286D8107A8CC92A133EDB69C8715D02B20298C3512A729E1D340CDC71067BB61BB726BD5EB351622404A3669F80D0D619F882FD02DBD156F0A159F0D6930F703D92E2165B9BE7D18523F053448AB2B861200516845E5FB270C83CCD057DDEFE6A0FBB5D3CE424E77191DDFBABEDD0AB8BC0782D4675772E966D4409BA5 ']' 658s + output_file=/tmp/sssd-softhsm2-aGaR2m/SSSD-child-20852-auth.output 658s ++ basename /tmp/sssd-softhsm2-aGaR2m/SSSD-child-20852-auth.output .output 658s + output_cert_file=/tmp/sssd-softhsm2-aGaR2m/SSSD-child-20852-auth.pem 658s + echo -n 053350 658s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-aGaR2m/test-full-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 '' --token_name 'Test Organization Interme Token' --module_name /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so 658s [p11_child[2286]] [main] (0x0400): p11_child started. 658s [p11_child[2286]] [main] (0x2000): Running in [auth] mode. 658s [p11_child[2286]] [main] (0x2000): Running with effective IDs: [0][0]. 658s [p11_child[2286]] [main] (0x2000): Running with real IDs [0][0]. 658s [p11_child[2286]] [do_card] (0x4000): Module List: 658s [p11_child[2286]] [do_card] (0x4000): common name: [softhsm2]. 658s [p11_child[2286]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 658s [p11_child[2286]] [do_card] (0x4000): Description [SoftHSM slot ID 0x67e9752a] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 658s [p11_child[2286]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 658s [p11_child[2286]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x67e9752a][1743353130] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 658s [p11_child[2286]] [do_card] (0x4000): Login required. 658s [p11_child[2286]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 658s [p11_child[2286]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 658s [p11_child[2286]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so Test Organization Interme Token Test Organization Interme Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 658s [p11_child[2286]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x67e9752a;slot-manufacturer=SoftHSM%20project;slot-id=1743353130;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=d9f91ef067e9752a;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 658s [p11_child[2286]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 658s [p11_child[2286]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 658s [p11_child[2286]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 658s [p11_child[2286]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 658s [p11_child[2286]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 658s [p11_child[2286]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 658s [p11_child[2286]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 658s [p11_child[2286]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 658s [p11_child[2286]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 658s [p11_child[2286]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 658s [p11_child[2286]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 658s [p11_child[2286]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 658s [p11_child[2286]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 658s [p11_child[2286]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 658s [p11_child[2286]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 658s [p11_child[2286]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 658s [p11_child[2286]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 658s [p11_child[2286]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 658s [p11_child[2286]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 658s [p11_child[2286]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 658s [p11_child[2286]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 658s [p11_child[2286]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 658s [p11_child[2286]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 658s [p11_child[2286]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 658s [p11_child[2286]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 658s [p11_child[2286]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 658s [p11_child[2286]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 658s [p11_child[2286]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 658s [p11_child[2286]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 658s [p11_child[2286]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 658s [p11_child[2286]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 658s [p11_child[2286]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 658s [p11_child[2286]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 658s [p11_child[2286]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 658s [p11_child[2286]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 658s [p11_child[2286]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 658s [p11_child[2286]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 658s [p11_child[2286]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 658s [p11_child[2286]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 658s [p11_child[2286]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 658s [p11_child[2286]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 658s [p11_child[2286]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 658s [p11_child[2286]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 658s [p11_child[2286]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 658s [p11_child[2286]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 658s [p11_child[2286]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 658s [p11_child[2286]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 658s [p11_child[2286]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 658s [p11_child[2286]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 658s [p11_child[2286]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 658s [p11_child[2286]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 658s [p11_child[2286]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 658s [p11_child[2286]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 658s [p11_child[2286]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 658s [p11_child[2286]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 658s [p11_child[2286]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 658s [p11_child[2286]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 658s [p11_child[2286]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 658s [p11_child[2286]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 658s [p11_child[2286]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 658s [p11_child[2286]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 658s [p11_child[2286]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 658s [p11_child[2286]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 658s [p11_child[2286]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 658s [p11_child[2286]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 658s [p11_child[2286]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 658s [p11_child[2286]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 658s [p11_child[2286]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 658s [p11_child[2286]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 658s [p11_child[2286]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 658s [p11_child[2286]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 658s [p11_child[2286]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 658s [p11_child[2286]] [do_card] (0x4000): Certificate verified and validated. 658s [p11_child[2286]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 658s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-aGaR2m/SSSD-child-20852-auth.output 658s + echo '-----BEGIN CERTIFICATE-----' 658s + tail -n1 /tmp/sssd-softhsm2-aGaR2m/SSSD-child-20852-auth.output 658s + echo '-----END CERTIFICATE-----' 658s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-aGaR2m/SSSD-child-20852-auth.pem 658s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-aGaR2m/SSSD-child-20852-auth.pem 658s + found_md5=Modulus=BC67B7286D8107A8CC92A133EDB69C8715D02B20298C3512A729E1D340CDC71067BB61BB726BD5EB351622404A3669F80D0D619F882FD02DBD156F0A159F0D6930F703D92E2165B9BE7D18523F053448AB2B861200516845E5FB270C83CCD057DDEFE6A0FBB5D3CE424E77191DDFBABEDD0AB8BC0782D4675772E966D4409BA5 658s + '[' Modulus=BC67B7286D8107A8CC92A133EDB69C8715D02B20298C3512A729E1D340CDC71067BB61BB726BD5EB351622404A3669F80D0D619F882FD02DBD156F0A159F0D6930F703D92E2165B9BE7D18523F053448AB2B861200516845E5FB270C83CCD057DDEFE6A0FBB5D3CE424E77191DDFBABEDD0AB8BC0782D4675772E966D4409BA5 '!=' Modulus=BC67B7286D8107A8CC92A133EDB69C8715D02B20298C3512A729E1D340CDC71067BB61BB726BD5EB351622404A3669F80D0D619F882FD02DBD156F0A159F0D6930F703D92E2165B9BE7D18523F053448AB2B861200516845E5FB270C83CCD057DDEFE6A0FBB5D3CE424E77191DDFBABEDD0AB8BC0782D4675772E966D4409BA5 ']' 658s + valid_certificate /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-12671 /tmp/sssd-softhsm2-aGaR2m/test-full-chain-CA.pem partial_chain 658s + check_certificate /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-12671 /tmp/sssd-softhsm2-aGaR2m/test-full-chain-CA.pem partial_chain 658s + local certificate=/tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA-trusted-certificate-0001.pem 658s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-12671 658s + local key_ring=/tmp/sssd-softhsm2-aGaR2m/test-full-chain-CA.pem 658s + local verify_option=partial_chain 658s + prepare_softhsm2_card /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-12671 658s + local certificate=/tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA-trusted-certificate-0001.pem 658s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-12671 658s + local key_cn 658s + local key_name 658s + local tokens_dir 658s + local output_cert_file 658s + token_name= 658s ++ basename /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA-trusted-certificate-0001.pem .pem 658s + key_name=test-intermediate-CA-trusted-certificate-0001 658s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA-trusted-certificate-0001.pem 658s ++ sed -n 's/ *commonName *= //p' 658s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 658s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 658s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-aGaR2m/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 658s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-aGaR2m/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 658s ++ basename /tmp/sssd-softhsm2-aGaR2m/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 658s + tokens_dir=/tmp/sssd-softhsm2-aGaR2m/softhsm2-test-intermediate-CA-trusted-certificate-0001 658s + token_name='Test Organization Interme Token' 658s + '[' '!' -e /tmp/sssd-softhsm2-aGaR2m/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 658s + '[' '!' -d /tmp/sssd-softhsm2-aGaR2m/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 658s + echo 'Test Organization Interme Token' 658s + '[' -n partial_chain ']' 658s + local verify_arg=--verify=partial_chain 658s + local output_base_name=SSSD-child-4539 658s + local output_file=/tmp/sssd-softhsm2-aGaR2m/SSSD-child-4539.output 658s + output_cert_file=/tmp/sssd-softhsm2-aGaR2m/SSSD-child-4539.pem 658s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-aGaR2m/test-full-chain-CA.pem 658s [p11_child[2296]] [main] (0x0400): p11_child started. 658s [p11_child[2296]] [main] (0x2000): Running in [pre-auth] mode. 658s [p11_child[2296]] [main] (0x2000): Running with effective IDs: [0][0]. 658s [p11_child[2296]] [main] (0x2000): Running with real IDs [0][0]. 658s [p11_child[2296]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 658s [p11_child[2296]] [do_card] (0x4000): Module List: 658s [p11_child[2296]] [do_card] (0x4000): common name: [softhsm2]. 658s [p11_child[2296]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 658s [p11_child[2296]] [do_card] (0x4000): Description [SoftHSM slot ID 0x67e9752a] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 658s [p11_child[2296]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 658s [p11_child[2296]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x67e9752a][1743353130] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 658s [p11_child[2296]] [do_card] (0x4000): Login NOT required. 658s [p11_child[2296]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 658s [p11_child[2296]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 658s [p11_child[2296]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Interme Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 658s [p11_child[2296]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x67e9752a;slot-manufacturer=SoftHSM%20project;slot-id=1743353130;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=d9f91ef067e9752a;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 658s [p11_child[2296]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 658s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-aGaR2m/SSSD-child-4539.output 658s + echo '-----BEGIN CERTIFICATE-----' 658s + tail -n1 /tmp/sssd-softhsm2-aGaR2m/SSSD-child-4539.output 658s + echo '-----END CERTIFICATE-----' 658s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-aGaR2m/SSSD-child-4539.pem 658s + local found_md5 expected_md5 658s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA-trusted-certificate-0001.pem 658s Certificate: 658s Data: 658s Version: 3 (0x2) 658s Serial Number: 4 (0x4) 658s Signature Algorithm: sha256WithRSAEncryption 658s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 658s Validity 658s Not Before: Mar 24 14:30:13 2024 GMT 658s Not After : Mar 24 14:30:13 2025 GMT 658s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 658s Subject Public Key Info: 658s Public Key Algorithm: rsaEncryption 658s Public-Key: (1024 bit) 658s Modulus: 658s 00:bc:67:b7:28:6d:81:07:a8:cc:92:a1:33:ed:b6: 658s 9c:87:15:d0:2b:20:29:8c:35:12:a7:29:e1:d3:40: 658s cd:c7:10:67:bb:61:bb:72:6b:d5:eb:35:16:22:40: 658s 4a:36:69:f8:0d:0d:61:9f:88:2f:d0:2d:bd:15:6f: 658s 0a:15:9f:0d:69:30:f7:03:d9:2e:21:65:b9:be:7d: 658s 18:52:3f:05:34:48:ab:2b:86:12:00:51:68:45:e5: 658s fb:27:0c:83:cc:d0:57:dd:ef:e6:a0:fb:b5:d3:ce: 658s 42:4e:77:19:1d:df:ba:be:dd:0a:b8:bc:07:82:d4: 658s 67:57:72:e9:66:d4:40:9b:a5 658s Exponent: 65537 (0x10001) 658s X509v3 extensions: 658s X509v3 Authority Key Identifier: 658s 31:FC:B0:C0:3B:5E:07:29:56:E3:5F:CB:E4:72:5A:3C:C9:4C:88:73 658s X509v3 Basic Constraints: 658s CA:FALSE 658s Netscape Cert Type: 658s SSL Client, S/MIME 658s Netscape Comment: 658s Test Organization Intermediate CA trusted Certificate 658s X509v3 Subject Key Identifier: 658s 74:F8:D5:C2:3D:00:9E:7B:0E:C9:7C:DD:FA:B3:69:12:F2:DB:0E:3C 658s X509v3 Key Usage: critical 658s Digital Signature, Non Repudiation, Key Encipherment 658s X509v3 Extended Key Usage: 658s TLS Web Client Authentication, E-mail Protection 658s X509v3 Subject Alternative Name: 658s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 658s Signature Algorithm: sha256WithRSAEncryption 658s Signature Value: 658s 9d:33:07:e7:5b:fe:da:5e:32:e8:f4:bd:9f:9f:50:86:c6:2f: 658s 00:ac:15:55:16:2e:b9:f6:df:3f:a8:a6:18:be:46:ac:ab:27: 658s b1:72:af:41:76:32:c1:43:ab:da:4f:1c:90:69:35:d4:2e:87: 658s ee:e5:07:ff:f8:4f:cc:24:8e:ed:90:e5:b4:12:02:9f:f9:d6: 658s 3f:d7:7b:07:17:50:8b:f3:b1:0e:0a:44:47:df:31:91:90:ee: 658s 25:3d:d1:47:c3:61:67:55:1a:eb:42:8d:11:22:0e:d9:5b:6a: 658s 2d:fb:05:ad:ab:af:fc:42:8b:c7:3e:0b:7b:81:8e:7e:8f:73: 658s c6:df 658s + expected_md5=Modulus=BC67B7286D8107A8CC92A133EDB69C8715D02B20298C3512A729E1D340CDC71067BB61BB726BD5EB351622404A3669F80D0D619F882FD02DBD156F0A159F0D6930F703D92E2165B9BE7D18523F053448AB2B861200516845E5FB270C83CCD057DDEFE6A0FBB5D3CE424E77191DDFBABEDD0AB8BC0782D4675772E966D4409BA5 658s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-aGaR2m/SSSD-child-4539.pem 658s + found_md5=Modulus=BC67B7286D8107A8CC92A133EDB69C8715D02B20298C3512A729E1D340CDC71067BB61BB726BD5EB351622404A3669F80D0D619F882FD02DBD156F0A159F0D6930F703D92E2165B9BE7D18523F053448AB2B861200516845E5FB270C83CCD057DDEFE6A0FBB5D3CE424E77191DDFBABEDD0AB8BC0782D4675772E966D4409BA5 658s + '[' Modulus=BC67B7286D8107A8CC92A133EDB69C8715D02B20298C3512A729E1D340CDC71067BB61BB726BD5EB351622404A3669F80D0D619F882FD02DBD156F0A159F0D6930F703D92E2165B9BE7D18523F053448AB2B861200516845E5FB270C83CCD057DDEFE6A0FBB5D3CE424E77191DDFBABEDD0AB8BC0782D4675772E966D4409BA5 '!=' Modulus=BC67B7286D8107A8CC92A133EDB69C8715D02B20298C3512A729E1D340CDC71067BB61BB726BD5EB351622404A3669F80D0D619F882FD02DBD156F0A159F0D6930F703D92E2165B9BE7D18523F053448AB2B861200516845E5FB270C83CCD057DDEFE6A0FBB5D3CE424E77191DDFBABEDD0AB8BC0782D4675772E966D4409BA5 ']' 658s + output_file=/tmp/sssd-softhsm2-aGaR2m/SSSD-child-4539-auth.output 658s ++ basename /tmp/sssd-softhsm2-aGaR2m/SSSD-child-4539-auth.output .output 658s + output_cert_file=/tmp/sssd-softhsm2-aGaR2m/SSSD-child-4539-auth.pem 658s + echo -n 053350 658s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-aGaR2m/test-full-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Interme Token' --module_name /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so 658s [p11_child[2304]] [main] (0x0400): p11_child started. 658s [p11_child[2304]] [main] (0x2000): Running in [auth] mode. 658s [p11_child[2304]] [main] (0x2000): Running with effective IDs: [0][0]. 658s [p11_child[2304]] [main] (0x2000): Running with real IDs [0][0]. 658s [p11_child[2304]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 658s [p11_child[2304]] [do_card] (0x4000): Module List: 658s [p11_child[2304]] [do_card] (0x4000): common name: [softhsm2]. 658s [p11_child[2304]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 658s [p11_child[2304]] [do_card] (0x4000): Description [SoftHSM slot ID 0x67e9752a] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 658s [p11_child[2304]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 658s [p11_child[2304]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x67e9752a][1743353130] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 658s [p11_child[2304]] [do_card] (0x4000): Login required. 658s [p11_child[2304]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 658s [p11_child[2304]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 658s [p11_child[2304]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so Test Organization Interme Token Test Organization Interme Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 658s [p11_child[2304]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x67e9752a;slot-manufacturer=SoftHSM%20project;slot-id=1743353130;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=d9f91ef067e9752a;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 658s [p11_child[2304]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 658s [p11_child[2304]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 658s [p11_child[2304]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 658s [p11_child[2304]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 658s [p11_child[2304]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 658s [p11_child[2304]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 658s [p11_child[2304]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 658s [p11_child[2304]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 658s [p11_child[2304]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 658s [p11_child[2304]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 658s [p11_child[2304]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 658s [p11_child[2304]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 658s [p11_child[2304]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 658s [p11_child[2304]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 658s [p11_child[2304]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 658s [p11_child[2304]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 658s [p11_child[2304]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 658s [p11_child[2304]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 658s [p11_child[2304]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 658s [p11_child[2304]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 658s [p11_child[2304]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 658s [p11_child[2304]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 658s [p11_child[2304]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 658s [p11_child[2304]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 658s [p11_child[2304]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 658s [p11_child[2304]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 658s [p11_child[2304]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 658s [p11_child[2304]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 658s [p11_child[2304]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 658s [p11_child[2304]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 658s [p11_child[2304]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 658s [p11_child[2304]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 658s [p11_child[2304]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 658s [p11_child[2304]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 658s [p11_child[2304]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 658s [p11_child[2304]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 658s [p11_child[2304]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 658s [p11_child[2304]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 658s [p11_child[2304]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 658s [p11_child[2304]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 658s [p11_child[2304]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 658s [p11_child[2304]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 658s [p11_child[2304]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 658s [p11_child[2304]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 658s [p11_child[2304]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 658s [p11_child[2304]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 658s [p11_child[2304]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 658s [p11_child[2304]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 658s [p11_child[2304]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 658s [p11_child[2304]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 658s [p11_child[2304]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 658s [p11_child[2304]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 658s [p11_child[2304]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 658s [p11_child[2304]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 658s [p11_child[2304]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 658s [p11_child[2304]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 658s [p11_child[2304]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 658s [p11_child[2304]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 658s [p11_child[2304]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 658s [p11_child[2304]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 658s [p11_child[2304]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 658s [p11_child[2304]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 658s [p11_child[2304]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 658s [p11_child[2304]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 658s [p11_child[2304]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 658s [p11_child[2304]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 658s [p11_child[2304]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 658s [p11_child[2304]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 658s [p11_child[2304]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 658s [p11_child[2304]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 658s [p11_child[2304]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 658s [p11_child[2304]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 658s [p11_child[2304]] [do_card] (0x4000): Certificate verified and validated. 658s [p11_child[2304]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 658s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-aGaR2m/SSSD-child-4539-auth.output 658s + echo '-----BEGIN CERTIFICATE-----' 658s + tail -n1 /tmp/sssd-softhsm2-aGaR2m/SSSD-child-4539-auth.output 658s + echo '-----END CERTIFICATE-----' 658s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-aGaR2m/SSSD-child-4539-auth.pem 658s Certificate: 658s Data: 658s Version: 3 (0x2) 658s Serial Number: 4 (0x4) 658s Signature Algorithm: sha256WithRSAEncryption 658s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 658s Validity 658s Not Before: Mar 24 14:30:13 2024 GMT 658s Not After : Mar 24 14:30:13 2025 GMT 658s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 658s Subject Public Key Info: 658s Public Key Algorithm: rsaEncryption 658s Public-Key: (1024 bit) 658s Modulus: 658s 00:bc:67:b7:28:6d:81:07:a8:cc:92:a1:33:ed:b6: 658s 9c:87:15:d0:2b:20:29:8c:35:12:a7:29:e1:d3:40: 658s cd:c7:10:67:bb:61:bb:72:6b:d5:eb:35:16:22:40: 658s 4a:36:69:f8:0d:0d:61:9f:88:2f:d0:2d:bd:15:6f: 658s 0a:15:9f:0d:69:30:f7:03:d9:2e:21:65:b9:be:7d: 658s 18:52:3f:05:34:48:ab:2b:86:12:00:51:68:45:e5: 658s fb:27:0c:83:cc:d0:57:dd:ef:e6:a0:fb:b5:d3:ce: 658s 42:4e:77:19:1d:df:ba:be:dd:0a:b8:bc:07:82:d4: 658s 67:57:72:e9:66:d4:40:9b:a5 658s Exponent: 65537 (0x10001) 658s X509v3 extensions: 658s X509v3 Authority Key Identifier: 658s 31:FC:B0:C0:3B:5E:07:29:56:E3:5F:CB:E4:72:5A:3C:C9:4C:88:73 658s X509v3 Basic Constraints: 658s CA:FALSE 658s Netscape Cert Type: 658s SSL Client, S/MIME 658s Netscape Comment: 658s Test Organization Intermediate CA trusted Certificate 658s X509v3 Subject Key Identifier: 658s 74:F8:D5:C2:3D:00:9E:7B:0E:C9:7C:DD:FA:B3:69:12:F2:DB:0E:3C 658s X509v3 Key Usage: critical 658s Digital Signature, Non Repudiation, Key Encipherment 658s X509v3 Extended Key Usage: 658s TLS Web Client Authentication, E-mail Protection 658s X509v3 Subject Alternative Name: 658s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 658s Signature Algorithm: sha256WithRSAEncryption 658s Signature Value: 658s 9d:33:07:e7:5b:fe:da:5e:32:e8:f4:bd:9f:9f:50:86:c6:2f: 658s 00:ac:15:55:16:2e:b9:f6:df:3f:a8:a6:18:be:46:ac:ab:27: 658s b1:72:af:41:76:32:c1:43:ab:da:4f:1c:90:69:35:d4:2e:87: 658s ee:e5:07:ff:f8:4f:cc:24:8e:ed:90:e5:b4:12:02:9f:f9:d6: 658s 3f:d7:7b:07:17:50:8b:f3:b1:0e:0a:44:47:df:31:91:90:ee: 658s 25:3d:d1:47:c3:61:67:55:1a:eb:42:8d:11:22:0e:d9:5b:6a: 658s 2d:fb:05:ad:ab:af:fc:42:8b:c7:3e:0b:7b:81:8e:7e:8f:73: 658s c6:df 658s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-aGaR2m/SSSD-child-4539-auth.pem 658s + found_md5=Modulus=BC67B7286D8107A8CC92A133EDB69C8715D02B20298C3512A729E1D340CDC71067BB61BB726BD5EB351622404A3669F80D0D619F882FD02DBD156F0A159F0D6930F703D92E2165B9BE7D18523F053448AB2B861200516845E5FB270C83CCD057DDEFE6A0FBB5D3CE424E77191DDFBABEDD0AB8BC0782D4675772E966D4409BA5 658s + '[' Modulus=BC67B7286D8107A8CC92A133EDB69C8715D02B20298C3512A729E1D340CDC71067BB61BB726BD5EB351622404A3669F80D0D619F882FD02DBD156F0A159F0D6930F703D92E2165B9BE7D18523F053448AB2B861200516845E5FB270C83CCD057DDEFE6A0FBB5D3CE424E77191DDFBABEDD0AB8BC0782D4675772E966D4409BA5 '!=' Modulus=BC67B7286D8107A8CC92A133EDB69C8715D02B20298C3512A729E1D340CDC71067BB61BB726BD5EB351622404A3669F80D0D619F882FD02DBD156F0A159F0D6930F703D92E2165B9BE7D18523F053448AB2B861200516845E5FB270C83CCD057DDEFE6A0FBB5D3CE424E77191DDFBABEDD0AB8BC0782D4675772E966D4409BA5 ']' 658s + invalid_certificate /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-12671 /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA.pem 658s + check_certificate /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-12671 /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA.pem 658s + local certificate=/tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA-trusted-certificate-0001.pem 658s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-12671 658s + local key_ring=/tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA.pem 658s + local verify_option= 658s + prepare_softhsm2_card /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-12671 658s + local certificate=/tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA-trusted-certificate-0001.pem 658s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-12671 658s + local key_cn 658s + local key_name 658s + local tokens_dir 658s + local output_cert_file 658s + token_name= 658s ++ basename /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA-trusted-certificate-0001.pem .pem 658s + key_name=test-intermediate-CA-trusted-certificate-0001 658s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA-trusted-certificate-0001.pem 658s ++ sed -n 's/ *commonName *= //p' 658s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 658s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 658s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-aGaR2m/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 658s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-aGaR2m/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 658s ++ basename /tmp/sssd-softhsm2-aGaR2m/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 658s + tokens_dir=/tmp/sssd-softhsm2-aGaR2m/softhsm2-test-intermediate-CA-trusted-certificate-0001 658s + token_name='Test Organization Interme Token' 658s + '[' '!' -e /tmp/sssd-softhsm2-aGaR2m/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 658s + '[' '!' -d /tmp/sssd-softhsm2-aGaR2m/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 658s + echo 'Test Organization Interme Token' 658s Test Organization Interme Token 658s + '[' -n '' ']' 658s + local output_base_name=SSSD-child-14735 658s + local output_file=/tmp/sssd-softhsm2-aGaR2m/SSSD-child-14735.output 658s + output_cert_file=/tmp/sssd-softhsm2-aGaR2m/SSSD-child-14735.pem 658s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA.pem 658s [p11_child[2314]] [main] (0x0400): p11_child started. 658s [p11_child[2314]] [main] (0x2000): Running in [pre-auth] mode. 658s [p11_child[2314]] [main] (0x2000): Running with effective IDs: [0][0]. 658s [p11_child[2314]] [main] (0x2000): Running with real IDs [0][0]. 658s [p11_child[2314]] [do_card] (0x4000): Module List: 658s [p11_child[2314]] [do_card] (0x4000): common name: [softhsm2]. 658s [p11_child[2314]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 658s [p11_child[2314]] [do_card] (0x4000): Description [SoftHSM slot ID 0x67e9752a] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 658s [p11_child[2314]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 658s [p11_child[2314]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x67e9752a][1743353130] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 658s [p11_child[2314]] [do_card] (0x4000): Login NOT required. 658s [p11_child[2314]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 658s [p11_child[2314]] [do_verification] (0x0040): X509_verify_cert failed [0]. 658s [p11_child[2314]] [do_verification] (0x0040): X509_verify_cert failed [2][unable to get issuer certificate]. 658s [p11_child[2314]] [read_certs] (0x0040): Certificate [Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] not valid, skipping. 658s [p11_child[2314]] [do_card] (0x4000): No certificate found. 658s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-aGaR2m/SSSD-child-14735.output 658s + return 2 658s + valid_certificate /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-12671 /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA.pem partial_chain 658s + check_certificate /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-12671 /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA.pem partial_chain 658s + local certificate=/tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA-trusted-certificate-0001.pem 658s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-12671 658s + local key_ring=/tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA.pem 658s + local verify_option=partial_chain 658s + prepare_softhsm2_card /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-12671 658s + local certificate=/tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA-trusted-certificate-0001.pem 658s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-12671 658s + local key_cn 658s + local key_name 658s + local tokens_dir 658s + local output_cert_file 658s + token_name= 658s ++ basename /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA-trusted-certificate-0001.pem .pem 658s + key_name=test-intermediate-CA-trusted-certificate-0001 658s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA-trusted-certificate-0001.pem 658s ++ sed -n 's/ *commonName *= //p' 658s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 658s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 658s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-aGaR2m/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 658s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-aGaR2m/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 658s ++ basename /tmp/sssd-softhsm2-aGaR2m/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 658s + tokens_dir=/tmp/sssd-softhsm2-aGaR2m/softhsm2-test-intermediate-CA-trusted-certificate-0001 658s + token_name='Test Organization Interme Token' 658s + '[' '!' -e /tmp/sssd-softhsm2-aGaR2m/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 658s Test Organization Interme Token 658s + '[' '!' -d /tmp/sssd-softhsm2-aGaR2m/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 658s + echo 'Test Organization Interme Token' 658s + '[' -n partial_chain ']' 658s + local verify_arg=--verify=partial_chain 658s + local output_base_name=SSSD-child-24323 658s + local output_file=/tmp/sssd-softhsm2-aGaR2m/SSSD-child-24323.output 658s + output_cert_file=/tmp/sssd-softhsm2-aGaR2m/SSSD-child-24323.pem 658s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA.pem 658s [p11_child[2321]] [main] (0x0400): p11_child started. 658s [p11_child[2321]] [main] (0x2000): Running in [pre-auth] mode. 658s [p11_child[2321]] [main] (0x2000): Running with effective IDs: [0][0]. 658s [p11_child[2321]] [main] (0x2000): Running with real IDs [0][0]. 658s [p11_child[2321]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 658s [p11_child[2321]] [do_card] (0x4000): Module List: 658s [p11_child[2321]] [do_card] (0x4000): common name: [softhsm2]. 658s [p11_child[2321]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 658s [p11_child[2321]] [do_card] (0x4000): Description [SoftHSM slot ID 0x67e9752a] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 658s [p11_child[2321]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 658s [p11_child[2321]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x67e9752a][1743353130] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 658s [p11_child[2321]] [do_card] (0x4000): Login NOT required. 658s [p11_child[2321]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 658s [p11_child[2321]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 658s [p11_child[2321]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Interme Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 658s [p11_child[2321]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x67e9752a;slot-manufacturer=SoftHSM%20project;slot-id=1743353130;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=d9f91ef067e9752a;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 658s [p11_child[2321]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 658s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-aGaR2m/SSSD-child-24323.output 658s + echo '-----BEGIN CERTIFICATE-----' 658s + tail -n1 /tmp/sssd-softhsm2-aGaR2m/SSSD-child-24323.output 658s + echo '-----END CERTIFICATE-----' 658s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-aGaR2m/SSSD-child-24323.pem 658s Certificate: 658s Data: 658s Version: 3 (0x2) 658s Serial Number: 4 (0x4) 658s Signature Algorithm: sha256WithRSAEncryption 658s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 658s Validity 658s Not Before: Mar 24 14:30:13 2024 GMT 658s Not After : Mar 24 14:30:13 2025 GMT 658s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 658s Subject Public Key Info: 658s Public Key Algorithm: rsaEncryption 658s Public-Key: (1024 bit) 658s Modulus: 658s 00:bc:67:b7:28:6d:81:07:a8:cc:92:a1:33:ed:b6: 658s 9c:87:15:d0:2b:20:29:8c:35:12:a7:29:e1:d3:40: 658s cd:c7:10:67:bb:61:bb:72:6b:d5:eb:35:16:22:40: 658s 4a:36:69:f8:0d:0d:61:9f:88:2f:d0:2d:bd:15:6f: 658s 0a:15:9f:0d:69:30:f7:03:d9:2e:21:65:b9:be:7d: 658s 18:52:3f:05:34:48:ab:2b:86:12:00:51:68:45:e5: 658s fb:27:0c:83:cc:d0:57:dd:ef:e6:a0:fb:b5:d3:ce: 658s 42:4e:77:19:1d:df:ba:be:dd:0a:b8:bc:07:82:d4: 658s 67:57:72:e9:66:d4:40:9b:a5 658s Exponent: 65537 (0x10001) 658s X509v3 extensions: 658s X509v3 Authority Key Identifier: 658s 31:FC:B0:C0:3B:5E:07:29:56:E3:5F:CB:E4:72:5A:3C:C9:4C:88:73 658s X509v3 Basic Constraints: 658s CA:FALSE 658s Netscape Cert Type: 658s SSL Client, S/MIME 658s Netscape Comment: 658s Test Organization Intermediate CA trusted Certificate 658s X509v3 Subject Key Identifier: 658s 74:F8:D5:C2:3D:00:9E:7B:0E:C9:7C:DD:FA:B3:69:12:F2:DB:0E:3C 658s X509v3 Key Usage: critical 658s Digital Signature, Non Repudiation, Key Encipherment 658s X509v3 Extended Key Usage: 658s TLS Web Client Authentication, E-mail Protection 658s X509v3 Subject Alternative Name: 658s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 658s Signature Algorithm: sha256WithRSAEncryption 658s Signature Value: 658s 9d:33:07:e7:5b:fe:da:5e:32:e8:f4:bd:9f:9f:50:86:c6:2f: 658s 00:ac:15:55:16:2e:b9:f6:df:3f:a8:a6:18:be:46:ac:ab:27: 658s b1:72:af:41:76:32:c1:43:ab:da:4f:1c:90:69:35:d4:2e:87: 658s ee:e5:07:ff:f8:4f:cc:24:8e:ed:90:e5:b4:12:02:9f:f9:d6: 658s 3f:d7:7b:07:17:50:8b:f3:b1:0e:0a:44:47:df:31:91:90:ee: 658s 25:3d:d1:47:c3:61:67:55:1a:eb:42:8d:11:22:0e:d9:5b:6a: 658s 2d:fb:05:ad:ab:af:fc:42:8b:c7:3e:0b:7b:81:8e:7e:8f:73: 658s c6:df 658s + local found_md5 expected_md5 658s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA-trusted-certificate-0001.pem 659s + expected_md5=Modulus=BC67B7286D8107A8CC92A133EDB69C8715D02B20298C3512A729E1D340CDC71067BB61BB726BD5EB351622404A3669F80D0D619F882FD02DBD156F0A159F0D6930F703D92E2165B9BE7D18523F053448AB2B861200516845E5FB270C83CCD057DDEFE6A0FBB5D3CE424E77191DDFBABEDD0AB8BC0782D4675772E966D4409BA5 659s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-aGaR2m/SSSD-child-24323.pem 659s + found_md5=Modulus=BC67B7286D8107A8CC92A133EDB69C8715D02B20298C3512A729E1D340CDC71067BB61BB726BD5EB351622404A3669F80D0D619F882FD02DBD156F0A159F0D6930F703D92E2165B9BE7D18523F053448AB2B861200516845E5FB270C83CCD057DDEFE6A0FBB5D3CE424E77191DDFBABEDD0AB8BC0782D4675772E966D4409BA5 659s + '[' Modulus=BC67B7286D8107A8CC92A133EDB69C8715D02B20298C3512A729E1D340CDC71067BB61BB726BD5EB351622404A3669F80D0D619F882FD02DBD156F0A159F0D6930F703D92E2165B9BE7D18523F053448AB2B861200516845E5FB270C83CCD057DDEFE6A0FBB5D3CE424E77191DDFBABEDD0AB8BC0782D4675772E966D4409BA5 '!=' Modulus=BC67B7286D8107A8CC92A133EDB69C8715D02B20298C3512A729E1D340CDC71067BB61BB726BD5EB351622404A3669F80D0D619F882FD02DBD156F0A159F0D6930F703D92E2165B9BE7D18523F053448AB2B861200516845E5FB270C83CCD057DDEFE6A0FBB5D3CE424E77191DDFBABEDD0AB8BC0782D4675772E966D4409BA5 ']' 659s + output_file=/tmp/sssd-softhsm2-aGaR2m/SSSD-child-24323-auth.output 659s ++ basename /tmp/sssd-softhsm2-aGaR2m/SSSD-child-24323-auth.output .output 659s + output_cert_file=/tmp/sssd-softhsm2-aGaR2m/SSSD-child-24323-auth.pem 659s + echo -n 053350 659s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-aGaR2m/test-intermediate-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Interme Token' --module_name /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so 659s [p11_child[2329]] [main] (0x0400): p11_child started. 659s [p11_child[2329]] [main] (0x2000): Running in [auth] mode. 659s [p11_child[2329]] [main] (0x2000): Running with effective IDs: [0][0]. 659s [p11_child[2329]] [main] (0x2000): Running with real IDs [0][0]. 659s [p11_child[2329]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 659s [p11_child[2329]] [do_card] (0x4000): Module List: 659s [p11_child[2329]] [do_card] (0x4000): common name: [softhsm2]. 659s [p11_child[2329]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 659s [p11_child[2329]] [do_card] (0x4000): Description [SoftHSM slot ID 0x67e9752a] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 659s [p11_child[2329]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 659s [p11_child[2329]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x67e9752a][1743353130] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 659s [p11_child[2329]] [do_card] (0x4000): Login required. 659s [p11_child[2329]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 659s [p11_child[2329]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 659s [p11_child[2329]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so Test Organization Interme Token Test Organization Interme Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 659s [p11_child[2329]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x67e9752a;slot-manufacturer=SoftHSM%20project;slot-id=1743353130;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=d9f91ef067e9752a;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 659s [p11_child[2329]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 659s [p11_child[2329]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 659s [p11_child[2329]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 659s [p11_child[2329]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 659s [p11_child[2329]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 659s [p11_child[2329]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 659s [p11_child[2329]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 659s [p11_child[2329]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 659s [p11_child[2329]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 659s [p11_child[2329]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 659s [p11_child[2329]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 659s [p11_child[2329]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 659s [p11_child[2329]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 659s [p11_child[2329]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 659s [p11_child[2329]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 659s [p11_child[2329]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 659s [p11_child[2329]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 659s [p11_child[2329]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 659s [p11_child[2329]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 659s [p11_child[2329]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 659s [p11_child[2329]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 659s [p11_child[2329]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 659s [p11_child[2329]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 659s [p11_child[2329]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 659s [p11_child[2329]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 659s [p11_child[2329]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 659s [p11_child[2329]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 659s [p11_child[2329]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 659s [p11_child[2329]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 659s [p11_child[2329]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 659s [p11_child[2329]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 659s [p11_child[2329]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 659s [p11_child[2329]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 659s [p11_child[2329]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 659s [p11_child[2329]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 659s [p11_child[2329]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 659s [p11_child[2329]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 659s [p11_child[2329]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 659s [p11_child[2329]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 659s [p11_child[2329]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 659s [p11_child[2329]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 659s [p11_child[2329]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 659s [p11_child[2329]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 659s [p11_child[2329]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 659s [p11_child[2329]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 659s [p11_child[2329]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 659s [p11_child[2329]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 659s [p11_child[2329]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 659s [p11_child[2329]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 659s [p11_child[2329]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 659s [p11_child[2329]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 659s [p11_child[2329]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 659s [p11_child[2329]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 659s [p11_child[2329]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 659s [p11_child[2329]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 659s [p11_child[2329]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 659s [p11_child[2329]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 659s [p11_child[2329]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 659s [p11_child[2329]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 659s [p11_child[2329]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 659s [p11_child[2329]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 659s [p11_child[2329]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 659s [p11_child[2329]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 659s [p11_child[2329]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 659s [p11_child[2329]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 659s [p11_child[2329]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 659s [p11_child[2329]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 659s [p11_child[2329]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 659s [p11_child[2329]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 659s [p11_child[2329]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 659s [p11_child[2329]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 659s [p11_child[2329]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 659s [p11_child[2329]] [do_card] (0x4000): Certificate verified and validated. 659s [p11_child[2329]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 659s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-aGaR2m/SSSD-child-24323-auth.output 659s + echo '-----BEGIN CERTIFICATE-----' 659s + tail -n1 /tmp/sssd-softhsm2-aGaR2m/SSSD-child-24323-auth.output 659s + echo '-----END CERTIFICATE-----' 659s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-aGaR2m/SSSD-child-24323-auth.pem 659s Certificate: 659s Data: 659s Version: 3 (0x2) 659s Serial Number: 4 (0x4) 659s Signature Algorithm: sha256WithRSAEncryption 659s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 659s Validity 659s Not Before: Mar 24 14:30:13 2024 GMT 659s Not After : Mar 24 14:30:13 2025 GMT 659s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 659s Subject Public Key Info: 659s Public Key Algorithm: rsaEncryption 659s Public-Key: (1024 bit) 659s Modulus: 659s 00:bc:67:b7:28:6d:81:07:a8:cc:92:a1:33:ed:b6: 659s 9c:87:15:d0:2b:20:29:8c:35:12:a7:29:e1:d3:40: 659s cd:c7:10:67:bb:61:bb:72:6b:d5:eb:35:16:22:40: 659s 4a:36:69:f8:0d:0d:61:9f:88:2f:d0:2d:bd:15:6f: 659s 0a:15:9f:0d:69:30:f7:03:d9:2e:21:65:b9:be:7d: 659s 18:52:3f:05:34:48:ab:2b:86:12:00:51:68:45:e5: 659s fb:27:0c:83:cc:d0:57:dd:ef:e6:a0:fb:b5:d3:ce: 659s 42:4e:77:19:1d:df:ba:be:dd:0a:b8:bc:07:82:d4: 659s 67:57:72:e9:66:d4:40:9b:a5 659s Exponent: 65537 (0x10001) 659s X509v3 extensions: 659s X509v3 Authority Key Identifier: 659s 31:FC:B0:C0:3B:5E:07:29:56:E3:5F:CB:E4:72:5A:3C:C9:4C:88:73 659s X509v3 Basic Constraints: 659s CA:FALSE 659s Netscape Cert Type: 659s SSL Client, S/MIME 659s Netscape Comment: 659s Test Organization Intermediate CA trusted Certificate 659s X509v3 Subject Key Identifier: 659s 74:F8:D5:C2:3D:00:9E:7B:0E:C9:7C:DD:FA:B3:69:12:F2:DB:0E:3C 659s X509v3 Key Usage: critical 659s Digital Signature, Non Repudiation, Key Encipherment 659s X509v3 Extended Key Usage: 659s TLS Web Client Authentication, E-mail Protection 659s X509v3 Subject Alternative Name: 659s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 659s Signature Algorithm: sha256WithRSAEncryption 659s Signature Value: 659s 9d:33:07:e7:5b:fe:da:5e:32:e8:f4:bd:9f:9f:50:86:c6:2f: 659s 00:ac:15:55:16:2e:b9:f6:df:3f:a8:a6:18:be:46:ac:ab:27: 659s b1:72:af:41:76:32:c1:43:ab:da:4f:1c:90:69:35:d4:2e:87: 659s ee:e5:07:ff:f8:4f:cc:24:8e:ed:90:e5:b4:12:02:9f:f9:d6: 659s 3f:d7:7b:07:17:50:8b:f3:b1:0e:0a:44:47:df:31:91:90:ee: 659s 25:3d:d1:47:c3:61:67:55:1a:eb:42:8d:11:22:0e:d9:5b:6a: 659s 2d:fb:05:ad:ab:af:fc:42:8b:c7:3e:0b:7b:81:8e:7e:8f:73: 659s c6:df 659s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-aGaR2m/SSSD-child-24323-auth.pem 659s + found_md5=Modulus=BC67B7286D8107A8CC92A133EDB69C8715D02B20298C3512A729E1D340CDC71067BB61BB726BD5EB351622404A3669F80D0D619F882FD02DBD156F0A159F0D6930F703D92E2165B9BE7D18523F053448AB2B861200516845E5FB270C83CCD057DDEFE6A0FBB5D3CE424E77191DDFBABEDD0AB8BC0782D4675772E966D4409BA5 659s + '[' Modulus=BC67B7286D8107A8CC92A133EDB69C8715D02B20298C3512A729E1D340CDC71067BB61BB726BD5EB351622404A3669F80D0D619F882FD02DBD156F0A159F0D6930F703D92E2165B9BE7D18523F053448AB2B861200516845E5FB270C83CCD057DDEFE6A0FBB5D3CE424E77191DDFBABEDD0AB8BC0782D4675772E966D4409BA5 '!=' Modulus=BC67B7286D8107A8CC92A133EDB69C8715D02B20298C3512A729E1D340CDC71067BB61BB726BD5EB351622404A3669F80D0D619F882FD02DBD156F0A159F0D6930F703D92E2165B9BE7D18523F053448AB2B861200516845E5FB270C83CCD057DDEFE6A0FBB5D3CE424E77191DDFBABEDD0AB8BC0782D4675772E966D4409BA5 ']' 659s + invalid_certificate /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-21502 /tmp/sssd-softhsm2-aGaR2m/test-root-CA.pem 659s + check_certificate /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-21502 /tmp/sssd-softhsm2-aGaR2m/test-root-CA.pem 659s + local certificate=/tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-trusted-certificate-0001.pem 659s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-21502 659s + local key_ring=/tmp/sssd-softhsm2-aGaR2m/test-root-CA.pem 659s + local verify_option= 659s + prepare_softhsm2_card /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-21502 659s + local certificate=/tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-trusted-certificate-0001.pem 659s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-21502 659s + local key_cn 659s + local key_name 659s + local tokens_dir 659s + local output_cert_file 659s + token_name= 659s ++ basename /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 659s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 659s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-trusted-certificate-0001.pem 659s ++ sed -n 's/ *commonName *= //p' 659s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 659s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 659s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-aGaR2m/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 659s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-aGaR2m/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 659s ++ basename /tmp/sssd-softhsm2-aGaR2m/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 659s + tokens_dir=/tmp/sssd-softhsm2-aGaR2m/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 659s + token_name='Test Organization Sub Int Token' 659s + '[' '!' -e /tmp/sssd-softhsm2-aGaR2m/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 659s + local key_file 659s + local decrypted_key 659s + mkdir -p /tmp/sssd-softhsm2-aGaR2m/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 659s + key_file=/tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-trusted-certificate-0001-key.pem 659s + decrypted_key=/tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 659s + cat 659s + softhsm2-util --init-token --label 'Test Organization Sub Int Token' --pin 053350 --so-pin 053350 --free 659s Slot 0 has a free/uninitialized token. 659s The token has been initialized and is reassigned to slot 161094254 659s + softhsm2-util --show-slots 659s Available slots: 659s Slot 161094254 659s Slot info: 659s Description: SoftHSM slot ID 0x99a1a6e 659s Manufacturer ID: SoftHSM project 659s Hardware version: 2.6 659s Firmware version: 2.6 659s Token present: yes 659s Token info: 659s Manufacturer ID: SoftHSM project 659s Model: SoftHSM v2 659s Hardware version: 2.6 659s Firmware version: 2.6 659s Serial number: 7c415f52099a1a6e 659s Initialized: yes 659s User PIN init.: yes 659s Label: Test Organization Sub Int Token 659s Slot 1 659s Slot info: 659s Description: SoftHSM slot ID 0x1 659s Manufacturer ID: SoftHSM project 659s Hardware version: 2.6 659s Firmware version: 2.6 659s Token present: yes 659s Token info: 659s Manufacturer ID: SoftHSM project 659s Model: SoftHSM v2 659s Hardware version: 2.6 659s Firmware version: 2.6 659s Serial number: 659s Initialized: no 659s User PIN init.: no 659s Label: 659s + p11tool --provider=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --write --no-mark-private --load-certificate=/tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-trusted-certificate-0001.pem --login --set-pin=053350 --label 'Test Organization Sub Intermediate Trusted Certificate 0001' --id 00112233445566778899FFAABBCCDDEEFF012345 659s + openssl rsa -passin pass:random-sub-intermediate-ca-trusted-cert-0001-21502 -in /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-trusted-certificate-0001-key.pem -out /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 659s writing RSA key 659s + p11tool --provider=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --write --load-privkey=/tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem --login --set-pin=053350 --label 'Test Organization Sub Intermediate Trusted Certificate 0001 Key' --id 00112233445566778899FFAABBCCDDEEFF012345 659s + rm /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 659s + p11tool --provider=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --list-all 659s Object 0: 659s URL: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7c415f52099a1a6e;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert 659s Type: X.509 Certificate (RSA-1024) 659s Expires: Mon Mar 24 14:30:13 2025 659s Label: Test Organization Sub Intermediate Trusted Certificate 0001 659s ID: 00:11:22:33:44:55:66:77:88:99:ff:aa:bb:cc:dd:ee:ff:01:23:45 659s 659s + echo 'Test Organization Sub Int Token' 659s Test Organization Sub Int Token 659s + '[' -n '' ']' 659s + local output_base_name=SSSD-child-28793 659s + local output_file=/tmp/sssd-softhsm2-aGaR2m/SSSD-child-28793.output 659s + output_cert_file=/tmp/sssd-softhsm2-aGaR2m/SSSD-child-28793.pem 659s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-aGaR2m/test-root-CA.pem 659s [p11_child[2348]] [main] (0x0400): p11_child started. 659s [p11_child[2348]] [main] (0x2000): Running in [pre-auth] mode. 659s [p11_child[2348]] [main] (0x2000): Running with effective IDs: [0][0]. 659s [p11_child[2348]] [main] (0x2000): Running with real IDs [0][0]. 659s [p11_child[2348]] [do_card] (0x4000): Module List: 659s [p11_child[2348]] [do_card] (0x4000): common name: [softhsm2]. 659s [p11_child[2348]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 659s [p11_child[2348]] [do_card] (0x4000): Description [SoftHSM slot ID 0x99a1a6e] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 659s [p11_child[2348]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 659s [p11_child[2348]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x99a1a6e][161094254] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 659s [p11_child[2348]] [do_card] (0x4000): Login NOT required. 659s [p11_child[2348]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 659s [p11_child[2348]] [do_verification] (0x0040): X509_verify_cert failed [0]. 659s [p11_child[2348]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 659s [p11_child[2348]] [read_certs] (0x0040): Certificate [Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] not valid, skipping. 659s [p11_child[2348]] [do_card] (0x4000): No certificate found. 659s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-aGaR2m/SSSD-child-28793.output 659s + return 2 659s + invalid_certificate /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-21502 /tmp/sssd-softhsm2-aGaR2m/test-root-CA.pem partial_chain 659s + check_certificate /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-21502 /tmp/sssd-softhsm2-aGaR2m/test-root-CA.pem partial_chain 659s + local certificate=/tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-trusted-certificate-0001.pem 659s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-21502 659s + local key_ring=/tmp/sssd-softhsm2-aGaR2m/test-root-CA.pem 659s + local verify_option=partial_chain 659s + prepare_softhsm2_card /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-21502 659s + local certificate=/tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-trusted-certificate-0001.pem 659s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-21502 659s + local key_cn 659s + local key_name 659s + local tokens_dir 659s + local output_cert_file 659s + token_name= 659s ++ basename /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 659s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 659s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-trusted-certificate-0001.pem 659s ++ sed -n 's/ *commonName *= //p' 659s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 659s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 659s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-aGaR2m/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 659s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-aGaR2m/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 659s ++ basename /tmp/sssd-softhsm2-aGaR2m/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 659s + tokens_dir=/tmp/sssd-softhsm2-aGaR2m/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 659s + token_name='Test Organization Sub Int Token' 659s + '[' '!' -e /tmp/sssd-softhsm2-aGaR2m/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 659s + '[' '!' -d /tmp/sssd-softhsm2-aGaR2m/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 659s Test Organization Sub Int Token 659s + echo 'Test Organization Sub Int Token' 659s + '[' -n partial_chain ']' 659s + local verify_arg=--verify=partial_chain 659s + local output_base_name=SSSD-child-22986 659s + local output_file=/tmp/sssd-softhsm2-aGaR2m/SSSD-child-22986.output 659s + output_cert_file=/tmp/sssd-softhsm2-aGaR2m/SSSD-child-22986.pem 659s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-aGaR2m/test-root-CA.pem 659s [p11_child[2355]] [main] (0x0400): p11_child started. 659s [p11_child[2355]] [main] (0x2000): Running in [pre-auth] mode. 659s [p11_child[2355]] [main] (0x2000): Running with effective IDs: [0][0]. 659s [p11_child[2355]] [main] (0x2000): Running with real IDs [0][0]. 659s [p11_child[2355]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 659s [p11_child[2355]] [do_card] (0x4000): Module List: 659s [p11_child[2355]] [do_card] (0x4000): common name: [softhsm2]. 659s [p11_child[2355]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 659s [p11_child[2355]] [do_card] (0x4000): Description [SoftHSM slot ID 0x99a1a6e] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 659s [p11_child[2355]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 659s [p11_child[2355]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x99a1a6e][161094254] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 659s [p11_child[2355]] [do_card] (0x4000): Login NOT required. 659s [p11_child[2355]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 659s [p11_child[2355]] [do_verification] (0x0040): X509_verify_cert failed [0]. 659s [p11_child[2355]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 659s [p11_child[2355]] [read_certs] (0x0040): Certificate [Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] not valid, skipping. 659s [p11_child[2355]] [do_card] (0x4000): No certificate found. 659s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-aGaR2m/SSSD-child-22986.output 659s + return 2 659s + valid_certificate /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-21502 /tmp/sssd-softhsm2-aGaR2m/test-full-chain-CA.pem 659s + check_certificate /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-21502 /tmp/sssd-softhsm2-aGaR2m/test-full-chain-CA.pem 659s + local certificate=/tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-trusted-certificate-0001.pem 659s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-21502 659s + local key_ring=/tmp/sssd-softhsm2-aGaR2m/test-full-chain-CA.pem 659s + local verify_option= 659s + prepare_softhsm2_card /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-21502 659s + local certificate=/tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-trusted-certificate-0001.pem 659s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-21502 659s + local key_cn 659s + local key_name 659s + local tokens_dir 659s + local output_cert_file 659s + token_name= 659s ++ basename /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 659s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 659s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-trusted-certificate-0001.pem 659s ++ sed -n 's/ *commonName *= //p' 659s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 659s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 659s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-aGaR2m/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 659s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-aGaR2m/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 659s ++ basename /tmp/sssd-softhsm2-aGaR2m/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 659s + tokens_dir=/tmp/sssd-softhsm2-aGaR2m/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 659s + token_name='Test Organization Sub Int Token' 659s + '[' '!' -e /tmp/sssd-softhsm2-aGaR2m/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 659s + '[' '!' -d /tmp/sssd-softhsm2-aGaR2m/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 659s + echo 'Test Organization Sub Int Token' 659s + '[' -n '' ']' 659s + local output_base_name=SSSD-child-25020 659s + local output_file=/tmp/sssd-softhsm2-aGaR2m/SSSD-child-25020.output 659s + output_cert_file=/tmp/sssd-softhsm2-aGaR2m/SSSD-child-25020.pem 659s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-aGaR2m/test-full-chain-CA.pem 659s Test Organization Sub Int Token 659s [p11_child[2362]] [main] (0x0400): p11_child started. 659s [p11_child[2362]] [main] (0x2000): Running in [pre-auth] mode. 659s [p11_child[2362]] [main] (0x2000): Running with effective IDs: [0][0]. 659s [p11_child[2362]] [main] (0x2000): Running with real IDs [0][0]. 659s [p11_child[2362]] [do_card] (0x4000): Module List: 659s [p11_child[2362]] [do_card] (0x4000): common name: [softhsm2]. 659s [p11_child[2362]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 659s [p11_child[2362]] [do_card] (0x4000): Description [SoftHSM slot ID 0x99a1a6e] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 659s [p11_child[2362]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 659s [p11_child[2362]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x99a1a6e][161094254] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 659s [p11_child[2362]] [do_card] (0x4000): Login NOT required. 659s [p11_child[2362]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 659s [p11_child[2362]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 659s [p11_child[2362]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Sub Int Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 659s [p11_child[2362]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x99a1a6e;slot-manufacturer=SoftHSM%20project;slot-id=161094254;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7c415f52099a1a6e;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 659s [p11_child[2362]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 659s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-aGaR2m/SSSD-child-25020.output 659s + echo '-----BEGIN CERTIFICATE-----' 659s + tail -n1 /tmp/sssd-softhsm2-aGaR2m/SSSD-child-25020.output 659s + echo '-----END CERTIFICATE-----' 659s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-aGaR2m/SSSD-child-25020.pem 659s + local found_md5 expected_md5 659s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-trusted-certificate-0001.pem 659s Certificate: 659s Data: 659s Version: 3 (0x2) 659s Serial Number: 5 (0x5) 659s Signature Algorithm: sha256WithRSAEncryption 659s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 659s Validity 659s Not Before: Mar 24 14:30:13 2024 GMT 659s Not After : Mar 24 14:30:13 2025 GMT 659s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 659s Subject Public Key Info: 659s Public Key Algorithm: rsaEncryption 659s Public-Key: (1024 bit) 659s Modulus: 659s 00:b4:5d:09:2d:64:33:ed:23:ae:89:5e:39:49:af: 659s 04:be:46:0f:69:7a:f6:3c:d0:31:a6:b7:72:35:a3: 659s a6:77:4c:94:cb:ef:e6:60:c9:fd:9a:be:39:4b:64: 659s ca:9e:98:b7:5a:f9:7b:a4:92:8b:b3:0f:94:da:f9: 659s 59:f3:a0:30:36:78:a8:52:21:ed:da:39:24:0d:1e: 659s 5e:2c:45:a3:a7:18:8a:05:ea:5a:70:4f:a0:84:e8: 659s ec:6d:70:d5:0f:1e:03:1c:28:1f:60:a4:1a:02:50: 659s cc:36:4b:7a:86:9d:bc:cc:21:c6:f4:d4:26:59:1f: 659s a1:c2:b3:0e:14:3a:16:b4:33 659s Exponent: 65537 (0x10001) 659s X509v3 extensions: 659s X509v3 Authority Key Identifier: 659s 5A:CC:9F:9F:88:9C:44:29:40:06:6B:A7:1C:C2:ED:65:BE:8F:AC:4D 659s X509v3 Basic Constraints: 659s CA:FALSE 659s Netscape Cert Type: 659s SSL Client, S/MIME 659s Netscape Comment: 659s Test Organization Sub Intermediate CA trusted Certificate 659s X509v3 Subject Key Identifier: 659s EA:AC:49:6C:AE:DC:32:E5:9C:AF:68:64:1D:2C:3E:E6:31:34:73:29 659s X509v3 Key Usage: critical 659s Digital Signature, Non Repudiation, Key Encipherment 659s X509v3 Extended Key Usage: 659s TLS Web Client Authentication, E-mail Protection 659s X509v3 Subject Alternative Name: 659s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 659s Signature Algorithm: sha256WithRSAEncryption 659s Signature Value: 659s 59:07:a0:ee:49:80:54:67:c5:2d:1f:55:06:f3:7b:a6:3e:a2: 659s 92:48:68:67:d5:e9:97:46:c0:62:9f:56:eb:26:fc:71:52:2e: 659s 07:f6:a6:89:d8:62:54:c3:42:d8:b6:bc:29:3a:b9:9b:16:ff: 659s 0a:7b:c5:ed:c7:63:a9:6d:f3:69:ba:0e:8f:c0:04:da:24:4c: 659s 17:79:18:a0:c4:ed:e3:50:d2:76:c6:8d:77:3e:c4:55:74:63: 659s a2:8f:ce:b3:75:1d:47:cb:2c:21:86:94:85:0e:0f:cd:c7:c5: 659s 06:9a:54:25:5c:cb:2b:51:54:5a:aa:0c:ae:98:25:7d:29:e1: 659s 78:47 659s + expected_md5=Modulus=B45D092D6433ED23AE895E3949AF04BE460F697AF63CD031A6B77235A3A6774C94CBEFE660C9FD9ABE394B64CA9E98B75AF97BA4928BB30F94DAF959F3A0303678A85221EDDA39240D1E5E2C45A3A7188A05EA5A704FA084E8EC6D70D50F1E031C281F60A41A0250CC364B7A869DBCCC21C6F4D426591FA1C2B30E143A16B433 659s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-aGaR2m/SSSD-child-25020.pem 659s + found_md5=Modulus=B45D092D6433ED23AE895E3949AF04BE460F697AF63CD031A6B77235A3A6774C94CBEFE660C9FD9ABE394B64CA9E98B75AF97BA4928BB30F94DAF959F3A0303678A85221EDDA39240D1E5E2C45A3A7188A05EA5A704FA084E8EC6D70D50F1E031C281F60A41A0250CC364B7A869DBCCC21C6F4D426591FA1C2B30E143A16B433 659s + '[' Modulus=B45D092D6433ED23AE895E3949AF04BE460F697AF63CD031A6B77235A3A6774C94CBEFE660C9FD9ABE394B64CA9E98B75AF97BA4928BB30F94DAF959F3A0303678A85221EDDA39240D1E5E2C45A3A7188A05EA5A704FA084E8EC6D70D50F1E031C281F60A41A0250CC364B7A869DBCCC21C6F4D426591FA1C2B30E143A16B433 '!=' Modulus=B45D092D6433ED23AE895E3949AF04BE460F697AF63CD031A6B77235A3A6774C94CBEFE660C9FD9ABE394B64CA9E98B75AF97BA4928BB30F94DAF959F3A0303678A85221EDDA39240D1E5E2C45A3A7188A05EA5A704FA084E8EC6D70D50F1E031C281F60A41A0250CC364B7A869DBCCC21C6F4D426591FA1C2B30E143A16B433 ']' 659s + output_file=/tmp/sssd-softhsm2-aGaR2m/SSSD-child-25020-auth.output 659s ++ basename /tmp/sssd-softhsm2-aGaR2m/SSSD-child-25020-auth.output .output 659s + output_cert_file=/tmp/sssd-softhsm2-aGaR2m/SSSD-child-25020-auth.pem 659s + echo -n 053350 659s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-aGaR2m/test-full-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 '' --token_name 'Test Organization Sub Int Token' --module_name /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so 659s [p11_child[2370]] [main] (0x0400): p11_child started. 659s [p11_child[2370]] [main] (0x2000): Running in [auth] mode. 659s [p11_child[2370]] [main] (0x2000): Running with effective IDs: [0][0]. 659s [p11_child[2370]] [main] (0x2000): Running with real IDs [0][0]. 659s [p11_child[2370]] [do_card] (0x4000): Module List: 659s [p11_child[2370]] [do_card] (0x4000): common name: [softhsm2]. 659s [p11_child[2370]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 659s [p11_child[2370]] [do_card] (0x4000): Description [SoftHSM slot ID 0x99a1a6e] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 659s [p11_child[2370]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 659s [p11_child[2370]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x99a1a6e][161094254] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 659s [p11_child[2370]] [do_card] (0x4000): Login required. 659s [p11_child[2370]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 659s [p11_child[2370]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 659s [p11_child[2370]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so Test Organization Sub Int Token Test Organization Sub Int Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 659s [p11_child[2370]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x99a1a6e;slot-manufacturer=SoftHSM%20project;slot-id=161094254;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7c415f52099a1a6e;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 659s [p11_child[2370]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 659s [p11_child[2370]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 659s [p11_child[2370]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 659s [p11_child[2370]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 659s [p11_child[2370]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 659s [p11_child[2370]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 659s [p11_child[2370]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 659s [p11_child[2370]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 659s [p11_child[2370]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 659s [p11_child[2370]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 659s [p11_child[2370]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 659s [p11_child[2370]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 659s [p11_child[2370]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 659s [p11_child[2370]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 659s [p11_child[2370]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 659s [p11_child[2370]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 659s [p11_child[2370]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 659s [p11_child[2370]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 659s [p11_child[2370]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 659s [p11_child[2370]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 659s [p11_child[2370]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 659s [p11_child[2370]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 659s [p11_child[2370]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 659s [p11_child[2370]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 659s [p11_child[2370]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 659s [p11_child[2370]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 659s [p11_child[2370]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 659s [p11_child[2370]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 659s [p11_child[2370]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 659s [p11_child[2370]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 659s [p11_child[2370]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 659s [p11_child[2370]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 659s [p11_child[2370]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 659s [p11_child[2370]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 659s [p11_child[2370]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 659s [p11_child[2370]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 659s [p11_child[2370]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 659s [p11_child[2370]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 659s [p11_child[2370]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 659s [p11_child[2370]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 659s [p11_child[2370]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 659s [p11_child[2370]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 659s [p11_child[2370]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 659s [p11_child[2370]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 659s [p11_child[2370]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 659s [p11_child[2370]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 659s [p11_child[2370]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 659s [p11_child[2370]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 659s [p11_child[2370]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 659s [p11_child[2370]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 659s [p11_child[2370]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 659s [p11_child[2370]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 659s [p11_child[2370]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 659s [p11_child[2370]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 659s [p11_child[2370]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 659s [p11_child[2370]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 659s [p11_child[2370]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 659s [p11_child[2370]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 659s [p11_child[2370]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 659s [p11_child[2370]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 659s [p11_child[2370]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 659s [p11_child[2370]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 659s [p11_child[2370]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 659s [p11_child[2370]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 659s [p11_child[2370]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 659s [p11_child[2370]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 659s [p11_child[2370]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 659s [p11_child[2370]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 659s [p11_child[2370]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 659s [p11_child[2370]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 659s [p11_child[2370]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 659s [p11_child[2370]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 659s [p11_child[2370]] [do_card] (0x4000): Certificate verified and validated. 659s [p11_child[2370]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 659s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-aGaR2m/SSSD-child-25020-auth.output 659s + echo '-----BEGIN CERTIFICATE-----' 659s + tail -n1 /tmp/sssd-softhsm2-aGaR2m/SSSD-child-25020-auth.output 659s + echo '-----END CERTIFICATE-----' 659s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-aGaR2m/SSSD-child-25020-auth.pem 659s Certificate: 659s Data: 659s Version: 3 (0x2) 659s Serial Number: 5 (0x5) 659s Signature Algorithm: sha256WithRSAEncryption 659s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 659s Validity 659s Not Before: Mar 24 14:30:13 2024 GMT 659s Not After : Mar 24 14:30:13 2025 GMT 659s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 659s Subject Public Key Info: 659s Public Key Algorithm: rsaEncryption 659s Public-Key: (1024 bit) 659s Modulus: 659s 00:b4:5d:09:2d:64:33:ed:23:ae:89:5e:39:49:af: 659s 04:be:46:0f:69:7a:f6:3c:d0:31:a6:b7:72:35:a3: 659s a6:77:4c:94:cb:ef:e6:60:c9:fd:9a:be:39:4b:64: 659s ca:9e:98:b7:5a:f9:7b:a4:92:8b:b3:0f:94:da:f9: 659s 59:f3:a0:30:36:78:a8:52:21:ed:da:39:24:0d:1e: 659s 5e:2c:45:a3:a7:18:8a:05:ea:5a:70:4f:a0:84:e8: 659s ec:6d:70:d5:0f:1e:03:1c:28:1f:60:a4:1a:02:50: 659s cc:36:4b:7a:86:9d:bc:cc:21:c6:f4:d4:26:59:1f: 659s a1:c2:b3:0e:14:3a:16:b4:33 659s Exponent: 65537 (0x10001) 659s X509v3 extensions: 659s X509v3 Authority Key Identifier: 659s 5A:CC:9F:9F:88:9C:44:29:40:06:6B:A7:1C:C2:ED:65:BE:8F:AC:4D 659s X509v3 Basic Constraints: 659s CA:FALSE 659s Netscape Cert Type: 659s SSL Client, S/MIME 659s Netscape Comment: 659s Test Organization Sub Intermediate CA trusted Certificate 659s X509v3 Subject Key Identifier: 659s EA:AC:49:6C:AE:DC:32:E5:9C:AF:68:64:1D:2C:3E:E6:31:34:73:29 659s X509v3 Key Usage: critical 659s Digital Signature, Non Repudiation, Key Encipherment 659s X509v3 Extended Key Usage: 659s TLS Web Client Authentication, E-mail Protection 659s X509v3 Subject Alternative Name: 659s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 659s Signature Algorithm: sha256WithRSAEncryption 659s Signature Value: 659s 59:07:a0:ee:49:80:54:67:c5:2d:1f:55:06:f3:7b:a6:3e:a2: 659s 92:48:68:67:d5:e9:97:46:c0:62:9f:56:eb:26:fc:71:52:2e: 659s 07:f6:a6:89:d8:62:54:c3:42:d8:b6:bc:29:3a:b9:9b:16:ff: 659s 0a:7b:c5:ed:c7:63:a9:6d:f3:69:ba:0e:8f:c0:04:da:24:4c: 659s 17:79:18:a0:c4:ed:e3:50:d2:76:c6:8d:77:3e:c4:55:74:63: 659s a2:8f:ce:b3:75:1d:47:cb:2c:21:86:94:85:0e:0f:cd:c7:c5: 659s 06:9a:54:25:5c:cb:2b:51:54:5a:aa:0c:ae:98:25:7d:29:e1: 659s 78:47 659s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-aGaR2m/SSSD-child-25020-auth.pem 659s + found_md5=Modulus=B45D092D6433ED23AE895E3949AF04BE460F697AF63CD031A6B77235A3A6774C94CBEFE660C9FD9ABE394B64CA9E98B75AF97BA4928BB30F94DAF959F3A0303678A85221EDDA39240D1E5E2C45A3A7188A05EA5A704FA084E8EC6D70D50F1E031C281F60A41A0250CC364B7A869DBCCC21C6F4D426591FA1C2B30E143A16B433 659s + '[' Modulus=B45D092D6433ED23AE895E3949AF04BE460F697AF63CD031A6B77235A3A6774C94CBEFE660C9FD9ABE394B64CA9E98B75AF97BA4928BB30F94DAF959F3A0303678A85221EDDA39240D1E5E2C45A3A7188A05EA5A704FA084E8EC6D70D50F1E031C281F60A41A0250CC364B7A869DBCCC21C6F4D426591FA1C2B30E143A16B433 '!=' Modulus=B45D092D6433ED23AE895E3949AF04BE460F697AF63CD031A6B77235A3A6774C94CBEFE660C9FD9ABE394B64CA9E98B75AF97BA4928BB30F94DAF959F3A0303678A85221EDDA39240D1E5E2C45A3A7188A05EA5A704FA084E8EC6D70D50F1E031C281F60A41A0250CC364B7A869DBCCC21C6F4D426591FA1C2B30E143A16B433 ']' 659s + valid_certificate /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-21502 /tmp/sssd-softhsm2-aGaR2m/test-full-chain-CA.pem partial_chain 659s + check_certificate /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-21502 /tmp/sssd-softhsm2-aGaR2m/test-full-chain-CA.pem partial_chain 659s + local certificate=/tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-trusted-certificate-0001.pem 659s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-21502 659s + local key_ring=/tmp/sssd-softhsm2-aGaR2m/test-full-chain-CA.pem 659s + local verify_option=partial_chain 659s + prepare_softhsm2_card /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-21502 659s + local certificate=/tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-trusted-certificate-0001.pem 659s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-21502 659s + local key_cn 659s + local key_name 659s + local tokens_dir 659s + local output_cert_file 659s + token_name= 659s ++ basename /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 659s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 659s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-trusted-certificate-0001.pem 659s ++ sed -n 's/ *commonName *= //p' 659s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 659s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 659s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-aGaR2m/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 659s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-aGaR2m/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 659s ++ basename /tmp/sssd-softhsm2-aGaR2m/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 659s + tokens_dir=/tmp/sssd-softhsm2-aGaR2m/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 659s + token_name='Test Organization Sub Int Token' 659s + '[' '!' -e /tmp/sssd-softhsm2-aGaR2m/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 659s + '[' '!' -d /tmp/sssd-softhsm2-aGaR2m/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 659s + echo 'Test Organization Sub Int Token' 659s + '[' -n partial_chain ']' 659s + local verify_arg=--verify=partial_chain 659s + local output_base_name=SSSD-child-19427 659s + local output_file=/tmp/sssd-softhsm2-aGaR2m/SSSD-child-19427.output 659s + output_cert_file=/tmp/sssd-softhsm2-aGaR2m/SSSD-child-19427.pem 659s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-aGaR2m/test-full-chain-CA.pem 659s Test Organization Sub Int Token 659s [p11_child[2380]] [main] (0x0400): p11_child started. 659s [p11_child[2380]] [main] (0x2000): Running in [pre-auth] mode. 659s [p11_child[2380]] [main] (0x2000): Running with effective IDs: [0][0]. 659s [p11_child[2380]] [main] (0x2000): Running with real IDs [0][0]. 659s [p11_child[2380]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 659s [p11_child[2380]] [do_card] (0x4000): Module List: 659s [p11_child[2380]] [do_card] (0x4000): common name: [softhsm2]. 659s [p11_child[2380]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 659s [p11_child[2380]] [do_card] (0x4000): Description [SoftHSM slot ID 0x99a1a6e] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 659s [p11_child[2380]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 659s [p11_child[2380]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x99a1a6e][161094254] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 659s [p11_child[2380]] [do_card] (0x4000): Login NOT required. 659s [p11_child[2380]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 659s [p11_child[2380]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 659s [p11_child[2380]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Sub Int Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 659s [p11_child[2380]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x99a1a6e;slot-manufacturer=SoftHSM%20project;slot-id=161094254;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7c415f52099a1a6e;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 659s [p11_child[2380]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 659s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-aGaR2m/SSSD-child-19427.output 659s + echo '-----BEGIN CERTIFICATE-----' 659s + tail -n1 /tmp/sssd-softhsm2-aGaR2m/SSSD-child-19427.output 659s + echo '-----END CERTIFICATE-----' 659s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-aGaR2m/SSSD-child-19427.pem 659s + local found_md5 expected_md5 659s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-trusted-certificate-0001.pem 659s Certificate: 659s Data: 659s Version: 3 (0x2) 659s Serial Number: 5 (0x5) 659s Signature Algorithm: sha256WithRSAEncryption 659s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 659s Validity 659s Not Before: Mar 24 14:30:13 2024 GMT 659s Not After : Mar 24 14:30:13 2025 GMT 659s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 659s Subject Public Key Info: 659s Public Key Algorithm: rsaEncryption 659s Public-Key: (1024 bit) 659s Modulus: 659s 00:b4:5d:09:2d:64:33:ed:23:ae:89:5e:39:49:af: 659s 04:be:46:0f:69:7a:f6:3c:d0:31:a6:b7:72:35:a3: 659s a6:77:4c:94:cb:ef:e6:60:c9:fd:9a:be:39:4b:64: 659s ca:9e:98:b7:5a:f9:7b:a4:92:8b:b3:0f:94:da:f9: 659s 59:f3:a0:30:36:78:a8:52:21:ed:da:39:24:0d:1e: 659s 5e:2c:45:a3:a7:18:8a:05:ea:5a:70:4f:a0:84:e8: 659s ec:6d:70:d5:0f:1e:03:1c:28:1f:60:a4:1a:02:50: 659s cc:36:4b:7a:86:9d:bc:cc:21:c6:f4:d4:26:59:1f: 659s a1:c2:b3:0e:14:3a:16:b4:33 659s Exponent: 65537 (0x10001) 659s X509v3 extensions: 659s X509v3 Authority Key Identifier: 659s 5A:CC:9F:9F:88:9C:44:29:40:06:6B:A7:1C:C2:ED:65:BE:8F:AC:4D 659s X509v3 Basic Constraints: 659s CA:FALSE 659s Netscape Cert Type: 659s SSL Client, S/MIME 659s Netscape Comment: 659s Test Organization Sub Intermediate CA trusted Certificate 659s X509v3 Subject Key Identifier: 659s EA:AC:49:6C:AE:DC:32:E5:9C:AF:68:64:1D:2C:3E:E6:31:34:73:29 659s X509v3 Key Usage: critical 659s Digital Signature, Non Repudiation, Key Encipherment 659s X509v3 Extended Key Usage: 659s TLS Web Client Authentication, E-mail Protection 659s X509v3 Subject Alternative Name: 659s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 659s Signature Algorithm: sha256WithRSAEncryption 659s Signature Value: 659s 59:07:a0:ee:49:80:54:67:c5:2d:1f:55:06:f3:7b:a6:3e:a2: 659s 92:48:68:67:d5:e9:97:46:c0:62:9f:56:eb:26:fc:71:52:2e: 659s 07:f6:a6:89:d8:62:54:c3:42:d8:b6:bc:29:3a:b9:9b:16:ff: 659s 0a:7b:c5:ed:c7:63:a9:6d:f3:69:ba:0e:8f:c0:04:da:24:4c: 659s 17:79:18:a0:c4:ed:e3:50:d2:76:c6:8d:77:3e:c4:55:74:63: 659s a2:8f:ce:b3:75:1d:47:cb:2c:21:86:94:85:0e:0f:cd:c7:c5: 659s 06:9a:54:25:5c:cb:2b:51:54:5a:aa:0c:ae:98:25:7d:29:e1: 659s 78:47 659s + expected_md5=Modulus=B45D092D6433ED23AE895E3949AF04BE460F697AF63CD031A6B77235A3A6774C94CBEFE660C9FD9ABE394B64CA9E98B75AF97BA4928BB30F94DAF959F3A0303678A85221EDDA39240D1E5E2C45A3A7188A05EA5A704FA084E8EC6D70D50F1E031C281F60A41A0250CC364B7A869DBCCC21C6F4D426591FA1C2B30E143A16B433 659s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-aGaR2m/SSSD-child-19427.pem 659s + found_md5=Modulus=B45D092D6433ED23AE895E3949AF04BE460F697AF63CD031A6B77235A3A6774C94CBEFE660C9FD9ABE394B64CA9E98B75AF97BA4928BB30F94DAF959F3A0303678A85221EDDA39240D1E5E2C45A3A7188A05EA5A704FA084E8EC6D70D50F1E031C281F60A41A0250CC364B7A869DBCCC21C6F4D426591FA1C2B30E143A16B433 659s + '[' Modulus=B45D092D6433ED23AE895E3949AF04BE460F697AF63CD031A6B77235A3A6774C94CBEFE660C9FD9ABE394B64CA9E98B75AF97BA4928BB30F94DAF959F3A0303678A85221EDDA39240D1E5E2C45A3A7188A05EA5A704FA084E8EC6D70D50F1E031C281F60A41A0250CC364B7A869DBCCC21C6F4D426591FA1C2B30E143A16B433 '!=' Modulus=B45D092D6433ED23AE895E3949AF04BE460F697AF63CD031A6B77235A3A6774C94CBEFE660C9FD9ABE394B64CA9E98B75AF97BA4928BB30F94DAF959F3A0303678A85221EDDA39240D1E5E2C45A3A7188A05EA5A704FA084E8EC6D70D50F1E031C281F60A41A0250CC364B7A869DBCCC21C6F4D426591FA1C2B30E143A16B433 ']' 659s + output_file=/tmp/sssd-softhsm2-aGaR2m/SSSD-child-19427-auth.output 659s ++ basename /tmp/sssd-softhsm2-aGaR2m/SSSD-child-19427-auth.output .output 659s + output_cert_file=/tmp/sssd-softhsm2-aGaR2m/SSSD-child-19427-auth.pem 659s + echo -n 053350 659s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-aGaR2m/test-full-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Sub Int Token' --module_name /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so 659s [p11_child[2388]] [main] (0x0400): p11_child started. 659s [p11_child[2388]] [main] (0x2000): Running in [auth] mode. 659s [p11_child[2388]] [main] (0x2000): Running with effective IDs: [0][0]. 659s [p11_child[2388]] [main] (0x2000): Running with real IDs [0][0]. 659s [p11_child[2388]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 660s [p11_child[2388]] [do_card] (0x4000): Module List: 660s [p11_child[2388]] [do_card] (0x4000): common name: [softhsm2]. 660s [p11_child[2388]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 660s [p11_child[2388]] [do_card] (0x4000): Description [SoftHSM slot ID 0x99a1a6e] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 660s [p11_child[2388]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 660s [p11_child[2388]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x99a1a6e][161094254] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 660s [p11_child[2388]] [do_card] (0x4000): Login required. 660s [p11_child[2388]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 660s [p11_child[2388]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 660s [p11_child[2388]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so Test Organization Sub Int Token Test Organization Sub Int Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 660s [p11_child[2388]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x99a1a6e;slot-manufacturer=SoftHSM%20project;slot-id=161094254;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7c415f52099a1a6e;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 660s [p11_child[2388]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 660s [p11_child[2388]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 660s [p11_child[2388]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 660s [p11_child[2388]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 660s [p11_child[2388]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 660s [p11_child[2388]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 660s [p11_child[2388]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 660s [p11_child[2388]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 660s [p11_child[2388]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 660s [p11_child[2388]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 660s [p11_child[2388]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 660s [p11_child[2388]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 660s [p11_child[2388]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 660s [p11_child[2388]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 660s [p11_child[2388]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 660s [p11_child[2388]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 660s [p11_child[2388]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 660s [p11_child[2388]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 660s [p11_child[2388]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 660s [p11_child[2388]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 660s [p11_child[2388]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 660s [p11_child[2388]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 660s [p11_child[2388]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 660s [p11_child[2388]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 660s [p11_child[2388]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 660s [p11_child[2388]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 660s [p11_child[2388]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 660s [p11_child[2388]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 660s [p11_child[2388]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 660s [p11_child[2388]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 660s [p11_child[2388]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 660s [p11_child[2388]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 660s [p11_child[2388]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 660s [p11_child[2388]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 660s [p11_child[2388]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 660s [p11_child[2388]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 660s [p11_child[2388]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 660s [p11_child[2388]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 660s [p11_child[2388]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 660s [p11_child[2388]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 660s [p11_child[2388]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 660s [p11_child[2388]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 660s [p11_child[2388]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 660s [p11_child[2388]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 660s [p11_child[2388]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 660s [p11_child[2388]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 660s [p11_child[2388]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 660s [p11_child[2388]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 660s [p11_child[2388]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 660s [p11_child[2388]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 660s [p11_child[2388]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 660s [p11_child[2388]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 660s [p11_child[2388]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 660s [p11_child[2388]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 660s [p11_child[2388]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 660s [p11_child[2388]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 660s [p11_child[2388]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 660s [p11_child[2388]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 660s [p11_child[2388]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 660s [p11_child[2388]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 660s [p11_child[2388]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 660s [p11_child[2388]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 660s [p11_child[2388]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 660s [p11_child[2388]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 660s [p11_child[2388]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 660s [p11_child[2388]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 660s [p11_child[2388]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 660s [p11_child[2388]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 660s [p11_child[2388]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 660s [p11_child[2388]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 660s [p11_child[2388]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 660s [p11_child[2388]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 660s [p11_child[2388]] [do_card] (0x4000): Certificate verified and validated. 660s [p11_child[2388]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 660s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-aGaR2m/SSSD-child-19427-auth.output 660s + echo '-----BEGIN CERTIFICATE-----' 660s + tail -n1 /tmp/sssd-softhsm2-aGaR2m/SSSD-child-19427-auth.output 660s + echo '-----END CERTIFICATE-----' 660s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-aGaR2m/SSSD-child-19427-auth.pem 660s Certificate: 660s Data: 660s Version: 3 (0x2) 660s Serial Number: 5 (0x5) 660s Signature Algorithm: sha256WithRSAEncryption 660s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 660s Validity 660s Not Before: Mar 24 14:30:13 2024 GMT 660s Not After : Mar 24 14:30:13 2025 GMT 660s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 660s Subject Public Key Info: 660s Public Key Algorithm: rsaEncryption 660s Public-Key: (1024 bit) 660s Modulus: 660s 00:b4:5d:09:2d:64:33:ed:23:ae:89:5e:39:49:af: 660s 04:be:46:0f:69:7a:f6:3c:d0:31:a6:b7:72:35:a3: 660s a6:77:4c:94:cb:ef:e6:60:c9:fd:9a:be:39:4b:64: 660s ca:9e:98:b7:5a:f9:7b:a4:92:8b:b3:0f:94:da:f9: 660s 59:f3:a0:30:36:78:a8:52:21:ed:da:39:24:0d:1e: 660s 5e:2c:45:a3:a7:18:8a:05:ea:5a:70:4f:a0:84:e8: 660s ec:6d:70:d5:0f:1e:03:1c:28:1f:60:a4:1a:02:50: 660s cc:36:4b:7a:86:9d:bc:cc:21:c6:f4:d4:26:59:1f: 660s a1:c2:b3:0e:14:3a:16:b4:33 660s Exponent: 65537 (0x10001) 660s X509v3 extensions: 660s X509v3 Authority Key Identifier: 660s 5A:CC:9F:9F:88:9C:44:29:40:06:6B:A7:1C:C2:ED:65:BE:8F:AC:4D 660s X509v3 Basic Constraints: 660s CA:FALSE 660s Netscape Cert Type: 660s SSL Client, S/MIME 660s Netscape Comment: 660s Test Organization Sub Intermediate CA trusted Certificate 660s X509v3 Subject Key Identifier: 660s EA:AC:49:6C:AE:DC:32:E5:9C:AF:68:64:1D:2C:3E:E6:31:34:73:29 660s X509v3 Key Usage: critical 660s Digital Signature, Non Repudiation, Key Encipherment 660s X509v3 Extended Key Usage: 660s TLS Web Client Authentication, E-mail Protection 660s X509v3 Subject Alternative Name: 660s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 660s Signature Algorithm: sha256WithRSAEncryption 660s Signature Value: 660s 59:07:a0:ee:49:80:54:67:c5:2d:1f:55:06:f3:7b:a6:3e:a2: 660s 92:48:68:67:d5:e9:97:46:c0:62:9f:56:eb:26:fc:71:52:2e: 660s 07:f6:a6:89:d8:62:54:c3:42:d8:b6:bc:29:3a:b9:9b:16:ff: 660s 0a:7b:c5:ed:c7:63:a9:6d:f3:69:ba:0e:8f:c0:04:da:24:4c: 660s 17:79:18:a0:c4:ed:e3:50:d2:76:c6:8d:77:3e:c4:55:74:63: 660s a2:8f:ce:b3:75:1d:47:cb:2c:21:86:94:85:0e:0f:cd:c7:c5: 660s 06:9a:54:25:5c:cb:2b:51:54:5a:aa:0c:ae:98:25:7d:29:e1: 660s 78:47 660s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-aGaR2m/SSSD-child-19427-auth.pem 660s + found_md5=Modulus=B45D092D6433ED23AE895E3949AF04BE460F697AF63CD031A6B77235A3A6774C94CBEFE660C9FD9ABE394B64CA9E98B75AF97BA4928BB30F94DAF959F3A0303678A85221EDDA39240D1E5E2C45A3A7188A05EA5A704FA084E8EC6D70D50F1E031C281F60A41A0250CC364B7A869DBCCC21C6F4D426591FA1C2B30E143A16B433 660s + '[' Modulus=B45D092D6433ED23AE895E3949AF04BE460F697AF63CD031A6B77235A3A6774C94CBEFE660C9FD9ABE394B64CA9E98B75AF97BA4928BB30F94DAF959F3A0303678A85221EDDA39240D1E5E2C45A3A7188A05EA5A704FA084E8EC6D70D50F1E031C281F60A41A0250CC364B7A869DBCCC21C6F4D426591FA1C2B30E143A16B433 '!=' Modulus=B45D092D6433ED23AE895E3949AF04BE460F697AF63CD031A6B77235A3A6774C94CBEFE660C9FD9ABE394B64CA9E98B75AF97BA4928BB30F94DAF959F3A0303678A85221EDDA39240D1E5E2C45A3A7188A05EA5A704FA084E8EC6D70D50F1E031C281F60A41A0250CC364B7A869DBCCC21C6F4D426591FA1C2B30E143A16B433 ']' 660s + invalid_certificate /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-21502 /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA.pem 660s + check_certificate /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-21502 /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA.pem 660s + local certificate=/tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-trusted-certificate-0001.pem 660s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-21502 660s + local key_ring=/tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA.pem 660s + local verify_option= 660s + prepare_softhsm2_card /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-21502 660s + local certificate=/tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-trusted-certificate-0001.pem 660s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-21502 660s + local key_cn 660s + local key_name 660s + local tokens_dir 660s + local output_cert_file 660s + token_name= 660s ++ basename /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 660s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 660s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-trusted-certificate-0001.pem 660s ++ sed -n 's/ *commonName *= //p' 660s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 660s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 660s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-aGaR2m/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 660s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-aGaR2m/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 660s ++ basename /tmp/sssd-softhsm2-aGaR2m/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 660s + tokens_dir=/tmp/sssd-softhsm2-aGaR2m/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 660s + token_name='Test Organization Sub Int Token' 660s Test Organization Sub Int Token 660s + '[' '!' -e /tmp/sssd-softhsm2-aGaR2m/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 660s + '[' '!' -d /tmp/sssd-softhsm2-aGaR2m/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 660s + echo 'Test Organization Sub Int Token' 660s + '[' -n '' ']' 660s + local output_base_name=SSSD-child-25081 660s + local output_file=/tmp/sssd-softhsm2-aGaR2m/SSSD-child-25081.output 660s + output_cert_file=/tmp/sssd-softhsm2-aGaR2m/SSSD-child-25081.pem 660s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA.pem 660s [p11_child[2398]] [main] (0x0400): p11_child started. 660s [p11_child[2398]] [main] (0x2000): Running in [pre-auth] mode. 660s [p11_child[2398]] [main] (0x2000): Running with effective IDs: [0][0]. 660s [p11_child[2398]] [main] (0x2000): Running with real IDs [0][0]. 660s [p11_child[2398]] [do_card] (0x4000): Module List: 660s [p11_child[2398]] [do_card] (0x4000): common name: [softhsm2]. 660s [p11_child[2398]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 660s [p11_child[2398]] [do_card] (0x4000): Description [SoftHSM slot ID 0x99a1a6e] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 660s [p11_child[2398]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 660s [p11_child[2398]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x99a1a6e][161094254] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 660s [p11_child[2398]] [do_card] (0x4000): Login NOT required. 660s [p11_child[2398]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 660s [p11_child[2398]] [do_verification] (0x0040): X509_verify_cert failed [0]. 660s [p11_child[2398]] [do_verification] (0x0040): X509_verify_cert failed [2][unable to get issuer certificate]. 660s [p11_child[2398]] [read_certs] (0x0040): Certificate [Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] not valid, skipping. 660s [p11_child[2398]] [do_card] (0x4000): No certificate found. 660s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-aGaR2m/SSSD-child-25081.output 660s + return 2 660s + invalid_certificate /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-21502 /tmp/sssd-softhsm2-aGaR2m/test-root-intermediate-chain-CA.pem partial_chain 660s + check_certificate /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-21502 /tmp/sssd-softhsm2-aGaR2m/test-root-intermediate-chain-CA.pem partial_chain 660s + local certificate=/tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-trusted-certificate-0001.pem 660s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-21502 660s + local key_ring=/tmp/sssd-softhsm2-aGaR2m/test-root-intermediate-chain-CA.pem 660s + local verify_option=partial_chain 660s + prepare_softhsm2_card /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-21502 660s + local certificate=/tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-trusted-certificate-0001.pem 660s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-21502 660s + local key_cn 660s + local key_name 660s + local tokens_dir 660s + local output_cert_file 660s + token_name= 660s ++ basename /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 660s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 660s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-trusted-certificate-0001.pem 660s ++ sed -n 's/ *commonName *= //p' 660s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 660s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 660s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-aGaR2m/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 660s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-aGaR2m/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 660s ++ basename /tmp/sssd-softhsm2-aGaR2m/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 660s + tokens_dir=/tmp/sssd-softhsm2-aGaR2m/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 660s + token_name='Test Organization Sub Int Token' 660s + '[' '!' -e /tmp/sssd-softhsm2-aGaR2m/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 660s + '[' '!' -d /tmp/sssd-softhsm2-aGaR2m/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 660s + echo 'Test Organization Sub Int Token' 660s Test Organization Sub Int Token 660s + '[' -n partial_chain ']' 660s + local verify_arg=--verify=partial_chain 660s + local output_base_name=SSSD-child-1473 660s + local output_file=/tmp/sssd-softhsm2-aGaR2m/SSSD-child-1473.output 660s + output_cert_file=/tmp/sssd-softhsm2-aGaR2m/SSSD-child-1473.pem 660s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-aGaR2m/test-root-intermediate-chain-CA.pem 660s [p11_child[2405]] [main] (0x0400): p11_child started. 660s [p11_child[2405]] [main] (0x2000): Running in [pre-auth] mode. 660s [p11_child[2405]] [main] (0x2000): Running with effective IDs: [0][0]. 660s [p11_child[2405]] [main] (0x2000): Running with real IDs [0][0]. 660s [p11_child[2405]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 660s [p11_child[2405]] [do_card] (0x4000): Module List: 660s [p11_child[2405]] [do_card] (0x4000): common name: [softhsm2]. 660s [p11_child[2405]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 660s [p11_child[2405]] [do_card] (0x4000): Description [SoftHSM slot ID 0x99a1a6e] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 660s [p11_child[2405]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 660s [p11_child[2405]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x99a1a6e][161094254] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 660s [p11_child[2405]] [do_card] (0x4000): Login NOT required. 660s [p11_child[2405]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 660s [p11_child[2405]] [do_verification] (0x0040): X509_verify_cert failed [0]. 660s [p11_child[2405]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 660s [p11_child[2405]] [read_certs] (0x0040): Certificate [Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] not valid, skipping. 660s [p11_child[2405]] [do_card] (0x4000): No certificate found. 660s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-aGaR2m/SSSD-child-1473.output 660s + return 2 660s + valid_certificate /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-21502 /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA.pem partial_chain 660s + check_certificate /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-21502 /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA.pem partial_chain 660s + local certificate=/tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-trusted-certificate-0001.pem 660s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-21502 660s + local key_ring=/tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA.pem 660s + local verify_option=partial_chain 660s + prepare_softhsm2_card /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-21502 660s + local certificate=/tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-trusted-certificate-0001.pem 660s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-21502 660s + local key_cn 660s + local key_name 660s + local tokens_dir 660s + local output_cert_file 660s + token_name= 660s ++ basename /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 660s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 660s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-trusted-certificate-0001.pem 660s ++ sed -n 's/ *commonName *= //p' 660s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 660s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 660s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-aGaR2m/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 660s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-aGaR2m/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 660s ++ basename /tmp/sssd-softhsm2-aGaR2m/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 660s + tokens_dir=/tmp/sssd-softhsm2-aGaR2m/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 660s + token_name='Test Organization Sub Int Token' 660s + '[' '!' -e /tmp/sssd-softhsm2-aGaR2m/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 660s + '[' '!' -d /tmp/sssd-softhsm2-aGaR2m/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 660s + echo 'Test Organization Sub Int Token' 660s + '[' -n partial_chain ']' 660s + local verify_arg=--verify=partial_chain 660s + local output_base_name=SSSD-child-7926 660s + local output_file=/tmp/sssd-softhsm2-aGaR2m/SSSD-child-7926.output 660s + output_cert_file=/tmp/sssd-softhsm2-aGaR2m/SSSD-child-7926.pem 660s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA.pem 660s Test Organization Sub Int Token 660s [p11_child[2412]] [main] (0x0400): p11_child started. 660s [p11_child[2412]] [main] (0x2000): Running in [pre-auth] mode. 660s [p11_child[2412]] [main] (0x2000): Running with effective IDs: [0][0]. 660s [p11_child[2412]] [main] (0x2000): Running with real IDs [0][0]. 660s [p11_child[2412]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 660s [p11_child[2412]] [do_card] (0x4000): Module List: 660s [p11_child[2412]] [do_card] (0x4000): common name: [softhsm2]. 660s [p11_child[2412]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 660s [p11_child[2412]] [do_card] (0x4000): Description [SoftHSM slot ID 0x99a1a6e] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 660s [p11_child[2412]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 660s [p11_child[2412]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x99a1a6e][161094254] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 660s [p11_child[2412]] [do_card] (0x4000): Login NOT required. 660s [p11_child[2412]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 660s [p11_child[2412]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 660s [p11_child[2412]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Sub Int Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 660s [p11_child[2412]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x99a1a6e;slot-manufacturer=SoftHSM%20project;slot-id=161094254;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7c415f52099a1a6e;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 660s [p11_child[2412]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 660s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-aGaR2m/SSSD-child-7926.output 660s + echo '-----BEGIN CERTIFICATE-----' 660s + tail -n1 /tmp/sssd-softhsm2-aGaR2m/SSSD-child-7926.output 660s + echo '-----END CERTIFICATE-----' 660s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-aGaR2m/SSSD-child-7926.pem 660s Certificate: 660s Data: 660s Version: 3 (0x2) 660s Serial Number: 5 (0x5) 660s Signature Algorithm: sha256WithRSAEncryption 660s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 660s Validity 660s Not Before: Mar 24 14:30:13 2024 GMT 660s Not After : Mar 24 14:30:13 2025 GMT 660s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 660s Subject Public Key Info: 660s Public Key Algorithm: rsaEncryption 660s Public-Key: (1024 bit) 660s Modulus: 660s 00:b4:5d:09:2d:64:33:ed:23:ae:89:5e:39:49:af: 660s 04:be:46:0f:69:7a:f6:3c:d0:31:a6:b7:72:35:a3: 660s a6:77:4c:94:cb:ef:e6:60:c9:fd:9a:be:39:4b:64: 660s ca:9e:98:b7:5a:f9:7b:a4:92:8b:b3:0f:94:da:f9: 660s 59:f3:a0:30:36:78:a8:52:21:ed:da:39:24:0d:1e: 660s 5e:2c:45:a3:a7:18:8a:05:ea:5a:70:4f:a0:84:e8: 660s ec:6d:70:d5:0f:1e:03:1c:28:1f:60:a4:1a:02:50: 660s cc:36:4b:7a:86:9d:bc:cc:21:c6:f4:d4:26:59:1f: 660s a1:c2:b3:0e:14:3a:16:b4:33 660s Exponent: 65537 (0x10001) 660s X509v3 extensions: 660s X509v3 Authority Key Identifier: 660s 5A:CC:9F:9F:88:9C:44:29:40:06:6B:A7:1C:C2:ED:65:BE:8F:AC:4D 660s X509v3 Basic Constraints: 660s CA:FALSE 660s Netscape Cert Type: 660s SSL Client, S/MIME 660s Netscape Comment: 660s Test Organization Sub Intermediate CA trusted Certificate 660s X509v3 Subject Key Identifier: 660s EA:AC:49:6C:AE:DC:32:E5:9C:AF:68:64:1D:2C:3E:E6:31:34:73:29 660s X509v3 Key Usage: critical 660s Digital Signature, Non Repudiation, Key Encipherment 660s X509v3 Extended Key Usage: 660s TLS Web Client Authentication, E-mail Protection 660s X509v3 Subject Alternative Name: 660s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 660s Signature Algorithm: sha256WithRSAEncryption 660s Signature Value: 660s 59:07:a0:ee:49:80:54:67:c5:2d:1f:55:06:f3:7b:a6:3e:a2: 660s 92:48:68:67:d5:e9:97:46:c0:62:9f:56:eb:26:fc:71:52:2e: 660s 07:f6:a6:89:d8:62:54:c3:42:d8:b6:bc:29:3a:b9:9b:16:ff: 660s 0a:7b:c5:ed:c7:63:a9:6d:f3:69:ba:0e:8f:c0:04:da:24:4c: 660s 17:79:18:a0:c4:ed:e3:50:d2:76:c6:8d:77:3e:c4:55:74:63: 660s a2:8f:ce:b3:75:1d:47:cb:2c:21:86:94:85:0e:0f:cd:c7:c5: 660s 06:9a:54:25:5c:cb:2b:51:54:5a:aa:0c:ae:98:25:7d:29:e1: 660s 78:47 660s + local found_md5 expected_md5 660s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-trusted-certificate-0001.pem 660s + expected_md5=Modulus=B45D092D6433ED23AE895E3949AF04BE460F697AF63CD031A6B77235A3A6774C94CBEFE660C9FD9ABE394B64CA9E98B75AF97BA4928BB30F94DAF959F3A0303678A85221EDDA39240D1E5E2C45A3A7188A05EA5A704FA084E8EC6D70D50F1E031C281F60A41A0250CC364B7A869DBCCC21C6F4D426591FA1C2B30E143A16B433 660s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-aGaR2m/SSSD-child-7926.pem 660s + found_md5=Modulus=B45D092D6433ED23AE895E3949AF04BE460F697AF63CD031A6B77235A3A6774C94CBEFE660C9FD9ABE394B64CA9E98B75AF97BA4928BB30F94DAF959F3A0303678A85221EDDA39240D1E5E2C45A3A7188A05EA5A704FA084E8EC6D70D50F1E031C281F60A41A0250CC364B7A869DBCCC21C6F4D426591FA1C2B30E143A16B433 660s + '[' Modulus=B45D092D6433ED23AE895E3949AF04BE460F697AF63CD031A6B77235A3A6774C94CBEFE660C9FD9ABE394B64CA9E98B75AF97BA4928BB30F94DAF959F3A0303678A85221EDDA39240D1E5E2C45A3A7188A05EA5A704FA084E8EC6D70D50F1E031C281F60A41A0250CC364B7A869DBCCC21C6F4D426591FA1C2B30E143A16B433 '!=' Modulus=B45D092D6433ED23AE895E3949AF04BE460F697AF63CD031A6B77235A3A6774C94CBEFE660C9FD9ABE394B64CA9E98B75AF97BA4928BB30F94DAF959F3A0303678A85221EDDA39240D1E5E2C45A3A7188A05EA5A704FA084E8EC6D70D50F1E031C281F60A41A0250CC364B7A869DBCCC21C6F4D426591FA1C2B30E143A16B433 ']' 660s + output_file=/tmp/sssd-softhsm2-aGaR2m/SSSD-child-7926-auth.output 660s ++ basename /tmp/sssd-softhsm2-aGaR2m/SSSD-child-7926-auth.output .output 660s + output_cert_file=/tmp/sssd-softhsm2-aGaR2m/SSSD-child-7926-auth.pem 660s + echo -n 053350 660s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Sub Int Token' --module_name /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so 660s [p11_child[2420]] [main] (0x0400): p11_child started. 660s [p11_child[2420]] [main] (0x2000): Running in [auth] mode. 660s [p11_child[2420]] [main] (0x2000): Running with effective IDs: [0][0]. 660s [p11_child[2420]] [main] (0x2000): Running with real IDs [0][0]. 660s [p11_child[2420]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 660s [p11_child[2420]] [do_card] (0x4000): Module List: 660s [p11_child[2420]] [do_card] (0x4000): common name: [softhsm2]. 660s [p11_child[2420]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 660s [p11_child[2420]] [do_card] (0x4000): Description [SoftHSM slot ID 0x99a1a6e] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 660s [p11_child[2420]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 660s [p11_child[2420]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x99a1a6e][161094254] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 660s [p11_child[2420]] [do_card] (0x4000): Login required. 660s [p11_child[2420]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 660s [p11_child[2420]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 660s [p11_child[2420]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so Test Organization Sub Int Token Test Organization Sub Int Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 660s [p11_child[2420]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x99a1a6e;slot-manufacturer=SoftHSM%20project;slot-id=161094254;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7c415f52099a1a6e;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 660s [p11_child[2420]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 660s [p11_child[2420]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 660s [p11_child[2420]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 660s [p11_child[2420]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 660s [p11_child[2420]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 660s [p11_child[2420]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 660s [p11_child[2420]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 660s [p11_child[2420]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 660s [p11_child[2420]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 660s [p11_child[2420]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 660s [p11_child[2420]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 660s [p11_child[2420]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 660s [p11_child[2420]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 660s [p11_child[2420]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 660s [p11_child[2420]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 660s [p11_child[2420]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 660s [p11_child[2420]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 660s [p11_child[2420]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 660s [p11_child[2420]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 660s [p11_child[2420]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 660s [p11_child[2420]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 660s [p11_child[2420]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 660s [p11_child[2420]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 660s [p11_child[2420]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 660s [p11_child[2420]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 660s [p11_child[2420]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 660s [p11_child[2420]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 660s [p11_child[2420]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 660s [p11_child[2420]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 660s [p11_child[2420]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 660s [p11_child[2420]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 660s [p11_child[2420]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 660s [p11_child[2420]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 660s [p11_child[2420]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 660s [p11_child[2420]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 660s [p11_child[2420]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 660s [p11_child[2420]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 660s [p11_child[2420]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 660s [p11_child[2420]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 660s [p11_child[2420]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 660s [p11_child[2420]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 660s [p11_child[2420]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 660s [p11_child[2420]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 660s [p11_child[2420]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 660s [p11_child[2420]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 660s [p11_child[2420]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 660s [p11_child[2420]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 660s [p11_child[2420]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 660s [p11_child[2420]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 660s [p11_child[2420]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 660s [p11_child[2420]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 660s [p11_child[2420]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 660s [p11_child[2420]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 660s [p11_child[2420]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 660s [p11_child[2420]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 660s [p11_child[2420]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 660s [p11_child[2420]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 660s [p11_child[2420]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 660s [p11_child[2420]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 660s [p11_child[2420]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 660s [p11_child[2420]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 660s [p11_child[2420]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 660s [p11_child[2420]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 660s [p11_child[2420]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 660s [p11_child[2420]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 660s [p11_child[2420]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 660s [p11_child[2420]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 660s [p11_child[2420]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 660s [p11_child[2420]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 660s [p11_child[2420]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 660s [p11_child[2420]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 660s [p11_child[2420]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 660s [p11_child[2420]] [do_card] (0x4000): Certificate verified and validated. 660s [p11_child[2420]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 660s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-aGaR2m/SSSD-child-7926-auth.output 660s + echo '-----BEGIN CERTIFICATE-----' 660s + tail -n1 /tmp/sssd-softhsm2-aGaR2m/SSSD-child-7926-auth.output 660s + echo '-----END CERTIFICATE-----' 660s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-aGaR2m/SSSD-child-7926-auth.pem 660s Certificate: 660s Data: 660s Version: 3 (0x2) 660s Serial Number: 5 (0x5) 660s Signature Algorithm: sha256WithRSAEncryption 660s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 660s Validity 660s Not Before: Mar 24 14:30:13 2024 GMT 660s Not After : Mar 24 14:30:13 2025 GMT 660s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 660s Subject Public Key Info: 660s Public Key Algorithm: rsaEncryption 660s Public-Key: (1024 bit) 660s Modulus: 660s 00:b4:5d:09:2d:64:33:ed:23:ae:89:5e:39:49:af: 660s 04:be:46:0f:69:7a:f6:3c:d0:31:a6:b7:72:35:a3: 660s a6:77:4c:94:cb:ef:e6:60:c9:fd:9a:be:39:4b:64: 660s ca:9e:98:b7:5a:f9:7b:a4:92:8b:b3:0f:94:da:f9: 660s 59:f3:a0:30:36:78:a8:52:21:ed:da:39:24:0d:1e: 660s 5e:2c:45:a3:a7:18:8a:05:ea:5a:70:4f:a0:84:e8: 660s ec:6d:70:d5:0f:1e:03:1c:28:1f:60:a4:1a:02:50: 660s cc:36:4b:7a:86:9d:bc:cc:21:c6:f4:d4:26:59:1f: 660s a1:c2:b3:0e:14:3a:16:b4:33 660s Exponent: 65537 (0x10001) 660s X509v3 extensions: 660s X509v3 Authority Key Identifier: 660s 5A:CC:9F:9F:88:9C:44:29:40:06:6B:A7:1C:C2:ED:65:BE:8F:AC:4D 660s X509v3 Basic Constraints: 660s CA:FALSE 660s Netscape Cert Type: 660s SSL Client, S/MIME 660s Netscape Comment: 660s Test Organization Sub Intermediate CA trusted Certificate 660s X509v3 Subject Key Identifier: 660s EA:AC:49:6C:AE:DC:32:E5:9C:AF:68:64:1D:2C:3E:E6:31:34:73:29 660s X509v3 Key Usage: critical 660s Digital Signature, Non Repudiation, Key Encipherment 660s X509v3 Extended Key Usage: 660s TLS Web Client Authentication, E-mail Protection 660s X509v3 Subject Alternative Name: 660s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 660s Signature Algorithm: sha256WithRSAEncryption 660s Signature Value: 660s 59:07:a0:ee:49:80:54:67:c5:2d:1f:55:06:f3:7b:a6:3e:a2: 660s 92:48:68:67:d5:e9:97:46:c0:62:9f:56:eb:26:fc:71:52:2e: 660s 07:f6:a6:89:d8:62:54:c3:42:d8:b6:bc:29:3a:b9:9b:16:ff: 660s 0a:7b:c5:ed:c7:63:a9:6d:f3:69:ba:0e:8f:c0:04:da:24:4c: 660s 17:79:18:a0:c4:ed:e3:50:d2:76:c6:8d:77:3e:c4:55:74:63: 660s a2:8f:ce:b3:75:1d:47:cb:2c:21:86:94:85:0e:0f:cd:c7:c5: 660s 06:9a:54:25:5c:cb:2b:51:54:5a:aa:0c:ae:98:25:7d:29:e1: 660s 78:47 660s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-aGaR2m/SSSD-child-7926-auth.pem 660s + found_md5=Modulus=B45D092D6433ED23AE895E3949AF04BE460F697AF63CD031A6B77235A3A6774C94CBEFE660C9FD9ABE394B64CA9E98B75AF97BA4928BB30F94DAF959F3A0303678A85221EDDA39240D1E5E2C45A3A7188A05EA5A704FA084E8EC6D70D50F1E031C281F60A41A0250CC364B7A869DBCCC21C6F4D426591FA1C2B30E143A16B433 660s + '[' Modulus=B45D092D6433ED23AE895E3949AF04BE460F697AF63CD031A6B77235A3A6774C94CBEFE660C9FD9ABE394B64CA9E98B75AF97BA4928BB30F94DAF959F3A0303678A85221EDDA39240D1E5E2C45A3A7188A05EA5A704FA084E8EC6D70D50F1E031C281F60A41A0250CC364B7A869DBCCC21C6F4D426591FA1C2B30E143A16B433 '!=' Modulus=B45D092D6433ED23AE895E3949AF04BE460F697AF63CD031A6B77235A3A6774C94CBEFE660C9FD9ABE394B64CA9E98B75AF97BA4928BB30F94DAF959F3A0303678A85221EDDA39240D1E5E2C45A3A7188A05EA5A704FA084E8EC6D70D50F1E031C281F60A41A0250CC364B7A869DBCCC21C6F4D426591FA1C2B30E143A16B433 ']' 660s + valid_certificate /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-21502 /tmp/sssd-softhsm2-aGaR2m/test-intermediate-sub-chain-CA.pem partial_chain 660s + check_certificate /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-21502 /tmp/sssd-softhsm2-aGaR2m/test-intermediate-sub-chain-CA.pem partial_chain 660s + local certificate=/tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-trusted-certificate-0001.pem 660s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-21502 660s + local key_ring=/tmp/sssd-softhsm2-aGaR2m/test-intermediate-sub-chain-CA.pem 660s + local verify_option=partial_chain 660s + prepare_softhsm2_card /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-21502 660s + local certificate=/tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-trusted-certificate-0001.pem 660s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-21502 660s + local key_cn 660s + local key_name 660s + local tokens_dir 660s + local output_cert_file 660s + token_name= 660s ++ basename /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 660s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 660s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-trusted-certificate-0001.pem 660s ++ sed -n 's/ *commonName *= //p' 660s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 660s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 660s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-aGaR2m/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 660s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-aGaR2m/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 660s ++ basename /tmp/sssd-softhsm2-aGaR2m/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 660s + tokens_dir=/tmp/sssd-softhsm2-aGaR2m/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 660s + token_name='Test Organization Sub Int Token' 660s + '[' '!' -e /tmp/sssd-softhsm2-aGaR2m/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 660s + '[' '!' -d /tmp/sssd-softhsm2-aGaR2m/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 660s + echo 'Test Organization Sub Int Token' 660s + '[' -n partial_chain ']' 660s + local verify_arg=--verify=partial_chain 660s + local output_base_name=SSSD-child-19068 660s Test Organization Sub Int Token 660s + local output_file=/tmp/sssd-softhsm2-aGaR2m/SSSD-child-19068.output 660s + output_cert_file=/tmp/sssd-softhsm2-aGaR2m/SSSD-child-19068.pem 660s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-aGaR2m/test-intermediate-sub-chain-CA.pem 660s [p11_child[2430]] [main] (0x0400): p11_child started. 660s [p11_child[2430]] [main] (0x2000): Running in [pre-auth] mode. 660s [p11_child[2430]] [main] (0x2000): Running with effective IDs: [0][0]. 660s [p11_child[2430]] [main] (0x2000): Running with real IDs [0][0]. 660s [p11_child[2430]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 660s [p11_child[2430]] [do_card] (0x4000): Module List: 660s [p11_child[2430]] [do_card] (0x4000): common name: [softhsm2]. 660s [p11_child[2430]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 660s [p11_child[2430]] [do_card] (0x4000): Description [SoftHSM slot ID 0x99a1a6e] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 660s [p11_child[2430]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 660s [p11_child[2430]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x99a1a6e][161094254] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 660s [p11_child[2430]] [do_card] (0x4000): Login NOT required. 660s [p11_child[2430]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 660s [p11_child[2430]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 660s [p11_child[2430]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Sub Int Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 660s [p11_child[2430]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x99a1a6e;slot-manufacturer=SoftHSM%20project;slot-id=161094254;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7c415f52099a1a6e;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 660s [p11_child[2430]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 660s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-aGaR2m/SSSD-child-19068.output 660s + echo '-----BEGIN CERTIFICATE-----' 660s + tail -n1 /tmp/sssd-softhsm2-aGaR2m/SSSD-child-19068.output 660s + echo '-----END CERTIFICATE-----' 660s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-aGaR2m/SSSD-child-19068.pem 660s + local found_md5 expected_md5 660s Certificate: 660s Data: 660s Version: 3 (0x2) 660s Serial Number: 5 (0x5) 660s Signature Algorithm: sha256WithRSAEncryption 660s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 660s Validity 660s Not Before: Mar 24 14:30:13 2024 GMT 660s Not After : Mar 24 14:30:13 2025 GMT 660s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 660s Subject Public Key Info: 660s Public Key Algorithm: rsaEncryption 660s Public-Key: (1024 bit) 660s Modulus: 660s 00:b4:5d:09:2d:64:33:ed:23:ae:89:5e:39:49:af: 660s 04:be:46:0f:69:7a:f6:3c:d0:31:a6:b7:72:35:a3: 660s a6:77:4c:94:cb:ef:e6:60:c9:fd:9a:be:39:4b:64: 660s ca:9e:98:b7:5a:f9:7b:a4:92:8b:b3:0f:94:da:f9: 660s 59:f3:a0:30:36:78:a8:52:21:ed:da:39:24:0d:1e: 660s 5e:2c:45:a3:a7:18:8a:05:ea:5a:70:4f:a0:84:e8: 660s ec:6d:70:d5:0f:1e:03:1c:28:1f:60:a4:1a:02:50: 660s cc:36:4b:7a:86:9d:bc:cc:21:c6:f4:d4:26:59:1f: 660s a1:c2:b3:0e:14:3a:16:b4:33 660s Exponent: 65537 (0x10001) 660s X509v3 extensions: 660s X509v3 Authority Key Identifier: 660s 5A:CC:9F:9F:88:9C:44:29:40:06:6B:A7:1C:C2:ED:65:BE:8F:AC:4D 660s X509v3 Basic Constraints: 660s CA:FALSE 660s Netscape Cert Type: 660s SSL Client, S/MIME 660s Netscape Comment: 660s Test Organization Sub Intermediate CA trusted Certificate 660s X509v3 Subject Key Identifier: 660s EA:AC:49:6C:AE:DC:32:E5:9C:AF:68:64:1D:2C:3E:E6:31:34:73:29 660s X509v3 Key Usage: critical 660s Digital Signature, Non Repudiation, Key Encipherment 660s X509v3 Extended Key Usage: 660s TLS Web Client Authentication, E-mail Protection 660s X509v3 Subject Alternative Name: 660s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 660s Signature Algorithm: sha256WithRSAEncryption 660s Signature Value: 660s 59:07:a0:ee:49:80:54:67:c5:2d:1f:55:06:f3:7b:a6:3e:a2: 660s 92:48:68:67:d5:e9:97:46:c0:62:9f:56:eb:26:fc:71:52:2e: 660s 07:f6:a6:89:d8:62:54:c3:42:d8:b6:bc:29:3a:b9:9b:16:ff: 660s 0a:7b:c5:ed:c7:63:a9:6d:f3:69:ba:0e:8f:c0:04:da:24:4c: 660s 17:79:18:a0:c4:ed:e3:50:d2:76:c6:8d:77:3e:c4:55:74:63: 660s a2:8f:ce:b3:75:1d:47:cb:2c:21:86:94:85:0e:0f:cd:c7:c5: 660s 06:9a:54:25:5c:cb:2b:51:54:5a:aa:0c:ae:98:25:7d:29:e1: 660s 78:47 660s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-aGaR2m/test-sub-intermediate-CA-trusted-certificate-0001.pem 660s + expected_md5=Modulus=B45D092D6433ED23AE895E3949AF04BE460F697AF63CD031A6B77235A3A6774C94CBEFE660C9FD9ABE394B64CA9E98B75AF97BA4928BB30F94DAF959F3A0303678A85221EDDA39240D1E5E2C45A3A7188A05EA5A704FA084E8EC6D70D50F1E031C281F60A41A0250CC364B7A869DBCCC21C6F4D426591FA1C2B30E143A16B433 660s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-aGaR2m/SSSD-child-19068.pem 660s + found_md5=Modulus=B45D092D6433ED23AE895E3949AF04BE460F697AF63CD031A6B77235A3A6774C94CBEFE660C9FD9ABE394B64CA9E98B75AF97BA4928BB30F94DAF959F3A0303678A85221EDDA39240D1E5E2C45A3A7188A05EA5A704FA084E8EC6D70D50F1E031C281F60A41A0250CC364B7A869DBCCC21C6F4D426591FA1C2B30E143A16B433 660s + '[' Modulus=B45D092D6433ED23AE895E3949AF04BE460F697AF63CD031A6B77235A3A6774C94CBEFE660C9FD9ABE394B64CA9E98B75AF97BA4928BB30F94DAF959F3A0303678A85221EDDA39240D1E5E2C45A3A7188A05EA5A704FA084E8EC6D70D50F1E031C281F60A41A0250CC364B7A869DBCCC21C6F4D426591FA1C2B30E143A16B433 '!=' Modulus=B45D092D6433ED23AE895E3949AF04BE460F697AF63CD031A6B77235A3A6774C94CBEFE660C9FD9ABE394B64CA9E98B75AF97BA4928BB30F94DAF959F3A0303678A85221EDDA39240D1E5E2C45A3A7188A05EA5A704FA084E8EC6D70D50F1E031C281F60A41A0250CC364B7A869DBCCC21C6F4D426591FA1C2B30E143A16B433 ']' 660s + output_file=/tmp/sssd-softhsm2-aGaR2m/SSSD-child-19068-auth.output 660s ++ basename /tmp/sssd-softhsm2-aGaR2m/SSSD-child-19068-auth.output .output 660s + output_cert_file=/tmp/sssd-softhsm2-aGaR2m/SSSD-child-19068-auth.pem 660s + echo -n 053350 660s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-aGaR2m/test-intermediate-sub-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Sub Int Token' --module_name /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so 660s [p11_child[2438]] [main] (0x0400): p11_child started. 660s [p11_child[2438]] [main] (0x2000): Running in [auth] mode. 660s [p11_child[2438]] [main] (0x2000): Running with effective IDs: [0][0]. 660s [p11_child[2438]] [main] (0x2000): Running with real IDs [0][0]. 660s [p11_child[2438]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 660s [p11_child[2438]] [do_card] (0x4000): Module List: 660s [p11_child[2438]] [do_card] (0x4000): common name: [softhsm2]. 660s [p11_child[2438]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 660s [p11_child[2438]] [do_card] (0x4000): Description [SoftHSM slot ID 0x99a1a6e] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 660s [p11_child[2438]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 660s [p11_child[2438]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x99a1a6e][161094254] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 660s [p11_child[2438]] [do_card] (0x4000): Login required. 660s [p11_child[2438]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 660s [p11_child[2438]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 660s [p11_child[2438]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so Test Organization Sub Int Token Test Organization Sub Int Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 660s [p11_child[2438]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x99a1a6e;slot-manufacturer=SoftHSM%20project;slot-id=161094254;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7c415f52099a1a6e;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 660s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 660s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 660s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 660s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 660s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 660s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 660s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 660s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 660s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 660s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 660s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 660s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 660s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 660s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 660s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 660s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 660s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 660s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 660s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 660s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 660s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 660s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 660s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 660s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 660s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 660s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 660s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 660s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 660s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 660s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 660s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 660s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 660s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 660s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 660s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 660s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 660s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 660s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 660s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 660s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 660s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 660s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 660s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 660s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 660s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 660s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 660s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 660s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 660s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 660s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 660s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 660s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 660s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 660s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 660s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 660s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 660s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 660s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 660s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 660s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 660s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 660s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 660s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 660s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 660s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 660s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 660s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 660s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 660s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 660s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 660s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 660s [p11_child[2438]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 660s [p11_child[2438]] [do_card] (0x4000): Certificate verified and validated. 660s [p11_child[2438]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 660s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-aGaR2m/SSSD-child-19068-auth.output 660s + echo '-----BEGIN CERTIFICATE-----' 660s + tail -n1 /tmp/sssd-softhsm2-aGaR2m/SSSD-child-19068-auth.output 660s + echo '-----END CERTIFICATE-----' 660s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-aGaR2m/SSSD-child-19068-auth.pem 660s Certificate: 660s Data: 660s Version: 3 (0x2) 660s Serial Number: 5 (0x5) 660s Signature Algorithm: sha256WithRSAEncryption 660s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 660s Validity 660s Not Before: Mar 24 14:30:13 2024 GMT 660s Not After : Mar 24 14:30:13 2025 GMT 660s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 660s Subject Public Key Info: 660s Public Key Algorithm: rsaEncryption 660s Public-Key: (1024 bit) 660s Modulus: 660s 00:b4:5d:09:2d:64:33:ed:23:ae:89:5e:39:49:af: 660s 04:be:46:0f:69:7a:f6:3c:d0:31:a6:b7:72:35:a3: 660s a6:77:4c:94:cb:ef:e6:60:c9:fd:9a:be:39:4b:64: 660s ca:9e:98:b7:5a:f9:7b:a4:92:8b:b3:0f:94:da:f9: 660s 59:f3:a0:30:36:78:a8:52:21:ed:da:39:24:0d:1e: 660s 5e:2c:45:a3:a7:18:8a:05:ea:5a:70:4f:a0:84:e8: 660s ec:6d:70:d5:0f:1e:03:1c:28:1f:60:a4:1a:02:50: 660s cc:36:4b:7a:86:9d:bc:cc:21:c6:f4:d4:26:59:1f: 660s a1:c2:b3:0e:14:3a:16:b4:33 660s Exponent: 65537 (0x10001) 660s X509v3 extensions: 660s X509v3 Authority Key Identifier: 660s 5A:CC:9F:9F:88:9C:44:29:40:06:6B:A7:1C:C2:ED:65:BE:8F:AC:4D 660s X509v3 Basic Constraints: 660s CA:FALSE 660s Netscape Cert Type: 660s SSL Client, S/MIME 660s Netscape Comment: 660s Test Organization Sub Intermediate CA trusted Certificate 660s X509v3 Subject Key Identifier: 660s EA:AC:49:6C:AE:DC:32:E5:9C:AF:68:64:1D:2C:3E:E6:31:34:73:29 660s X509v3 Key Usage: critical 660s Digital Signature, Non Repudiation, Key Encipherment 660s X509v3 Extended Key Usage: 660s TLS Web Client Authentication, E-mail Protection 660s X509v3 Subject Alternative Name: 660s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 660s Signature Algorithm: sha256WithRSAEncryption 660s Signature Value: 660s 59:07:a0:ee:49:80:54:67:c5:2d:1f:55:06:f3:7b:a6:3e:a2: 660s 92:48:68:67:d5:e9:97:46:c0:62:9f:56:eb:26:fc:71:52:2e: 660s 07:f6:a6:89:d8:62:54:c3:42:d8:b6:bc:29:3a:b9:9b:16:ff: 660s 0a:7b:c5:ed:c7:63:a9:6d:f3:69:ba:0e:8f:c0:04:da:24:4c: 660s 17:79:18:a0:c4:ed:e3:50:d2:76:c6:8d:77:3e:c4:55:74:63: 660s a2:8f:ce:b3:75:1d:47:cb:2c:21:86:94:85:0e:0f:cd:c7:c5: 660s 06:9a:54:25:5c:cb:2b:51:54:5a:aa:0c:ae:98:25:7d:29:e1: 660s 78:47 660s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-aGaR2m/SSSD-child-19068-auth.pem 660s + found_md5=Modulus=B45D092D6433ED23AE895E3949AF04BE460F697AF63CD031A6B77235A3A6774C94CBEFE660C9FD9ABE394B64CA9E98B75AF97BA4928BB30F94DAF959F3A0303678A85221EDDA39240D1E5E2C45A3A7188A05EA5A704FA084E8EC6D70D50F1E031C281F60A41A0250CC364B7A869DBCCC21C6F4D426591FA1C2B30E143A16B433 660s + '[' Modulus=B45D092D6433ED23AE895E3949AF04BE460F697AF63CD031A6B77235A3A6774C94CBEFE660C9FD9ABE394B64CA9E98B75AF97BA4928BB30F94DAF959F3A0303678A85221EDDA39240D1E5E2C45A3A7188A05EA5A704FA084E8EC6D70D50F1E031C281F60A41A0250CC364B7A869DBCCC21C6F4D426591FA1C2B30E143A16B433 '!=' Modulus=B45D092D6433ED23AE895E3949AF04BE460F697AF63CD031A6B77235A3A6774C94CBEFE660C9FD9ABE394B64CA9E98B75AF97BA4928BB30F94DAF959F3A0303678A85221EDDA39240D1E5E2C45A3A7188A05EA5A704FA084E8EC6D70D50F1E031C281F60A41A0250CC364B7A869DBCCC21C6F4D426591FA1C2B30E143A16B433 ']' 660s + set +x 660s 660s Test completed, Root CA and intermediate issued certificates verified! 661s autopkgtest [14:30:19]: test sssd-softhism2-certificates-tests.sh: -----------------------] 661s sssd-softhism2-certificates-tests.sh PASS 661s autopkgtest [14:30:19]: test sssd-softhism2-certificates-tests.sh: - - - - - - - - - - results - - - - - - - - - - 664s autopkgtest [14:30:22]: test sssd-smart-card-pam-auth-configs: preparing testbed 669s Reading package lists... 670s Building dependency tree... 670s Reading state information... 670s Starting pkgProblemResolver with broken count: 0 670s Starting 2 pkgProblemResolver with broken count: 0 670s Done 670s The following additional packages will be installed: 670s pamtester 670s The following NEW packages will be installed: 670s autopkgtest-satdep pamtester 670s 0 upgraded, 2 newly installed, 0 to remove and 0 not upgraded. 670s Need to get 14.6 kB/15.4 kB of archives. 670s After this operation, 86.0 kB of additional disk space will be used. 670s Get:1 /tmp/autopkgtest.rakP4F/4-autopkgtest-satdep.deb autopkgtest-satdep ppc64el 0 [760 B] 670s Get:2 http://ftpmaster.internal/ubuntu noble/universe ppc64el pamtester ppc64el 0.1.2-4 [14.6 kB] 671s Fetched 14.6 kB in 0s (69.2 kB/s) 671s Selecting previously unselected package pamtester. 671s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 70317 files and directories currently installed.) 671s Preparing to unpack .../pamtester_0.1.2-4_ppc64el.deb ... 671s Unpacking pamtester (0.1.2-4) ... 671s Selecting previously unselected package autopkgtest-satdep. 671s Preparing to unpack .../4-autopkgtest-satdep.deb ... 671s Unpacking autopkgtest-satdep (0) ... 671s Setting up pamtester (0.1.2-4) ... 671s Setting up autopkgtest-satdep (0) ... 671s Processing triggers for man-db (2.12.0-3) ... 673s (Reading database ... 70323 files and directories currently installed.) 673s Removing autopkgtest-satdep (0) ... 674s autopkgtest [14:30:32]: test sssd-smart-card-pam-auth-configs: env OFFLINE_MODE=1 bash debian/tests/sssd-smart-card-pam-auth-configs-tester.sh 674s autopkgtest [14:30:32]: test sssd-smart-card-pam-auth-configs: [----------------------- 674s + '[' -z ubuntu ']' 674s + export DEBIAN_FRONTEND=noninteractive 674s + DEBIAN_FRONTEND=noninteractive 674s + required_tools=(pamtester softhsm2-util sssd) 674s + [[ ! -v OFFLINE_MODE ]] 674s + for cmd in "${required_tools[@]}" 674s + command -v pamtester 674s + for cmd in "${required_tools[@]}" 674s + command -v softhsm2-util 674s + for cmd in "${required_tools[@]}" 674s + command -v sssd 674s + PIN=123456 674s ++ mktemp -d -t sssd-softhsm2-certs-XXXXXX 674s + tmpdir=/tmp/sssd-softhsm2-certs-c0AzGN 674s + backupsdir= 674s + alternative_pam_configs=(sss-smart-card-optional sss-smart-card-required) 674s + declare -a restore_paths 674s + declare -a delete_paths 674s + trap handle_exit EXIT 674s ++ dirname debian/tests/sssd-smart-card-pam-auth-configs-tester.sh 674s + tester=debian/tests/sssd-softhism2-certificates-tests.sh 674s + '[' '!' -e debian/tests/sssd-softhism2-certificates-tests.sh ']' 674s + '[' '!' -e debian/tests/sssd-softhism2-certificates-tests.sh ']' 674s + export PIN TEST_TMPDIR=/tmp/sssd-softhsm2-certs-c0AzGN GENERATE_SMART_CARDS=1 KEEP_TEMPORARY_FILES=1 NO_SSSD_TESTS=1 674s + TEST_TMPDIR=/tmp/sssd-softhsm2-certs-c0AzGN 674s + GENERATE_SMART_CARDS=1 674s + KEEP_TEMPORARY_FILES=1 674s + NO_SSSD_TESTS=1 674s + bash debian/tests/sssd-softhism2-certificates-tests.sh 674s + '[' -z ubuntu ']' 674s + required_tools=(p11tool openssl softhsm2-util) 674s + for cmd in "${required_tools[@]}" 674s + command -v p11tool 674s + for cmd in "${required_tools[@]}" 674s + command -v openssl 674s + for cmd in "${required_tools[@]}" 674s + command -v softhsm2-util 674s + PIN=123456 674s +++ find /usr/lib/softhsm/libsofthsm2.so 674s +++ head -n 1 674s ++ realpath /usr/lib/softhsm/libsofthsm2.so 674s + SOFTHSM2_MODULE=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so 674s + SSSD_P11_CHILD=/usr/libexec/sssd/p11_child 674s + TOKEN_ID=00112233445566778899FFAABBCCDDEEFF012345 674s + '[' '!' -v NO_SSSD_TESTS ']' 674s + '[' '!' -e /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so ']' 674s + tmpdir=/tmp/sssd-softhsm2-certs-c0AzGN 674s + keys_size=1024 674s + [[ ! -v KEEP_TEMPORARY_FILES ]] 674s + trap 'set +x; echo -e "\nUnexpected failure!!!"' ERR 674s + echo -n 01 674s + touch /tmp/sssd-softhsm2-certs-c0AzGN/index.txt 674s + mkdir -p /tmp/sssd-softhsm2-certs-c0AzGN/new_certs 674s + cat 674s + root_ca_key_pass=pass:random-root-CA-password-29982 674s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-certs-c0AzGN/test-root-CA-key.pem -passout pass:random-root-CA-password-29982 1024 674s + openssl req -passin pass:random-root-CA-password-29982 -batch -config /tmp/sssd-softhsm2-certs-c0AzGN/test-root-CA.config -x509 -new -nodes -key /tmp/sssd-softhsm2-certs-c0AzGN/test-root-CA-key.pem -sha256 -days 1024 -set_serial 0 -extensions v3_ca -out /tmp/sssd-softhsm2-certs-c0AzGN/test-root-CA.pem 674s + openssl x509 -noout -in /tmp/sssd-softhsm2-certs-c0AzGN/test-root-CA.pem 674s + cat 674s + intermediate_ca_key_pass=pass:random-intermediate-CA-password-13316 674s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-certs-c0AzGN/test-intermediate-CA-key.pem -passout pass:random-intermediate-CA-password-13316 1024 674s + openssl req -batch -new -nodes -passin pass:random-intermediate-CA-password-13316 -config /tmp/sssd-softhsm2-certs-c0AzGN/test-intermediate-CA.config -key /tmp/sssd-softhsm2-certs-c0AzGN/test-intermediate-CA-key.pem -passout pass:random-root-CA-password-29982 -sha256 -extensions v3_ca -out /tmp/sssd-softhsm2-certs-c0AzGN/test-intermediate-CA-certificate-request.pem 674s + openssl req -text -noout -in /tmp/sssd-softhsm2-certs-c0AzGN/test-intermediate-CA-certificate-request.pem 674s + openssl ca -batch -notext -config /tmp/sssd-softhsm2-certs-c0AzGN/test-root-CA.config -passin pass:random-root-CA-password-29982 -keyfile /tmp/sssd-softhsm2-certs-c0AzGN/test-root-CA-key.pem -in /tmp/sssd-softhsm2-certs-c0AzGN/test-intermediate-CA-certificate-request.pem -days 365 -extensions v3_intermediate_ca -out /tmp/sssd-softhsm2-certs-c0AzGN/test-intermediate-CA.pem 674s Certificate Request: 674s Data: 674s Version: 1 (0x0) 674s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 674s Subject Public Key Info: 674s Public Key Algorithm: rsaEncryption 674s Public-Key: (1024 bit) 674s Modulus: 674s 00:f0:56:5b:9c:ee:7a:af:93:e8:2c:e3:c3:d2:a9: 674s 09:d3:63:4e:97:39:49:34:7e:6b:6f:0d:f7:94:fa: 674s e3:7e:b3:20:23:b3:76:d8:b5:6e:5b:08:28:05:88: 674s 6e:15:3f:1f:69:37:43:12:f1:94:f7:78:91:8c:10: 674s c9:38:57:4b:94:30:8f:74:8f:2c:1b:73:2c:ba:58: 674s c3:0e:b5:cf:b2:ca:38:6c:5e:39:d3:c8:4a:04:69: 674s 8a:fd:74:17:8d:1f:8b:76:04:50:1e:22:0d:33:d2: 674s 51:07:5f:e6:4f:dd:81:3e:a2:fe:ef:18:cd:f6:89: 674s bc:e0:0b:cc:23:b8:3b:15:ef 674s Exponent: 65537 (0x10001) 674s Attributes: 674s (none) 674s Requested Extensions: 674s Signature Algorithm: sha256WithRSAEncryption 674s Signature Value: 674s 34:eb:16:bc:c8:5c:9e:bc:04:ff:77:63:5e:a8:dd:ae:c1:d8: 674s 30:5d:61:f1:d4:9e:64:3d:c6:b9:52:21:7e:75:cf:00:06:32: 674s da:e9:3d:a3:8c:aa:fe:62:f0:99:e4:72:39:0e:ba:58:b0:97: 674s f4:2c:12:46:56:3f:dd:65:25:43:a9:d5:99:36:f0:f2:15:c3: 674s e2:33:46:74:95:11:35:d1:86:9b:e1:12:e7:27:d1:8a:f1:e9: 674s 45:f1:38:1f:a0:6e:bd:56:82:82:4d:38:17:eb:87:96:c6:ca: 674s c3:39:b4:9e:80:f2:25:e2:15:8a:3a:48:61:b1:8a:87:86:f3: 674s 30:69 674s Using configuration from /tmp/sssd-softhsm2-certs-c0AzGN/test-root-CA.config 674s Check that the request matches the signature 674s Signature ok 674s Certificate Details: 674s Serial Number: 1 (0x1) 674s Validity 674s Not Before: Mar 24 14:30:32 2024 GMT 674s Not After : Mar 24 14:30:32 2025 GMT 674s Subject: 674s organizationName = Test Organization 674s organizationalUnitName = Test Organization Unit 674s commonName = Test Organization Intermediate CA 674s X509v3 extensions: 674s X509v3 Subject Key Identifier: 674s 5A:1F:57:9E:79:7C:0C:67:61:9A:39:D0:45:88:94:B0:4C:0E:1A:A3 674s X509v3 Authority Key Identifier: 674s keyid:EC:A9:A6:EC:82:AA:35:B7:7C:33:DC:EA:94:88:C3:86:D5:C2:3D:02 674s DirName:/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root CA 674s serial:00 674s X509v3 Basic Constraints: 674s CA:TRUE 674s X509v3 Key Usage: critical 674s Digital Signature, Certificate Sign, CRL Sign 674s Certificate is to be certified until Mar 24 14:30:32 2025 GMT (365 days) 674s 674s Write out database with 1 new entries 674s Database updated 674s + openssl x509 -noout -in /tmp/sssd-softhsm2-certs-c0AzGN/test-intermediate-CA.pem 674s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-c0AzGN/test-root-CA.pem /tmp/sssd-softhsm2-certs-c0AzGN/test-intermediate-CA.pem 674s + cat 674s /tmp/sssd-softhsm2-certs-c0AzGN/test-intermediate-CA.pem: OK 674s + sub_intermediate_ca_key_pass=pass:random-sub-intermediate-CA-password-29292 674s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-certs-c0AzGN/test-sub-intermediate-CA-key.pem -passout pass:random-sub-intermediate-CA-password-29292 1024 674s + openssl req -batch -new -nodes -passin pass:random-sub-intermediate-CA-password-29292 -config /tmp/sssd-softhsm2-certs-c0AzGN/test-sub-intermediate-CA.config -key /tmp/sssd-softhsm2-certs-c0AzGN/test-sub-intermediate-CA-key.pem -passout pass:random-intermediate-CA-password-13316 -sha256 -extensions v3_ca -out /tmp/sssd-softhsm2-certs-c0AzGN/test-sub-intermediate-CA-certificate-request.pem 674s + openssl req -text -noout -in /tmp/sssd-softhsm2-certs-c0AzGN/test-sub-intermediate-CA-certificate-request.pem 674s + openssl ca -batch -notext -config /tmp/sssd-softhsm2-certs-c0AzGN/test-intermediate-CA.config -passin pass:random-intermediate-CA-password-13316 -keyfile /tmp/sssd-softhsm2-certs-c0AzGN/test-intermediate-CA-key.pem -in /tmp/sssd-softhsm2-certs-c0AzGN/test-sub-intermediate-CA-certificate-request.pem -days 365 -extensions v3_intermediate_ca -out /tmp/sssd-softhsm2-certs-c0AzGN/test-sub-intermediate-CA.pem 674s Certificate Request: 674s Data: 674s Version: 1 (0x0) 674s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 674s Subject Public Key Info: 674s Public Key Algorithm: rsaEncryption 674s Public-Key: (1024 bit) 674s Modulus: 674s 00:94:1c:b3:8a:b4:6d:2b:03:cd:7a:0a:1d:44:a6: 674s 64:c1:b5:b8:52:c3:43:0b:e3:0f:94:08:6c:c3:a0: 674s 20:b7:a1:fa:8f:09:8e:9c:6b:dd:bd:c6:b3:3b:42: 674s 16:c3:ff:b4:52:20:6c:6d:1c:f5:2c:d6:7a:fb:bf: 674s 0d:25:ac:16:1d:5b:c9:6d:f0:67:10:28:ef:8c:5d: 674s b8:72:c5:56:37:e7:c5:4d:57:1a:b3:c4:aa:7b:59: 674s 76:bb:4f:10:7a:69:29:19:88:3d:be:98:b9:6b:1e: 674s 5f:96:24:93:98:7b:fe:63:ac:2d:f9:17:ce:86:81: 674s ef:0d:79:9a:2c:e5:89:11:55 674s Exponent: 65537 (0x10001) 674s Attributes: 674s (none) 674s Requested Extensions: 674s Signature Algorithm: sha256WithRSAEncryption 674s Signature Value: 674s 6c:dd:19:24:87:78:5d:f9:eb:5c:1f:bf:fd:de:70:2a:8d:62: 674s 6f:1d:e5:ac:71:5a:af:c0:24:e2:99:6f:37:8c:4b:22:dd:f8: 674s 63:84:33:51:48:76:c3:18:30:5d:70:6b:f8:e0:e9:96:d7:f0: 674s 47:7d:0c:38:90:01:66:61:8a:45:f1:22:f8:4b:5a:36:35:ff: 674s b3:48:5a:4d:98:30:eb:9a:33:93:3d:5d:1c:63:30:1f:41:10: 674s 3e:b8:b3:51:44:ef:f4:4d:99:72:8e:d9:d1:62:0b:f7:3a:9e: 674s c3:4e:4b:c3:1f:a3:6d:a5:7b:80:a6:b4:07:31:ce:e0:dc:0c: 674s 49:89 674s Using configuration from /tmp/sssd-softhsm2-certs-c0AzGN/test-intermediate-CA.config 674s Check that the request matches the signature 674s Signature ok 674s Certificate Details: 674s Serial Number: 2 (0x2) 674s Validity 674s Not Before: Mar 24 14:30:32 2024 GMT 674s Not After : Mar 24 14:30:32 2025 GMT 674s Subject: 674s organizationName = Test Organization 674s organizationalUnitName = Test Organization Unit 674s commonName = Test Organization Sub Intermediate CA 674s X509v3 extensions: 674s X509v3 Subject Key Identifier: 674s 12:05:99:BB:0E:7D:3C:BB:1F:93:71:6A:B0:BF:7F:40:F2:0F:46:4E 674s X509v3 Authority Key Identifier: 674s keyid:5A:1F:57:9E:79:7C:0C:67:61:9A:39:D0:45:88:94:B0:4C:0E:1A:A3 674s DirName:/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root CA 674s serial:01 674s X509v3 Basic Constraints: 674s CA:TRUE 674s X509v3 Key Usage: critical 674s Digital Signature, Certificate Sign, CRL Sign 674s Certificate is to be certified until Mar 24 14:30:32 2025 GMT (365 days) 674s 674s Write out database with 1 new entries 674s Database updated 674s + openssl x509 -noout -in /tmp/sssd-softhsm2-certs-c0AzGN/test-sub-intermediate-CA.pem 674s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-certs-c0AzGN/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-c0AzGN/test-sub-intermediate-CA.pem 674s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-certs-c0AzGN/test-root-CA.pem /tmp/sssd-softhsm2-certs-c0AzGN/test-sub-intermediate-CA.pem 674s /tmp/sssd-softhsm2-certs-c0AzGN/test-sub-intermediate-CA.pem: OK 674s + local cmd=openssl 674s + shift 674s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-c0AzGN/test-root-CA.pem /tmp/sssd-softhsm2-certs-c0AzGN/test-sub-intermediate-CA.pem 674s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 674s error 20 at 0 depth lookup: unable to get local issuer certificate 674s error /tmp/sssd-softhsm2-certs-c0AzGN/test-sub-intermediate-CA.pem: verification failed 674s + cat 674s + root_ca_trusted_cert_0001_key_pass=pass:random-root-ca-trusted-cert-0001-21404 674s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-certs-c0AzGN/test-root-CA-trusted-certificate-0001-key.pem -passout pass:random-root-ca-trusted-cert-0001-21404 1024 674s + openssl req -new -nodes -reqexts req_exts -passin pass:random-root-ca-trusted-cert-0001-21404 -key /tmp/sssd-softhsm2-certs-c0AzGN/test-root-CA-trusted-certificate-0001-key.pem -config /tmp/sssd-softhsm2-certs-c0AzGN/test-root-CA-trusted-certificate-0001.config -out /tmp/sssd-softhsm2-certs-c0AzGN/test-root-CA-trusted-certificate-0001-request.pem 674s + openssl req -text -noout -in /tmp/sssd-softhsm2-certs-c0AzGN/test-root-CA-trusted-certificate-0001-request.pem 674s + openssl ca -batch -notext -config /tmp/sssd-softhsm2-certs-c0AzGN/test-root-CA.config -passin pass:random-root-CA-password-29982 -keyfile /tmp/sssd-softhsm2-certs-c0AzGN/test-root-CA-key.pem -in /tmp/sssd-softhsm2-certs-c0AzGN/test-root-CA-trusted-certificate-0001-request.pem -days 365 -extensions usr_cert -out /tmp/sssd-softhsm2-certs-c0AzGN/test-root-CA-trusted-certificate-0001.pem 674s Certificate Request: 674s Data: 674s Version: 1 (0x0) 674s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 674s Subject Public Key Info: 674s Public Key Algorithm: rsaEncryption 674s Public-Key: (1024 bit) 674s Modulus: 674s 00:c8:ad:24:dc:a7:20:2a:f1:db:4d:1a:1f:79:e7: 674s a2:f1:5e:e9:8d:4a:15:85:a5:8e:7f:90:b9:18:b0: 674s 9b:a7:fe:92:1e:4e:7a:5a:c8:e9:4b:f6:ca:96:23: 674s 1e:45:11:a5:e0:ca:5e:5b:5f:f3:f9:8c:7e:e8:7e: 674s e2:31:37:0c:25:99:52:a5:d1:db:cc:fc:ac:37:23: 674s f7:8d:24:a0:9b:ac:64:f7:2d:b6:eb:e5:30:3c:e9: 674s b7:a5:70:bf:e4:3f:f3:89:06:07:07:11:56:3d:3b: 674s 37:01:f5:7e:27:bc:99:c7:f3:85:64:e2:c6:ac:1d: 674s 41:1a:c6:83:58:cf:f6:78:0b 674s Exponent: 65537 (0x10001) 674s Attributes: 674s Requested Extensions: 674s X509v3 Basic Constraints: 674s CA:FALSE 674s Netscape Cert Type: 674s SSL Client, S/MIME 674s Netscape Comment: 674s Test Organization Root CA trusted Certificate 674s X509v3 Subject Key Identifier: 674s 98:2D:8D:58:A5:40:E2:49:AC:22:2B:DF:18:B1:CA:36:E3:DB:06:B0 674s X509v3 Key Usage: critical 674s Digital Signature, Non Repudiation, Key Encipherment 674s X509v3 Extended Key Usage: 674s TLS Web Client Authentication, E-mail Protection 674s X509v3 Subject Alternative Name: 674s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 674s Signature Algorithm: sha256WithRSAEncryption 674s Signature Value: 674s 3e:51:58:bf:cf:f9:ae:2d:e8:f7:cb:e4:93:e2:f3:a9:3b:96: 674s 47:b6:96:dc:d4:3d:b3:a9:d3:9c:e5:5d:87:f3:a2:09:d7:59: 674s a6:b7:73:c9:e0:dd:b3:82:fd:77:6c:a4:9d:cf:75:48:f2:cc: 674s 22:6f:c8:70:09:d5:34:ca:72:fe:2e:03:80:f5:49:ec:16:8d: 674s df:05:f9:97:b1:c6:a6:bf:3f:74:94:cc:67:ca:dd:b9:77:20: 674s 9e:c0:a9:58:d4:a7:7a:23:6d:7e:f1:a6:3d:b5:b2:9c:38:e0: 674s 7a:63:0f:a3:24:d8:e3:a4:2a:f0:08:e1:55:f5:8c:40:ab:c0: 674s a9:cf 674s Using configuration from /tmp/sssd-softhsm2-certs-c0AzGN/test-root-CA.config 674s Check that the request matches the signature 674s Signature ok 674s Certificate Details: 674s Serial Number: 3 (0x3) 674s Validity 674s Not Before: Mar 24 14:30:32 2024 GMT 674s Not After : Mar 24 14:30:32 2025 GMT 674s Subject: 674s organizationName = Test Organization 674s organizationalUnitName = Test Organization Unit 674s commonName = Test Organization Root Trusted Certificate 0001 674s X509v3 extensions: 674s X509v3 Authority Key Identifier: 674s EC:A9:A6:EC:82:AA:35:B7:7C:33:DC:EA:94:88:C3:86:D5:C2:3D:02 674s X509v3 Basic Constraints: 674s CA:FALSE 674s Netscape Cert Type: 674s SSL Client, S/MIME 674s Netscape Comment: 674s Test Organization Root CA trusted Certificate 674s X509v3 Subject Key Identifier: 674s 98:2D:8D:58:A5:40:E2:49:AC:22:2B:DF:18:B1:CA:36:E3:DB:06:B0 674s X509v3 Key Usage: critical 674s Digital Signature, Non Repudiation, Key Encipherment 674s X509v3 Extended Key Usage: 674s TLS Web Client Authentication, E-mail Protection 674s X509v3 Subject Alternative Name: 674s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 674s Certificate is to be certified until Mar 24 14:30:32 2025 GMT (365 days) 674s 674s Write out database with 1 new entries 674s Database updated 674s + openssl x509 -noout -in /tmp/sssd-softhsm2-certs-c0AzGN/test-root-CA-trusted-certificate-0001.pem 674s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-c0AzGN/test-root-CA.pem /tmp/sssd-softhsm2-certs-c0AzGN/test-root-CA-trusted-certificate-0001.pem 674s /tmp/sssd-softhsm2-certs-c0AzGN/test-root-CA-trusted-certificate-0001.pem: OK 674s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-certs-c0AzGN/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-c0AzGN/test-root-CA-trusted-certificate-0001.pem 674s + local cmd=openssl 674s + shift 674s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-c0AzGN/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-c0AzGN/test-root-CA-trusted-certificate-0001.pem 674s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 674s error 20 at 0 depth lookup: unable to get local issuer certificate 674s error /tmp/sssd-softhsm2-certs-c0AzGN/test-root-CA-trusted-certificate-0001.pem: verification failed 674s + cat 674s + intermediate_ca_trusted_cert_0001_key_pass=pass:random-intermediate-ca-trusted-cert-0001-6470 674s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-certs-c0AzGN/test-intermediate-CA-trusted-certificate-0001-key.pem -passout pass:random-intermediate-ca-trusted-cert-0001-6470 1024 674s + openssl req -new -nodes -reqexts req_exts -passin pass:random-intermediate-ca-trusted-cert-0001-6470 -key /tmp/sssd-softhsm2-certs-c0AzGN/test-intermediate-CA-trusted-certificate-0001-key.pem -config /tmp/sssd-softhsm2-certs-c0AzGN/test-intermediate-CA-trusted-certificate-0001.config -out /tmp/sssd-softhsm2-certs-c0AzGN/test-intermediate-CA-trusted-certificate-0001-request.pem 674s + openssl req -text -noout -in /tmp/sssd-softhsm2-certs-c0AzGN/test-intermediate-CA-trusted-certificate-0001-request.pem 674s Certificate Request: 674s Data: 674s Version: 1 (0x0) 674s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 674s Subject Public Key Info: 674s Public Key Algorithm: rsaEncryption 674s Public-Key: (1024 bit) 674s Modulus: 674s 00:ba:a7:6e:35:1e:fb:26:0b:c7:0f:ca:e0:16:be: 674s ab:fc:b6:6f:e9:06:ab:86:8e:9c:38:53:fb:24:0a: 674s f2:09:af:ef:7a:45:79:aa:e3:2e:3f:8c:13:8a:ee: 674s 16:58:45:ec:b0:90:ff:99:0d:c5:e3:1b:41:49:4c: 674s c4:c6:31:bc:9f:5c:f1:74:c7:c1:b4:f6:30:f1:28: 674s 17:38:1e:69:fc:9f:c1:8f:56:56:20:16:5d:c3:e7: 674s af:a5:ea:15:23:83:b1:49:52:70:1d:48:6e:32:29: 674s a4:55:4d:26:76:e2:72:b1:19:fd:dc:ce:c4:e2:4d: 674s 22:4e:29:93:2b:35:5d:f2:33 674s Exponent: 65537 (0x10001) 674s Attributes: 674s Requested Extensions: 674s X509v3 Basic Constraints: 674s CA:FALSE 674s Netscape Cert Type: 674s SSL Client, S/MIME 674s Netscape Comment: 674s Test Organization Intermediate CA trusted Certificate 674s X509v3 Subject Key Identifier: 674s 96:B7:08:6B:97:0D:7A:B4:F4:FA:12:14:44:87:60:C0:33:9C:2D:5E 674s X509v3 Key Usage: critical 674s Digital Signature, Non Repudiation, Key Encipherment 674s X509v3 Extended Key Usage: 674s TLS Web Client Authentication, E-mail Protection 674s X509v3 Subject Alternative Name: 674s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 674s Signature Algorithm: sha256WithRSAEncryption 674s Signature Value: 674s 11:02:6f:52:52:91:d1:9a:55:0e:09:ea:6e:3d:a3:12:17:ac: 674s 12:06:81:73:d3:df:e2:93:5f:ca:32:cb:ca:f2:5e:0e:6b:c2: 674s 93:94:89:ae:45:6c:65:ad:b6:75:4e:67:72:13:a9:52:b7:0d: 674s 1a:96:e3:83:47:de:1a:1c:5f:2a:78:2c:83:4d:d1:57:c7:9b: 674s ba:60:3f:23:84:8f:65:3c:08:12:fb:6c:ab:aa:59:9e:7a:9c: 674s fa:1a:09:ed:e6:b0:b5:c2:5e:c0:89:7e:6d:08:ab:fa:c2:47: 674s 48:4f:b2:98:dc:6b:0d:51:f4:40:0c:13:f6:b4:a4:c5:5f:f1: 674s b4:c9 674s + openssl ca -passin pass:random-intermediate-CA-password-13316 -config /tmp/sssd-softhsm2-certs-c0AzGN/test-intermediate-CA.config -batch -notext -keyfile /tmp/sssd-softhsm2-certs-c0AzGN/test-intermediate-CA-key.pem -in /tmp/sssd-softhsm2-certs-c0AzGN/test-intermediate-CA-trusted-certificate-0001-request.pem -days 365 -extensions usr_cert -out /tmp/sssd-softhsm2-certs-c0AzGN/test-intermediate-CA-trusted-certificate-0001.pem 674s Using configuration from /tmp/sssd-softhsm2-certs-c0AzGN/test-intermediate-CA.config 674s Check that the request matches the signature 674s Signature ok 674s Certificate Details: 674s Serial Number: 4 (0x4) 674s Validity 674s Not Before: Mar 24 14:30:32 2024 GMT 674s Not After : Mar 24 14:30:32 2025 GMT 674s Subject: 674s organizationName = Test Organization 674s organizationalUnitName = Test Organization Unit 674s commonName = Test Organization Intermediate Trusted Certificate 0001 674s X509v3 extensions: 674s X509v3 Authority Key Identifier: 674s 5A:1F:57:9E:79:7C:0C:67:61:9A:39:D0:45:88:94:B0:4C:0E:1A:A3 674s X509v3 Basic Constraints: 674s CA:FALSE 674s Netscape Cert Type: 674s SSL Client, S/MIME 674s Netscape Comment: 674s Test Organization Intermediate CA trusted Certificate 674s X509v3 Subject Key Identifier: 674s 96:B7:08:6B:97:0D:7A:B4:F4:FA:12:14:44:87:60:C0:33:9C:2D:5E 674s X509v3 Key Usage: critical 674s Digital Signature, Non Repudiation, Key Encipherment 674s X509v3 Extended Key Usage: 674s TLS Web Client Authentication, E-mail Protection 674s X509v3 Subject Alternative Name: 674s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 674s Certificate is to be certified until Mar 24 14:30:32 2025 GMT (365 days) 674s 674s Write out database with 1 new entries 674s Database updated 674s + openssl x509 -noout -in /tmp/sssd-softhsm2-certs-c0AzGN/test-intermediate-CA-trusted-certificate-0001.pem 674s This certificate should not be trusted fully 674s + echo 'This certificate should not be trusted fully' 674s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-certs-c0AzGN/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-c0AzGN/test-intermediate-CA-trusted-certificate-0001.pem 674s + local cmd=openssl 674s + shift 674s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-c0AzGN/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-c0AzGN/test-intermediate-CA-trusted-certificate-0001.pem 674s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 674s error 2 at 1 depth lookup: unable to get issuer certificate 674s error /tmp/sssd-softhsm2-certs-c0AzGN/test-intermediate-CA-trusted-certificate-0001.pem: verification failed 674s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-certs-c0AzGN/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-c0AzGN/test-intermediate-CA-trusted-certificate-0001.pem 674s /tmp/sssd-softhsm2-certs-c0AzGN/test-intermediate-CA-trusted-certificate-0001.pem: OK 674s + cat 674s + sub_intermediate_ca_trusted_cert_0001_key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-31277 674s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-certs-c0AzGN/test-sub-intermediate-CA-trusted-certificate-0001-key.pem -passout pass:random-sub-intermediate-ca-trusted-cert-0001-31277 1024 675s + openssl req -new -nodes -reqexts req_exts -passin pass:random-sub-intermediate-ca-trusted-cert-0001-31277 -key /tmp/sssd-softhsm2-certs-c0AzGN/test-sub-intermediate-CA-trusted-certificate-0001-key.pem -config /tmp/sssd-softhsm2-certs-c0AzGN/test-sub-intermediate-CA-trusted-certificate-0001.config -out /tmp/sssd-softhsm2-certs-c0AzGN/test-sub-intermediate-CA-trusted-certificate-0001-request.pem 675s + openssl req -text -noout -in /tmp/sssd-softhsm2-certs-c0AzGN/test-sub-intermediate-CA-trusted-certificate-0001-request.pem 675s + openssl ca -passin pass:random-sub-intermediate-CA-password-29292 -config /tmp/sssd-softhsm2-certs-c0AzGN/test-sub-intermediate-CA.config -batch -notext -keyfile /tmp/sssd-softhsm2-certs-c0AzGN/test-sub-intermediate-CA-key.pem -in /tmp/sssd-softhsm2-certs-c0AzGN/test-sub-intermediate-CA-trusted-certificate-0001-request.pem -days 365 -extensions usr_cert -out /tmp/sssd-softhsm2-certs-c0AzGN/test-sub-intermediate-CA-trusted-certificate-0001.pem 675s Certificate Request: 675s Data: 675s Version: 1 (0x0) 675s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 675s Subject Public Key Info: 675s Public Key Algorithm: rsaEncryption 675s Public-Key: (1024 bit) 675s Modulus: 675s 00:d2:60:ac:fa:85:a0:58:63:b4:01:4a:51:d8:67: 675s 18:f0:af:86:f8:98:2b:78:b0:9c:a2:ed:d4:90:05: 675s 94:34:e6:18:75:0d:3e:19:00:df:6d:49:e8:68:34: 675s e9:b2:06:10:e3:ad:40:3c:3d:fb:84:d0:48:0e:7f: 675s e9:b6:51:a5:fd:e1:38:0d:fe:73:cd:eb:9a:84:eb: 675s a5:e6:46:b1:2f:c8:94:a7:2c:9e:73:db:e1:de:12: 675s b2:38:b2:d6:7d:72:66:89:ce:1c:02:a6:a3:66:89: 675s e5:2d:f7:17:00:d1:9f:ea:3e:0a:06:a6:79:13:26: 675s 7f:ba:22:08:41:cf:ee:db:43 675s Exponent: 65537 (0x10001) 675s Attributes: 675s Requested Extensions: 675s X509v3 Basic Constraints: 675s CA:FALSE 675s Netscape Cert Type: 675s SSL Client, S/MIME 675s Netscape Comment: 675s Test Organization Sub Intermediate CA trusted Certificate 675s X509v3 Subject Key Identifier: 675s AA:73:66:7C:2A:9B:3A:5C:09:11:1E:F9:C3:1C:56:ED:29:42:4E:54 675s X509v3 Key Usage: critical 675s Digital Signature, Non Repudiation, Key Encipherment 675s X509v3 Extended Key Usage: 675s TLS Web Client Authentication, E-mail Protection 675s X509v3 Subject Alternative Name: 675s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 675s Signature Algorithm: sha256WithRSAEncryption 675s Signature Value: 675s af:ee:e6:75:3e:a1:14:49:ad:2c:96:ab:c8:ed:37:81:e1:39: 675s b3:b1:53:f2:e0:ac:40:1b:25:a5:88:41:f1:dc:03:d2:ca:14: 675s 75:e2:17:2d:92:3b:1e:7c:8e:dc:f1:6e:1f:0a:33:95:68:b8: 675s 29:77:cd:1e:49:84:bf:c9:9c:21:0f:e9:c6:a0:4c:35:df:b5: 675s 7d:e1:03:0b:0f:9a:23:96:62:eb:25:75:68:10:4f:49:e2:7b: 675s c4:89:d2:26:51:0b:41:b9:39:e9:99:5a:fa:e3:88:d3:85:0c: 675s d1:1a:1d:25:5f:94:19:f0:fb:05:09:3f:65:d8:b6:78:55:c4: 675s c7:1c 675s Using configuration from /tmp/sssd-softhsm2-certs-c0AzGN/test-sub-intermediate-CA.config 675s Check that the request matches the signature 675s Signature ok 675s Certificate Details: 675s Serial Number: 5 (0x5) 675s Validity 675s Not Before: Mar 24 14:30:32 2024 GMT 675s Not After : Mar 24 14:30:32 2025 GMT 675s Subject: 675s organizationName = Test Organization 675s organizationalUnitName = Test Organization Unit 675s commonName = Test Organization Sub Intermediate Trusted Certificate 0001 675s X509v3 extensions: 675s X509v3 Authority Key Identifier: 675s 12:05:99:BB:0E:7D:3C:BB:1F:93:71:6A:B0:BF:7F:40:F2:0F:46:4E 675s X509v3 Basic Constraints: 675s CA:FALSE 675s Netscape Cert Type: 675s SSL Client, S/MIME 675s Netscape Comment: 675s Test Organization Sub Intermediate CA trusted Certificate 675s X509v3 Subject Key Identifier: 675s AA:73:66:7C:2A:9B:3A:5C:09:11:1E:F9:C3:1C:56:ED:29:42:4E:54 675s X509v3 Key Usage: critical 675s Digital Signature, Non Repudiation, Key Encipherment 675s X509v3 Extended Key Usage: 675s TLS Web Client Authentication, E-mail Protection 675s X509v3 Subject Alternative Name: 675s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 675s Certificate is to be certified until Mar 24 14:30:32 2025 GMT (365 days) 675s 675s Write out database with 1 new entries 675s Database updated 675s + openssl x509 -noout -in /tmp/sssd-softhsm2-certs-c0AzGN/test-sub-intermediate-CA-trusted-certificate-0001.pem 675s + echo 'This certificate should not be trusted fully' 675s This certificate should not be trusted fully 675s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-certs-c0AzGN/test-sub-intermediate-CA.pem /tmp/sssd-softhsm2-certs-c0AzGN/test-sub-intermediate-CA-trusted-certificate-0001.pem 675s + local cmd=openssl 675s + shift 675s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-c0AzGN/test-sub-intermediate-CA.pem /tmp/sssd-softhsm2-certs-c0AzGN/test-sub-intermediate-CA-trusted-certificate-0001.pem 675s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 675s error 2 at 1 depth lookup: unable to get issuer certificate 675s error /tmp/sssd-softhsm2-certs-c0AzGN/test-sub-intermediate-CA-trusted-certificate-0001.pem: verification failed 675s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-certs-c0AzGN/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-c0AzGN/test-sub-intermediate-CA-trusted-certificate-0001.pem 675s + local cmd=openssl 675s + shift 675s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-c0AzGN/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-c0AzGN/test-sub-intermediate-CA-trusted-certificate-0001.pem 675s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 675s error 20 at 0 depth lookup: unable to get local issuer certificate 675s error /tmp/sssd-softhsm2-certs-c0AzGN/test-sub-intermediate-CA-trusted-certificate-0001.pem: verification failed 675s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-certs-c0AzGN/test-sub-intermediate-CA.pem /tmp/sssd-softhsm2-certs-c0AzGN/test-sub-intermediate-CA-trusted-certificate-0001.pem 675s /tmp/sssd-softhsm2-certs-c0AzGN/test-sub-intermediate-CA-trusted-certificate-0001.pem: OK 675s + expect_fail openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-certs-c0AzGN/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-c0AzGN/test-sub-intermediate-CA-trusted-certificate-0001.pem 675s + local cmd=openssl 675s + shift 675s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-certs-c0AzGN/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-c0AzGN/test-sub-intermediate-CA-trusted-certificate-0001.pem 675s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 675s error 20 at 0 depth lookup: unable to get local issuer certificate 675s error /tmp/sssd-softhsm2-certs-c0AzGN/test-sub-intermediate-CA-trusted-certificate-0001.pem: verification failed 675s + echo 'Building a the full-chain CA file...' 675s Building a the full-chain CA file... 675s + cat /tmp/sssd-softhsm2-certs-c0AzGN/test-root-CA.pem /tmp/sssd-softhsm2-certs-c0AzGN/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-c0AzGN/test-sub-intermediate-CA.pem 675s + cat /tmp/sssd-softhsm2-certs-c0AzGN/test-root-CA.pem /tmp/sssd-softhsm2-certs-c0AzGN/test-intermediate-CA.pem 675s + cat /tmp/sssd-softhsm2-certs-c0AzGN/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-c0AzGN/test-sub-intermediate-CA.pem 675s + openssl crl2pkcs7 -nocrl -certfile /tmp/sssd-softhsm2-certs-c0AzGN/test-full-chain-CA.pem 675s + openssl pkcs7 -print_certs -noout 675s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-c0AzGN/test-full-chain-CA.pem /tmp/sssd-softhsm2-certs-c0AzGN/test-intermediate-CA.pem 675s subject=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 675s issuer=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 675s 675s subject=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 675s issuer=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 675s 675s subject=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 675s issuer=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 675s 675s /tmp/sssd-softhsm2-certs-c0AzGN/test-intermediate-CA.pem: OK 675s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-c0AzGN/test-full-chain-CA.pem /tmp/sssd-softhsm2-certs-c0AzGN/test-root-CA-trusted-certificate-0001.pem 675s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-c0AzGN/test-full-chain-CA.pem /tmp/sssd-softhsm2-certs-c0AzGN/test-intermediate-CA-trusted-certificate-0001.pem 675s /tmp/sssd-softhsm2-certs-c0AzGN/test-root-CA-trusted-certificate-0001.pem: OK 675s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-c0AzGN/test-full-chain-CA.pem /tmp/sssd-softhsm2-certs-c0AzGN/test-root-intermediate-chain-CA.pem 675s /tmp/sssd-softhsm2-certs-c0AzGN/test-intermediate-CA-trusted-certificate-0001.pem: OK 675s /tmp/sssd-softhsm2-certs-c0AzGN/test-root-intermediate-chain-CA.pem: OK 675s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-c0AzGN/test-full-chain-CA.pem /tmp/sssd-softhsm2-certs-c0AzGN/test-sub-intermediate-CA-trusted-certificate-0001.pem 675s /tmp/sssd-softhsm2-certs-c0AzGN/test-sub-intermediate-CA-trusted-certificate-0001.pem: OK 675s Certificates generation completed! 675s + echo 'Certificates generation completed!' 675s + [[ -v NO_SSSD_TESTS ]] 675s + [[ -v GENERATE_SMART_CARDS ]] 675s + prepare_softhsm2_card /tmp/sssd-softhsm2-certs-c0AzGN/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-21404 675s + local certificate=/tmp/sssd-softhsm2-certs-c0AzGN/test-root-CA-trusted-certificate-0001.pem 675s + local key_pass=pass:random-root-ca-trusted-cert-0001-21404 675s + local key_cn 675s + local key_name 675s + local tokens_dir 675s + local output_cert_file 675s + token_name= 675s ++ basename /tmp/sssd-softhsm2-certs-c0AzGN/test-root-CA-trusted-certificate-0001.pem .pem 675s + key_name=test-root-CA-trusted-certificate-0001 675s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-certs-c0AzGN/test-root-CA-trusted-certificate-0001.pem 675s ++ sed -n 's/ *commonName *= //p' 675s + key_cn='Test Organization Root Trusted Certificate 0001' 675s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 675s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-certs-c0AzGN/softhsm2-test-root-CA-trusted-certificate-0001.conf 675s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-certs-c0AzGN/softhsm2-test-root-CA-trusted-certificate-0001.conf 675s ++ basename /tmp/sssd-softhsm2-certs-c0AzGN/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 675s + tokens_dir=/tmp/sssd-softhsm2-certs-c0AzGN/softhsm2-test-root-CA-trusted-certificate-0001 675s + token_name='Test Organization Root Tr Token' 675s + '[' '!' -e /tmp/sssd-softhsm2-certs-c0AzGN/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 675s + local key_file 675s + local decrypted_key 675s + mkdir -p /tmp/sssd-softhsm2-certs-c0AzGN/softhsm2-test-root-CA-trusted-certificate-0001 675s + key_file=/tmp/sssd-softhsm2-certs-c0AzGN/test-root-CA-trusted-certificate-0001-key.pem 675s + decrypted_key=/tmp/sssd-softhsm2-certs-c0AzGN/test-root-CA-trusted-certificate-0001-key-decrypted.pem 675s + cat 675s + softhsm2-util --init-token --label 'Test Organization Root Tr Token' --pin 123456 --so-pin 123456 --free 675s Slot 0 has a free/uninitialized token. 675s The token has been initialized and is reassigned to slot 1328810265 675s + softhsm2-util --show-slots 675s Available slots: 675s Slot 1328810265 675s Slot info: 675s Description: SoftHSM slot ID 0x4f340919 675s Manufacturer ID: SoftHSM project 675s Hardware version: 2.6 675s Firmware version: 2.6 675s Token present: yes 675s Token info: 675s Manufacturer ID: SoftHSM project 675s Model: SoftHSM v2 675s Hardware version: 2.6 675s Firmware version: 2.6 675s Serial number: 3fb7c7a04f340919 675s Initialized: yes 675s User PIN init.: yes 675s Label: Test Organization Root Tr Token 675s Slot 1 675s Slot info: 675s Description: SoftHSM slot ID 0x1 675s Manufacturer ID: SoftHSM project 675s Hardware version: 2.6 675s Firmware version: 2.6 675s Token present: yes 675s Token info: 675s Manufacturer ID: SoftHSM project 675s Model: SoftHSM v2 675s Hardware version: 2.6 675s Firmware version: 2.6 675s Serial number: 675s Initialized: no 675s User PIN init.: no 675s Label: 675s + p11tool --provider=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --write --no-mark-private --load-certificate=/tmp/sssd-softhsm2-certs-c0AzGN/test-root-CA-trusted-certificate-0001.pem --login --set-pin=123456 --label 'Test Organization Root Trusted Certificate 0001' --id 00112233445566778899FFAABBCCDDEEFF012345 675s + openssl rsa -passin pass:random-root-ca-trusted-cert-0001-21404 -in /tmp/sssd-softhsm2-certs-c0AzGN/test-root-CA-trusted-certificate-0001-key.pem -out /tmp/sssd-softhsm2-certs-c0AzGN/test-root-CA-trusted-certificate-0001-key-decrypted.pem 675s writing RSA key 675s + p11tool --provider=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --write --load-privkey=/tmp/sssd-softhsm2-certs-c0AzGN/test-root-CA-trusted-certificate-0001-key-decrypted.pem --login --set-pin=123456 --label 'Test Organization Root Trusted Certificate 0001 Key' --id 00112233445566778899FFAABBCCDDEEFF012345 675s + rm /tmp/sssd-softhsm2-certs-c0AzGN/test-root-CA-trusted-certificate-0001-key-decrypted.pem 675s + p11tool --provider=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --list-all 675s Object 0: 675s URL: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=3fb7c7a04f340919;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert 675s Type: X.509 Certificate (RSA-1024) 675s Expires: Mon Mar 24 14:30:32 2025 675s Label: Test Organization Root Trusted Certificate 0001 675s ID: 00:11:22:33:44:55:66:77:88:99:ff:aa:bb:cc:dd:ee:ff:01:23:45 675s 675s + echo 'Test Organization Root Tr Token' 675s Test Organization Root Tr Token 675s + prepare_softhsm2_card /tmp/sssd-softhsm2-certs-c0AzGN/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-6470 675s + local certificate=/tmp/sssd-softhsm2-certs-c0AzGN/test-intermediate-CA-trusted-certificate-0001.pem 675s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-6470 675s + local key_cn 675s + local key_name 675s + local tokens_dir 675s + local output_cert_file 675s + token_name= 675s ++ basename /tmp/sssd-softhsm2-certs-c0AzGN/test-intermediate-CA-trusted-certificate-0001.pem .pem 675s + key_name=test-intermediate-CA-trusted-certificate-0001 675s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-certs-c0AzGN/test-intermediate-CA-trusted-certificate-0001.pem 675s ++ sed -n 's/ *commonName *= //p' 675s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 675s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 675s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-certs-c0AzGN/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 675s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-certs-c0AzGN/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 675s ++ basename /tmp/sssd-softhsm2-certs-c0AzGN/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 675s + tokens_dir=/tmp/sssd-softhsm2-certs-c0AzGN/softhsm2-test-intermediate-CA-trusted-certificate-0001 675s + token_name='Test Organization Interme Token' 675s + '[' '!' -e /tmp/sssd-softhsm2-certs-c0AzGN/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 675s + local key_file 675s + local decrypted_key 675s + mkdir -p /tmp/sssd-softhsm2-certs-c0AzGN/softhsm2-test-intermediate-CA-trusted-certificate-0001 675s + key_file=/tmp/sssd-softhsm2-certs-c0AzGN/test-intermediate-CA-trusted-certificate-0001-key.pem 675s + decrypted_key=/tmp/sssd-softhsm2-certs-c0AzGN/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 675s + cat 675s + softhsm2-util --init-token --label 'Test Organization Interme Token' --pin 123456 --so-pin 123456 --free 675s Slot 0 has a free/uninitialized token. 675s The token has been initialized and is reassigned to slot 209501986 675s + softhsm2-util --show-slots 675s Available slots: 675s Slot 209501986 675s Slot info: 675s Description: SoftHSM slot ID 0xc7cbf22 675s Manufacturer ID: SoftHSM project 675s Hardware version: 2.6 675s Firmware version: 2.6 675s Token present: yes 675s Token info: 675s Manufacturer ID: SoftHSM project 675s Model: SoftHSM v2 675s Hardware version: 2.6 675s Firmware version: 2.6 675s Serial number: cc0095908c7cbf22 675s Initialized: yes 675s User PIN init.: yes 675s Label: Test Organization Interme Token 675s Slot 1 675s Slot info: 675s Description: SoftHSM slot ID 0x1 675s Manufacturer ID: SoftHSM project 675s Hardware version: 2.6 675s Firmware version: 2.6 675s Token present: yes 675s Token info: 675s Manufacturer ID: SoftHSM project 675s Model: SoftHSM v2 675s Hardware version: 2.6 675s Firmware version: 2.6 675s Serial number: 675s Initialized: no 675s User PIN init.: no 675s Label: 675s + p11tool --provider=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --write --no-mark-private --load-certificate=/tmp/sssd-softhsm2-certs-c0AzGN/test-intermediate-CA-trusted-certificate-0001.pem --login --set-pin=123456 --label 'Test Organization Intermediate Trusted Certificate 0001' --id 00112233445566778899FFAABBCCDDEEFF012345 675s + openssl rsa -passin pass:random-intermediate-ca-trusted-cert-0001-6470 -in /tmp/sssd-softhsm2-certs-c0AzGN/test-intermediate-CA-trusted-certificate-0001-key.pem -out /tmp/sssd-softhsm2-certs-c0AzGN/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 675s writing RSA key 675s + p11tool --provider=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --write --load-privkey=/tmp/sssd-softhsm2-certs-c0AzGN/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem --login --set-pin=123456 --label 'Test Organization Intermediate Trusted Certificate 0001 Key' --id 00112233445566778899FFAABBCCDDEEFF012345 675s + rm /tmp/sssd-softhsm2-certs-c0AzGN/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 675s + p11tool --provider=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --list-all 675s Object 0: 675s URL: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=cc0095908c7cbf22;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert 675s Type: X.509 Certificate (RSA-1024) 675s Expires: Mon Mar 24 14:30:32 2025 675s Label: Test Organization Intermediate Trusted Certificate 0001 675s ID: 00:11:22:33:44:55:66:77:88:99:ff:aa:bb:cc:dd:ee:ff:01:23:45 675s 675s + echo 'Test Organization Interme Token' 675s Test Organization Interme Token 675s + prepare_softhsm2_card /tmp/sssd-softhsm2-certs-c0AzGN/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-31277 675s + local certificate=/tmp/sssd-softhsm2-certs-c0AzGN/test-sub-intermediate-CA-trusted-certificate-0001.pem 675s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-31277 675s + local key_cn 675s + local key_name 675s + local tokens_dir 675s + local output_cert_file 675s + token_name= 675s ++ basename /tmp/sssd-softhsm2-certs-c0AzGN/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 675s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 675s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-certs-c0AzGN/test-sub-intermediate-CA-trusted-certificate-0001.pem 675s ++ sed -n 's/ *commonName *= //p' 675s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 675s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 675s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-certs-c0AzGN/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 675s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-certs-c0AzGN/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 675s ++ basename /tmp/sssd-softhsm2-certs-c0AzGN/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 675s + tokens_dir=/tmp/sssd-softhsm2-certs-c0AzGN/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 675s + token_name='Test Organization Sub Int Token' 675s + '[' '!' -e /tmp/sssd-softhsm2-certs-c0AzGN/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 675s + local key_file 675s + local decrypted_key 675s + mkdir -p /tmp/sssd-softhsm2-certs-c0AzGN/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 675s + key_file=/tmp/sssd-softhsm2-certs-c0AzGN/test-sub-intermediate-CA-trusted-certificate-0001-key.pem 675s + decrypted_key=/tmp/sssd-softhsm2-certs-c0AzGN/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 675s + cat 675s + softhsm2-util --init-token --label 'Test Organization Sub Int Token' --pin 123456 --so-pin 123456 --free 675s Slot 0 has a free/uninitialized token. 675s The token has been initialized and is reassigned to slot 285406680 675s + softhsm2-util --show-slots 675s Available slots: 675s Slot 285406680 675s Slot info: 675s Description: SoftHSM slot ID 0x1102f5d8 675s Manufacturer ID: SoftHSM project 675s Hardware version: 2.6 675s Firmware version: 2.6 675s Token present: yes 675s Token info: 675s Manufacturer ID: SoftHSM project 675s Model: SoftHSM v2 675s Hardware version: 2.6 675s Firmware version: 2.6 675s Serial number: 78af42859102f5d8 675s Initialized: yes 675s User PIN init.: yes 675s Label: Test Organization Sub Int Token 675s Slot 1 675s Slot info: 675s Description: SoftHSM slot ID 0x1 675s Manufacturer ID: SoftHSM project 675s Hardware version: 2.6 675s Firmware version: 2.6 675s Token present: yes 675s Token info: 675s Manufacturer ID: SoftHSM project 675s Model: SoftHSM v2 675s Hardware version: 2.6 675s Firmware version: 2.6 675s Serial number: 675s Initialized: no 675s User PIN init.: no 675s Label: 675s + p11tool --provider=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --write --no-mark-private --load-certificate=/tmp/sssd-softhsm2-certs-c0AzGN/test-sub-intermediate-CA-trusted-certificate-0001.pem --login --set-pin=123456 --label 'Test Organization Sub Intermediate Trusted Certificate 0001' --id 00112233445566778899FFAABBCCDDEEFF012345 675s + openssl rsa -passin pass:random-sub-intermediate-ca-trusted-cert-0001-31277 -in /tmp/sssd-softhsm2-certs-c0AzGN/test-sub-intermediate-CA-trusted-certificate-0001-key.pem -out /tmp/sssd-softhsm2-certs-c0AzGN/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 675s writing RSA key 675s + p11tool --provider=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --write --load-privkey=/tmp/sssd-softhsm2-certs-c0AzGN/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem --login --set-pin=123456 --label 'Test Organization Sub Intermediate Trusted Certificate 0001 Key' --id 00112233445566778899FFAABBCCDDEEFF012345 675s + rm /tmp/sssd-softhsm2-certs-c0AzGN/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 675s + p11tool --provider=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --list-all 675s Object 0: 675s URL: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=78af42859102f5d8;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert 675s Type: X.509 Certificate (RSA-1024) 675s Expires: Mon Mar 24 14:30:32 2025 675s Label: Test Organization Sub Intermediate Trusted Certificate 0001 675s ID: 00:11:22:33:44:55:66:77:88:99:ff:aa:bb:cc:dd:ee:ff:01:23:45 675s 675s + echo 'Test Organization Sub Int Token' 675s + echo 'Certificates generation completed!' 675s Test Organization Sub Int Token 675s Certificates generation completed! 675s + exit 0 675s + find /tmp/sssd-softhsm2-certs-c0AzGN -type d -exec chmod 777 '{}' ';' 675s + find /tmp/sssd-softhsm2-certs-c0AzGN -type f -exec chmod 666 '{}' ';' 675s + backup_file /etc/sssd/sssd.conf 675s + '[' -z '' ']' 675s ++ mktemp -d -t sssd-softhsm2-backups-XXXXXX 675s + backupsdir=/tmp/sssd-softhsm2-backups-IeYcZ5 675s + '[' -e /etc/sssd/sssd.conf ']' 675s + delete_paths+=("$1") 675s + rm -f /etc/sssd/sssd.conf 675s ++ runuser -u ubuntu -- sh -c 'echo ~' 675s + user_home=/home/ubuntu 675s + mkdir -p /home/ubuntu 675s + chown ubuntu:ubuntu /home/ubuntu 675s ++ runuser -u ubuntu -- sh -c 'echo ${XDG_CONFIG_HOME:-~/.config}' 675s + user_config=/home/ubuntu/.config 675s + system_config=/etc 675s + softhsm2_conf_paths=("${AUTOPKGTEST_NORMAL_USER}:$user_config/softhsm2/softhsm2.conf" "root:$system_config/softhsm/softhsm2.conf") 675s + for path_pair in "${softhsm2_conf_paths[@]}" 675s + IFS=: 675s + read -r -a path 675s + path=/home/ubuntu/.config/softhsm2/softhsm2.conf 675s + backup_file /home/ubuntu/.config/softhsm2/softhsm2.conf 675s + '[' -z /tmp/sssd-softhsm2-backups-IeYcZ5 ']' 675s + '[' -e /home/ubuntu/.config/softhsm2/softhsm2.conf ']' 675s + delete_paths+=("$1") 675s + rm -f /home/ubuntu/.config/softhsm2/softhsm2.conf 675s + for path_pair in "${softhsm2_conf_paths[@]}" 675s + IFS=: 675s + read -r -a path 675s + path=/etc/softhsm/softhsm2.conf 675s + backup_file /etc/softhsm/softhsm2.conf 675s + '[' -z /tmp/sssd-softhsm2-backups-IeYcZ5 ']' 675s + '[' -e /etc/softhsm/softhsm2.conf ']' 675s ++ dirname /etc/softhsm/softhsm2.conf 675s + local back_dir=/tmp/sssd-softhsm2-backups-IeYcZ5//etc/softhsm 675s ++ basename /etc/softhsm/softhsm2.conf 675s + local back_path=/tmp/sssd-softhsm2-backups-IeYcZ5//etc/softhsm/softhsm2.conf 675s + '[' '!' -e /tmp/sssd-softhsm2-backups-IeYcZ5//etc/softhsm/softhsm2.conf ']' 675s + mkdir -p /tmp/sssd-softhsm2-backups-IeYcZ5//etc/softhsm 675s + cp -a /etc/softhsm/softhsm2.conf /tmp/sssd-softhsm2-backups-IeYcZ5//etc/softhsm/softhsm2.conf 675s + restore_paths+=("$back_path") 675s + rm -f /etc/softhsm/softhsm2.conf 675s + test_authentication login /tmp/sssd-softhsm2-certs-c0AzGN/softhsm2-test-root-CA-trusted-certificate-0001.conf /tmp/sssd-softhsm2-certs-c0AzGN/test-full-chain-CA.pem 675s + pam_service=login 675s + certificate_config=/tmp/sssd-softhsm2-certs-c0AzGN/softhsm2-test-root-CA-trusted-certificate-0001.conf 675s + ca_db=/tmp/sssd-softhsm2-certs-c0AzGN/test-full-chain-CA.pem 675s + verification_options= 675s + mkdir -p -m 700 /etc/sssd 675s + echo 'Using CA DB '\''/tmp/sssd-softhsm2-certs-c0AzGN/test-full-chain-CA.pem'\'' with verification options: '\'''\''' 675s Using CA DB '/tmp/sssd-softhsm2-certs-c0AzGN/test-full-chain-CA.pem' with verification options: '' 675s + cat 675s + chmod 600 /etc/sssd/sssd.conf 675s + for path_pair in "${softhsm2_conf_paths[@]}" 675s + IFS=: 675s + read -r -a path 675s + user=ubuntu 675s + path=/home/ubuntu/.config/softhsm2/softhsm2.conf 675s ++ dirname /home/ubuntu/.config/softhsm2/softhsm2.conf 675s + runuser -u ubuntu -- mkdir -p /home/ubuntu/.config/softhsm2 675s + runuser -u ubuntu -- ln -sf /tmp/sssd-softhsm2-certs-c0AzGN/softhsm2-test-root-CA-trusted-certificate-0001.conf /home/ubuntu/.config/softhsm2/softhsm2.conf 675s + runuser -u ubuntu -- softhsm2-util --show-slots 675s + grep 'Test Organization' 675s Label: Test Organization Root Tr Token 675s + for path_pair in "${softhsm2_conf_paths[@]}" 675s + IFS=: 675s + read -r -a path 675s + user=root 675s + path=/etc/softhsm/softhsm2.conf 675s ++ dirname /etc/softhsm/softhsm2.conf 675s + runuser -u root -- mkdir -p /etc/softhsm 675s + runuser -u root -- ln -sf /tmp/sssd-softhsm2-certs-c0AzGN/softhsm2-test-root-CA-trusted-certificate-0001.conf /etc/softhsm/softhsm2.conf 675s + runuser -u root -- softhsm2-util --show-slots 675s + grep 'Test Organization' 675s Label: Test Organization Root Tr Token 675s + systemctl restart sssd 675s + pam-auth-update --disable sss-smart-card-optional sss-smart-card-required 676s + for alternative in "${alternative_pam_configs[@]}" 676s + pam-auth-update --enable sss-smart-card-optional 676s + cat /etc/pam.d/common-auth 676s # 676s # /etc/pam.d/common-auth - authentication settings common to all services 676s # 676s # This file is included from other service-specific PAM config files, 676s # and should contain a list of the authentication modules that define 676s # the central authentication scheme for use on the system 676s # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the 676s # traditional Unix authentication mechanisms. 676s # 676s # As of pam 1.0.1-6, this file is managed by pam-auth-update by default. 676s # To take advantage of this, it is recommended that you configure any 676s # local modules either before or after the default block, and use 676s # pam-auth-update to manage selection of other modules. See 676s # pam-auth-update(8) for details. 676s 676s # here are the per-package modules (the "Primary" block) 676s auth [success=3 default=ignore] pam_sss.so allow_missing_name try_cert_auth 676s auth [success=2 default=ignore] pam_unix.so nullok try_first_pass 676s auth [success=1 default=ignore] pam_sss.so use_first_pass 676s # here's the fallback if no module succeeds 676s auth requisite pam_deny.so 676s # prime the stack with a positive return value if there isn't one already; 676s # this avoids us returning an error just because nothing sets a success code 676s # since the modules above will each just jump around 676s auth required pam_permit.so 676s # and here are more per-package modules (the "Additional" block) 676s auth optional pam_cap.so 676s # end of pam-auth-update config 676s + echo -n -e 123456 676s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 676s pamtester: invoking pam_start(login, ubuntu, ...) 676s pamtester: performing operation - authenticate 676s PIN for Test Organization Root Tr Token: pamtester: successfully authenticated 676s + echo -n -e 123456 676s + runuser -u ubuntu -- pamtester -v login '' authenticate 676s pamtester: invoking pam_start(login, , ...) 676s pamtester: performing operation - authenticate 676s PIN for Test Organization Root Tr Token: pamtester: successfully authenticated 676s + echo -n -e wrong123456 676s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 676s pamtester: invoking pam_start(login, ubuntu, ...) 676s pamtester: performing operation - authenticate 678s PIN for Test Organization Root Tr Token: Password: pamtester: Authentication failure 679s + echo -n -e wrong123456 679s + runuser -u ubuntu -- pamtester -v login '' authenticate 679s pamtester: invoking pam_start(login, , ...) 679s pamtester: performing operation - authenticate 681s PIN for Test Organization Root Tr Token: Password: pamtester: Authentication failure 681s + echo -n -e 123456 681s + pamtester -v login root authenticate 681s pamtester: invoking pam_start(login, root, ...) 681s pamtester: performing operation - authenticate 684s Password: pamtester: Authentication failure 684s + for alternative in "${alternative_pam_configs[@]}" 684s + pam-auth-update --enable sss-smart-card-required 684s PAM configuration 684s ----------------- 684s 684s Incompatible PAM profiles selected. 684s 684s The following PAM profiles cannot be used together: 684s 684s SSS required smart card authentication, SSS optional smart card 684s authentication 684s 684s Please select a different set of modules to enable. 684s 684s + cat /etc/pam.d/common-auth 684s + echo -n -e 123456 684s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 684s # 684s # /etc/pam.d/common-auth - authentication settings common to all services 684s # 684s # This file is included from other service-specific PAM config files, 684s # and should contain a list of the authentication modules that define 684s # the central authentication scheme for use on the system 684s # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the 684s # traditional Unix authentication mechanisms. 684s # 684s # As of pam 1.0.1-6, this file is managed by pam-auth-update by default. 684s # To take advantage of this, it is recommended that you configure any 684s # local modules either before or after the default block, and use 684s # pam-auth-update to manage selection of other modules. See 684s # pam-auth-update(8) for details. 684s 684s # here are the per-package modules (the "Primary" block) 684s auth [success=3 ignore=ignore default=die] pam_sss.so allow_missing_name require_cert_auth 684s auth [success=2 default=ignore] pam_unix.so nullok try_first_pass 684s auth [success=1 default=ignore] pam_sss.so use_first_pass 684s # here's the fallback if no module succeeds 684s auth requisite pam_deny.so 684s # prime the stack with a positive return value if there isn't one already; 684s # this avoids us returning an error just because nothing sets a success code 684s # since the modules above will each just jump around 684s auth required pam_permit.so 684s # and here are more per-package modules (the "Additional" block) 684s auth optional pam_cap.so 684s # end of pam-auth-update config 684s pamtester: invoking pam_start(login, ubuntu, ...) 684s pamtester: performing operation - authenticate 684s PIN for Test Organization Root Tr Token: pamtester: successfully authenticated 684s + echo -n -e 123456 684s + runuser -u ubuntu -- pamtester -v login '' authenticate 684s pamtester: invoking pam_start(login, , ...) 684s pamtester: performing operation - authenticate 684s PIN for Test Organization Root Tr Token: pamtester: successfully authenticated 684s + echo -n -e wrong123456 684s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 684s pamtester: invoking pam_start(login, ubuntu, ...) 684s pamtester: performing operation - authenticate 687s PIN for Test Organization Root Tr Token: pamtester: Authentication failure 688s + echo -n -e wrong123456 688s + runuser -u ubuntu -- pamtester -v login '' authenticate 688s pamtester: invoking pam_start(login, , ...) 688s pamtester: performing operation - authenticate 691s PIN for Test Organization Root Tr Token: pamtester: Authentication failure 691s + echo -n -e 123456 691s + pamtester -v login root authenticate 691s pamtester: invoking pam_start(login, root, ...) 691s pamtester: performing operation - authenticate 694s pamtester: Authentication service cannot retrieve authentication info 694s + test_authentication login /tmp/sssd-softhsm2-certs-c0AzGN/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf /tmp/sssd-softhsm2-certs-c0AzGN/test-full-chain-CA.pem 694s + pam_service=login 694s + certificate_config=/tmp/sssd-softhsm2-certs-c0AzGN/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 694s + ca_db=/tmp/sssd-softhsm2-certs-c0AzGN/test-full-chain-CA.pem 694s + verification_options= 694s + mkdir -p -m 700 /etc/sssd 694s + echo 'Using CA DB '\''/tmp/sssd-softhsm2-certs-c0AzGN/test-full-chain-CA.pem'\'' with verification options: '\'''\''' 694s + cat 694s Using CA DB '/tmp/sssd-softhsm2-certs-c0AzGN/test-full-chain-CA.pem' with verification options: '' 694s + chmod 600 /etc/sssd/sssd.conf 694s + for path_pair in "${softhsm2_conf_paths[@]}" 694s + IFS=: 694s + read -r -a path 694s + user=ubuntu 694s + path=/home/ubuntu/.config/softhsm2/softhsm2.conf 694s ++ dirname /home/ubuntu/.config/softhsm2/softhsm2.conf 694s + runuser -u ubuntu -- mkdir -p /home/ubuntu/.config/softhsm2 694s + runuser -u ubuntu -- ln -sf /tmp/sssd-softhsm2-certs-c0AzGN/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf /home/ubuntu/.config/softhsm2/softhsm2.conf 694s + runuser -u ubuntu -- softhsm2-util --show-slots 694s + grep 'Test Organization' 694s + for path_pair in "${softhsm2_conf_paths[@]}" 694s + IFS=: 694s + read -r -a path 694s + user=root 694s + path=/etc/softhsm/softhsm2.conf 694s ++ dirname /etc/softhsm/softhsm2.conf 694s + runuser -u root -- mkdir -p /etc/softhsm 694s + runuser -u root -- ln -sf /tmp/sssd-softhsm2-certs-c0AzGN/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf /etc/softhsm/softhsm2.conf 694s + runuser -u root -- softhsm2-util --show-slots 694s + grep 'Test Organization' 694s + systemctl restart sssd 694s Label: Test Organization Sub Int Token 694s Label: Test Organization Sub Int Token 695s + pam-auth-update --disable sss-smart-card-optional sss-smart-card-required 695s + for alternative in "${alternative_pam_configs[@]}" 695s + pam-auth-update --enable sss-smart-card-optional 695s + cat /etc/pam.d/common-auth 695s # 695s # /etc/pam.d/common-auth - authentication settings common to all services 695s # 695s # This file is included from other service-specific PAM config files, 695s # and should contain a list of the authentication modules that define 695s # the central authentication scheme for use on the system 695s # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the 695s # traditional Unix authentication mechanisms. 695s # 695s # As of pam 1.0.1-6, this file is managed by pam-auth-update by default. 695s # To take advantage of this, it is recommended that you configure any 695s # local modules either before or after the default block, and use 695s # pam-auth-update to manage selection of other modules. See 695s # pam-auth-update(8) for details. 695s 695s # here are the per-package modules (the "Primary" block) 695s auth [success=3 default=ignore] pam_sss.so allow_missing_name try_cert_auth 695s auth [success=2 default=ignore] pam_unix.so nullok try_first_pass 695s auth [success=1 default=ignore] pam_sss.so use_first_pass 695s # here's the fallback if no module succeeds 695s auth requisite pam_deny.so 695s # prime the stack with a positive return value if there isn't one already; 695s # this avoids us returning an error just because nothing sets a success code 695s # since the modules above will each just jump around 695s auth required pam_permit.so 695s # and here are more per-package modules (the "Additional" block) 695s auth optional pam_cap.so 695s # end of pam-auth-update config 695s + echo -n -e 123456 695s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 695s pamtester: invoking pam_start(login, ubuntu, ...) 695s pamtester: performing operation - authenticate 695s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 695s + echo -n -e 123456 695s + runuser -u ubuntu -- pamtester -v login '' authenticate 695s pamtester: invoking pam_start(login, , ...) 695s pamtester: performing operation - authenticate 695s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 695s + echo -n -e wrong123456 695s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 695s pamtester: invoking pam_start(login, ubuntu, ...) 695s pamtester: performing operation - authenticate 698s PIN for Test Organization Sub Int Token: Password: pamtester: Authentication failure 698s + echo -n -e wrong123456 698s + runuser -u ubuntu -- pamtester -v login '' authenticate 698s pamtester: invoking pam_start(login, , ...) 698s pamtester: performing operation - authenticate 703s PIN for Test Organization Sub Int Token: Password: pamtester: Authentication failure 703s + echo -n -e 123456 703s + pamtester -v login root authenticate 703s pamtester: invoking pam_start(login, root, ...) 703s pamtester: performing operation - authenticate 704s Password: pamtester: Authentication failure 704s PAM configuration 704s ----------------- 704s 704s Incompatible PAM profiles selected. 704s 704s The following PAM profiles cannot be used together: 704s 704s SSS required smart card authentication, SSS optional smart card 704s authentication 704s 704s Please select a different set of modules to enable. 704s 704s # 704s # /etc/pam.d/common-auth - authentication settings common to all services 704s # 704s # This file is included from other service-specific PAM config files, 704s # and should contain a list of the authentication modules that define 704s # the central authentication scheme for use on the system 704s # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the 704s # traditional Unix authentication mechanisms. 704s # 704s # As of pam 1.0.1-6, this file is managed by pam-auth-update by default. 704s # To take advantage of this, it is recommended that you configure any 704s # local modules either before or after the default block, and use 704s # pam-auth-update to manage selection of other modules. See 704s # pam-auth-update(8) for details. 704s 704s # here are the per-package modules (the "Primary" block) 704s auth [success=3 ignore=ignore default=die] pam_sss.so allow_missing_name require_cert_auth 704s auth [success=2 default=ignore] pam_unix.so nullok try_first_pass 704s auth [success=1 default=ignore] pam_sss.so use_first_pass 704s # here's the fallback if no module succeeds 704s auth requisite pam_deny.so 704s # prime the stack with a positive return value if there isn't one already; 704s # this avoids us returning an error just because nothing sets a success code 704s # since the modules above will each just jump around 704s auth required pam_permit.so 704s # and here are more per-package modules (the "Additional" block) 704s auth optional pam_cap.so 704s # end of pam-auth-update config 704s + for alternative in "${alternative_pam_configs[@]}" 704s + pam-auth-update --enable sss-smart-card-required 704s + cat /etc/pam.d/common-auth 704s + echo -n -e 123456 704s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 704s pamtester: invoking pam_start(login, ubuntu, ...) 704s pamtester: performing operation - authenticate 704s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 704s + echo -n -e 123456 704s + runuser -u ubuntu -- pamtester -v login '' authenticate 704s pamtester: invoking pam_start(login, , ...) 704s pamtester: performing operation - authenticate 704s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 704s + echo -n -e wrong123456 704s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 704s pamtester: invoking pam_start(login, ubuntu, ...) 704s pamtester: performing operation - authenticate 707s PIN for Test Organization Sub Int Token: pamtester: Authentication failure 707s + echo -n -e wrong123456 707s + runuser -u ubuntu -- pamtester -v login '' authenticate 707s pamtester: invoking pam_start(login, , ...) 707s pamtester: performing operation - authenticate 709s PIN for Test Organization Sub Int Token: pamtester: Authentication failure 709s + echo -n -e 123456 709s + pamtester -v login root authenticate 709s pamtester: invoking pam_start(login, root, ...) 709s pamtester: performing operation - authenticate 712s pamtester: Authentication service cannot retrieve authentication info 712s + test_authentication login /tmp/sssd-softhsm2-certs-c0AzGN/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf /tmp/sssd-softhsm2-certs-c0AzGN/test-sub-intermediate-CA.pem partial_chain 712s Using CA DB '/tmp/sssd-softhsm2-certs-c0AzGN/test-sub-intermediate-CA.pem' with verification options: 'partial_chain' 712s + pam_service=login 712s + certificate_config=/tmp/sssd-softhsm2-certs-c0AzGN/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 712s + ca_db=/tmp/sssd-softhsm2-certs-c0AzGN/test-sub-intermediate-CA.pem 712s + verification_options=partial_chain 712s + mkdir -p -m 700 /etc/sssd 712s + echo 'Using CA DB '\''/tmp/sssd-softhsm2-certs-c0AzGN/test-sub-intermediate-CA.pem'\'' with verification options: '\''partial_chain'\''' 712s + cat 712s + chmod 600 /etc/sssd/sssd.conf 712s + for path_pair in "${softhsm2_conf_paths[@]}" 712s + IFS=: 712s + read -r -a path 712s + user=ubuntu 712s + path=/home/ubuntu/.config/softhsm2/softhsm2.conf 712s ++ dirname /home/ubuntu/.config/softhsm2/softhsm2.conf 712s + runuser -u ubuntu -- mkdir -p /home/ubuntu/.config/softhsm2 712s Label: Test Organization Sub Int Token 712s Label: Test Organization Sub Int Token 712s + runuser -u ubuntu -- ln -sf /tmp/sssd-softhsm2-certs-c0AzGN/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf /home/ubuntu/.config/softhsm2/softhsm2.conf 712s + runuser -u ubuntu -- softhsm2-util --show-slots 712s + grep 'Test Organization' 712s + for path_pair in "${softhsm2_conf_paths[@]}" 712s + IFS=: 712s + read -r -a path 712s + user=root 712s + path=/etc/softhsm/softhsm2.conf 712s ++ dirname /etc/softhsm/softhsm2.conf 712s + runuser -u root -- mkdir -p /etc/softhsm 712s + runuser -u root -- ln -sf /tmp/sssd-softhsm2-certs-c0AzGN/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf /etc/softhsm/softhsm2.conf 712s + runuser -u root -- softhsm2-util --show-slots 712s + grep 'Test Organization' 712s + systemctl restart sssd 712s + pam-auth-update --disable sss-smart-card-optional sss-smart-card-required 713s + for alternative in "${alternative_pam_configs[@]}" 713s + pam-auth-update --enable sss-smart-card-optional 713s + cat /etc/pam.d/common-auth 713s # 713s # /etc/pam.d/common-auth - authentication settings common to all services 713s # 713s # This file is included from other service-specific PAM config files, 713s # and should contain a list of the authentication modules that define 713s # the central authentication scheme for use on the system 713s # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the 713s # traditional Unix authentication mechanisms. 713s # 713s # As of pam 1.0.1-6, this file is managed by pam-auth-update by default. 713s # To take advantage of this, it is recommended that you configure any 713s # local modules either before or after the default block, and use 713s # pam-auth-update to manage selection of other modules. See 713s # pam-auth-update(8) for details. 713s 713s # here are the per-package modules (the "Primary" block) 713s auth [success=3 default=ignore] pam_sss.so allow_missing_name try_cert_auth 713s auth [success=2 default=ignore] pam_unix.so nullok try_first_pass 713s auth [success=1 default=ignore] pam_sss.so use_first_pass 713s # here's the fallback if no module succeeds 713s auth requisite pam_deny.so 713s # prime the stack with a positive return value if there isn't one already; 713s # this avoids us returning an error just because nothing sets a success code 713s # since the modules above will each just jump around 713s auth required pam_permit.so 713s # and here are more per-package modules (the "Additional" block) 713s auth optional pam_cap.so 713s # end of pam-auth-update config 713s + echo -n -e 123456 713s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 713s pamtester: invoking pam_start(login, ubuntu, ...) 713s pamtester: performing operation - authenticate 713s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 713s + echo -n -e 123456 713s + runuser -u ubuntu -- pamtester -v login '' authenticate 713s pamtester: invoking pam_start(login, , ...) 713s pamtester: performing operation - authenticate 713s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 713s + echo -n -e wrong123456 713s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 713s pamtester: invoking pam_start(login, ubuntu, ...) 713s pamtester: performing operation - authenticate 715s PIN for Test Organization Sub Int Token: Password: pamtester: Authentication failure 715s + echo -n -e wrong123456 715s + runuser -u ubuntu -- pamtester -v login '' authenticate 715s pamtester: invoking pam_start(login, , ...) 715s pamtester: performing operation - authenticate 718s PIN for Test Organization Sub Int Token: Password: pamtester: Authentication failure 718s + echo -n -e 123456 718s + pamtester -v login root authenticate 718s pamtester: invoking pam_start(login, root, ...) 718s pamtester: performing operation - authenticate 720s Password: pamtester: Authentication failure 720s + for alternative in "${alternative_pam_configs[@]}" 720s + pam-auth-update --enable sss-smart-card-required 720s PAM configuration 720s ----------------- 720s 720s Incompatible PAM profiles selected. 720s 720s The following PAM profiles cannot be used together: 720s 720s SSS required smart card authentication, SSS optional smart card 720s authentication 720s 720s Please select a different set of modules to enable. 720s 720s + cat /etc/pam.d/common-auth 720s # 720s # /etc/pam.d/common-auth - authentication settings common to all services 720s # 720s # This file is included from other service-specific PAM config files, 720s # and should contain a list of the authentication modules that define 720s # the central authentication scheme for use on the system 720s # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the 720s # traditional Unix authentication mechanisms. 720s # 720s # As of pam 1.0.1-6, this file is managed by pam-auth-update by default. 720s # To take advantage of this, it is recommended that you configure any 720s # local modules either before or after the default block, and use 720s # pam-auth-update to manage selection of other modules. See 720s # pam-auth-update(8) for details. 720s 720s # here are the per-package modules (the "Primary" block) 720s auth [success=3 ignore=ignore default=die] pam_sss.so allow_missing_name require_cert_auth 720s auth [success=2 default=ignore] pam_unix.so nullok try_first_pass 720s auth [success=1 default=ignore] pam_sss.so use_first_pass 720s # here's the fallback if no module succeeds 720s auth requisite pam_deny.so 720s # prime the stack with a positive return value if there isn't one already; 720s # this avoids us returning an error just because nothing sets a success code 720s # since the modules above will each just jump around 720s auth required pam_permit.so 720s # and here are more per-package modules (the "Additional" block) 720s auth optional pam_cap.so 720s # end of pam-auth-update config 720s + echo -n -e 123456 720s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 720s pamtester: invoking pam_start(login, ubuntu, ...) 720s pamtester: performing operation - authenticate 720s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 720s + echo -n -e 123456 720s + runuser -u ubuntu -- pamtester -v login '' authenticate 720s pamtester: invoking pam_start(login, , ...) 720s pamtester: performing operation - authenticate 720s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 720s + echo -n -e wrong123456 720s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 720s pamtester: invoking pam_start(login, ubuntu, ...) 720s pamtester: performing operation - authenticate 723s PIN for Test Organization Sub Int Token: pamtester: Authentication failure 723s + echo -n -e wrong123456 723s + runuser -u ubuntu -- pamtester -v login '' authenticate 723s pamtester: invoking pam_start(login, , ...) 723s pamtester: performing operation - authenticate 726s PIN for Test Organization Sub Int Token: pamtester: Authentication failure 726s + echo -n -e 123456 726s + pamtester -v login root authenticate 726s pamtester: invoking pam_start(login, root, ...) 726s pamtester: performing operation - authenticate 730s pamtester: Authentication service cannot retrieve authentication info 730s Script completed successfully! 730s + handle_exit 730s + exit_code=0 730s + restore_changes 730s + for path in "${restore_paths[@]}" 730s + local original_path 730s ++ realpath --strip --relative-base=/tmp/sssd-softhsm2-backups-IeYcZ5 /tmp/sssd-softhsm2-backups-IeYcZ5//etc/softhsm/softhsm2.conf 730s + original_path=/etc/softhsm/softhsm2.conf 730s + rm /etc/softhsm/softhsm2.conf 730s + mv /tmp/sssd-softhsm2-backups-IeYcZ5//etc/softhsm/softhsm2.conf /etc/softhsm/softhsm2.conf 730s + for path in "${delete_paths[@]}" 730s + rm -f /etc/sssd/sssd.conf 730s + for path in "${delete_paths[@]}" 730s + rm -f /home/ubuntu/.config/softhsm2/softhsm2.conf 730s + pam-auth-update --disable sss-smart-card-optional sss-smart-card-required 730s + '[' -e /etc/sssd/sssd.conf ']' 730s + systemctl stop sssd 730s + '[' -e /etc/softhsm/softhsm2.conf ']' 730s + chmod 600 /etc/softhsm/softhsm2.conf 730s + rm -rf /tmp/sssd-softhsm2-certs-c0AzGN 730s + '[' 0 = 0 ']' 730s + rm -rf /tmp/sssd-softhsm2-backups-IeYcZ5 730s + set +x 730s autopkgtest [14:31:28]: test sssd-smart-card-pam-auth-configs: -----------------------] 731s autopkgtest [14:31:29]: test sssd-smart-card-pam-auth-configs: - - - - - - - - - - results - - - - - - - - - - 731s sssd-smart-card-pam-auth-configs PASS 731s autopkgtest [14:31:29]: @@@@@@@@@@@@@@@@@@@@ summary 731s ldap-user-group-ldap-auth PASS 731s ldap-user-group-krb5-auth FAIL badpkg 731s blame: sssd 731s badpkg: Test dependencies are unsatisfiable. A common reason is that your testbed is out of date with respect to the archive, and you need to use a current testbed or run apt-get update or use -U. 731s sssd-softhism2-certificates-tests.sh PASS 731s sssd-smart-card-pam-auth-configs PASS 744s Creating nova instance adt-noble-ppc64el-sssd-20240324-141918-juju-7f2275-prod-proposed-migration-environment-3 from image adt/ubuntu-noble-ppc64el-server-20240323.img (UUID ff8abf95-5243-4ea5-b7f5-3bf690534a1d)... 744s Creating nova instance adt-noble-ppc64el-sssd-20240324-141918-juju-7f2275-prod-proposed-migration-environment-3 from image adt/ubuntu-noble-ppc64el-server-20240323.img (UUID ff8abf95-5243-4ea5-b7f5-3bf690534a1d)...