0s autopkgtest [22:43:41]: starting date and time: 2024-11-15 22:43:41+0000 0s autopkgtest [22:43:41]: git checkout: 0acbae0a WIP show VirtSubproc stderr in real-time 0s autopkgtest [22:43:41]: host juju-7f2275-prod-proposed-migration-environment-2; command line: /home/ubuntu/autopkgtest/runner/autopkgtest --output-dir /tmp/autopkgtest-work.047s79a9/out --timeout-copy=6000 --setup-commands /home/ubuntu/autopkgtest-cloud/worker-config-production/setup-canonical.sh --apt-pocket=proposed=src:systemd,src:openssh --apt-upgrade sssd --timeout-short=300 --timeout-copy=20000 --timeout-build=20000 '--env=ADT_TEST_TRIGGERS=systemd/255.4-1ubuntu8.5 openssh/1:9.6p1-3ubuntu13.7' -- ssh -s /home/ubuntu/autopkgtest/ssh-setup/nova -- --flavor autopkgtest-ppc64el --security-groups autopkgtest-juju-7f2275-prod-proposed-migration-environment-2@bos03-ppc64el-26.secgroup --name adt-noble-ppc64el-sssd-20241115-224341-juju-7f2275-prod-proposed-migration-environment-2-95739731-b4a9-466b-9a7c-3fb928445741 --image adt/ubuntu-noble-ppc64el-server --keyname testbed-juju-7f2275-prod-proposed-migration-environment-2 --net-id=net_prod-proposed-migration-ppc64el -e TERM=linux -e ''"'"'http_proxy=http://squid.internal:3128'"'"'' -e ''"'"'https_proxy=http://squid.internal:3128'"'"'' -e ''"'"'no_proxy=127.0.0.1,127.0.1.1,login.ubuntu.com,localhost,localdomain,novalocal,internal,archive.ubuntu.com,ports.ubuntu.com,security.ubuntu.com,ddebs.ubuntu.com,changelogs.ubuntu.com,keyserver.ubuntu.com,launchpadlibrarian.net,launchpadcontent.net,launchpad.net,10.24.0.0/24,keystone.ps5.canonical.com,objectstorage.prodstack5.canonical.com'"'"'' --mirror=http://ftpmaster.internal/ubuntu/ 87s autopkgtest [22:45:08]: testbed dpkg architecture: ppc64el 87s autopkgtest [22:45:08]: testbed apt version: 2.7.14build2 87s autopkgtest [22:45:08]: @@@@@@@@@@@@@@@@@@@@ test bed setup 88s Get:1 http://ftpmaster.internal/ubuntu noble-proposed InRelease [265 kB] 89s Get:2 http://ftpmaster.internal/ubuntu noble-proposed/main Sources [78.5 kB] 89s Get:3 http://ftpmaster.internal/ubuntu noble-proposed/universe Sources [88.3 kB] 89s Get:4 http://ftpmaster.internal/ubuntu noble-proposed/restricted Sources [3240 B] 89s Get:5 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el Packages [153 kB] 89s Get:6 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el c-n-f Metadata [3752 B] 89s Get:7 http://ftpmaster.internal/ubuntu noble-proposed/restricted ppc64el Packages [1176 B] 89s Get:8 http://ftpmaster.internal/ubuntu noble-proposed/restricted ppc64el c-n-f Metadata [116 B] 89s Get:9 http://ftpmaster.internal/ubuntu noble-proposed/universe ppc64el Packages [624 kB] 89s Get:10 http://ftpmaster.internal/ubuntu noble-proposed/universe ppc64el c-n-f Metadata [9704 B] 89s Get:11 http://ftpmaster.internal/ubuntu noble-proposed/multiverse ppc64el c-n-f Metadata [116 B] 93s Fetched 1227 kB in 1s (1266 kB/s) 93s Reading package lists... 96s Reading package lists... 96s Building dependency tree... 96s Reading state information... 96s Calculating upgrade... 96s The following packages will be upgraded: 96s libnss-systemd libpam-systemd libsystemd-shared libsystemd0 libudev1 96s openssh-client openssh-server openssh-sftp-server systemd systemd-dev 96s systemd-resolved systemd-sysv systemd-timesyncd udev 97s 14 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 97s Need to get 11.7 MB of archives. 97s After this operation, 1024 B of additional disk space will be used. 97s Get:1 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libnss-systemd ppc64el 255.4-1ubuntu8.5 [207 kB] 97s Get:2 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el systemd-dev all 255.4-1ubuntu8.5 [104 kB] 97s Get:3 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el systemd-timesyncd ppc64el 255.4-1ubuntu8.5 [37.6 kB] 97s Get:4 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el systemd-resolved ppc64el 255.4-1ubuntu8.5 [345 kB] 97s Get:5 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libsystemd-shared ppc64el 255.4-1ubuntu8.5 [2345 kB] 97s Get:6 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libsystemd0 ppc64el 255.4-1ubuntu8.5 [526 kB] 97s Get:7 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el systemd-sysv ppc64el 255.4-1ubuntu8.5 [11.9 kB] 97s Get:8 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libpam-systemd ppc64el 255.4-1ubuntu8.5 [303 kB] 97s Get:9 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el systemd ppc64el 255.4-1ubuntu8.5 [3767 kB] 97s Get:10 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el udev ppc64el 255.4-1ubuntu8.5 [2036 kB] 97s Get:11 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libudev1 ppc64el 255.4-1ubuntu8.5 [200 kB] 97s Get:12 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el openssh-sftp-server ppc64el 1:9.6p1-3ubuntu13.7 [43.4 kB] 97s Get:13 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el openssh-server ppc64el 1:9.6p1-3ubuntu13.7 [625 kB] 97s Get:14 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el openssh-client ppc64el 1:9.6p1-3ubuntu13.7 [1109 kB] 98s Preconfiguring packages ... 98s Fetched 11.7 MB in 1s (10.6 MB/s) 98s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 72377 files and directories currently installed.) 98s Preparing to unpack .../0-libnss-systemd_255.4-1ubuntu8.5_ppc64el.deb ... 98s Unpacking libnss-systemd:ppc64el (255.4-1ubuntu8.5) over (255.4-1ubuntu8.4) ... 99s Preparing to unpack .../1-systemd-dev_255.4-1ubuntu8.5_all.deb ... 99s Unpacking systemd-dev (255.4-1ubuntu8.5) over (255.4-1ubuntu8.4) ... 99s Preparing to unpack .../2-systemd-timesyncd_255.4-1ubuntu8.5_ppc64el.deb ... 99s Unpacking systemd-timesyncd (255.4-1ubuntu8.5) over (255.4-1ubuntu8.4) ... 99s Preparing to unpack .../3-systemd-resolved_255.4-1ubuntu8.5_ppc64el.deb ... 99s Unpacking systemd-resolved (255.4-1ubuntu8.5) over (255.4-1ubuntu8.4) ... 99s Preparing to unpack .../4-libsystemd-shared_255.4-1ubuntu8.5_ppc64el.deb ... 99s Unpacking libsystemd-shared:ppc64el (255.4-1ubuntu8.5) over (255.4-1ubuntu8.4) ... 99s Preparing to unpack .../5-libsystemd0_255.4-1ubuntu8.5_ppc64el.deb ... 99s Unpacking libsystemd0:ppc64el (255.4-1ubuntu8.5) over (255.4-1ubuntu8.4) ... 99s Setting up libsystemd0:ppc64el (255.4-1ubuntu8.5) ... 99s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 72377 files and directories currently installed.) 99s Preparing to unpack .../systemd-sysv_255.4-1ubuntu8.5_ppc64el.deb ... 99s Unpacking systemd-sysv (255.4-1ubuntu8.5) over (255.4-1ubuntu8.4) ... 99s Preparing to unpack .../libpam-systemd_255.4-1ubuntu8.5_ppc64el.deb ... 99s Unpacking libpam-systemd:ppc64el (255.4-1ubuntu8.5) over (255.4-1ubuntu8.4) ... 99s Preparing to unpack .../systemd_255.4-1ubuntu8.5_ppc64el.deb ... 99s Unpacking systemd (255.4-1ubuntu8.5) over (255.4-1ubuntu8.4) ... 99s Preparing to unpack .../udev_255.4-1ubuntu8.5_ppc64el.deb ... 99s Unpacking udev (255.4-1ubuntu8.5) over (255.4-1ubuntu8.4) ... 100s Preparing to unpack .../libudev1_255.4-1ubuntu8.5_ppc64el.deb ... 100s Unpacking libudev1:ppc64el (255.4-1ubuntu8.5) over (255.4-1ubuntu8.4) ... 100s Setting up libudev1:ppc64el (255.4-1ubuntu8.5) ... 100s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 72377 files and directories currently installed.) 100s Preparing to unpack .../openssh-sftp-server_1%3a9.6p1-3ubuntu13.7_ppc64el.deb ... 100s Unpacking openssh-sftp-server (1:9.6p1-3ubuntu13.7) over (1:9.6p1-3ubuntu13.5) ... 100s Preparing to unpack .../openssh-server_1%3a9.6p1-3ubuntu13.7_ppc64el.deb ... 100s Unpacking openssh-server (1:9.6p1-3ubuntu13.7) over (1:9.6p1-3ubuntu13.5) ... 100s Preparing to unpack .../openssh-client_1%3a9.6p1-3ubuntu13.7_ppc64el.deb ... 100s Unpacking openssh-client (1:9.6p1-3ubuntu13.7) over (1:9.6p1-3ubuntu13.5) ... 100s Setting up openssh-client (1:9.6p1-3ubuntu13.7) ... 100s Setting up systemd-dev (255.4-1ubuntu8.5) ... 100s Setting up libsystemd-shared:ppc64el (255.4-1ubuntu8.5) ... 100s Setting up openssh-sftp-server (1:9.6p1-3ubuntu13.7) ... 100s Setting up openssh-server (1:9.6p1-3ubuntu13.7) ... 100s Replacing config file /etc/ssh/sshd_config with new version 101s Setting up systemd (255.4-1ubuntu8.5) ... 102s Setting up systemd-timesyncd (255.4-1ubuntu8.5) ... 103s Setting up udev (255.4-1ubuntu8.5) ... 104s Setting up systemd-resolved (255.4-1ubuntu8.5) ... 104s Setting up systemd-sysv (255.4-1ubuntu8.5) ... 104s Setting up libnss-systemd:ppc64el (255.4-1ubuntu8.5) ... 104s Setting up libpam-systemd:ppc64el (255.4-1ubuntu8.5) ... 105s Processing triggers for libc-bin (2.39-0ubuntu8.3) ... 105s Processing triggers for ufw (0.36.2-6) ... 105s Processing triggers for man-db (2.12.0-4build2) ... 107s Processing triggers for dbus (1.14.10-4ubuntu4.1) ... 107s Processing triggers for initramfs-tools (0.142ubuntu25.4) ... 107s update-initramfs: Generating /boot/initrd.img-6.8.0-48-generic 107s W: No lz4 in /usr/bin:/sbin:/bin, using gzip 120s Reading package lists... 120s Building dependency tree... 120s Reading state information... 121s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 122s Hit:1 http://ftpmaster.internal/ubuntu noble-proposed InRelease 122s Hit:2 http://ftpmaster.internal/ubuntu noble InRelease 122s Hit:3 http://ftpmaster.internal/ubuntu noble-updates InRelease 122s Hit:4 http://ftpmaster.internal/ubuntu noble-security InRelease 123s Reading package lists... 123s Reading package lists... 124s Building dependency tree... 124s Reading state information... 124s Calculating upgrade... 124s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 124s Reading package lists... 125s Building dependency tree... 125s Reading state information... 125s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 125s autopkgtest [22:45:46]: rebooting testbed after setup commands that affected boot 129s autopkgtest-virt-ssh: WARNING: ssh connection failed. Retrying in 3 seconds... 160s autopkgtest [22:46:21]: testbed running kernel: Linux 6.8.0-48-generic #48-Ubuntu SMP Fri Sep 27 14:02:57 UTC 2024 162s autopkgtest [22:46:23]: @@@@@@@@@@@@@@@@@@@@ apt-source sssd 179s Get:1 http://ftpmaster.internal/ubuntu noble-updates/main sssd 2.9.4-1.1ubuntu6.1 (dsc) [5064 B] 179s Get:2 http://ftpmaster.internal/ubuntu noble-updates/main sssd 2.9.4-1.1ubuntu6.1 (tar) [7983 kB] 179s Get:3 http://ftpmaster.internal/ubuntu noble-updates/main sssd 2.9.4-1.1ubuntu6.1 (diff) [51.3 kB] 180s gpgv: Signature made Mon Jun 10 14:26:32 2024 UTC 180s gpgv: using RSA key 50C4A0DDCF31E452CEB19B516569D855A744BE93 180s gpgv: Can't check signature: No public key 180s dpkg-source: warning: cannot verify inline signature for ./sssd_2.9.4-1.1ubuntu6.1.dsc: no acceptable signature found 180s autopkgtest [22:46:41]: testing package sssd version 2.9.4-1.1ubuntu6.1 181s autopkgtest [22:46:42]: build not needed 183s autopkgtest [22:46:44]: test ldap-user-group-ldap-auth: preparing testbed 184s Reading package lists... 184s Building dependency tree... 184s Reading state information... 184s Starting pkgProblemResolver with broken count: 0 185s Starting 2 pkgProblemResolver with broken count: 0 185s Done 185s The following additional packages will be installed: 185s expect ldap-utils libavahi-client3 libavahi-common-data libavahi-common3 185s libbasicobjects0t64 libcares2 libcollection4t64 libcrack2 libdhash1t64 185s libevent-2.1-7t64 libini-config5t64 libipa-hbac-dev libipa-hbac0t64 libjose0 185s libkrad0 libldb2 libltdl7 libnfsidmap1 libnss-sss libnss-sudo libodbc2 185s libpam-pwquality libpam-sss libpath-utils1t64 libpwquality-common 185s libpwquality1 libref-array1t64 libsmbclient0 libsss-certmap-dev 185s libsss-certmap0 libsss-idmap-dev libsss-idmap0 libsss-nss-idmap-dev 185s libsss-nss-idmap0 libsss-sudo libtalloc2 libtcl8.6 libtdb1 libtevent0t64 185s libverto-libevent1t64 libverto1t64 libwbclient0 python3-libipa-hbac 185s python3-libsss-nss-idmap python3-sss samba-libs slapd sssd sssd-ad 185s sssd-ad-common sssd-common sssd-dbus sssd-idp sssd-ipa sssd-kcm sssd-krb5 185s sssd-krb5-common sssd-ldap sssd-passkey sssd-proxy sssd-tools tcl-expect 185s tcl8.6 185s Suggested packages: 185s tk8.6 libsasl2-modules-gssapi-mit | libsasl2-modules-gssapi-heimdal 185s odbc-postgresql tdsodbc adcli libsasl2-modules-ldap tcl-tclreadline 185s Recommended packages: 185s cracklib-runtime libsasl2-modules-gssapi-mit 185s | libsasl2-modules-gssapi-heimdal 185s The following NEW packages will be installed: 185s autopkgtest-satdep expect ldap-utils libavahi-client3 libavahi-common-data 185s libavahi-common3 libbasicobjects0t64 libcares2 libcollection4t64 libcrack2 185s libdhash1t64 libevent-2.1-7t64 libini-config5t64 libipa-hbac-dev 185s libipa-hbac0t64 libjose0 libkrad0 libldb2 libltdl7 libnfsidmap1 libnss-sss 185s libnss-sudo libodbc2 libpam-pwquality libpam-sss libpath-utils1t64 185s libpwquality-common libpwquality1 libref-array1t64 libsmbclient0 185s libsss-certmap-dev libsss-certmap0 libsss-idmap-dev libsss-idmap0 185s libsss-nss-idmap-dev libsss-nss-idmap0 libsss-sudo libtalloc2 libtcl8.6 185s libtdb1 libtevent0t64 libverto-libevent1t64 libverto1t64 libwbclient0 185s python3-libipa-hbac python3-libsss-nss-idmap python3-sss samba-libs slapd 185s sssd sssd-ad sssd-ad-common sssd-common sssd-dbus sssd-idp sssd-ipa sssd-kcm 185s sssd-krb5 sssd-krb5-common sssd-ldap sssd-passkey sssd-proxy sssd-tools 185s tcl-expect tcl8.6 185s 0 upgraded, 65 newly installed, 0 to remove and 0 not upgraded. 185s Need to get 14.3 MB/14.3 MB of archives. 185s After this operation, 70.0 MB of additional disk space will be used. 185s Get:1 /tmp/autopkgtest.HhFPuo/1-autopkgtest-satdep.deb autopkgtest-satdep ppc64el 0 [876 B] 185s Get:2 http://ftpmaster.internal/ubuntu noble/main ppc64el libltdl7 ppc64el 2.4.7-7build1 [48.2 kB] 185s Get:3 http://ftpmaster.internal/ubuntu noble-updates/main ppc64el libodbc2 ppc64el 2.3.12-1ubuntu0.24.04.1 [188 kB] 185s Get:4 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el slapd ppc64el 2.6.7+dfsg-1~exp1ubuntu8.1 [1760 kB] 186s Get:5 http://ftpmaster.internal/ubuntu noble/main ppc64el libtcl8.6 ppc64el 8.6.14+dfsg-1build1 [1204 kB] 186s Get:6 http://ftpmaster.internal/ubuntu noble/main ppc64el tcl8.6 ppc64el 8.6.14+dfsg-1build1 [14.8 kB] 186s Get:7 http://ftpmaster.internal/ubuntu noble/universe ppc64el tcl-expect ppc64el 5.45.4-3 [122 kB] 186s Get:8 http://ftpmaster.internal/ubuntu noble/universe ppc64el expect ppc64el 5.45.4-3 [137 kB] 186s Get:9 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el ldap-utils ppc64el 2.6.7+dfsg-1~exp1ubuntu8.1 [155 kB] 186s Get:10 http://ftpmaster.internal/ubuntu noble/main ppc64el libavahi-common-data ppc64el 0.8-13ubuntu6 [29.7 kB] 186s Get:11 http://ftpmaster.internal/ubuntu noble/main ppc64el libavahi-common3 ppc64el 0.8-13ubuntu6 [26.3 kB] 186s Get:12 http://ftpmaster.internal/ubuntu noble/main ppc64el libavahi-client3 ppc64el 0.8-13ubuntu6 [30.8 kB] 186s Get:13 http://ftpmaster.internal/ubuntu noble/main ppc64el libbasicobjects0t64 ppc64el 0.6.2-2.1build1 [6138 B] 186s Get:14 http://ftpmaster.internal/ubuntu noble/main ppc64el libcares2 ppc64el 1.27.0-1.0ubuntu1 [99.0 kB] 186s Get:15 http://ftpmaster.internal/ubuntu noble/main ppc64el libcollection4t64 ppc64el 0.6.2-2.1build1 [36.4 kB] 186s Get:16 http://ftpmaster.internal/ubuntu noble/main ppc64el libcrack2 ppc64el 2.9.6-5.1build2 [31.1 kB] 186s Get:17 http://ftpmaster.internal/ubuntu noble/main ppc64el libdhash1t64 ppc64el 0.6.2-2.1build1 [10.4 kB] 186s Get:18 http://ftpmaster.internal/ubuntu noble/main ppc64el libevent-2.1-7t64 ppc64el 2.1.12-stable-9ubuntu2 [174 kB] 186s Get:19 http://ftpmaster.internal/ubuntu noble/main ppc64el libpath-utils1t64 ppc64el 0.6.2-2.1build1 [10.6 kB] 186s Get:20 http://ftpmaster.internal/ubuntu noble/main ppc64el libref-array1t64 ppc64el 0.6.2-2.1build1 [8160 B] 186s Get:21 http://ftpmaster.internal/ubuntu noble/main ppc64el libini-config5t64 ppc64el 0.6.2-2.1build1 [55.3 kB] 186s Get:22 http://ftpmaster.internal/ubuntu noble-updates/main ppc64el libipa-hbac0t64 ppc64el 2.9.4-1.1ubuntu6.1 [18.1 kB] 186s Get:23 http://ftpmaster.internal/ubuntu noble/universe ppc64el libjose0 ppc64el 13-1 [51.9 kB] 186s Get:24 http://ftpmaster.internal/ubuntu noble/main ppc64el libverto-libevent1t64 ppc64el 0.3.1-1.2ubuntu3 [6490 B] 186s Get:25 http://ftpmaster.internal/ubuntu noble/main ppc64el libverto1t64 ppc64el 0.3.1-1.2ubuntu3 [12.1 kB] 186s Get:26 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libkrad0 ppc64el 1.20.1-6ubuntu2.2 [24.4 kB] 186s Get:27 http://ftpmaster.internal/ubuntu noble/main ppc64el libtalloc2 ppc64el 2.4.2-1build2 [36.7 kB] 186s Get:28 http://ftpmaster.internal/ubuntu noble/main ppc64el libtdb1 ppc64el 1.4.10-1build1 [62.8 kB] 186s Get:29 http://ftpmaster.internal/ubuntu noble/main ppc64el libtevent0t64 ppc64el 0.16.1-2build1 [51.2 kB] 186s Get:30 http://ftpmaster.internal/ubuntu noble/main ppc64el libldb2 ppc64el 2:2.8.0+samba4.19.5+dfsg-4ubuntu9 [220 kB] 186s Get:31 http://ftpmaster.internal/ubuntu noble/main ppc64el libnfsidmap1 ppc64el 1:2.6.4-3ubuntu5 [54.5 kB] 186s Get:32 http://ftpmaster.internal/ubuntu noble/universe ppc64el libnss-sudo all 1.9.15p5-3ubuntu5 [15.2 kB] 186s Get:33 http://ftpmaster.internal/ubuntu noble/main ppc64el libpwquality-common all 1.4.5-3build1 [7748 B] 186s Get:34 http://ftpmaster.internal/ubuntu noble/main ppc64el libpwquality1 ppc64el 1.4.5-3build1 [17.0 kB] 186s Get:35 http://ftpmaster.internal/ubuntu noble/main ppc64el libpam-pwquality ppc64el 1.4.5-3build1 [12.5 kB] 186s Get:36 http://ftpmaster.internal/ubuntu noble/main ppc64el libwbclient0 ppc64el 2:4.19.5+dfsg-4ubuntu9 [77.3 kB] 186s Get:37 http://ftpmaster.internal/ubuntu noble/main ppc64el samba-libs ppc64el 2:4.19.5+dfsg-4ubuntu9 [6674 kB] 186s Get:38 http://ftpmaster.internal/ubuntu noble/main ppc64el libsmbclient0 ppc64el 2:4.19.5+dfsg-4ubuntu9 [70.3 kB] 186s Get:39 http://ftpmaster.internal/ubuntu noble-updates/main ppc64el libnss-sss ppc64el 2.9.4-1.1ubuntu6.1 [36.8 kB] 186s Get:40 http://ftpmaster.internal/ubuntu noble-updates/main ppc64el libpam-sss ppc64el 2.9.4-1.1ubuntu6.1 [57.0 kB] 186s Get:41 http://ftpmaster.internal/ubuntu noble-updates/main ppc64el python3-sss ppc64el 2.9.4-1.1ubuntu6.1 [48.5 kB] 186s Get:42 http://ftpmaster.internal/ubuntu noble-updates/main ppc64el libsss-certmap0 ppc64el 2.9.4-1.1ubuntu6.1 [54.2 kB] 186s Get:43 http://ftpmaster.internal/ubuntu noble-updates/main ppc64el libsss-idmap0 ppc64el 2.9.4-1.1ubuntu6.1 [25.2 kB] 186s Get:44 http://ftpmaster.internal/ubuntu noble-updates/main ppc64el libsss-nss-idmap0 ppc64el 2.9.4-1.1ubuntu6.1 [37.9 kB] 186s Get:45 http://ftpmaster.internal/ubuntu noble-updates/main ppc64el sssd-common ppc64el 2.9.4-1.1ubuntu6.1 [1280 kB] 186s Get:46 http://ftpmaster.internal/ubuntu noble-updates/universe ppc64el sssd-idp ppc64el 2.9.4-1.1ubuntu6.1 [30.8 kB] 186s Get:47 http://ftpmaster.internal/ubuntu noble-updates/universe ppc64el sssd-passkey ppc64el 2.9.4-1.1ubuntu6.1 [35.4 kB] 186s Get:48 http://ftpmaster.internal/ubuntu noble-updates/main ppc64el sssd-ad-common ppc64el 2.9.4-1.1ubuntu6.1 [88.6 kB] 186s Get:49 http://ftpmaster.internal/ubuntu noble-updates/main ppc64el sssd-krb5-common ppc64el 2.9.4-1.1ubuntu6.1 [103 kB] 186s Get:50 http://ftpmaster.internal/ubuntu noble-updates/main ppc64el sssd-ad ppc64el 2.9.4-1.1ubuntu6.1 [148 kB] 186s Get:51 http://ftpmaster.internal/ubuntu noble-updates/main ppc64el sssd-ipa ppc64el 2.9.4-1.1ubuntu6.1 [240 kB] 186s Get:52 http://ftpmaster.internal/ubuntu noble-updates/main ppc64el sssd-krb5 ppc64el 2.9.4-1.1ubuntu6.1 [14.4 kB] 186s Get:53 http://ftpmaster.internal/ubuntu noble-updates/main ppc64el sssd-ldap ppc64el 2.9.4-1.1ubuntu6.1 [31.6 kB] 186s Get:54 http://ftpmaster.internal/ubuntu noble-updates/main ppc64el sssd-proxy ppc64el 2.9.4-1.1ubuntu6.1 [48.0 kB] 186s Get:55 http://ftpmaster.internal/ubuntu noble-updates/main ppc64el sssd ppc64el 2.9.4-1.1ubuntu6.1 [4122 B] 186s Get:56 http://ftpmaster.internal/ubuntu noble-updates/main ppc64el sssd-dbus ppc64el 2.9.4-1.1ubuntu6.1 [122 kB] 186s Get:57 http://ftpmaster.internal/ubuntu noble-updates/universe ppc64el sssd-kcm ppc64el 2.9.4-1.1ubuntu6.1 [160 kB] 186s Get:58 http://ftpmaster.internal/ubuntu noble-updates/main ppc64el sssd-tools ppc64el 2.9.4-1.1ubuntu6.1 [108 kB] 186s Get:59 http://ftpmaster.internal/ubuntu noble-updates/main ppc64el libipa-hbac-dev ppc64el 2.9.4-1.1ubuntu6.1 [6672 B] 186s Get:60 http://ftpmaster.internal/ubuntu noble-updates/main ppc64el libsss-certmap-dev ppc64el 2.9.4-1.1ubuntu6.1 [5738 B] 186s Get:61 http://ftpmaster.internal/ubuntu noble-updates/main ppc64el libsss-idmap-dev ppc64el 2.9.4-1.1ubuntu6.1 [8392 B] 186s Get:62 http://ftpmaster.internal/ubuntu noble-updates/main ppc64el libsss-nss-idmap-dev ppc64el 2.9.4-1.1ubuntu6.1 [6716 B] 186s Get:63 http://ftpmaster.internal/ubuntu noble-updates/universe ppc64el libsss-sudo ppc64el 2.9.4-1.1ubuntu6.1 [23.0 kB] 186s Get:64 http://ftpmaster.internal/ubuntu noble-updates/universe ppc64el python3-libipa-hbac ppc64el 2.9.4-1.1ubuntu6.1 [19.2 kB] 186s Get:65 http://ftpmaster.internal/ubuntu noble-updates/universe ppc64el python3-libsss-nss-idmap ppc64el 2.9.4-1.1ubuntu6.1 [9544 B] 187s Preconfiguring packages ... 187s Fetched 14.3 MB in 2s (9035 kB/s) 187s Selecting previously unselected package libltdl7:ppc64el. 187s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 72377 files and directories currently installed.) 187s Preparing to unpack .../00-libltdl7_2.4.7-7build1_ppc64el.deb ... 187s Unpacking libltdl7:ppc64el (2.4.7-7build1) ... 187s Selecting previously unselected package libodbc2:ppc64el. 187s Preparing to unpack .../01-libodbc2_2.3.12-1ubuntu0.24.04.1_ppc64el.deb ... 187s Unpacking libodbc2:ppc64el (2.3.12-1ubuntu0.24.04.1) ... 187s Selecting previously unselected package slapd. 187s Preparing to unpack .../02-slapd_2.6.7+dfsg-1~exp1ubuntu8.1_ppc64el.deb ... 188s Unpacking slapd (2.6.7+dfsg-1~exp1ubuntu8.1) ... 188s Selecting previously unselected package libtcl8.6:ppc64el. 188s Preparing to unpack .../03-libtcl8.6_8.6.14+dfsg-1build1_ppc64el.deb ... 188s Unpacking libtcl8.6:ppc64el (8.6.14+dfsg-1build1) ... 188s Selecting previously unselected package tcl8.6. 188s Preparing to unpack .../04-tcl8.6_8.6.14+dfsg-1build1_ppc64el.deb ... 188s Unpacking tcl8.6 (8.6.14+dfsg-1build1) ... 188s Selecting previously unselected package tcl-expect:ppc64el. 188s Preparing to unpack .../05-tcl-expect_5.45.4-3_ppc64el.deb ... 188s Unpacking tcl-expect:ppc64el (5.45.4-3) ... 188s Selecting previously unselected package expect. 188s Preparing to unpack .../06-expect_5.45.4-3_ppc64el.deb ... 188s Unpacking expect (5.45.4-3) ... 188s Selecting previously unselected package ldap-utils. 188s Preparing to unpack .../07-ldap-utils_2.6.7+dfsg-1~exp1ubuntu8.1_ppc64el.deb ... 188s Unpacking ldap-utils (2.6.7+dfsg-1~exp1ubuntu8.1) ... 188s Selecting previously unselected package libavahi-common-data:ppc64el. 188s Preparing to unpack .../08-libavahi-common-data_0.8-13ubuntu6_ppc64el.deb ... 188s Unpacking libavahi-common-data:ppc64el (0.8-13ubuntu6) ... 188s Selecting previously unselected package libavahi-common3:ppc64el. 188s Preparing to unpack .../09-libavahi-common3_0.8-13ubuntu6_ppc64el.deb ... 188s Unpacking libavahi-common3:ppc64el (0.8-13ubuntu6) ... 188s Selecting previously unselected package libavahi-client3:ppc64el. 188s Preparing to unpack .../10-libavahi-client3_0.8-13ubuntu6_ppc64el.deb ... 188s Unpacking libavahi-client3:ppc64el (0.8-13ubuntu6) ... 188s Selecting previously unselected package libbasicobjects0t64:ppc64el. 188s Preparing to unpack .../11-libbasicobjects0t64_0.6.2-2.1build1_ppc64el.deb ... 188s Unpacking libbasicobjects0t64:ppc64el (0.6.2-2.1build1) ... 188s Selecting previously unselected package libcares2:ppc64el. 188s Preparing to unpack .../12-libcares2_1.27.0-1.0ubuntu1_ppc64el.deb ... 188s Unpacking libcares2:ppc64el (1.27.0-1.0ubuntu1) ... 188s Selecting previously unselected package libcollection4t64:ppc64el. 188s Preparing to unpack .../13-libcollection4t64_0.6.2-2.1build1_ppc64el.deb ... 188s Unpacking libcollection4t64:ppc64el (0.6.2-2.1build1) ... 188s Selecting previously unselected package libcrack2:ppc64el. 188s Preparing to unpack .../14-libcrack2_2.9.6-5.1build2_ppc64el.deb ... 188s Unpacking libcrack2:ppc64el (2.9.6-5.1build2) ... 188s Selecting previously unselected package libdhash1t64:ppc64el. 188s Preparing to unpack .../15-libdhash1t64_0.6.2-2.1build1_ppc64el.deb ... 188s Unpacking libdhash1t64:ppc64el (0.6.2-2.1build1) ... 188s Selecting previously unselected package libevent-2.1-7t64:ppc64el. 188s Preparing to unpack .../16-libevent-2.1-7t64_2.1.12-stable-9ubuntu2_ppc64el.deb ... 188s Unpacking libevent-2.1-7t64:ppc64el (2.1.12-stable-9ubuntu2) ... 188s Selecting previously unselected package libpath-utils1t64:ppc64el. 188s Preparing to unpack .../17-libpath-utils1t64_0.6.2-2.1build1_ppc64el.deb ... 188s Unpacking libpath-utils1t64:ppc64el (0.6.2-2.1build1) ... 188s Selecting previously unselected package libref-array1t64:ppc64el. 188s Preparing to unpack .../18-libref-array1t64_0.6.2-2.1build1_ppc64el.deb ... 188s Unpacking libref-array1t64:ppc64el (0.6.2-2.1build1) ... 188s Selecting previously unselected package libini-config5t64:ppc64el. 188s Preparing to unpack .../19-libini-config5t64_0.6.2-2.1build1_ppc64el.deb ... 188s Unpacking libini-config5t64:ppc64el (0.6.2-2.1build1) ... 188s Selecting previously unselected package libipa-hbac0t64. 188s Preparing to unpack .../20-libipa-hbac0t64_2.9.4-1.1ubuntu6.1_ppc64el.deb ... 188s Unpacking libipa-hbac0t64 (2.9.4-1.1ubuntu6.1) ... 188s Selecting previously unselected package libjose0:ppc64el. 188s Preparing to unpack .../21-libjose0_13-1_ppc64el.deb ... 188s Unpacking libjose0:ppc64el (13-1) ... 188s Selecting previously unselected package libverto-libevent1t64:ppc64el. 188s Preparing to unpack .../22-libverto-libevent1t64_0.3.1-1.2ubuntu3_ppc64el.deb ... 188s Unpacking libverto-libevent1t64:ppc64el (0.3.1-1.2ubuntu3) ... 188s Selecting previously unselected package libverto1t64:ppc64el. 188s Preparing to unpack .../23-libverto1t64_0.3.1-1.2ubuntu3_ppc64el.deb ... 188s Unpacking libverto1t64:ppc64el (0.3.1-1.2ubuntu3) ... 188s Selecting previously unselected package libkrad0:ppc64el. 188s Preparing to unpack .../24-libkrad0_1.20.1-6ubuntu2.2_ppc64el.deb ... 188s Unpacking libkrad0:ppc64el (1.20.1-6ubuntu2.2) ... 188s Selecting previously unselected package libtalloc2:ppc64el. 188s Preparing to unpack .../25-libtalloc2_2.4.2-1build2_ppc64el.deb ... 188s Unpacking libtalloc2:ppc64el (2.4.2-1build2) ... 188s Selecting previously unselected package libtdb1:ppc64el. 188s Preparing to unpack .../26-libtdb1_1.4.10-1build1_ppc64el.deb ... 188s Unpacking libtdb1:ppc64el (1.4.10-1build1) ... 188s Selecting previously unselected package libtevent0t64:ppc64el. 188s Preparing to unpack .../27-libtevent0t64_0.16.1-2build1_ppc64el.deb ... 188s Unpacking libtevent0t64:ppc64el (0.16.1-2build1) ... 188s Selecting previously unselected package libldb2:ppc64el. 188s Preparing to unpack .../28-libldb2_2%3a2.8.0+samba4.19.5+dfsg-4ubuntu9_ppc64el.deb ... 188s Unpacking libldb2:ppc64el (2:2.8.0+samba4.19.5+dfsg-4ubuntu9) ... 188s Selecting previously unselected package libnfsidmap1:ppc64el. 188s Preparing to unpack .../29-libnfsidmap1_1%3a2.6.4-3ubuntu5_ppc64el.deb ... 188s Unpacking libnfsidmap1:ppc64el (1:2.6.4-3ubuntu5) ... 188s Selecting previously unselected package libnss-sudo. 188s Preparing to unpack .../30-libnss-sudo_1.9.15p5-3ubuntu5_all.deb ... 188s Unpacking libnss-sudo (1.9.15p5-3ubuntu5) ... 188s Selecting previously unselected package libpwquality-common. 188s Preparing to unpack .../31-libpwquality-common_1.4.5-3build1_all.deb ... 188s Unpacking libpwquality-common (1.4.5-3build1) ... 188s Selecting previously unselected package libpwquality1:ppc64el. 188s Preparing to unpack .../32-libpwquality1_1.4.5-3build1_ppc64el.deb ... 188s Unpacking libpwquality1:ppc64el (1.4.5-3build1) ... 188s Selecting previously unselected package libpam-pwquality:ppc64el. 188s Preparing to unpack .../33-libpam-pwquality_1.4.5-3build1_ppc64el.deb ... 188s Unpacking libpam-pwquality:ppc64el (1.4.5-3build1) ... 188s Selecting previously unselected package libwbclient0:ppc64el. 188s Preparing to unpack .../34-libwbclient0_2%3a4.19.5+dfsg-4ubuntu9_ppc64el.deb ... 188s Unpacking libwbclient0:ppc64el (2:4.19.5+dfsg-4ubuntu9) ... 188s Selecting previously unselected package samba-libs:ppc64el. 188s Preparing to unpack .../35-samba-libs_2%3a4.19.5+dfsg-4ubuntu9_ppc64el.deb ... 188s Unpacking samba-libs:ppc64el (2:4.19.5+dfsg-4ubuntu9) ... 189s Selecting previously unselected package libsmbclient0:ppc64el. 189s Preparing to unpack .../36-libsmbclient0_2%3a4.19.5+dfsg-4ubuntu9_ppc64el.deb ... 189s Unpacking libsmbclient0:ppc64el (2:4.19.5+dfsg-4ubuntu9) ... 189s Selecting previously unselected package libnss-sss:ppc64el. 189s Preparing to unpack .../37-libnss-sss_2.9.4-1.1ubuntu6.1_ppc64el.deb ... 189s Unpacking libnss-sss:ppc64el (2.9.4-1.1ubuntu6.1) ... 189s Selecting previously unselected package libpam-sss:ppc64el. 189s Preparing to unpack .../38-libpam-sss_2.9.4-1.1ubuntu6.1_ppc64el.deb ... 189s Unpacking libpam-sss:ppc64el (2.9.4-1.1ubuntu6.1) ... 189s Selecting previously unselected package python3-sss. 189s Preparing to unpack .../39-python3-sss_2.9.4-1.1ubuntu6.1_ppc64el.deb ... 189s Unpacking python3-sss (2.9.4-1.1ubuntu6.1) ... 189s Selecting previously unselected package libsss-certmap0. 189s Preparing to unpack .../40-libsss-certmap0_2.9.4-1.1ubuntu6.1_ppc64el.deb ... 189s Unpacking libsss-certmap0 (2.9.4-1.1ubuntu6.1) ... 189s Selecting previously unselected package libsss-idmap0. 189s Preparing to unpack .../41-libsss-idmap0_2.9.4-1.1ubuntu6.1_ppc64el.deb ... 189s Unpacking libsss-idmap0 (2.9.4-1.1ubuntu6.1) ... 189s Selecting previously unselected package libsss-nss-idmap0. 189s Preparing to unpack .../42-libsss-nss-idmap0_2.9.4-1.1ubuntu6.1_ppc64el.deb ... 189s Unpacking libsss-nss-idmap0 (2.9.4-1.1ubuntu6.1) ... 189s Selecting previously unselected package sssd-common. 189s Preparing to unpack .../43-sssd-common_2.9.4-1.1ubuntu6.1_ppc64el.deb ... 189s Unpacking sssd-common (2.9.4-1.1ubuntu6.1) ... 189s Selecting previously unselected package sssd-idp. 189s Preparing to unpack .../44-sssd-idp_2.9.4-1.1ubuntu6.1_ppc64el.deb ... 189s Unpacking sssd-idp (2.9.4-1.1ubuntu6.1) ... 189s Selecting previously unselected package sssd-passkey. 189s Preparing to unpack .../45-sssd-passkey_2.9.4-1.1ubuntu6.1_ppc64el.deb ... 189s Unpacking sssd-passkey (2.9.4-1.1ubuntu6.1) ... 189s Selecting previously unselected package sssd-ad-common. 189s Preparing to unpack .../46-sssd-ad-common_2.9.4-1.1ubuntu6.1_ppc64el.deb ... 189s Unpacking sssd-ad-common (2.9.4-1.1ubuntu6.1) ... 189s Selecting previously unselected package sssd-krb5-common. 189s Preparing to unpack .../47-sssd-krb5-common_2.9.4-1.1ubuntu6.1_ppc64el.deb ... 189s Unpacking sssd-krb5-common (2.9.4-1.1ubuntu6.1) ... 189s Selecting previously unselected package sssd-ad. 189s Preparing to unpack .../48-sssd-ad_2.9.4-1.1ubuntu6.1_ppc64el.deb ... 189s Unpacking sssd-ad (2.9.4-1.1ubuntu6.1) ... 189s Selecting previously unselected package sssd-ipa. 189s Preparing to unpack .../49-sssd-ipa_2.9.4-1.1ubuntu6.1_ppc64el.deb ... 189s Unpacking sssd-ipa (2.9.4-1.1ubuntu6.1) ... 189s Selecting previously unselected package sssd-krb5. 189s Preparing to unpack .../50-sssd-krb5_2.9.4-1.1ubuntu6.1_ppc64el.deb ... 189s Unpacking sssd-krb5 (2.9.4-1.1ubuntu6.1) ... 189s Selecting previously unselected package sssd-ldap. 189s Preparing to unpack .../51-sssd-ldap_2.9.4-1.1ubuntu6.1_ppc64el.deb ... 189s Unpacking sssd-ldap (2.9.4-1.1ubuntu6.1) ... 189s Selecting previously unselected package sssd-proxy. 189s Preparing to unpack .../52-sssd-proxy_2.9.4-1.1ubuntu6.1_ppc64el.deb ... 189s Unpacking sssd-proxy (2.9.4-1.1ubuntu6.1) ... 189s Selecting previously unselected package sssd. 189s Preparing to unpack .../53-sssd_2.9.4-1.1ubuntu6.1_ppc64el.deb ... 189s Unpacking sssd (2.9.4-1.1ubuntu6.1) ... 189s Selecting previously unselected package sssd-dbus. 189s Preparing to unpack .../54-sssd-dbus_2.9.4-1.1ubuntu6.1_ppc64el.deb ... 189s Unpacking sssd-dbus (2.9.4-1.1ubuntu6.1) ... 189s Selecting previously unselected package sssd-kcm. 189s Preparing to unpack .../55-sssd-kcm_2.9.4-1.1ubuntu6.1_ppc64el.deb ... 189s Unpacking sssd-kcm (2.9.4-1.1ubuntu6.1) ... 189s Selecting previously unselected package sssd-tools. 189s Preparing to unpack .../56-sssd-tools_2.9.4-1.1ubuntu6.1_ppc64el.deb ... 189s Unpacking sssd-tools (2.9.4-1.1ubuntu6.1) ... 189s Selecting previously unselected package libipa-hbac-dev. 189s Preparing to unpack .../57-libipa-hbac-dev_2.9.4-1.1ubuntu6.1_ppc64el.deb ... 189s Unpacking libipa-hbac-dev (2.9.4-1.1ubuntu6.1) ... 189s Selecting previously unselected package libsss-certmap-dev. 189s Preparing to unpack .../58-libsss-certmap-dev_2.9.4-1.1ubuntu6.1_ppc64el.deb ... 189s Unpacking libsss-certmap-dev (2.9.4-1.1ubuntu6.1) ... 189s Selecting previously unselected package libsss-idmap-dev. 189s Preparing to unpack .../59-libsss-idmap-dev_2.9.4-1.1ubuntu6.1_ppc64el.deb ... 189s Unpacking libsss-idmap-dev (2.9.4-1.1ubuntu6.1) ... 189s Selecting previously unselected package libsss-nss-idmap-dev. 189s Preparing to unpack .../60-libsss-nss-idmap-dev_2.9.4-1.1ubuntu6.1_ppc64el.deb ... 189s Unpacking libsss-nss-idmap-dev (2.9.4-1.1ubuntu6.1) ... 189s Selecting previously unselected package libsss-sudo. 189s Preparing to unpack .../61-libsss-sudo_2.9.4-1.1ubuntu6.1_ppc64el.deb ... 189s Unpacking libsss-sudo (2.9.4-1.1ubuntu6.1) ... 189s Selecting previously unselected package python3-libipa-hbac. 189s Preparing to unpack .../62-python3-libipa-hbac_2.9.4-1.1ubuntu6.1_ppc64el.deb ... 189s Unpacking python3-libipa-hbac (2.9.4-1.1ubuntu6.1) ... 189s Selecting previously unselected package python3-libsss-nss-idmap. 189s Preparing to unpack .../63-python3-libsss-nss-idmap_2.9.4-1.1ubuntu6.1_ppc64el.deb ... 189s Unpacking python3-libsss-nss-idmap (2.9.4-1.1ubuntu6.1) ... 189s Selecting previously unselected package autopkgtest-satdep. 189s Preparing to unpack .../64-1-autopkgtest-satdep.deb ... 189s Unpacking autopkgtest-satdep (0) ... 189s Setting up libpwquality-common (1.4.5-3build1) ... 189s Setting up libnfsidmap1:ppc64el (1:2.6.4-3ubuntu5) ... 189s Setting up libsss-idmap0 (2.9.4-1.1ubuntu6.1) ... 189s Setting up libbasicobjects0t64:ppc64el (0.6.2-2.1build1) ... 189s Setting up libipa-hbac0t64 (2.9.4-1.1ubuntu6.1) ... 189s Setting up libsss-idmap-dev (2.9.4-1.1ubuntu6.1) ... 189s Setting up libref-array1t64:ppc64el (0.6.2-2.1build1) ... 189s Setting up libipa-hbac-dev (2.9.4-1.1ubuntu6.1) ... 189s Setting up libtdb1:ppc64el (1.4.10-1build1) ... 189s Setting up libcollection4t64:ppc64el (0.6.2-2.1build1) ... 189s Setting up libevent-2.1-7t64:ppc64el (2.1.12-stable-9ubuntu2) ... 189s Setting up ldap-utils (2.6.7+dfsg-1~exp1ubuntu8.1) ... 189s Setting up libjose0:ppc64el (13-1) ... 189s Setting up libwbclient0:ppc64el (2:4.19.5+dfsg-4ubuntu9) ... 189s Setting up libtalloc2:ppc64el (2.4.2-1build2) ... 189s Setting up libpath-utils1t64:ppc64el (0.6.2-2.1build1) ... 189s Setting up libavahi-common-data:ppc64el (0.8-13ubuntu6) ... 189s Setting up libcares2:ppc64el (1.27.0-1.0ubuntu1) ... 189s Setting up libdhash1t64:ppc64el (0.6.2-2.1build1) ... 189s Setting up libtcl8.6:ppc64el (8.6.14+dfsg-1build1) ... 189s Setting up libltdl7:ppc64el (2.4.7-7build1) ... 189s Setting up libcrack2:ppc64el (2.9.6-5.1build2) ... 189s Setting up libodbc2:ppc64el (2.3.12-1ubuntu0.24.04.1) ... 189s Setting up python3-libipa-hbac (2.9.4-1.1ubuntu6.1) ... 189s Setting up libnss-sudo (1.9.15p5-3ubuntu5) ... 189s Setting up libsss-nss-idmap0 (2.9.4-1.1ubuntu6.1) ... 189s Setting up libini-config5t64:ppc64el (0.6.2-2.1build1) ... 189s Setting up libtevent0t64:ppc64el (0.16.1-2build1) ... 189s Setting up libnss-sss:ppc64el (2.9.4-1.1ubuntu6.1) ... 189s Setting up slapd (2.6.7+dfsg-1~exp1ubuntu8.1) ... 190s Creating new user openldap... done. 190s Creating initial configuration... done. 190s Creating LDAP directory... done. 190s Setting up tcl8.6 (8.6.14+dfsg-1build1) ... 190s Setting up libsss-sudo (2.9.4-1.1ubuntu6.1) ... 190s Setting up libsss-nss-idmap-dev (2.9.4-1.1ubuntu6.1) ... 190s Setting up libavahi-common3:ppc64el (0.8-13ubuntu6) ... 190s Setting up tcl-expect:ppc64el (5.45.4-3) ... 190s Setting up libsss-certmap0 (2.9.4-1.1ubuntu6.1) ... 190s Setting up libpwquality1:ppc64el (1.4.5-3build1) ... 190s Setting up python3-libsss-nss-idmap (2.9.4-1.1ubuntu6.1) ... 190s Setting up libldb2:ppc64el (2:2.8.0+samba4.19.5+dfsg-4ubuntu9) ... 190s Setting up libavahi-client3:ppc64el (0.8-13ubuntu6) ... 190s Setting up expect (5.45.4-3) ... 190s Setting up libpam-pwquality:ppc64el (1.4.5-3build1) ... 191s Setting up samba-libs:ppc64el (2:4.19.5+dfsg-4ubuntu9) ... 191s Setting up libsss-certmap-dev (2.9.4-1.1ubuntu6.1) ... 191s Setting up python3-sss (2.9.4-1.1ubuntu6.1) ... 191s Setting up libsmbclient0:ppc64el (2:4.19.5+dfsg-4ubuntu9) ... 191s Setting up libpam-sss:ppc64el (2.9.4-1.1ubuntu6.1) ... 191s Setting up sssd-common (2.9.4-1.1ubuntu6.1) ... 191s Creating SSSD system user & group... 191s warn: The home directory `/var/lib/sss' already exists. Not touching this directory. 191s warn: Warning: The home directory `/var/lib/sss' does not belong to the user you are currently creating. 191s Warning: found usr.sbin.sssd in /etc/apparmor.d/force-complain, forcing complain mode 191s Warning from /etc/apparmor.d/usr.sbin.sssd (/etc/apparmor.d/usr.sbin.sssd line 63): Caching disabled for: 'usr.sbin.sssd' due to force complain 192s Created symlink /etc/systemd/system/sssd.service.wants/sssd-autofs.socket → /usr/lib/systemd/system/sssd-autofs.socket. 192s Created symlink /etc/systemd/system/sssd.service.wants/sssd-nss.socket → /usr/lib/systemd/system/sssd-nss.socket. 192s Created symlink /etc/systemd/system/sssd.service.wants/sssd-pam-priv.socket → /usr/lib/systemd/system/sssd-pam-priv.socket. 192s Created symlink /etc/systemd/system/sssd.service.wants/sssd-pam.socket → /usr/lib/systemd/system/sssd-pam.socket. 193s Created symlink /etc/systemd/system/sssd.service.wants/sssd-ssh.socket → /usr/lib/systemd/system/sssd-ssh.socket. 193s Created symlink /etc/systemd/system/sssd.service.wants/sssd-sudo.socket → /usr/lib/systemd/system/sssd-sudo.socket. 193s Created symlink /etc/systemd/system/multi-user.target.wants/sssd.service → /usr/lib/systemd/system/sssd.service. 194s sssd-autofs.service is a disabled or a static unit, not starting it. 194s sssd-nss.service is a disabled or a static unit, not starting it. 194s sssd-pam.service is a disabled or a static unit, not starting it. 194s sssd-ssh.service is a disabled or a static unit, not starting it. 194s sssd-sudo.service is a disabled or a static unit, not starting it. 194s Could not execute systemctl: at /usr/bin/deb-systemd-invoke line 148. 194s Setting up sssd-proxy (2.9.4-1.1ubuntu6.1) ... 194s Setting up sssd-kcm (2.9.4-1.1ubuntu6.1) ... 194s Created symlink /etc/systemd/system/sockets.target.wants/sssd-kcm.socket → /usr/lib/systemd/system/sssd-kcm.socket. 194s sssd-kcm.service is a disabled or a static unit, not starting it. 194s Setting up sssd-dbus (2.9.4-1.1ubuntu6.1) ... 195s sssd-ifp.service is a disabled or a static unit, not starting it. 195s Setting up sssd-ad-common (2.9.4-1.1ubuntu6.1) ... 195s Created symlink /etc/systemd/system/sssd.service.wants/sssd-pac.socket → /usr/lib/systemd/system/sssd-pac.socket. 195s sssd-pac.service is a disabled or a static unit, not starting it. 195s Could not execute systemctl: at /usr/bin/deb-systemd-invoke line 148. 195s Setting up sssd-krb5-common (2.9.4-1.1ubuntu6.1) ... 195s Setting up sssd-krb5 (2.9.4-1.1ubuntu6.1) ... 196s Setting up sssd-ldap (2.9.4-1.1ubuntu6.1) ... 196s Setting up sssd-ad (2.9.4-1.1ubuntu6.1) ... 196s Setting up sssd-tools (2.9.4-1.1ubuntu6.1) ... 196s Setting up sssd-ipa (2.9.4-1.1ubuntu6.1) ... 196s Setting up sssd (2.9.4-1.1ubuntu6.1) ... 196s Setting up libverto-libevent1t64:ppc64el (0.3.1-1.2ubuntu3) ... 196s Setting up libverto1t64:ppc64el (0.3.1-1.2ubuntu3) ... 196s Setting up libkrad0:ppc64el (1.20.1-6ubuntu2.2) ... 196s Setting up sssd-passkey (2.9.4-1.1ubuntu6.1) ... 196s Setting up sssd-idp (2.9.4-1.1ubuntu6.1) ... 196s Setting up autopkgtest-satdep (0) ... 196s Processing triggers for libc-bin (2.39-0ubuntu8.3) ... 196s Processing triggers for ufw (0.36.2-6) ... 196s Processing triggers for man-db (2.12.0-4build2) ... 198s Processing triggers for dbus (1.14.10-4ubuntu4.1) ... 209s (Reading database ... 73668 files and directories currently installed.) 209s Removing autopkgtest-satdep (0) ... 210s autopkgtest [22:47:11]: test ldap-user-group-ldap-auth: [----------------------- 210s + . debian/tests/util 210s + . debian/tests/common-tests 210s + mydomain=example.com 210s + myhostname=ldap.example.com 210s + mysuffix=dc=example,dc=com 210s + admin_dn=cn=admin,dc=example,dc=com 210s + admin_pw=secret 210s + ldap_user=testuser1 210s + ldap_user_pw=testuser1secret 210s + ldap_group=ldapusers 210s + adjust_hostname ldap.example.com 210s + local myhostname=ldap.example.com 210s + echo ldap.example.com 210s + hostname ldap.example.com 210s + grep -qE ldap.example.com /etc/hosts 210s + echo 127.0.1.10 ldap.example.com 210s + reconfigure_slapd 210s + debconf-set-selections 210s + rm -rf /var/backups/*slapd* /var/backups/unknown*ldapdb 210s + dpkg-reconfigure -fnoninteractive -pcritical slapd 210s Backing up /etc/ldap/slapd.d in /var/backups/slapd-2.6.7+dfsg-1~exp1ubuntu8.1... done. 210s Moving old database directory to /var/backups: 210s - directory unknown... done. 210s Creating initial configuration... done. 210s Creating LDAP directory... done. 211s + generate_certs ldap.example.com 211s + local cn=ldap.example.com 211s + local cert=/etc/ldap/server.pem 211s + local key=/etc/ldap/server.key 211s + local cnf=/etc/ldap/openssl.cnf 211s + cat 211s + openssl req -new -x509 -nodes -out /etc/ldap/server.pem -keyout /etc/ldap/server.key -config /etc/ldap/openssl.cnf 211s ...++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ 211s ...................................++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ 211s ----- 211s + chmod 0640 /etc/ldap/server.key 211s + chgrp openldap /etc/ldap/server.key 211s + [ ! -f /etc/ldap/server.pem ] 211s + [ ! -f /etc/ldap/server.key ] 211s + enable_ldap_ssl 211s + cat 211s + cat 211s modifying entry "cn=config" 211s 211s + ldapmodify -H ldapi:/// -Y EXTERNAL -Q 211s + populate_ldap_rfc2307 211s + ldapadd -x -D cn=admin,dc=example,dc=com -w secret 211s + cat 211s adding new entry "ou=People,dc=example,dc=com" 211s 211s adding new entry "ou=Group,dc=example,dc=com" 211s 211s adding new entry "uid=testuser1,ou=People,dc=example,dc=com" 211s 211s adding new entry "cn=testuser1,ou=Group,dc=example,dc=com" 211s 211s adding new entry "cn=ldapusers,ou=Group,dc=example,dc=com" 211s 211s + configure_sssd_ldap_rfc2307 211s + cat 211s + chmod 0600 /etc/sssd/sssd.conf 211s + systemctl restart sssd 212s + enable_pam_mkhomedir 212s + grep -qE ^session.*pam_mkhomedir\.so /etc/pam.d/common-session 212s + echo session optional pam_mkhomedir.so 212s + run_common_testsAssert local user databases do not have our LDAP test data 212s 212s + echo Assert local user databases do not have our LDAP test data 212s + check_local_user testuser1 212s + localThe LDAP user is known to the system via getent 212s local_user=testuser1 212s + grep -q ^testuser1 /etc/passwd 212s + check_local_group testuser1 212s + local local_group=testuser1 212s + grep -q ^testuser1 /etc/group 212s + check_local_group ldapusers 212s + local local_group=ldapusers 212s + grep -q ^ldapusers /etc/group 212s + echo The LDAP user is known to the system via getent 212s + check_getent_user testuser1 212s + local getent_user=testuser1 212s + local output 212s + getent passwd testuser1 212s The LDAP user's private group is known to the system via getent 212s + output=testuser1:*:10001:10001:testuser1:/home/testuser1:/bin/bash 212s + [ -z testuser1:*:10001:10001:testuser1:/home/testuser1:/bin/bash ] 212s + echo The LDAP user's private group is known to the system via getent 212s + check_getent_group testuser1 212s + local getent_group=testuser1 212s + local output 212s + getent group testuser1 212s + output=testuser1:*:10001:testuser1 212s + [ -z testuser1:*:10001:testuser1 ] 212s + echo The LDAP group ldapusers is known to the system via getent 212s + check_getent_group ldapusers 212s + local getent_group=ldapusers 212s + local output 212s The LDAP group ldapusers is known to the system via getent 212s + getent group ldapusers 212s The id(1) command can resolve the group membership of the LDAP user 212s + output=ldapusers:*:10100:testuser1 212s + [ -z ldapusers:*:10100:testuser1 ] 212s + echo The id(1) command can resolve the group membership of the LDAP user 212s + id -Gn testuser1 212s The LDAP user can login on a terminal 212s + output=testuser1 ldapusers 212s + [ testuser1 ldapusers != testuser1 ldapusers ] 212s + echo The LDAP user can login on a terminal 212s + /usr/bin/expect -f debian/tests/login.exp testuser1 testuser1secret 212s spawn login 212s ldap.example.com login: testuser1 212s Password: 212s Welcome to Ubuntu 24.04.1 LTS (GNU/Linux 6.8.0-48-generic ppc64le) 212s 212s * Documentation: https://help.ubuntu.com 212s * Management: https://landscape.canonical.com 212s * Support: https://ubuntu.com/pro 212s 212s 212s The programs included with the Ubuntu system are free software; 212s the exact distribution terms for each program are described in the 212s individual files in /usr/share/doc/*/copyright. 212s 212s Ubuntu comes with ABSOLUTELY NO WARRANTY, to the extent permitted by 212s applicable law. 212s 212s 212s The programs included with the Ubuntu system are free software; 212s the exact distribution terms for each program are described in the 212s individual files in /usr/share/doc/*/copyright. 212s 212s Ubuntu comes with ABSOLUTELY NO WARRANTY, to the extent permitted by 212s applicable law. 212s 212s Creating directory '/home/testuser1'. 212s [?2004htestuser1@ldap:~$ id -un 212s [?2004l testuser1 212s [?2004htestuser1@ldap:~$ autopkgtest [22:47:13]: test ldap-user-group-ldap-auth: -----------------------] 213s autopkgtest [22:47:14]: test ldap-user-group-ldap-auth: - - - - - - - - - - results - - - - - - - - - - 213s ldap-user-group-ldap-auth PASS 214s autopkgtest [22:47:15]: test ldap-user-group-krb5-auth: preparing testbed 215s Reading package lists... 215s Building dependency tree... 215s Reading state information... 215s Starting pkgProblemResolver with broken count: 0 215s Starting 2 pkgProblemResolver with broken count: 0 215s Done 216s The following additional packages will be installed: 216s krb5-admin-server krb5-config krb5-kdc krb5-user libgssrpc4t64 216s libkadm5clnt-mit12 libkadm5srv-mit12 libkdb5-10t64 216s Suggested packages: 216s krb5-kdc-ldap krb5-kpropd krb5-k5tls krb5-doc 216s The following NEW packages will be installed: 216s autopkgtest-satdep krb5-admin-server krb5-config krb5-kdc krb5-user 216s libgssrpc4t64 libkadm5clnt-mit12 libkadm5srv-mit12 libkdb5-10t64 216s 0 upgraded, 9 newly installed, 0 to remove and 0 not upgraded. 216s Need to get 671 kB/672 kB of archives. 216s After this operation, 3110 kB of additional disk space will be used. 216s Get:1 /tmp/autopkgtest.HhFPuo/2-autopkgtest-satdep.deb autopkgtest-satdep ppc64el 0 [896 B] 216s Get:2 http://ftpmaster.internal/ubuntu noble/main ppc64el krb5-config all 2.7 [22.0 kB] 216s Get:3 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libgssrpc4t64 ppc64el 1.20.1-6ubuntu2.2 [65.2 kB] 216s Get:4 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libkadm5clnt-mit12 ppc64el 1.20.1-6ubuntu2.2 [43.9 kB] 216s Get:5 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libkdb5-10t64 ppc64el 1.20.1-6ubuntu2.2 [46.9 kB] 216s Get:6 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libkadm5srv-mit12 ppc64el 1.20.1-6ubuntu2.2 [61.2 kB] 216s Get:7 http://ftpmaster.internal/ubuntu noble-proposed/universe ppc64el krb5-user ppc64el 1.20.1-6ubuntu2.2 [116 kB] 216s Get:8 http://ftpmaster.internal/ubuntu noble-proposed/universe ppc64el krb5-kdc ppc64el 1.20.1-6ubuntu2.2 [209 kB] 216s Get:9 http://ftpmaster.internal/ubuntu noble-proposed/universe ppc64el krb5-admin-server ppc64el 1.20.1-6ubuntu2.2 [107 kB] 217s Preconfiguring packages ... 218s Fetched 671 kB in 1s (1170 kB/s) 218s Selecting previously unselected package krb5-config. 218s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 73668 files and directories currently installed.) 218s Preparing to unpack .../0-krb5-config_2.7_all.deb ... 218s Unpacking krb5-config (2.7) ... 218s Selecting previously unselected package libgssrpc4t64:ppc64el. 218s Preparing to unpack .../1-libgssrpc4t64_1.20.1-6ubuntu2.2_ppc64el.deb ... 218s Unpacking libgssrpc4t64:ppc64el (1.20.1-6ubuntu2.2) ... 218s Selecting previously unselected package libkadm5clnt-mit12:ppc64el. 218s Preparing to unpack .../2-libkadm5clnt-mit12_1.20.1-6ubuntu2.2_ppc64el.deb ... 218s Unpacking libkadm5clnt-mit12:ppc64el (1.20.1-6ubuntu2.2) ... 218s Selecting previously unselected package libkdb5-10t64:ppc64el. 218s Preparing to unpack .../3-libkdb5-10t64_1.20.1-6ubuntu2.2_ppc64el.deb ... 218s Unpacking libkdb5-10t64:ppc64el (1.20.1-6ubuntu2.2) ... 218s Selecting previously unselected package libkadm5srv-mit12:ppc64el. 218s Preparing to unpack .../4-libkadm5srv-mit12_1.20.1-6ubuntu2.2_ppc64el.deb ... 218s Unpacking libkadm5srv-mit12:ppc64el (1.20.1-6ubuntu2.2) ... 218s Selecting previously unselected package krb5-user. 218s Preparing to unpack .../5-krb5-user_1.20.1-6ubuntu2.2_ppc64el.deb ... 218s Unpacking krb5-user (1.20.1-6ubuntu2.2) ... 218s Selecting previously unselected package krb5-kdc. 218s Preparing to unpack .../6-krb5-kdc_1.20.1-6ubuntu2.2_ppc64el.deb ... 218s Unpacking krb5-kdc (1.20.1-6ubuntu2.2) ... 219s Selecting previously unselected package krb5-admin-server. 219s Preparing to unpack .../7-krb5-admin-server_1.20.1-6ubuntu2.2_ppc64el.deb ... 219s Unpacking krb5-admin-server (1.20.1-6ubuntu2.2) ... 219s Selecting previously unselected package autopkgtest-satdep. 219s Preparing to unpack .../8-2-autopkgtest-satdep.deb ... 219s Unpacking autopkgtest-satdep (0) ... 219s Setting up libgssrpc4t64:ppc64el (1.20.1-6ubuntu2.2) ... 219s Setting up krb5-config (2.7) ... 219s Setting up libkadm5clnt-mit12:ppc64el (1.20.1-6ubuntu2.2) ... 219s Setting up libkdb5-10t64:ppc64el (1.20.1-6ubuntu2.2) ... 219s Setting up libkadm5srv-mit12:ppc64el (1.20.1-6ubuntu2.2) ... 219s Setting up krb5-user (1.20.1-6ubuntu2.2) ... 219s update-alternatives: using /usr/bin/kinit.mit to provide /usr/bin/kinit (kinit) in auto mode 219s update-alternatives: using /usr/bin/klist.mit to provide /usr/bin/klist (klist) in auto mode 219s update-alternatives: using /usr/bin/kswitch.mit to provide /usr/bin/kswitch (kswitch) in auto mode 219s update-alternatives: using /usr/bin/ksu.mit to provide /usr/bin/ksu (ksu) in auto mode 219s update-alternatives: using /usr/bin/kpasswd.mit to provide /usr/bin/kpasswd (kpasswd) in auto mode 219s update-alternatives: using /usr/bin/kdestroy.mit to provide /usr/bin/kdestroy (kdestroy) in auto mode 219s update-alternatives: using /usr/bin/kadmin.mit to provide /usr/bin/kadmin (kadmin) in auto mode 219s update-alternatives: using /usr/bin/ktutil.mit to provide /usr/bin/ktutil (ktutil) in auto mode 219s Setting up krb5-kdc (1.20.1-6ubuntu2.2) ... 220s Created symlink /etc/systemd/system/multi-user.target.wants/krb5-kdc.service → /usr/lib/systemd/system/krb5-kdc.service. 220s Could not execute systemctl: at /usr/bin/deb-systemd-invoke line 148. 220s Setting up krb5-admin-server (1.20.1-6ubuntu2.2) ... 221s Created symlink /etc/systemd/system/multi-user.target.wants/krb5-admin-server.service → /usr/lib/systemd/system/krb5-admin-server.service. 221s Setting up autopkgtest-satdep (0) ... 222s Processing triggers for man-db (2.12.0-4build2) ... 222s Processing triggers for libc-bin (2.39-0ubuntu8.3) ... 231s (Reading database ... 73763 files and directories currently installed.) 231s Removing autopkgtest-satdep (0) ... 231s autopkgtest [22:47:32]: test ldap-user-group-krb5-auth: [----------------------- 232s + . debian/tests/util 232s + . debian/tests/common-tests 232s + mydomain=example.com 232s + myhostname=ldap.example.com 232s + mysuffix=dc=example,dc=com 232s + myrealm=EXAMPLE.COM 232s + admin_dn=cn=admin,dc=example,dc=com 232s + admin_pw=secret 232s + ldap_user=testuser1 232s + ldap_user_pw=testuser1secret 232s + kerberos_principal_pw=testuser1kerberos 232s + ldap_group=ldapusers 232s + adjust_hostname ldap.example.com 232s + local myhostname=ldap.example.com 232s + echo ldap.example.com 232s + hostname ldap.example.com 232s + grep -qE ldap.example.com /etc/hosts 232s + reconfigure_slapd 232s + debconf-set-selections 232s + rm -rf /var/backups/slapd-2.6.7+dfsg-1~exp1ubuntu8.1 /var/backups/unknown-2.6.7+dfsg-1~exp1ubuntu8.1-20241115-224711.ldapdb 232s + dpkg-reconfigure -fnoninteractive -pcritical slapd 232s Backing up /etc/ldap/slapd.d in /var/backups/slapd-2.6.7+dfsg-1~exp1ubuntu8.1... done. 232s Moving old database directory to /var/backups: 232s - directory unknown... done. 232s Creating initial configuration... done. 232s Creating LDAP directory... done. 233s + generate_certs ldap.example.com 233s + local cn=ldap.example.com 233s + local cert=/etc/ldap/server.pem 233s + local key=/etc/ldap/server.key 233s + local cnf=/etc/ldap/openssl.cnf 233s + cat 233s + openssl req -new -x509 -nodes -out /etc/ldap/server.pem -keyout /etc/ldap/server.key -config /etc/ldap/openssl.cnf 233s ............++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ 233s .....++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++modifying entry "cn=config" 233s 233s ++ 233s ----- 233s + chmod 0640 /etc/ldap/server.key 233s + chgrp openldap /etc/ldap/server.key 233s + [ ! -f /etc/ldap/server.pem ] 233s + [ ! -f /etc/ldap/server.key ] 233s + enable_ldap_ssl 233s + cat 233s + ldapmodify -H ldapi:/// -Y EXTERNAL -Q 233s + cat 233s + populate_ldap_rfc2307 233s + cat 233s + ldapadd -x -D cn=admin,dc=example,dc=com -w secret 233s adding new entry "ou=People,dc=example,dc=com" 233s 233s adding new entry "ou=Group,dc=example,dc=com" 233s 233s adding new entry "uid=testuser1,ou=People,dc=example,dc=com" 233s 233s adding new entry "cn=testuser1,ou=Group,dc=example,dc=com" 233s 233s adding new entry "cn=ldapusers,ou=Group,dc=example,dc=com" 233s 233s + create_realm EXAMPLE.COM ldap.example.com 233s + local realm_name=EXAMPLE.COM 233s + local kerberos_server=ldap.example.com 233s + rm -rf /var/lib/krb5kdc/* 233s + rm -rf /etc/krb5kdc/kdc.conf 233s + rm -f /etc/krb5.keytab 233s + cat 233s + cat 233s + echo # */admin * 233s + kdb5_util create -s -P secretpassword 233s Initializing database '/var/lib/krb5kdc/principal' for realm 'EXAMPLE.COM', 233s master key name 'K/M@EXAMPLE.COM' 233s + systemctl restart krb5-kdc.service krb5-admin-server.service 233s + create_krb_principal testuser1 testuser1kerberos 233s + local principal=testuser1 233s + local password=testuser1kerberos 233s + kadmin.local -q addprinc -pw testuser1kerberos testuser1 233s No policy specified for testuser1@EXAMPLE.COM; defaulting to no policy 233s Authenticating as principal root/admin@EXAMPLE.COM with password. 233s Principal "testuser1@EXAMPLE.COM" created. 233s + configure_sssd_ldap_rfc2307_krb5_auth 233s + cat 233s + chmod 0600 /etc/sssd/sssd.conf 233s + systemctl restart sssd 234s Assert local user databases do not have our LDAP test data 234s + enable_pam_mkhomedir 234s + grep -qE ^session.*pam_mkhomedir\.so /etc/pam.d/common-session 234s + run_common_tests 234s + echo Assert local user databases do not have our LDAP test data 234s + check_local_user testuser1 234s + local local_user=testuser1 234s + grep -q ^testuser1 /etc/passwd 234s + check_local_group testuser1 234s + local local_group=testuser1 234s + grep -q ^testuser1 /etc/group 234s + check_local_group ldapusers 234s + local local_group=ldapusers 234s + grep -q ^ldapusers /etc/group 234s + echo The LDAP user is known to the system via getentThe LDAP user is known to the system via getent 234s 234s + check_getent_user testuser1 234s + local getent_user=testuser1 234s + local output 234s + getent passwd testuser1 234s The LDAP user's private group is known to the system via getent 234s + output=testuser1:*:10001:10001:testuser1:/home/testuser1:/bin/bash 234s + [ -z testuser1:*:10001:10001:testuser1:/home/testuser1:/bin/bash ] 234s + echo The LDAP user's private group is known to the system via getent 234s + check_getent_group testuser1 234s + local getent_group=testuser1 234s + local output 234s + getent group testuser1 234s + output=testuser1:*:10001:testuser1 234s + [ -z testuser1:*:10001:testuser1 ] 234s + echo The LDAP group ldapusers is known to the system via getent 234s + check_getent_group ldapusers 234s + local getent_group=ldapusers 234s + local output 234s The LDAP group ldapusers is known to the system via getent 234s + getent group ldapusers 234s + output=ldapusers:*:10100:testuser1 234s The id(1) command can resolve the group membership of the LDAP user 234s + [ -z ldapusers:*:10100:testuser1 ] 234s + echo The id(1) command can resolve the group membership of the LDAP user 234s + id -Gn testuser1 234s + output=testuser1 ldapusers 234s The Kerberos principal can login on a terminal 234s + [ testuser1 ldapusers != testuser1 ldapusers ] 234s + echo The Kerberos principal can login on a terminal 234s + kdestroy 234s + /usr/bin/expect -f debian/tests/login.exp testuser1 testuser1kerberos testuser1@EXAMPLE.COM 234s spawn login 234s ldap.example.com login: testuser1 234s Password: 234s Welcome to Ubuntu 24.04.1 LTS (GNU/Linux 6.8.0-48-generic ppc64le) 234s 234s * Documentation: https://help.ubuntu.com 234s * Management: https://landscape.canonical.com 234s * Support: https://ubuntu.com/pro 234s 234s 234s The programs included with the Ubuntu system are free software; 234s the exact distribution terms for each program are described in the 234s individual files in /usr/share/doc/*/copyright. 234s 234s Ubuntu comes with ABSOLUTELY NO WARRANTY, to the extent permitted by 234s applicable law. 234s 234s [?2004htestuser1@ldap:~$ id -un 234s [?2004l testuser1 234s [?2004htestuser1@ldap:~$ klist 234s [?2004l Ticket cache: FILE:/tmp/krb5cc_10001_Mt3yTu 235s Default principal: testuser1@EXAMPLE.COMautopkgtest [22:47:36]: test ldap-user-group-krb5-auth: -----------------------] 235s autopkgtest [22:47:36]: test ldap-user-group-krb5-auth: - - - - - - - - - - results - - - - - - - - - - 235s ldap-user-group-krb5-auth PASS 236s autopkgtest [22:47:37]: test sssd-softhism2-certificates-tests.sh: preparing testbed 355s autopkgtest [22:49:36]: testbed dpkg architecture: ppc64el 355s autopkgtest [22:49:36]: testbed apt version: 2.7.14build2 355s autopkgtest [22:49:36]: @@@@@@@@@@@@@@@@@@@@ test bed setup 356s Get:1 http://ftpmaster.internal/ubuntu noble-proposed InRelease [265 kB] 356s Get:2 http://ftpmaster.internal/ubuntu noble-proposed/main Sources [78.5 kB] 357s Get:3 http://ftpmaster.internal/ubuntu noble-proposed/restricted Sources [3240 B] 357s Get:4 http://ftpmaster.internal/ubuntu noble-proposed/universe Sources [88.3 kB] 357s Get:5 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el Packages [153 kB] 357s Get:6 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el c-n-f Metadata [3752 B] 357s Get:7 http://ftpmaster.internal/ubuntu noble-proposed/restricted ppc64el Packages [1176 B] 357s Get:8 http://ftpmaster.internal/ubuntu noble-proposed/restricted ppc64el c-n-f Metadata [116 B] 357s Get:9 http://ftpmaster.internal/ubuntu noble-proposed/universe ppc64el Packages [624 kB] 357s Get:10 http://ftpmaster.internal/ubuntu noble-proposed/universe ppc64el c-n-f Metadata [9704 B] 357s Get:11 http://ftpmaster.internal/ubuntu noble-proposed/multiverse ppc64el c-n-f Metadata [116 B] 361s Fetched 1227 kB in 1s (1049 kB/s) 361s Reading package lists... 364s Reading package lists... 364s Building dependency tree... 364s Reading state information... 364s Calculating upgrade... 364s The following packages will be upgraded: 364s libnss-systemd libpam-systemd libsystemd-shared libsystemd0 libudev1 364s openssh-client openssh-server openssh-sftp-server systemd systemd-dev 364s systemd-resolved systemd-sysv systemd-timesyncd udev 364s 14 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 364s Need to get 11.7 MB of archives. 364s After this operation, 1024 B of additional disk space will be used. 364s Get:1 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libnss-systemd ppc64el 255.4-1ubuntu8.5 [207 kB] 365s Get:2 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el systemd-dev all 255.4-1ubuntu8.5 [104 kB] 365s Get:3 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el systemd-timesyncd ppc64el 255.4-1ubuntu8.5 [37.6 kB] 365s Get:4 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el systemd-resolved ppc64el 255.4-1ubuntu8.5 [345 kB] 365s Get:5 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libsystemd-shared ppc64el 255.4-1ubuntu8.5 [2345 kB] 365s Get:6 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libsystemd0 ppc64el 255.4-1ubuntu8.5 [526 kB] 365s Get:7 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el systemd-sysv ppc64el 255.4-1ubuntu8.5 [11.9 kB] 365s Get:8 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libpam-systemd ppc64el 255.4-1ubuntu8.5 [303 kB] 365s Get:9 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el systemd ppc64el 255.4-1ubuntu8.5 [3767 kB] 366s Get:10 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el udev ppc64el 255.4-1ubuntu8.5 [2036 kB] 366s Get:11 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libudev1 ppc64el 255.4-1ubuntu8.5 [200 kB] 366s Get:12 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el openssh-sftp-server ppc64el 1:9.6p1-3ubuntu13.7 [43.4 kB] 366s Get:13 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el openssh-server ppc64el 1:9.6p1-3ubuntu13.7 [625 kB] 366s Get:14 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el openssh-client ppc64el 1:9.6p1-3ubuntu13.7 [1109 kB] 366s Preconfiguring packages ... 366s Fetched 11.7 MB in 2s (7152 kB/s) 367s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 72377 files and directories currently installed.) 367s Preparing to unpack .../0-libnss-systemd_255.4-1ubuntu8.5_ppc64el.deb ... 367s Unpacking libnss-systemd:ppc64el (255.4-1ubuntu8.5) over (255.4-1ubuntu8.4) ... 367s Preparing to unpack .../1-systemd-dev_255.4-1ubuntu8.5_all.deb ... 367s Unpacking systemd-dev (255.4-1ubuntu8.5) over (255.4-1ubuntu8.4) ... 367s Preparing to unpack .../2-systemd-timesyncd_255.4-1ubuntu8.5_ppc64el.deb ... 367s Unpacking systemd-timesyncd (255.4-1ubuntu8.5) over (255.4-1ubuntu8.4) ... 367s Preparing to unpack .../3-systemd-resolved_255.4-1ubuntu8.5_ppc64el.deb ... 367s Unpacking systemd-resolved (255.4-1ubuntu8.5) over (255.4-1ubuntu8.4) ... 367s Preparing to unpack .../4-libsystemd-shared_255.4-1ubuntu8.5_ppc64el.deb ... 367s Unpacking libsystemd-shared:ppc64el (255.4-1ubuntu8.5) over (255.4-1ubuntu8.4) ... 367s Preparing to unpack .../5-libsystemd0_255.4-1ubuntu8.5_ppc64el.deb ... 367s Unpacking libsystemd0:ppc64el (255.4-1ubuntu8.5) over (255.4-1ubuntu8.4) ... 367s Setting up libsystemd0:ppc64el (255.4-1ubuntu8.5) ... 367s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 72377 files and directories currently installed.) 367s Preparing to unpack .../systemd-sysv_255.4-1ubuntu8.5_ppc64el.deb ... 367s Unpacking systemd-sysv (255.4-1ubuntu8.5) over (255.4-1ubuntu8.4) ... 367s Preparing to unpack .../libpam-systemd_255.4-1ubuntu8.5_ppc64el.deb ... 367s Unpacking libpam-systemd:ppc64el (255.4-1ubuntu8.5) over (255.4-1ubuntu8.4) ... 367s Preparing to unpack .../systemd_255.4-1ubuntu8.5_ppc64el.deb ... 367s Unpacking systemd (255.4-1ubuntu8.5) over (255.4-1ubuntu8.4) ... 368s Preparing to unpack .../udev_255.4-1ubuntu8.5_ppc64el.deb ... 368s Unpacking udev (255.4-1ubuntu8.5) over (255.4-1ubuntu8.4) ... 368s Preparing to unpack .../libudev1_255.4-1ubuntu8.5_ppc64el.deb ... 368s Unpacking libudev1:ppc64el (255.4-1ubuntu8.5) over (255.4-1ubuntu8.4) ... 368s Setting up libudev1:ppc64el (255.4-1ubuntu8.5) ... 368s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 72377 files and directories currently installed.) 368s Preparing to unpack .../openssh-sftp-server_1%3a9.6p1-3ubuntu13.7_ppc64el.deb ... 368s Unpacking openssh-sftp-server (1:9.6p1-3ubuntu13.7) over (1:9.6p1-3ubuntu13.5) ... 368s Preparing to unpack .../openssh-server_1%3a9.6p1-3ubuntu13.7_ppc64el.deb ... 368s Unpacking openssh-server (1:9.6p1-3ubuntu13.7) over (1:9.6p1-3ubuntu13.5) ... 368s Preparing to unpack .../openssh-client_1%3a9.6p1-3ubuntu13.7_ppc64el.deb ... 368s Unpacking openssh-client (1:9.6p1-3ubuntu13.7) over (1:9.6p1-3ubuntu13.5) ... 368s Setting up openssh-client (1:9.6p1-3ubuntu13.7) ... 368s Setting up systemd-dev (255.4-1ubuntu8.5) ... 368s Setting up libsystemd-shared:ppc64el (255.4-1ubuntu8.5) ... 368s Setting up openssh-sftp-server (1:9.6p1-3ubuntu13.7) ... 368s Setting up openssh-server (1:9.6p1-3ubuntu13.7) ... 369s Replacing config file /etc/ssh/sshd_config with new version 370s Setting up systemd (255.4-1ubuntu8.5) ... 371s Setting up systemd-timesyncd (255.4-1ubuntu8.5) ... 371s Setting up udev (255.4-1ubuntu8.5) ... 372s Setting up systemd-resolved (255.4-1ubuntu8.5) ... 373s Setting up systemd-sysv (255.4-1ubuntu8.5) ... 373s Setting up libnss-systemd:ppc64el (255.4-1ubuntu8.5) ... 373s Setting up libpam-systemd:ppc64el (255.4-1ubuntu8.5) ... 373s Processing triggers for libc-bin (2.39-0ubuntu8.3) ... 373s Processing triggers for ufw (0.36.2-6) ... 373s Processing triggers for man-db (2.12.0-4build2) ... 376s Processing triggers for dbus (1.14.10-4ubuntu4.1) ... 376s Processing triggers for initramfs-tools (0.142ubuntu25.4) ... 376s update-initramfs: Generating /boot/initrd.img-6.8.0-48-generic 376s W: No lz4 in /usr/bin:/sbin:/bin, using gzip 390s Reading package lists... 390s Building dependency tree... 390s Reading state information... 390s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 391s Hit:1 http://ftpmaster.internal/ubuntu noble-proposed InRelease 391s Hit:2 http://ftpmaster.internal/ubuntu noble InRelease 391s Hit:3 http://ftpmaster.internal/ubuntu noble-updates InRelease 391s Hit:4 http://ftpmaster.internal/ubuntu noble-security InRelease 392s Reading package lists... 392s Reading package lists... 393s Building dependency tree... 393s Reading state information... 393s Calculating upgrade... 393s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 393s Reading package lists... 393s Building dependency tree... 393s Reading state information... 394s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 394s autopkgtest [22:50:15]: rebooting testbed after setup commands that affected boot 398s autopkgtest-virt-ssh: WARNING: ssh connection failed. Retrying in 3 seconds... 433s Reading package lists... 433s Building dependency tree... 433s Reading state information... 434s Starting pkgProblemResolver with broken count: 0 434s Starting 2 pkgProblemResolver with broken count: 0 434s Done 434s The following additional packages will be installed: 434s gnutls-bin libavahi-client3 libavahi-common-data libavahi-common3 434s libbasicobjects0t64 libcares2 libcollection4t64 libcrack2 libdhash1t64 434s libevent-2.1-7t64 libgnutls-dane0t64 libini-config5t64 libipa-hbac0t64 434s libldb2 libnfsidmap1 libnss-sss libpam-pwquality libpam-sss 434s libpath-utils1t64 libpwquality-common libpwquality1 libref-array1t64 434s libsmbclient0 libsofthsm2 libsss-certmap0 libsss-idmap0 libsss-nss-idmap0 434s libtalloc2 libtdb1 libtevent0t64 libunbound8 libwbclient0 python3-sss 434s samba-libs softhsm2 softhsm2-common sssd sssd-ad sssd-ad-common sssd-common 434s sssd-ipa sssd-krb5 sssd-krb5-common sssd-ldap sssd-proxy 434s Suggested packages: 434s dns-root-data adcli libsss-sudo sssd-tools libsasl2-modules-ldap 434s Recommended packages: 434s cracklib-runtime libsasl2-modules-gssapi-mit 434s | libsasl2-modules-gssapi-heimdal ldap-utils 434s The following NEW packages will be installed: 434s autopkgtest-satdep gnutls-bin libavahi-client3 libavahi-common-data 434s libavahi-common3 libbasicobjects0t64 libcares2 libcollection4t64 libcrack2 434s libdhash1t64 libevent-2.1-7t64 libgnutls-dane0t64 libini-config5t64 434s libipa-hbac0t64 libldb2 libnfsidmap1 libnss-sss libpam-pwquality libpam-sss 434s libpath-utils1t64 libpwquality-common libpwquality1 libref-array1t64 434s libsmbclient0 libsofthsm2 libsss-certmap0 libsss-idmap0 libsss-nss-idmap0 434s libtalloc2 libtdb1 libtevent0t64 libunbound8 libwbclient0 python3-sss 434s samba-libs softhsm2 softhsm2-common sssd sssd-ad sssd-ad-common sssd-common 434s sssd-ipa sssd-krb5 sssd-krb5-common sssd-ldap sssd-proxy 434s 0 upgraded, 46 newly installed, 0 to remove and 0 not upgraded. 434s Need to get 11.4 MB/11.4 MB of archives. 434s After this operation, 57.0 MB of additional disk space will be used. 434s Get:1 /tmp/autopkgtest.HhFPuo/3-autopkgtest-satdep.deb autopkgtest-satdep ppc64el 0 [752 B] 434s Get:2 http://ftpmaster.internal/ubuntu noble/main ppc64el libevent-2.1-7t64 ppc64el 2.1.12-stable-9ubuntu2 [174 kB] 434s Get:3 http://ftpmaster.internal/ubuntu noble-updates/main ppc64el libunbound8 ppc64el 1.19.2-1ubuntu3.3 [538 kB] 435s Get:4 http://ftpmaster.internal/ubuntu noble-updates/main ppc64el libgnutls-dane0t64 ppc64el 3.8.3-1.1ubuntu3.2 [24.6 kB] 435s Get:5 http://ftpmaster.internal/ubuntu noble-updates/universe ppc64el gnutls-bin ppc64el 3.8.3-1.1ubuntu3.2 [290 kB] 435s Get:6 http://ftpmaster.internal/ubuntu noble/main ppc64el libavahi-common-data ppc64el 0.8-13ubuntu6 [29.7 kB] 435s Get:7 http://ftpmaster.internal/ubuntu noble/main ppc64el libavahi-common3 ppc64el 0.8-13ubuntu6 [26.3 kB] 435s Get:8 http://ftpmaster.internal/ubuntu noble/main ppc64el libavahi-client3 ppc64el 0.8-13ubuntu6 [30.8 kB] 435s Get:9 http://ftpmaster.internal/ubuntu noble/main ppc64el libbasicobjects0t64 ppc64el 0.6.2-2.1build1 [6138 B] 435s Get:10 http://ftpmaster.internal/ubuntu noble/main ppc64el libcares2 ppc64el 1.27.0-1.0ubuntu1 [99.0 kB] 435s Get:11 http://ftpmaster.internal/ubuntu noble/main ppc64el libcollection4t64 ppc64el 0.6.2-2.1build1 [36.4 kB] 435s Get:12 http://ftpmaster.internal/ubuntu noble/main ppc64el libcrack2 ppc64el 2.9.6-5.1build2 [31.1 kB] 435s Get:13 http://ftpmaster.internal/ubuntu noble/main ppc64el libdhash1t64 ppc64el 0.6.2-2.1build1 [10.4 kB] 435s Get:14 http://ftpmaster.internal/ubuntu noble/main ppc64el libpath-utils1t64 ppc64el 0.6.2-2.1build1 [10.6 kB] 435s Get:15 http://ftpmaster.internal/ubuntu noble/main ppc64el libref-array1t64 ppc64el 0.6.2-2.1build1 [8160 B] 435s Get:16 http://ftpmaster.internal/ubuntu noble/main ppc64el libini-config5t64 ppc64el 0.6.2-2.1build1 [55.3 kB] 435s Get:17 http://ftpmaster.internal/ubuntu noble-updates/main ppc64el libipa-hbac0t64 ppc64el 2.9.4-1.1ubuntu6.1 [18.1 kB] 435s Get:18 http://ftpmaster.internal/ubuntu noble/main ppc64el libtalloc2 ppc64el 2.4.2-1build2 [36.7 kB] 435s Get:19 http://ftpmaster.internal/ubuntu noble/main ppc64el libtdb1 ppc64el 1.4.10-1build1 [62.8 kB] 435s Get:20 http://ftpmaster.internal/ubuntu noble/main ppc64el libtevent0t64 ppc64el 0.16.1-2build1 [51.2 kB] 435s Get:21 http://ftpmaster.internal/ubuntu noble/main ppc64el libldb2 ppc64el 2:2.8.0+samba4.19.5+dfsg-4ubuntu9 [220 kB] 435s Get:22 http://ftpmaster.internal/ubuntu noble/main ppc64el libnfsidmap1 ppc64el 1:2.6.4-3ubuntu5 [54.5 kB] 435s Get:23 http://ftpmaster.internal/ubuntu noble/main ppc64el libpwquality-common all 1.4.5-3build1 [7748 B] 435s Get:24 http://ftpmaster.internal/ubuntu noble/main ppc64el libpwquality1 ppc64el 1.4.5-3build1 [17.0 kB] 435s Get:25 http://ftpmaster.internal/ubuntu noble/main ppc64el libpam-pwquality ppc64el 1.4.5-3build1 [12.5 kB] 435s Get:26 http://ftpmaster.internal/ubuntu noble/main ppc64el libwbclient0 ppc64el 2:4.19.5+dfsg-4ubuntu9 [77.3 kB] 435s Get:27 http://ftpmaster.internal/ubuntu noble/main ppc64el samba-libs ppc64el 2:4.19.5+dfsg-4ubuntu9 [6674 kB] 435s Get:28 http://ftpmaster.internal/ubuntu noble/main ppc64el libsmbclient0 ppc64el 2:4.19.5+dfsg-4ubuntu9 [70.3 kB] 436s Get:29 http://ftpmaster.internal/ubuntu noble/universe ppc64el softhsm2-common ppc64el 2.6.1-2.2ubuntu3 [6198 B] 436s Get:30 http://ftpmaster.internal/ubuntu noble/universe ppc64el libsofthsm2 ppc64el 2.6.1-2.2ubuntu3 [296 kB] 436s Get:31 http://ftpmaster.internal/ubuntu noble/universe ppc64el softhsm2 ppc64el 2.6.1-2.2ubuntu3 [200 kB] 436s Get:32 http://ftpmaster.internal/ubuntu noble-updates/main ppc64el python3-sss ppc64el 2.9.4-1.1ubuntu6.1 [48.5 kB] 436s Get:33 http://ftpmaster.internal/ubuntu noble-updates/main ppc64el libsss-idmap0 ppc64el 2.9.4-1.1ubuntu6.1 [25.2 kB] 436s Get:34 http://ftpmaster.internal/ubuntu noble-updates/main ppc64el libnss-sss ppc64el 2.9.4-1.1ubuntu6.1 [36.8 kB] 436s Get:35 http://ftpmaster.internal/ubuntu noble-updates/main ppc64el libpam-sss ppc64el 2.9.4-1.1ubuntu6.1 [57.0 kB] 436s Get:36 http://ftpmaster.internal/ubuntu noble-updates/main ppc64el libsss-certmap0 ppc64el 2.9.4-1.1ubuntu6.1 [54.2 kB] 436s Get:37 http://ftpmaster.internal/ubuntu noble-updates/main ppc64el libsss-nss-idmap0 ppc64el 2.9.4-1.1ubuntu6.1 [37.9 kB] 436s Get:38 http://ftpmaster.internal/ubuntu noble-updates/main ppc64el sssd-common ppc64el 2.9.4-1.1ubuntu6.1 [1280 kB] 436s Get:39 http://ftpmaster.internal/ubuntu noble-updates/main ppc64el sssd-ad-common ppc64el 2.9.4-1.1ubuntu6.1 [88.6 kB] 436s Get:40 http://ftpmaster.internal/ubuntu noble-updates/main ppc64el sssd-krb5-common ppc64el 2.9.4-1.1ubuntu6.1 [103 kB] 436s Get:41 http://ftpmaster.internal/ubuntu noble-updates/main ppc64el sssd-ad ppc64el 2.9.4-1.1ubuntu6.1 [148 kB] 436s Get:42 http://ftpmaster.internal/ubuntu noble-updates/main ppc64el sssd-ipa ppc64el 2.9.4-1.1ubuntu6.1 [240 kB] 436s Get:43 http://ftpmaster.internal/ubuntu noble-updates/main ppc64el sssd-krb5 ppc64el 2.9.4-1.1ubuntu6.1 [14.4 kB] 436s Get:44 http://ftpmaster.internal/ubuntu noble-updates/main ppc64el sssd-ldap ppc64el 2.9.4-1.1ubuntu6.1 [31.6 kB] 436s Get:45 http://ftpmaster.internal/ubuntu noble-updates/main ppc64el sssd-proxy ppc64el 2.9.4-1.1ubuntu6.1 [48.0 kB] 436s Get:46 http://ftpmaster.internal/ubuntu noble-updates/main ppc64el sssd ppc64el 2.9.4-1.1ubuntu6.1 [4122 B] 436s Fetched 11.4 MB in 2s (6660 kB/s) 436s Selecting previously unselected package libevent-2.1-7t64:ppc64el. 437s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 72377 files and directories currently installed.) 437s Preparing to unpack .../00-libevent-2.1-7t64_2.1.12-stable-9ubuntu2_ppc64el.deb ... 437s Unpacking libevent-2.1-7t64:ppc64el (2.1.12-stable-9ubuntu2) ... 437s Selecting previously unselected package libunbound8:ppc64el. 437s Preparing to unpack .../01-libunbound8_1.19.2-1ubuntu3.3_ppc64el.deb ... 437s Unpacking libunbound8:ppc64el (1.19.2-1ubuntu3.3) ... 437s Selecting previously unselected package libgnutls-dane0t64:ppc64el. 437s Preparing to unpack .../02-libgnutls-dane0t64_3.8.3-1.1ubuntu3.2_ppc64el.deb ... 437s Unpacking libgnutls-dane0t64:ppc64el (3.8.3-1.1ubuntu3.2) ... 437s Selecting previously unselected package gnutls-bin. 437s Preparing to unpack .../03-gnutls-bin_3.8.3-1.1ubuntu3.2_ppc64el.deb ... 437s Unpacking gnutls-bin (3.8.3-1.1ubuntu3.2) ... 437s Selecting previously unselected package libavahi-common-data:ppc64el. 437s Preparing to unpack .../04-libavahi-common-data_0.8-13ubuntu6_ppc64el.deb ... 437s Unpacking libavahi-common-data:ppc64el (0.8-13ubuntu6) ... 437s Selecting previously unselected package libavahi-common3:ppc64el. 437s Preparing to unpack .../05-libavahi-common3_0.8-13ubuntu6_ppc64el.deb ... 437s Unpacking libavahi-common3:ppc64el (0.8-13ubuntu6) ... 437s Selecting previously unselected package libavahi-client3:ppc64el. 437s Preparing to unpack .../06-libavahi-client3_0.8-13ubuntu6_ppc64el.deb ... 437s Unpacking libavahi-client3:ppc64el (0.8-13ubuntu6) ... 437s Selecting previously unselected package libbasicobjects0t64:ppc64el. 437s Preparing to unpack .../07-libbasicobjects0t64_0.6.2-2.1build1_ppc64el.deb ... 437s Unpacking libbasicobjects0t64:ppc64el (0.6.2-2.1build1) ... 437s Selecting previously unselected package libcares2:ppc64el. 437s Preparing to unpack .../08-libcares2_1.27.0-1.0ubuntu1_ppc64el.deb ... 437s Unpacking libcares2:ppc64el (1.27.0-1.0ubuntu1) ... 437s Selecting previously unselected package libcollection4t64:ppc64el. 437s Preparing to unpack .../09-libcollection4t64_0.6.2-2.1build1_ppc64el.deb ... 437s Unpacking libcollection4t64:ppc64el (0.6.2-2.1build1) ... 437s Selecting previously unselected package libcrack2:ppc64el. 437s Preparing to unpack .../10-libcrack2_2.9.6-5.1build2_ppc64el.deb ... 437s Unpacking libcrack2:ppc64el (2.9.6-5.1build2) ... 437s Selecting previously unselected package libdhash1t64:ppc64el. 437s Preparing to unpack .../11-libdhash1t64_0.6.2-2.1build1_ppc64el.deb ... 437s Unpacking libdhash1t64:ppc64el (0.6.2-2.1build1) ... 437s Selecting previously unselected package libpath-utils1t64:ppc64el. 437s Preparing to unpack .../12-libpath-utils1t64_0.6.2-2.1build1_ppc64el.deb ... 437s Unpacking libpath-utils1t64:ppc64el (0.6.2-2.1build1) ... 437s Selecting previously unselected package libref-array1t64:ppc64el. 437s Preparing to unpack .../13-libref-array1t64_0.6.2-2.1build1_ppc64el.deb ... 437s Unpacking libref-array1t64:ppc64el (0.6.2-2.1build1) ... 437s Selecting previously unselected package libini-config5t64:ppc64el. 437s Preparing to unpack .../14-libini-config5t64_0.6.2-2.1build1_ppc64el.deb ... 437s Unpacking libini-config5t64:ppc64el (0.6.2-2.1build1) ... 437s Selecting previously unselected package libipa-hbac0t64. 437s Preparing to unpack .../15-libipa-hbac0t64_2.9.4-1.1ubuntu6.1_ppc64el.deb ... 437s Unpacking libipa-hbac0t64 (2.9.4-1.1ubuntu6.1) ... 437s Selecting previously unselected package libtalloc2:ppc64el. 437s Preparing to unpack .../16-libtalloc2_2.4.2-1build2_ppc64el.deb ... 437s Unpacking libtalloc2:ppc64el (2.4.2-1build2) ... 437s Selecting previously unselected package libtdb1:ppc64el. 437s Preparing to unpack .../17-libtdb1_1.4.10-1build1_ppc64el.deb ... 437s Unpacking libtdb1:ppc64el (1.4.10-1build1) ... 437s Selecting previously unselected package libtevent0t64:ppc64el. 437s Preparing to unpack .../18-libtevent0t64_0.16.1-2build1_ppc64el.deb ... 437s Unpacking libtevent0t64:ppc64el (0.16.1-2build1) ... 437s Selecting previously unselected package libldb2:ppc64el. 437s Preparing to unpack .../19-libldb2_2%3a2.8.0+samba4.19.5+dfsg-4ubuntu9_ppc64el.deb ... 437s Unpacking libldb2:ppc64el (2:2.8.0+samba4.19.5+dfsg-4ubuntu9) ... 437s Selecting previously unselected package libnfsidmap1:ppc64el. 437s Preparing to unpack .../20-libnfsidmap1_1%3a2.6.4-3ubuntu5_ppc64el.deb ... 437s Unpacking libnfsidmap1:ppc64el (1:2.6.4-3ubuntu5) ... 437s Selecting previously unselected package libpwquality-common. 437s Preparing to unpack .../21-libpwquality-common_1.4.5-3build1_all.deb ... 437s Unpacking libpwquality-common (1.4.5-3build1) ... 437s Selecting previously unselected package libpwquality1:ppc64el. 437s Preparing to unpack .../22-libpwquality1_1.4.5-3build1_ppc64el.deb ... 437s Unpacking libpwquality1:ppc64el (1.4.5-3build1) ... 437s Selecting previously unselected package libpam-pwquality:ppc64el. 437s Preparing to unpack .../23-libpam-pwquality_1.4.5-3build1_ppc64el.deb ... 437s Unpacking libpam-pwquality:ppc64el (1.4.5-3build1) ... 437s Selecting previously unselected package libwbclient0:ppc64el. 437s Preparing to unpack .../24-libwbclient0_2%3a4.19.5+dfsg-4ubuntu9_ppc64el.deb ... 437s Unpacking libwbclient0:ppc64el (2:4.19.5+dfsg-4ubuntu9) ... 437s Selecting previously unselected package samba-libs:ppc64el. 437s Preparing to unpack .../25-samba-libs_2%3a4.19.5+dfsg-4ubuntu9_ppc64el.deb ... 437s Unpacking samba-libs:ppc64el (2:4.19.5+dfsg-4ubuntu9) ... 438s Selecting previously unselected package libsmbclient0:ppc64el. 438s Preparing to unpack .../26-libsmbclient0_2%3a4.19.5+dfsg-4ubuntu9_ppc64el.deb ... 438s Unpacking libsmbclient0:ppc64el (2:4.19.5+dfsg-4ubuntu9) ... 438s Selecting previously unselected package softhsm2-common. 438s Preparing to unpack .../27-softhsm2-common_2.6.1-2.2ubuntu3_ppc64el.deb ... 438s Unpacking softhsm2-common (2.6.1-2.2ubuntu3) ... 438s Selecting previously unselected package libsofthsm2. 438s Preparing to unpack .../28-libsofthsm2_2.6.1-2.2ubuntu3_ppc64el.deb ... 438s Unpacking libsofthsm2 (2.6.1-2.2ubuntu3) ... 438s Selecting previously unselected package softhsm2. 438s Preparing to unpack .../29-softhsm2_2.6.1-2.2ubuntu3_ppc64el.deb ... 438s Unpacking softhsm2 (2.6.1-2.2ubuntu3) ... 438s Selecting previously unselected package python3-sss. 438s Preparing to unpack .../30-python3-sss_2.9.4-1.1ubuntu6.1_ppc64el.deb ... 438s Unpacking python3-sss (2.9.4-1.1ubuntu6.1) ... 438s Selecting previously unselected package libsss-idmap0. 438s Preparing to unpack .../31-libsss-idmap0_2.9.4-1.1ubuntu6.1_ppc64el.deb ... 438s Unpacking libsss-idmap0 (2.9.4-1.1ubuntu6.1) ... 438s Selecting previously unselected package libnss-sss:ppc64el. 438s Preparing to unpack .../32-libnss-sss_2.9.4-1.1ubuntu6.1_ppc64el.deb ... 438s Unpacking libnss-sss:ppc64el (2.9.4-1.1ubuntu6.1) ... 438s Selecting previously unselected package libpam-sss:ppc64el. 438s Preparing to unpack .../33-libpam-sss_2.9.4-1.1ubuntu6.1_ppc64el.deb ... 438s Unpacking libpam-sss:ppc64el (2.9.4-1.1ubuntu6.1) ... 438s Selecting previously unselected package libsss-certmap0. 438s Preparing to unpack .../34-libsss-certmap0_2.9.4-1.1ubuntu6.1_ppc64el.deb ... 438s Unpacking libsss-certmap0 (2.9.4-1.1ubuntu6.1) ... 438s Selecting previously unselected package libsss-nss-idmap0. 438s Preparing to unpack .../35-libsss-nss-idmap0_2.9.4-1.1ubuntu6.1_ppc64el.deb ... 438s Unpacking libsss-nss-idmap0 (2.9.4-1.1ubuntu6.1) ... 438s Selecting previously unselected package sssd-common. 438s Preparing to unpack .../36-sssd-common_2.9.4-1.1ubuntu6.1_ppc64el.deb ... 438s Unpacking sssd-common (2.9.4-1.1ubuntu6.1) ... 438s Selecting previously unselected package sssd-ad-common. 438s Preparing to unpack .../37-sssd-ad-common_2.9.4-1.1ubuntu6.1_ppc64el.deb ... 438s Unpacking sssd-ad-common (2.9.4-1.1ubuntu6.1) ... 438s Selecting previously unselected package sssd-krb5-common. 438s Preparing to unpack .../38-sssd-krb5-common_2.9.4-1.1ubuntu6.1_ppc64el.deb ... 438s Unpacking sssd-krb5-common (2.9.4-1.1ubuntu6.1) ... 438s Selecting previously unselected package sssd-ad. 438s Preparing to unpack .../39-sssd-ad_2.9.4-1.1ubuntu6.1_ppc64el.deb ... 438s Unpacking sssd-ad (2.9.4-1.1ubuntu6.1) ... 438s Selecting previously unselected package sssd-ipa. 438s Preparing to unpack .../40-sssd-ipa_2.9.4-1.1ubuntu6.1_ppc64el.deb ... 438s Unpacking sssd-ipa (2.9.4-1.1ubuntu6.1) ... 438s Selecting previously unselected package sssd-krb5. 438s Preparing to unpack .../41-sssd-krb5_2.9.4-1.1ubuntu6.1_ppc64el.deb ... 438s Unpacking sssd-krb5 (2.9.4-1.1ubuntu6.1) ... 438s Selecting previously unselected package sssd-ldap. 438s Preparing to unpack .../42-sssd-ldap_2.9.4-1.1ubuntu6.1_ppc64el.deb ... 438s Unpacking sssd-ldap (2.9.4-1.1ubuntu6.1) ... 438s Selecting previously unselected package sssd-proxy. 438s Preparing to unpack .../43-sssd-proxy_2.9.4-1.1ubuntu6.1_ppc64el.deb ... 438s Unpacking sssd-proxy (2.9.4-1.1ubuntu6.1) ... 438s Selecting previously unselected package sssd. 438s Preparing to unpack .../44-sssd_2.9.4-1.1ubuntu6.1_ppc64el.deb ... 438s Unpacking sssd (2.9.4-1.1ubuntu6.1) ... 438s Selecting previously unselected package autopkgtest-satdep. 438s Preparing to unpack .../45-3-autopkgtest-satdep.deb ... 438s Unpacking autopkgtest-satdep (0) ... 438s Setting up libpwquality-common (1.4.5-3build1) ... 438s Setting up softhsm2-common (2.6.1-2.2ubuntu3) ... 439s 439s Creating config file /etc/softhsm/softhsm2.conf with new version 439s Setting up libnfsidmap1:ppc64el (1:2.6.4-3ubuntu5) ... 439s Setting up libsss-idmap0 (2.9.4-1.1ubuntu6.1) ... 439s Setting up libbasicobjects0t64:ppc64el (0.6.2-2.1build1) ... 439s Setting up libipa-hbac0t64 (2.9.4-1.1ubuntu6.1) ... 439s Setting up libref-array1t64:ppc64el (0.6.2-2.1build1) ... 439s Setting up libtdb1:ppc64el (1.4.10-1build1) ... 439s Setting up libcollection4t64:ppc64el (0.6.2-2.1build1) ... 439s Setting up libevent-2.1-7t64:ppc64el (2.1.12-stable-9ubuntu2) ... 439s Setting up libwbclient0:ppc64el (2:4.19.5+dfsg-4ubuntu9) ... 439s Setting up libtalloc2:ppc64el (2.4.2-1build2) ... 439s Setting up libpath-utils1t64:ppc64el (0.6.2-2.1build1) ... 439s Setting up libunbound8:ppc64el (1.19.2-1ubuntu3.3) ... 439s Setting up libgnutls-dane0t64:ppc64el (3.8.3-1.1ubuntu3.2) ... 439s Setting up libavahi-common-data:ppc64el (0.8-13ubuntu6) ... 439s Setting up libcares2:ppc64el (1.27.0-1.0ubuntu1) ... 439s Setting up libdhash1t64:ppc64el (0.6.2-2.1build1) ... 439s Setting up libcrack2:ppc64el (2.9.6-5.1build2) ... 439s Setting up libsss-nss-idmap0 (2.9.4-1.1ubuntu6.1) ... 439s Setting up libini-config5t64:ppc64el (0.6.2-2.1build1) ... 439s Setting up libtevent0t64:ppc64el (0.16.1-2build1) ... 439s Setting up libnss-sss:ppc64el (2.9.4-1.1ubuntu6.1) ... 439s Setting up gnutls-bin (3.8.3-1.1ubuntu3.2) ... 439s Setting up libsofthsm2 (2.6.1-2.2ubuntu3) ... 439s Setting up softhsm2 (2.6.1-2.2ubuntu3) ... 439s Setting up libavahi-common3:ppc64el (0.8-13ubuntu6) ... 439s Setting up libsss-certmap0 (2.9.4-1.1ubuntu6.1) ... 439s Setting up libpwquality1:ppc64el (1.4.5-3build1) ... 439s Setting up libldb2:ppc64el (2:2.8.0+samba4.19.5+dfsg-4ubuntu9) ... 439s Setting up libavahi-client3:ppc64el (0.8-13ubuntu6) ... 439s Setting up libpam-pwquality:ppc64el (1.4.5-3build1) ... 439s Setting up samba-libs:ppc64el (2:4.19.5+dfsg-4ubuntu9) ... 439s Setting up python3-sss (2.9.4-1.1ubuntu6.1) ... 439s Setting up libsmbclient0:ppc64el (2:4.19.5+dfsg-4ubuntu9) ... 439s Setting up libpam-sss:ppc64el (2.9.4-1.1ubuntu6.1) ... 440s Setting up sssd-common (2.9.4-1.1ubuntu6.1) ... 440s Creating SSSD system user & group... 440s warn: The home directory `/var/lib/sss' already exists. Not touching this directory. 440s warn: Warning: The home directory `/var/lib/sss' does not belong to the user you are currently creating. 440s Warning: found usr.sbin.sssd in /etc/apparmor.d/force-complain, forcing complain mode 440s Warning from /etc/apparmor.d/usr.sbin.sssd (/etc/apparmor.d/usr.sbin.sssd line 63): Caching disabled for: 'usr.sbin.sssd' due to force complain 441s Created symlink /etc/systemd/system/sssd.service.wants/sssd-autofs.socket → /usr/lib/systemd/system/sssd-autofs.socket. 441s Created symlink /etc/systemd/system/sssd.service.wants/sssd-nss.socket → /usr/lib/systemd/system/sssd-nss.socket. 442s Created symlink /etc/systemd/system/sssd.service.wants/sssd-pam-priv.socket → /usr/lib/systemd/system/sssd-pam-priv.socket. 442s Created symlink /etc/systemd/system/sssd.service.wants/sssd-pam.socket → /usr/lib/systemd/system/sssd-pam.socket. 443s Created symlink /etc/systemd/system/sssd.service.wants/sssd-ssh.socket → /usr/lib/systemd/system/sssd-ssh.socket. 443s Created symlink /etc/systemd/system/sssd.service.wants/sssd-sudo.socket → /usr/lib/systemd/system/sssd-sudo.socket. 443s Created symlink /etc/systemd/system/multi-user.target.wants/sssd.service → /usr/lib/systemd/system/sssd.service. 444s sssd-autofs.service is a disabled or a static unit, not starting it. 444s sssd-nss.service is a disabled or a static unit, not starting it. 444s sssd-pam.service is a disabled or a static unit, not starting it. 444s sssd-ssh.service is a disabled or a static unit, not starting it. 444s sssd-sudo.service is a disabled or a static unit, not starting it. 444s Could not execute systemctl: at /usr/bin/deb-systemd-invoke line 148. 444s Setting up sssd-proxy (2.9.4-1.1ubuntu6.1) ... 444s Setting up sssd-ad-common (2.9.4-1.1ubuntu6.1) ... 444s Created symlink /etc/systemd/system/sssd.service.wants/sssd-pac.socket → /usr/lib/systemd/system/sssd-pac.socket. 445s sssd-pac.service is a disabled or a static unit, not starting it. 445s Could not execute systemctl: at /usr/bin/deb-systemd-invoke line 148. 445s Setting up sssd-krb5-common (2.9.4-1.1ubuntu6.1) ... 445s Setting up sssd-krb5 (2.9.4-1.1ubuntu6.1) ... 445s Setting up sssd-ldap (2.9.4-1.1ubuntu6.1) ... 445s Setting up sssd-ad (2.9.4-1.1ubuntu6.1) ... 445s Setting up sssd-ipa (2.9.4-1.1ubuntu6.1) ... 445s Setting up sssd (2.9.4-1.1ubuntu6.1) ... 445s Setting up autopkgtest-satdep (0) ... 445s Processing triggers for man-db (2.12.0-4build2) ... 448s Processing triggers for libc-bin (2.39-0ubuntu8.3) ... 452s (Reading database ... 72973 files and directories currently installed.) 452s Removing autopkgtest-satdep (0) ... 456s autopkgtest [22:51:17]: test sssd-softhism2-certificates-tests.sh: [----------------------- 457s + '[' -z ubuntu ']' 457s + required_tools=(p11tool openssl softhsm2-util) 457s + for cmd in "${required_tools[@]}" 457s + command -v p11tool 457s + for cmd in "${required_tools[@]}" 457s + command -v openssl 457s + for cmd in "${required_tools[@]}" 457s + command -v softhsm2-util 457s + PIN=053350 457s +++ head -n 1 457s +++ find /usr/lib/softhsm/libsofthsm2.so 457s ++ realpath /usr/lib/softhsm/libsofthsm2.so 457s + SOFTHSM2_MODULE=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so 457s + SSSD_P11_CHILD=/usr/libexec/sssd/p11_child 457s + TOKEN_ID=00112233445566778899FFAABBCCDDEEFF012345 457s + '[' '!' -v NO_SSSD_TESTS ']' 457s + '[' '!' -x /usr/libexec/sssd/p11_child ']' 457s + ca_db_arg=ca_db 457s ++ /usr/libexec/sssd/p11_child --help 457s + p11_child_help='Usage: p11_child [OPTION...] 457s -d, --debug-level=INT Debug level 457s --debug-timestamps=INT Add debug timestamps 457s --debug-microseconds=INT Show timestamps with microseconds 457s --dumpable=INT Allow core dumps 457s --debug-fd=INT An open file descriptor for the debug 457s logs 457s --logger=stderr|files|journald Set logger 457s --auth Run in auth mode 457s --pre Run in pre-auth mode 457s --wait_for_card Wait until card is available 457s --verification Run in verification mode 457s --pin Expect PIN on stdin 457s --keypad Expect PIN on keypad 457s --verify=STRING Tune validation 457s --ca_db=STRING CA DB to use 457s --module_name=STRING Module name for authentication 457s --token_name=STRING Token name for authentication 457s --key_id=STRING Key ID for authentication 457s --label=STRING Label for authentication 457s --certificate=STRING certificate to verify, base64 encoded 457s --uri=STRING PKCS#11 URI to restrict selection 457s --chain-id=LONG Tevent chain ID used for logging 457s purposes 457s 457s Help options: 457s -?, --help Show this help message 457s --usage Display brief usage message' 457s + echo 'Usage: p11_child [OPTION...] 457s -d, --debug-level=INT Debug level 457s --debug-timestamps=INT Add debug timestamps 457s --debug-microseconds=INT Show timestamps with microseconds 457s --dumpable=INT Allow core dumps 457s --debug-fd=INT An open file descriptor for the debug 457s logs 457s --logger=stderr|files|journald Set logger 457s --auth Run in auth mode 457s --pre Run in pre-auth mode 457s --wait_for_card Wait until card is available 457s --verification Run in verification mode 457s --pin Expect PIN on stdin 457s --keypad Expect PIN on keypad 457s --verify=STRING Tune validation 457s --ca_db=STRING CA DB to use 457s --module_name=STRING Module name for authentication 457s --token_name=STRING Token name for authentication 457s --key_id=STRING Key ID for authentication 457s --label=STRING Label for authentication 457s --certificate=STRING certificate to verify, base64 encoded 457s --uri=STRING PKCS#11 URI to restrict selection 457s --chain-id=LONG Tevent chain ID used for logging 457s purposes 457s 457s Help options: 457s -?, --help Show this help message 457s --usage Display brief usage message' 457s + grep nssdb -qs 457s + grep -qs -- --ca_db 457s + echo 'Usage: p11_child [OPTION...] 457s -d, --debug-level=INT Debug level 457s --debug-timestamps=INT Add debug timestamps 457s --debug-microseconds=INT Show timestamps with microseconds 457s --dumpable=INT Allow core dumps 457s --debug-fd=INT An open file descriptor for the debug 457s logs 457s --logger=stderr|files|journald Set logger 457s --auth Run in auth mode 457s --pre Run in pre-auth mode 457s --wait_for_card Wait until card is available 457s --verification Run in verification mode 457s --pin Expect PIN on stdin 457s --keypad Expect PIN on keypad 457s --verify=STRING Tune validation 457s --ca_db=STRING CA DB to use 457s --module_name=STRING Module name for authentication 457s --token_name=STRING Token name for authentication 457s --key_id=STRING Key ID for authentication 457s --label=STRING Label for authentication 457s --certificate=STRING certificate to verify, base64 encoded 457s --uri=STRING PKCS#11 URI to restrict selection 457s --chain-id=LONG Tevent chain ID used for logging 457s purposes 457s 457s Help options: 457s -?, --help Show this help message 457s --usage Display brief usage message' 457s + '[' '!' -e /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so ']' 457s ++ mktemp -d -t sssd-softhsm2-XXXXXX 457s + tmpdir=/tmp/sssd-softhsm2-9bLCCU 457s + keys_size=1024 457s + [[ ! -v KEEP_TEMPORARY_FILES ]] 457s + trap 'rm -rf "$tmpdir"' EXIT 457s + trap 'set +x; echo -e "\nUnexpected failure!!!"' ERR 457s + echo -n 01 457s + touch /tmp/sssd-softhsm2-9bLCCU/index.txt 457s + mkdir -p /tmp/sssd-softhsm2-9bLCCU/new_certs 457s + cat 457s + root_ca_key_pass=pass:random-root-CA-password-7171 457s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-9bLCCU/test-root-CA-key.pem -passout pass:random-root-CA-password-7171 1024 457s + openssl req -passin pass:random-root-CA-password-7171 -batch -config /tmp/sssd-softhsm2-9bLCCU/test-root-CA.config -x509 -new -nodes -key /tmp/sssd-softhsm2-9bLCCU/test-root-CA-key.pem -sha256 -days 1024 -set_serial 0 -extensions v3_ca -out /tmp/sssd-softhsm2-9bLCCU/test-root-CA.pem 457s + openssl x509 -noout -in /tmp/sssd-softhsm2-9bLCCU/test-root-CA.pem 457s + cat 457s + intermediate_ca_key_pass=pass:random-intermediate-CA-password-32371 457s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA-key.pem -passout pass:random-intermediate-CA-password-32371 1024 457s + openssl req -batch -new -nodes -passin pass:random-intermediate-CA-password-32371 -config /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA.config -key /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA-key.pem -passout pass:random-root-CA-password-7171 -sha256 -extensions v3_ca -out /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA-certificate-request.pem 457s + openssl req -text -noout -in /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA-certificate-request.pem 457s Certificate Request: 457s Data: 457s Version: 1 (0x0) 457s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 457s Subject Public Key Info: 457s Public Key Algorithm: rsaEncryption 457s Public-Key: (1024 bit) 457s Modulus: 457s 00:c9:b1:2c:d8:2a:37:8b:a1:02:69:c2:10:8d:f0: 457s 7b:54:4f:00:d3:fe:80:9e:80:dd:a3:84:e7:17:a4: 457s 9a:8e:79:83:1d:3e:34:ae:24:96:d3:8c:b8:b2:bf: 457s 12:d6:03:a7:78:ee:21:1d:20:50:ab:0c:c3:96:89: 457s 13:3a:3e:18:36:b5:0c:cc:d4:56:dc:3d:69:ad:05: 457s 10:f4:fd:a4:4a:1c:f8:5c:72:35:42:c8:2b:c5:55: 457s 39:0c:88:8e:48:03:fd:6d:6d:fc:61:4a:6c:4a:ac: 457s 89:88:ae:94:08:35:84:86:96:eb:1a:e9:cf:87:f5: 457s d7:25:a0:51:63:bf:2f:6a:dd 457s Exponent: 65537 (0x10001) 457s Attributes: 457s (none) 457s Requested Extensions: 457s Signature Algorithm: sha256WithRSAEncryption 457s Signature Value: 457s 7d:ea:ed:be:ad:e4:46:b4:10:f5:b2:78:a7:75:d3:1c:cf:56: 457s 26:fc:d6:9f:69:c1:a1:35:60:1e:dc:bb:2d:b0:d1:a1:fa:40: 457s 66:e5:9e:23:87:fe:32:74:84:86:a0:68:02:01:8b:f8:b3:ea: 457s ad:72:fc:ae:d9:e7:27:b1:3f:1b:d3:15:20:26:a3:81:1f:62: 457s 3f:b6:91:ae:a9:42:ec:0f:ff:a7:af:98:42:b8:1e:fb:eb:af: 457s f3:1d:9b:b3:5c:97:b0:50:6f:d7:c5:0f:d3:c2:9c:2a:e2:79: 457s c3:28:5c:09:84:aa:c2:87:ae:df:43:08:e5:64:e5:48:01:5b: 457s 24:e4 457s + openssl ca -batch -notext -config /tmp/sssd-softhsm2-9bLCCU/test-root-CA.config -passin pass:random-root-CA-password-7171 -keyfile /tmp/sssd-softhsm2-9bLCCU/test-root-CA-key.pem -in /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA-certificate-request.pem -days 365 -extensions v3_intermediate_ca -out /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA.pem 457s Using configuration from /tmp/sssd-softhsm2-9bLCCU/test-root-CA.config 457s Check that the request matches the signature 457s Signature ok 457s Certificate Details: 457s Serial Number: 1 (0x1) 457s Validity 457s Not Before: Nov 15 22:51:18 2024 GMT 457s Not After : Nov 15 22:51:18 2025 GMT 457s Subject: 457s organizationName = Test Organization 457s organizationalUnitName = Test Organization Unit 457s commonName = Test Organization Intermediate CA 457s X509v3 extensions: 457s X509v3 Subject Key Identifier: 457s 27:41:83:33:0F:3B:D1:38:5D:23:3B:2D:5F:C0:22:A2:98:49:19:00 457s X509v3 Authority Key Identifier: 457s keyid:8D:29:A7:90:8D:1C:B0:70:DB:0B:A0:DE:98:10:46:0B:4B:B2:0D:B5 457s DirName:/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root CA 457s serial:00 457s X509v3 Basic Constraints: 457s CA:TRUE 457s X509v3 Key Usage: critical 457s Digital Signature, Certificate Sign, CRL Sign 457s Certificate is to be certified until Nov 15 22:51:18 2025 GMT (365 days) 457s 457s Write out database with 1 new entries 457s Database updated 457s + openssl x509 -noout -in /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA.pem 457s + openssl verify -CAfile /tmp/sssd-softhsm2-9bLCCU/test-root-CA.pem /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA.pem 457s /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA.pem: OK 457s + cat 457s + sub_intermediate_ca_key_pass=pass:random-sub-intermediate-CA-password-29834 457s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-key.pem -passout pass:random-sub-intermediate-CA-password-29834 1024 457s + openssl req -batch -new -nodes -passin pass:random-sub-intermediate-CA-password-29834 -config /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA.config -key /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-key.pem -passout pass:random-intermediate-CA-password-32371 -sha256 -extensions v3_ca -out /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-certificate-request.pem 457s + openssl req -text -noout -in /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-certificate-request.pem 457s Certificate Request: 457s Data: 457s Version: 1 (0x0) 457s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 457s Subject Public Key Info: 457s Public Key Algorithm: rsaEncryption 457s Public-Key: (1024 bit) 457s Modulus: 457s 00:c4:ec:ff:88:b6:1e:af:d8:97:da:96:76:e2:d1: 457s 0f:94:bc:a8:26:62:5a:a5:75:0b:85:da:0a:55:98: 457s 5b:9e:07:d8:48:30:1f:c8:8f:73:86:9f:e3:6c:49: 457s 2a:79:a2:91:4f:78:25:bb:db:22:eb:75:da:5a:e5: 457s 9e:64:37:31:d1:19:9e:8a:fd:1a:1c:83:2f:d1:28: 457s c1:fb:17:e5:3e:3b:9e:b9:3c:47:b3:dd:50:ab:b9: 457s 18:01:bb:92:c4:b2:bb:da:66:4e:8a:7c:40:93:15: 457s b7:67:6d:25:df:d3:1e:39:99:01:f7:99:63:40:7e: 457s 2f:b7:d4:1d:ca:2e:b3:ea:af 457s Exponent: 65537 (0x10001) 457s Attributes: 457s (none) 457s Requested Extensions: 457s Signature Algorithm: sha256WithRSAEncryption 457s Signature Value: 457s a5:b8:dd:d4:b4:ac:cd:da:29:5d:71:3d:3e:17:3b:94:ee:4c: 457s 4b:64:25:ec:53:8f:2e:8a:ca:e1:e7:e2:78:77:eb:ee:ba:f3: 457s 45:7c:46:cf:05:88:97:7e:f1:78:52:2a:f1:96:81:2d:41:ee: 457s a8:72:f2:5b:bd:44:7a:50:25:8f:6f:53:d5:8a:e5:d3:03:ea: 457s ed:1b:7b:d6:df:2a:83:02:6e:8b:99:15:1c:f8:21:ee:45:ca: 457s 4c:2a:ff:0e:e0:88:3c:17:68:85:fb:a7:44:18:50:59:d0:30: 457s 78:8d:49:51:c4:21:0f:12:17:a2:f9:0d:2b:39:83:7e:c8:fb: 457s 6a:d0 457s + openssl ca -batch -notext -config /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA.config -passin pass:random-intermediate-CA-password-32371 -keyfile /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA-key.pem -in /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-certificate-request.pem -days 365 -extensions v3_intermediate_ca -out /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA.pem 457s Using configuration from /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA.config 457s Check that the request matches the signature 457s Signature ok 457s Certificate Details: 457s Serial Number: 2 (0x2) 457s Validity 457s Not Before: Nov 15 22:51:18 2024 GMT 457s Not After : Nov 15 22:51:18 2025 GMT 457s Subject: 457s organizationName = Test Organization 457s organizationalUnitName = Test Organization Unit 457s commonName = Test Organization Sub Intermediate CA 457s X509v3 extensions: 457s X509v3 Subject Key Identifier: 457s 8D:43:1A:C1:9D:24:18:DA:45:27:0D:22:7F:EC:2E:E1:E9:FB:8D:BE 457s X509v3 Authority Key Identifier: 457s keyid:27:41:83:33:0F:3B:D1:38:5D:23:3B:2D:5F:C0:22:A2:98:49:19:00 457s DirName:/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root CA 457s serial:01 457s X509v3 Basic Constraints: 457s CA:TRUE 457s X509v3 Key Usage: critical 457s Digital Signature, Certificate Sign, CRL Sign 457s Certificate is to be certified until Nov 15 22:51:18 2025 GMT (365 days) 457s 457s Write out database with 1 new entries 457s Database updated 457s + openssl x509 -noout -in /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA.pem 457s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA.pem /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA.pem 457s /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA.pem: OK 457s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-9bLCCU/test-root-CA.pem /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA.pem 457s + local cmd=openssl 457s + shift 457s + openssl verify -CAfile /tmp/sssd-softhsm2-9bLCCU/test-root-CA.pem /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA.pem 457s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 457s error 20 at 0 depth lookup: unable to get local issuer certificate 457s error /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA.pem: verification failed 457s + cat 457s + root_ca_trusted_cert_0001_key_pass=pass:random-root-ca-trusted-cert-0001-24305 457s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-9bLCCU/test-root-CA-trusted-certificate-0001-key.pem -passout pass:random-root-ca-trusted-cert-0001-24305 1024 457s + openssl req -new -nodes -reqexts req_exts -passin pass:random-root-ca-trusted-cert-0001-24305 -key /tmp/sssd-softhsm2-9bLCCU/test-root-CA-trusted-certificate-0001-key.pem -config /tmp/sssd-softhsm2-9bLCCU/test-root-CA-trusted-certificate-0001.config -out /tmp/sssd-softhsm2-9bLCCU/test-root-CA-trusted-certificate-0001-request.pem 457s + openssl req -text -noout -in /tmp/sssd-softhsm2-9bLCCU/test-root-CA-trusted-certificate-0001-request.pem 457s Certificate Request: 457s Data: 457s Version: 1 (0x0) 457s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 457s Subject Public Key Info: 457s Public Key Algorithm: rsaEncryption 457s Public-Key: (1024 bit) 457s Modulus: 457s 00:b2:d6:41:7a:0b:d3:49:71:30:56:d9:27:39:7c: 457s bc:23:33:7a:68:bd:e9:7f:16:c7:d1:2c:f7:63:66: 457s f5:73:62:f8:dd:c1:4b:c1:6b:ce:3d:6a:ec:da:54: 457s 71:36:a3:13:9b:bd:88:20:4e:d0:7e:4b:5d:02:2d: 457s d5:47:32:56:05:fa:43:17:c0:0a:8b:df:dc:1b:7e: 457s 21:ed:aa:81:36:bd:1c:7a:f7:8a:08:58:22:74:53: 457s 14:dd:7d:45:6e:92:c8:bd:ed:1b:33:22:d0:aa:26: 457s 11:7a:af:af:62:25:15:0e:c7:d5:8b:f5:50:16:62: 457s 7d:94:ac:e8:25:10:f5:ad:ff 457s Exponent: 65537 (0x10001) 457s Attributes: 457s Requested Extensions: 457s X509v3 Basic Constraints: 457s CA:FALSE 457s Netscape Cert Type: 457s SSL Client, S/MIME 457s Netscape Comment: 457s Test Organization Root CA trusted Certificate 457s X509v3 Subject Key Identifier: 457s 7E:45:E1:1A:E6:05:B5:7E:DB:16:28:0A:3F:CB:FE:3E:99:1F:17:C7 457s X509v3 Key Usage: critical 457s Digital Signature, Non Repudiation, Key Encipherment 457s X509v3 Extended Key Usage: 457s TLS Web Client Authentication, E-mail Protection 457s X509v3 Subject Alternative Name: 457s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 457s Signature Algorithm: sha256WithRSAEncryption 457s Signature Value: 457s 50:d9:05:02:c0:11:58:47:2d:87:b5:c8:bf:65:94:aa:35:bb: 457s d0:6f:86:84:95:69:e3:14:13:6e:7b:c0:07:34:21:73:94:e5: 457s 5c:30:91:ea:ce:a9:65:f8:1c:8f:c6:20:7f:a9:a2:81:09:7b: 457s d2:93:a0:d2:cf:60:af:ea:01:d7:d1:1a:95:71:00:6b:63:de: 457s cc:bb:00:bc:19:b8:ac:d8:ab:74:51:f5:fe:07:38:a0:0e:be: 457s c4:4b:de:9d:50:0c:12:2c:af:ad:78:06:8b:72:f1:7b:d0:e8: 457s 3e:02:87:84:0c:84:e9:c9:61:67:b3:6d:ed:cf:af:37:af:55: 457s d0:30 457s + openssl ca -batch -notext -config /tmp/sssd-softhsm2-9bLCCU/test-root-CA.config -passin pass:random-root-CA-password-7171 -keyfile /tmp/sssd-softhsm2-9bLCCU/test-root-CA-key.pem -in /tmp/sssd-softhsm2-9bLCCU/test-root-CA-trusted-certificate-0001-request.pem -days 365 -extensions usr_cert -out /tmp/sssd-softhsm2-9bLCCU/test-root-CA-trusted-certificate-0001.pem 457s Using configuration from /tmp/sssd-softhsm2-9bLCCU/test-root-CA.config 457s Check that the request matches the signature 457s Signature ok 457s Certificate Details: 457s Serial Number: 3 (0x3) 457s Validity 457s Not Before: Nov 15 22:51:18 2024 GMT 457s Not After : Nov 15 22:51:18 2025 GMT 457s Subject: 457s organizationName = Test Organization 457s organizationalUnitName = Test Organization Unit 457s commonName = Test Organization Root Trusted Certificate 0001 457s X509v3 extensions: 457s X509v3 Authority Key Identifier: 457s 8D:29:A7:90:8D:1C:B0:70:DB:0B:A0:DE:98:10:46:0B:4B:B2:0D:B5 457s X509v3 Basic Constraints: 457s CA:FALSE 457s Netscape Cert Type: 457s SSL Client, S/MIME 457s Netscape Comment: 457s Test Organization Root CA trusted Certificate 457s X509v3 Subject Key Identifier: 457s 7E:45:E1:1A:E6:05:B5:7E:DB:16:28:0A:3F:CB:FE:3E:99:1F:17:C7 457s X509v3 Key Usage: critical 457s Digital Signature, Non Repudiation, Key Encipherment 457s X509v3 Extended Key Usage: 457s TLS Web Client Authentication, E-mail Protection 457s X509v3 Subject Alternative Name: 457s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 457s Certificate is to be certified until Nov 15 22:51:18 2025 GMT (365 days) 457s 457s Write out database with 1 new entries 457s Database updated 457s + openssl x509 -noout -in /tmp/sssd-softhsm2-9bLCCU/test-root-CA-trusted-certificate-0001.pem 457s + openssl verify -CAfile /tmp/sssd-softhsm2-9bLCCU/test-root-CA.pem /tmp/sssd-softhsm2-9bLCCU/test-root-CA-trusted-certificate-0001.pem 457s /tmp/sssd-softhsm2-9bLCCU/test-root-CA-trusted-certificate-0001.pem: OK 457s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA.pem /tmp/sssd-softhsm2-9bLCCU/test-root-CA-trusted-certificate-0001.pem 457s + local cmd=openssl 457s + shift 457s + openssl verify -CAfile /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA.pem /tmp/sssd-softhsm2-9bLCCU/test-root-CA-trusted-certificate-0001.pem 457s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 457s error 20 at 0 depth lookup: unable to get local issuer certificate 457s error /tmp/sssd-softhsm2-9bLCCU/test-root-CA-trusted-certificate-0001.pem: verification failed 457s + cat 457s + intermediate_ca_trusted_cert_0001_key_pass=pass:random-intermediate-ca-trusted-cert-0001-5947 457s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA-trusted-certificate-0001-key.pem -passout pass:random-intermediate-ca-trusted-cert-0001-5947 1024 457s + openssl req -new -nodes -reqexts req_exts -passin pass:random-intermediate-ca-trusted-cert-0001-5947 -key /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA-trusted-certificate-0001-key.pem -config /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA-trusted-certificate-0001.config -out /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA-trusted-certificate-0001-request.pem 457s + openssl req -text -noout -in /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA-trusted-certificate-0001-request.pem 457s Certificate Request: 457s Data: 457s Version: 1 (0x0) 457s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 457s Subject Public Key Info: 457s Public Key Algorithm: rsaEncryption 457s Public-Key: (1024 bit) 457s Modulus: 457s 00:cb:05:ec:d1:66:37:ba:27:9f:b9:fa:d4:47:42: 457s 49:66:35:0e:34:72:86:b2:a2:f8:e3:7c:69:94:da: 457s a9:6d:f4:c1:5d:2e:8b:45:55:e1:55:f1:1a:16:5f: 457s 19:b7:1b:44:ee:f2:2d:50:b0:6b:14:84:3f:4c:8b: 457s e3:b1:9b:4a:b9:b4:84:1e:db:bd:1e:69:54:50:f3: 457s d9:7c:35:9c:60:af:90:32:25:23:18:40:18:d2:23: 457s 86:54:e6:6b:8e:b9:a2:a9:71:fe:f7:a6:89:69:ce: 457s 8c:03:42:e7:73:7d:60:f4:9d:89:85:64:89:18:7a: 457s 00:48:47:e5:66:4a:21:cd:c9 457s Exponent: 65537 (0x10001) 457s Attributes: 457s Requested Extensions: 457s X509v3 Basic Constraints: 457s CA:FALSE 457s Netscape Cert Type: 457s SSL Client, S/MIME 457s Netscape Comment: 457s Test Organization Intermediate CA trusted Certificate 457s X509v3 Subject Key Identifier: 457s 0E:DB:57:94:43:BC:1C:09:B9:2E:AE:06:E4:E3:90:0C:65:2D:C4:54 457s X509v3 Key Usage: critical 457s Digital Signature, Non Repudiation, Key Encipherment 457s X509v3 Extended Key Usage: 457s TLS Web Client Authentication, E-mail Protection 457s X509v3 Subject Alternative Name: 457s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 457s Signature Algorithm: sha256WithRSAEncryption 457s Signature Value: 457s c8:53:ce:fb:00:3a:a9:c0:c9:6f:3b:c0:40:ed:09:0c:3a:ef: 457s 5a:fc:e3:c6:e7:2d:dd:cd:4a:1e:cd:06:8a:c9:e0:a3:c2:c6: 457s 0e:d1:7d:08:13:46:cd:b2:92:37:9f:19:fb:05:a3:07:9e:fb: 457s 19:52:7f:b5:48:f3:e1:ac:f6:46:6b:64:c9:80:e8:0e:49:56: 457s 03:e2:de:08:af:e2:e5:91:71:c6:4b:24:ad:91:96:78:8d:98: 457s f1:70:2c:9c:d4:19:59:43:33:83:6e:0f:60:12:53:85:32:13: 457s 02:ee:58:9b:30:d2:a7:0d:5c:61:d7:2a:bc:75:85:9e:11:5d: 457s 5e:4c 457s + openssl ca -passin pass:random-intermediate-CA-password-32371 -config /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA.config -batch -notext -keyfile /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA-key.pem -in /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA-trusted-certificate-0001-request.pem -days 365 -extensions usr_cert -out /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA-trusted-certificate-0001.pem 457s Using configuration from /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA.config 457s Check that the request matches the signature 457s Signature ok 457s Certificate Details: 457s Serial Number: 4 (0x4) 457s Validity 457s Not Before: Nov 15 22:51:18 2024 GMT 457s Not After : Nov 15 22:51:18 2025 GMT 457s Subject: 457s organizationName = Test Organization 457s organizationalUnitName = Test Organization Unit 457s commonName = Test Organization Intermediate Trusted Certificate 0001 457s X509v3 extensions: 457s X509v3 Authority Key Identifier: 457s 27:41:83:33:0F:3B:D1:38:5D:23:3B:2D:5F:C0:22:A2:98:49:19:00 457s X509v3 Basic Constraints: 457s CA:FALSE 457s Netscape Cert Type: 457s SSL Client, S/MIME 457s Netscape Comment: 457s Test Organization Intermediate CA trusted Certificate 457s X509v3 Subject Key Identifier: 457s 0E:DB:57:94:43:BC:1C:09:B9:2E:AE:06:E4:E3:90:0C:65:2D:C4:54 457s X509v3 Key Usage: critical 457s Digital Signature, Non Repudiation, Key Encipherment 457s X509v3 Extended Key Usage: 457s TLS Web Client Authentication, E-mail Protection 457s X509v3 Subject Alternative Name: 457s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 457s Certificate is to be certified until Nov 15 22:51:18 2025 GMT (365 days) 457s 457s Write out database with 1 new entries 457s Database updated 457s + openssl x509 -noout -in /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA-trusted-certificate-0001.pem 457s This certificate should not be trusted fully 457s + echo 'This certificate should not be trusted fully' 457s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA.pem /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA-trusted-certificate-0001.pem 457s + local cmd=openssl 457s + shift 457s + openssl verify -CAfile /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA.pem /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA-trusted-certificate-0001.pem 457s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 457s error 2 at 1 depth lookup: unable to get issuer certificate 457s error /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA-trusted-certificate-0001.pem: verification failed 457s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA.pem /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA-trusted-certificate-0001.pem 457s /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA-trusted-certificate-0001.pem: OK 457s + cat 457s + sub_intermediate_ca_trusted_cert_0001_key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-16232 457s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-trusted-certificate-0001-key.pem -passout pass:random-sub-intermediate-ca-trusted-cert-0001-16232 1024 457s + openssl req -new -nodes -reqexts req_exts -passin pass:random-sub-intermediate-ca-trusted-cert-0001-16232 -key /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-trusted-certificate-0001-key.pem -config /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-trusted-certificate-0001.config -out /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-trusted-certificate-0001-request.pem 458s + openssl req -text -noout -in /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-trusted-certificate-0001-request.pem 458s Certificate Request: 458s Data: 458s Version: 1 (0x0) 458s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 458s Subject Public Key Info: 458s Public Key Algorithm: rsaEncryption 458s Public-Key: (1024 bit) 458s Modulus: 458s 00:9f:0b:59:f9:86:33:69:c9:9d:ce:dd:9f:6c:3c: 458s 8f:99:4c:ef:c3:a3:4f:eb:e0:75:c3:2b:63:91:cb: 458s 6c:1d:4e:87:09:42:fa:ce:bf:19:58:73:31:95:35: 458s a4:63:e4:8a:d4:6a:61:39:61:77:d2:3f:40:e3:67: 458s 61:8b:c6:fc:46:a8:21:b3:9b:f6:15:49:f6:f7:25: 458s cb:f4:cb:47:de:da:18:2e:b4:7a:d9:4e:1b:2c:09: 458s 80:20:39:ea:e8:3b:a2:16:92:94:1e:04:9a:8b:93: 458s 8b:44:c4:5f:81:05:66:9a:ad:c5:0a:d1:b8:ed:23: 458s 70:7a:01:0e:a2:06:95:33:39 458s Exponent: 65537 (0x10001) 458s Attributes: 458s Requested Extensions: 458s X509v3 Basic Constraints: 458s CA:FALSE 458s Netscape Cert Type: 458s SSL Client, S/MIME 458s Netscape Comment: 458s Test Organization Sub Intermediate CA trusted Certificate 458s X509v3 Subject Key Identifier: 458s 52:9F:42:82:0C:64:51:ED:F2:D3:88:B5:78:15:28:B4:B0:5D:CB:D4 458s X509v3 Key Usage: critical 458s Digital Signature, Non Repudiation, Key Encipherment 458s X509v3 Extended Key Usage: 458s TLS Web Client Authentication, E-mail Protection 458s X509v3 Subject Alternative Name: 458s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 458s Signature Algorithm: sha256WithRSAEncryption 458s Signature Value: 458s 19:7a:1d:7c:3c:7c:94:96:c1:ce:d8:57:9a:e7:2b:78:90:29: 458s 3c:8c:63:1b:3d:5a:9a:12:d8:e8:04:b4:12:b9:5f:1c:9e:75: 458s 02:b3:24:7c:19:82:67:62:47:56:ea:30:de:f2:39:8a:1c:73: 458s 19:08:4f:68:47:da:b0:bd:65:31:2b:c4:51:a3:34:dd:9c:58: 458s 78:9d:77:5f:e1:e0:97:23:a0:23:a4:e4:e1:2a:a7:24:84:38: 458s 68:86:39:c5:e3:35:41:d1:58:9c:e3:09:fe:b0:2c:ce:15:cb: 458s 93:ed:56:d7:24:58:c6:ce:26:1e:9f:3d:05:9e:98:ae:fe:05: 458s b4:03 458s + openssl ca -passin pass:random-sub-intermediate-CA-password-29834 -config /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA.config -batch -notext -keyfile /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-key.pem -in /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-trusted-certificate-0001-request.pem -days 365 -extensions usr_cert -out /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-trusted-certificate-0001.pem 458s Using configuration from /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA.config 458s Check that the request matches the signature 458s Signature ok 458s Certificate Details: 458s Serial Number: 5 (0x5) 458s Validity 458s Not Before: Nov 15 22:51:19 2024 GMT 458s Not After : Nov 15 22:51:19 2025 GMT 458s Subject: 458s organizationName = Test Organization 458s organizationalUnitName = Test Organization Unit 458s commonName = Test Organization Sub Intermediate Trusted Certificate 0001 458s X509v3 extensions: 458s X509v3 Authority Key Identifier: 458s 8D:43:1A:C1:9D:24:18:DA:45:27:0D:22:7F:EC:2E:E1:E9:FB:8D:BE 458s X509v3 Basic Constraints: 458s CA:FALSE 458s Netscape Cert Type: 458s SSL Client, S/MIME 458s Netscape Comment: 458s Test Organization Sub Intermediate CA trusted Certificate 458s X509v3 Subject Key Identifier: 458s 52:9F:42:82:0C:64:51:ED:F2:D3:88:B5:78:15:28:B4:B0:5D:CB:D4 458s X509v3 Key Usage: critical 458s Digital Signature, Non Repudiation, Key Encipherment 458s X509v3 Extended Key Usage: 458s TLS Web Client Authentication, E-mail Protection 458s X509v3 Subject Alternative Name: 458s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 458s Certificate is to be certified until Nov 15 22:51:19 2025 GMT (365 days) 458s 458s Write out database with 1 new entries 458s Database updated 458s + openssl x509 -noout -in /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-trusted-certificate-0001.pem 458s This certificate should not be trusted fully 458s + echo 'This certificate should not be trusted fully' 458s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA.pem /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-trusted-certificate-0001.pem 458s + local cmd=openssl 458s + shift 458s + openssl verify -CAfile /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA.pem /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-trusted-certificate-0001.pem 458s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 458s error 2 at 1 depth lookup: unable to get issuer certificate 458s error /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-trusted-certificate-0001.pem: verification failed 458s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA.pem /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-trusted-certificate-0001.pem 458s + local cmd=openssl 458s + shift 458s + openssl verify -CAfile /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA.pem /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-trusted-certificate-0001.pem 458s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 458s error 20 at 0 depth lookup: unable to get local issuer certificate 458s error /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-trusted-certificate-0001.pem: verification failed 458s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA.pem /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-trusted-certificate-0001.pem 458s /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-trusted-certificate-0001.pem: OK 458s + expect_fail openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA.pem /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-trusted-certificate-0001.pem 458s + local cmd=openssl 458s + shift 458s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA.pem /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-trusted-certificate-0001.pem 458s Building a the full-chain CA file... 458s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 458s error 20 at 0 depth lookup: unable to get local issuer certificate 458s error /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-trusted-certificate-0001.pem: verification failed 458s + echo 'Building a the full-chain CA file...' 458s + cat /tmp/sssd-softhsm2-9bLCCU/test-root-CA.pem /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA.pem /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA.pem 458s + cat /tmp/sssd-softhsm2-9bLCCU/test-root-CA.pem /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA.pem 458s + cat /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA.pem /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA.pem 458s + openssl crl2pkcs7 -nocrl -certfile /tmp/sssd-softhsm2-9bLCCU/test-full-chain-CA.pem 458s + openssl pkcs7 -print_certs -noout 458s subject=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 458s issuer=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 458s 458s subject=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 458s issuer=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 458s 458s subject=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 458s issuer=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 458s 458s + openssl verify -CAfile /tmp/sssd-softhsm2-9bLCCU/test-full-chain-CA.pem /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA.pem 458s /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA.pem: OK 458s + openssl verify -CAfile /tmp/sssd-softhsm2-9bLCCU/test-full-chain-CA.pem /tmp/sssd-softhsm2-9bLCCU/test-root-CA-trusted-certificate-0001.pem 458s + openssl verify -CAfile /tmp/sssd-softhsm2-9bLCCU/test-full-chain-CA.pem /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA-trusted-certificate-0001.pem 458s /tmp/sssd-softhsm2-9bLCCU/test-root-CA-trusted-certificate-0001.pem: OK 458s /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA-trusted-certificate-0001.pem: OK 458s + openssl verify -CAfile /tmp/sssd-softhsm2-9bLCCU/test-full-chain-CA.pem /tmp/sssd-softhsm2-9bLCCU/test-root-intermediate-chain-CA.pem 458s /tmp/sssd-softhsm2-9bLCCU/test-root-intermediate-chain-CA.pem: OK 458s + openssl verify -CAfile /tmp/sssd-softhsm2-9bLCCU/test-full-chain-CA.pem /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-trusted-certificate-0001.pem 458s /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-trusted-certificate-0001.pem: OK 458s Certificates generation completed! 458s + echo 'Certificates generation completed!' 458s + [[ -v NO_SSSD_TESTS ]] 458s + invalid_certificate /tmp/sssd-softhsm2-9bLCCU/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-24305 /dev/null 458s + check_certificate /tmp/sssd-softhsm2-9bLCCU/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-24305 /dev/null 458s + local certificate=/tmp/sssd-softhsm2-9bLCCU/test-root-CA-trusted-certificate-0001.pem 458s + local key_pass=pass:random-root-ca-trusted-cert-0001-24305 458s + local key_ring=/dev/null 458s + local verify_option= 458s + prepare_softhsm2_card /tmp/sssd-softhsm2-9bLCCU/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-24305 458s + local certificate=/tmp/sssd-softhsm2-9bLCCU/test-root-CA-trusted-certificate-0001.pem 458s + local key_pass=pass:random-root-ca-trusted-cert-0001-24305 458s + local key_cn 458s + local key_name 458s + local tokens_dir 458s + local output_cert_file 458s + token_name= 458s ++ basename /tmp/sssd-softhsm2-9bLCCU/test-root-CA-trusted-certificate-0001.pem .pem 458s + key_name=test-root-CA-trusted-certificate-0001 458s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-9bLCCU/test-root-CA-trusted-certificate-0001.pem 458s ++ sed -n 's/ *commonName *= //p' 458s + key_cn='Test Organization Root Trusted Certificate 0001' 458s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 458s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-9bLCCU/softhsm2-test-root-CA-trusted-certificate-0001.conf 458s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-9bLCCU/softhsm2-test-root-CA-trusted-certificate-0001.conf 458s ++ basename /tmp/sssd-softhsm2-9bLCCU/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 458s + tokens_dir=/tmp/sssd-softhsm2-9bLCCU/softhsm2-test-root-CA-trusted-certificate-0001 458s + token_name='Test Organization Root Tr Token' 458s + '[' '!' -e /tmp/sssd-softhsm2-9bLCCU/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 458s + local key_file 458s + local decrypted_key 458s + mkdir -p /tmp/sssd-softhsm2-9bLCCU/softhsm2-test-root-CA-trusted-certificate-0001 458s + key_file=/tmp/sssd-softhsm2-9bLCCU/test-root-CA-trusted-certificate-0001-key.pem 458s + decrypted_key=/tmp/sssd-softhsm2-9bLCCU/test-root-CA-trusted-certificate-0001-key-decrypted.pem 458s + cat 458s + softhsm2-util --init-token --label 'Test Organization Root Tr Token' --pin 053350 --so-pin 053350 --free 458s Slot 0 has a free/uninitialized token. 458s The token has been initialized and is reassigned to slot 755808537 458s + softhsm2-util --show-slots 458s Available slots: 458s Slot 755808537 458s Slot info: 458s Description: SoftHSM slot ID 0x2d0cb919 458s Manufacturer ID: SoftHSM project 458s Hardware version: 2.6 458s Firmware version: 2.6 458s Token present: yes 458s Token info: 458s Manufacturer ID: SoftHSM project 458s Model: SoftHSM v2 458s Hardware version: 2.6 458s Firmware version: 2.6 458s Serial number: fe782113ad0cb919 458s Initialized: yes 458s User PIN init.: yes 458s Label: Test Organization Root Tr Token 458s Slot 1 458s Slot info: 458s Description: SoftHSM slot ID 0x1 458s Manufacturer ID: SoftHSM project 458s Hardware version: 2.6 458s Firmware version: 2.6 458s Token present: yes 458s Token info: 458s Manufacturer ID: SoftHSM project 458s Model: SoftHSM v2 458s Hardware version: 2.6 458s Firmware version: 2.6 458s Serial number: 458s Initialized: no 458s User PIN init.: no 458s Label: 458s + p11tool --provider=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --write --no-mark-private --load-certificate=/tmp/sssd-softhsm2-9bLCCU/test-root-CA-trusted-certificate-0001.pem --login --set-pin=053350 --label 'Test Organization Root Trusted Certificate 0001' --id 00112233445566778899FFAABBCCDDEEFF012345 458s + openssl rsa -passin pass:random-root-ca-trusted-cert-0001-24305 -in /tmp/sssd-softhsm2-9bLCCU/test-root-CA-trusted-certificate-0001-key.pem -out /tmp/sssd-softhsm2-9bLCCU/test-root-CA-trusted-certificate-0001-key-decrypted.pem 458s writing RSA key 458s + p11tool --provider=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --write --load-privkey=/tmp/sssd-softhsm2-9bLCCU/test-root-CA-trusted-certificate-0001-key-decrypted.pem --login --set-pin=053350 --label 'Test Organization Root Trusted Certificate 0001 Key' --id 00112233445566778899FFAABBCCDDEEFF012345 458s + rm /tmp/sssd-softhsm2-9bLCCU/test-root-CA-trusted-certificate-0001-key-decrypted.pem 458s + p11tool --provider=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --list-all 458s Object 0: 458s URL: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fe782113ad0cb919;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert 458s Type: X.509 Certificate (RSA-1024) 458s Expires: Sat Nov 15 22:51:18 2025 458s Label: Test Organization Root Trusted Certificate 0001 458s ID: 00:11:22:33:44:55:66:77:88:99:ff:aa:bb:cc:dd:ee:ff:01:23:45 458s 458s + echo 'Test Organization Root Tr Token' 458s + '[' -n '' ']' 458s + local output_base_name=SSSD-child-22630 458s + local output_file=/tmp/sssd-softhsm2-9bLCCU/SSSD-child-22630.output 458s + output_cert_file=/tmp/sssd-softhsm2-9bLCCU/SSSD-child-22630.pem 458s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/dev/null 458s Test Organization Root Tr Token 458s [p11_child[2368]] [main] (0x0400): p11_child started. 458s [p11_child[2368]] [main] (0x2000): Running in [pre-auth] mode. 458s [p11_child[2368]] [main] (0x2000): Running with effective IDs: [0][0]. 458s [p11_child[2368]] [main] (0x2000): Running with real IDs [0][0]. 458s [p11_child[2368]] [init_verification] (0x0040): X509_LOOKUP_load_file [/dev/null] failed [92274824][error:05800088:x509 certificate routines::no certificate or crl found]. 458s [p11_child[2368]] [do_work] (0x0040): init_verification failed. 458s [p11_child[2368]] [main] (0x0020): p11_child failed (5) 458s + return 2 458s + valid_certificate /tmp/sssd-softhsm2-9bLCCU/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-24305 /dev/null no_verification 458s + check_certificate /tmp/sssd-softhsm2-9bLCCU/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-24305 /dev/null no_verification 458s + local certificate=/tmp/sssd-softhsm2-9bLCCU/test-root-CA-trusted-certificate-0001.pem 458s + local key_pass=pass:random-root-ca-trusted-cert-0001-24305 458s + local key_ring=/dev/null 458s + local verify_option=no_verification 458s + prepare_softhsm2_card /tmp/sssd-softhsm2-9bLCCU/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-24305 458s + local certificate=/tmp/sssd-softhsm2-9bLCCU/test-root-CA-trusted-certificate-0001.pem 458s + local key_pass=pass:random-root-ca-trusted-cert-0001-24305 458s + local key_cn 458s + local key_name 458s + local tokens_dir 458s + local output_cert_file 458s + token_name= 458s ++ basename /tmp/sssd-softhsm2-9bLCCU/test-root-CA-trusted-certificate-0001.pem .pem 458s + key_name=test-root-CA-trusted-certificate-0001 458s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-9bLCCU/test-root-CA-trusted-certificate-0001.pem 458s ++ sed -n 's/ *commonName *= //p' 458s + key_cn='Test Organization Root Trusted Certificate 0001' 458s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 458s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-9bLCCU/softhsm2-test-root-CA-trusted-certificate-0001.conf 458s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-9bLCCU/softhsm2-test-root-CA-trusted-certificate-0001.conf 458s ++ basename /tmp/sssd-softhsm2-9bLCCU/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 458s + tokens_dir=/tmp/sssd-softhsm2-9bLCCU/softhsm2-test-root-CA-trusted-certificate-0001 458s Test Organization Root Tr Token 458s + token_name='Test Organization Root Tr Token' 458s + '[' '!' -e /tmp/sssd-softhsm2-9bLCCU/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 458s + '[' '!' -d /tmp/sssd-softhsm2-9bLCCU/softhsm2-test-root-CA-trusted-certificate-0001 ']' 458s + echo 'Test Organization Root Tr Token' 458s + '[' -n no_verification ']' 458s + local verify_arg=--verify=no_verification 458s + local output_base_name=SSSD-child-927 458s + local output_file=/tmp/sssd-softhsm2-9bLCCU/SSSD-child-927.output 458s + output_cert_file=/tmp/sssd-softhsm2-9bLCCU/SSSD-child-927.pem 458s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --verify=no_verification --ca_db=/dev/null 458s [p11_child[2374]] [main] (0x0400): p11_child started. 458s [p11_child[2374]] [main] (0x2000): Running in [pre-auth] mode. 458s [p11_child[2374]] [main] (0x2000): Running with effective IDs: [0][0]. 458s [p11_child[2374]] [main] (0x2000): Running with real IDs [0][0]. 458s [p11_child[2374]] [parse_cert_verify_opts] (0x0020): Found 'no_verification' option, disabling verification completely. This should not be used in production. 458s [p11_child[2374]] [do_card] (0x4000): Module List: 458s [p11_child[2374]] [do_card] (0x4000): common name: [softhsm2]. 458s [p11_child[2374]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 458s [p11_child[2374]] [do_card] (0x4000): Description [SoftHSM slot ID 0x2d0cb919] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 458s [p11_child[2374]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 458s [p11_child[2374]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x2d0cb919][755808537] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 458s [p11_child[2374]] [do_card] (0x4000): Login NOT required. 458s [p11_child[2374]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 458s [p11_child[2374]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Root Tr Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 458s [p11_child[2374]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x2d0cb919;slot-manufacturer=SoftHSM%20project;slot-id=755808537;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fe782113ad0cb919;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 458s [p11_child[2374]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 458s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-9bLCCU/SSSD-child-927.output 458s + echo '-----BEGIN CERTIFICATE-----' 458s + tail -n1 /tmp/sssd-softhsm2-9bLCCU/SSSD-child-927.output 458s + echo '-----END CERTIFICATE-----' 458s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-9bLCCU/SSSD-child-927.pem 458s Certificate: 458s Data: 458s Version: 3 (0x2) 458s Serial Number: 3 (0x3) 458s Signature Algorithm: sha256WithRSAEncryption 458s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 458s Validity 458s Not Before: Nov 15 22:51:18 2024 GMT 458s Not After : Nov 15 22:51:18 2025 GMT 458s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 458s Subject Public Key Info: 458s Public Key Algorithm: rsaEncryption 458s Public-Key: (1024 bit) 458s Modulus: 458s 00:b2:d6:41:7a:0b:d3:49:71:30:56:d9:27:39:7c: 458s bc:23:33:7a:68:bd:e9:7f:16:c7:d1:2c:f7:63:66: 458s f5:73:62:f8:dd:c1:4b:c1:6b:ce:3d:6a:ec:da:54: 458s 71:36:a3:13:9b:bd:88:20:4e:d0:7e:4b:5d:02:2d: 458s d5:47:32:56:05:fa:43:17:c0:0a:8b:df:dc:1b:7e: 458s 21:ed:aa:81:36:bd:1c:7a:f7:8a:08:58:22:74:53: 458s 14:dd:7d:45:6e:92:c8:bd:ed:1b:33:22:d0:aa:26: 458s 11:7a:af:af:62:25:15:0e:c7:d5:8b:f5:50:16:62: 458s 7d:94:ac:e8:25:10:f5:ad:ff 458s Exponent: 65537 (0x10001) 458s X509v3 extensions: 458s X509v3 Authority Key Identifier: 458s 8D:29:A7:90:8D:1C:B0:70:DB:0B:A0:DE:98:10:46:0B:4B:B2:0D:B5 458s X509v3 Basic Constraints: 458s CA:FALSE 458s Netscape Cert Type: 458s SSL Client, S/MIME 458s Netscape Comment: 458s Test Organization Root CA trusted Certificate 458s X509v3 Subject Key Identifier: 458s 7E:45:E1:1A:E6:05:B5:7E:DB:16:28:0A:3F:CB:FE:3E:99:1F:17:C7 458s X509v3 Key Usage: critical 458s Digital Signature, Non Repudiation, Key Encipherment 458s X509v3 Extended Key Usage: 458s TLS Web Client Authentication, E-mail Protection 458s X509v3 Subject Alternative Name: 458s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 458s Signature Algorithm: sha256WithRSAEncryption 458s Signature Value: 458s 96:12:5d:d3:39:0f:32:67:e5:03:47:74:18:71:af:9c:fe:02: 458s 12:31:05:66:31:ac:64:65:1f:65:4a:20:89:a0:27:23:89:dc: 458s 53:f5:dd:55:ef:ab:5b:4d:4e:f1:40:bc:eb:a5:ac:31:b6:74: 458s 83:71:c8:5c:e4:4f:a4:d2:2d:e8:c9:ff:e5:fb:a9:a7:8f:3a: 458s 97:fc:d8:4d:d2:91:e9:9f:b9:c1:d8:a6:b1:2b:90:ce:c2:f1: 458s 34:14:9a:c2:c1:26:9f:ec:9c:22:d2:c1:06:4c:f9:ae:bc:aa: 458s 93:a8:cb:e0:e0:5c:a7:ab:43:e1:52:5c:34:f8:49:0a:a8:29: 458s 5d:45 458s + local found_md5 expected_md5 458s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-9bLCCU/test-root-CA-trusted-certificate-0001.pem 458s + expected_md5=Modulus=B2D6417A0BD349713056D927397CBC23337A68BDE97F16C7D12CF76366F57362F8DDC14BC16BCE3D6AECDA547136A3139BBD88204ED07E4B5D022DD547325605FA4317C00A8BDFDC1B7E21EDAA8136BD1C7AF78A085822745314DD7D456E92C8BDED1B3322D0AA26117AAFAF6225150EC7D58BF55016627D94ACE82510F5ADFF 458s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-9bLCCU/SSSD-child-927.pem 458s + found_md5=Modulus=B2D6417A0BD349713056D927397CBC23337A68BDE97F16C7D12CF76366F57362F8DDC14BC16BCE3D6AECDA547136A3139BBD88204ED07E4B5D022DD547325605FA4317C00A8BDFDC1B7E21EDAA8136BD1C7AF78A085822745314DD7D456E92C8BDED1B3322D0AA26117AAFAF6225150EC7D58BF55016627D94ACE82510F5ADFF 458s + '[' Modulus=B2D6417A0BD349713056D927397CBC23337A68BDE97F16C7D12CF76366F57362F8DDC14BC16BCE3D6AECDA547136A3139BBD88204ED07E4B5D022DD547325605FA4317C00A8BDFDC1B7E21EDAA8136BD1C7AF78A085822745314DD7D456E92C8BDED1B3322D0AA26117AAFAF6225150EC7D58BF55016627D94ACE82510F5ADFF '!=' Modulus=B2D6417A0BD349713056D927397CBC23337A68BDE97F16C7D12CF76366F57362F8DDC14BC16BCE3D6AECDA547136A3139BBD88204ED07E4B5D022DD547325605FA4317C00A8BDFDC1B7E21EDAA8136BD1C7AF78A085822745314DD7D456E92C8BDED1B3322D0AA26117AAFAF6225150EC7D58BF55016627D94ACE82510F5ADFF ']' 458s + output_file=/tmp/sssd-softhsm2-9bLCCU/SSSD-child-927-auth.output 458s ++ basename /tmp/sssd-softhsm2-9bLCCU/SSSD-child-927-auth.output .output 458s + output_cert_file=/tmp/sssd-softhsm2-9bLCCU/SSSD-child-927-auth.pem 458s + echo -n 053350 458s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/dev/null --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=no_verification --token_name 'Test Organization Root Tr Token' --module_name /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so 458s [p11_child[2382]] [main] (0x0400): p11_child started. 458s [p11_child[2382]] [main] (0x2000): Running in [auth] mode. 458s [p11_child[2382]] [main] (0x2000): Running with effective IDs: [0][0]. 458s [p11_child[2382]] [main] (0x2000): Running with real IDs [0][0]. 458s [p11_child[2382]] [parse_cert_verify_opts] (0x0020): Found 'no_verification' option, disabling verification completely. This should not be used in production. 458s [p11_child[2382]] [do_card] (0x4000): Module List: 458s [p11_child[2382]] [do_card] (0x4000): common name: [softhsm2]. 458s [p11_child[2382]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 458s [p11_child[2382]] [do_card] (0x4000): Description [SoftHSM slot ID 0x2d0cb919] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 458s [p11_child[2382]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 458s [p11_child[2382]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x2d0cb919][755808537] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 458s [p11_child[2382]] [do_card] (0x4000): Login required. 458s [p11_child[2382]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 458s [p11_child[2382]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so Test Organization Root Tr Token Test Organization Root Tr Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 458s [p11_child[2382]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x2d0cb919;slot-manufacturer=SoftHSM%20project;slot-id=755808537;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fe782113ad0cb919;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 458s [p11_child[2382]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 458s [p11_child[2382]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 458s [p11_child[2382]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 458s [p11_child[2382]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 458s [p11_child[2382]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 458s [p11_child[2382]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 458s [p11_child[2382]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 458s [p11_child[2382]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 458s [p11_child[2382]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 458s [p11_child[2382]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 458s [p11_child[2382]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 458s [p11_child[2382]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 458s [p11_child[2382]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 458s [p11_child[2382]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 458s [p11_child[2382]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 458s [p11_child[2382]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 458s [p11_child[2382]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 458s [p11_child[2382]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 458s [p11_child[2382]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 458s [p11_child[2382]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 458s [p11_child[2382]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 458s [p11_child[2382]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 458s [p11_child[2382]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 458s [p11_child[2382]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 458s [p11_child[2382]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 458s [p11_child[2382]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 458s [p11_child[2382]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 458s [p11_child[2382]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 458s [p11_child[2382]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 458s [p11_child[2382]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 458s [p11_child[2382]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 458s [p11_child[2382]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 458s [p11_child[2382]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 458s [p11_child[2382]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 458s [p11_child[2382]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 458s [p11_child[2382]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 458s [p11_child[2382]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 458s [p11_child[2382]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 458s [p11_child[2382]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 458s [p11_child[2382]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 458s [p11_child[2382]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 458s [p11_child[2382]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 458s [p11_child[2382]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 458s [p11_child[2382]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 458s [p11_child[2382]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 458s [p11_child[2382]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 458s [p11_child[2382]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 458s [p11_child[2382]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 458s [p11_child[2382]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 458s [p11_child[2382]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 458s [p11_child[2382]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 458s [p11_child[2382]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 458s [p11_child[2382]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 458s [p11_child[2382]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 458s [p11_child[2382]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 458s [p11_child[2382]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 458s [p11_child[2382]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 458s [p11_child[2382]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 458s [p11_child[2382]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 458s [p11_child[2382]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 458s [p11_child[2382]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 458s [p11_child[2382]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 458s [p11_child[2382]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 458s [p11_child[2382]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 458s [p11_child[2382]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 458s [p11_child[2382]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 458s [p11_child[2382]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 458s [p11_child[2382]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 458s [p11_child[2382]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 458s [p11_child[2382]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 458s [p11_child[2382]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 458s [p11_child[2382]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 458s [p11_child[2382]] [do_card] (0x4000): Certificate verified and validated. 458s [p11_child[2382]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 458s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-9bLCCU/SSSD-child-927-auth.output 458s + echo '-----BEGIN CERTIFICATE-----' 458s + tail -n1 /tmp/sssd-softhsm2-9bLCCU/SSSD-child-927-auth.output 458s + echo '-----END CERTIFICATE-----' 458s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-9bLCCU/SSSD-child-927-auth.pem 458s Certificate: 458s Data: 458s Version: 3 (0x2) 458s Serial Number: 3 (0x3) 458s Signature Algorithm: sha256WithRSAEncryption 458s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 458s Validity 458s Not Before: Nov 15 22:51:18 2024 GMT 458s Not After : Nov 15 22:51:18 2025 GMT 458s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 458s Subject Public Key Info: 458s Public Key Algorithm: rsaEncryption 458s Public-Key: (1024 bit) 458s Modulus: 458s 00:b2:d6:41:7a:0b:d3:49:71:30:56:d9:27:39:7c: 458s bc:23:33:7a:68:bd:e9:7f:16:c7:d1:2c:f7:63:66: 458s f5:73:62:f8:dd:c1:4b:c1:6b:ce:3d:6a:ec:da:54: 458s 71:36:a3:13:9b:bd:88:20:4e:d0:7e:4b:5d:02:2d: 458s d5:47:32:56:05:fa:43:17:c0:0a:8b:df:dc:1b:7e: 458s 21:ed:aa:81:36:bd:1c:7a:f7:8a:08:58:22:74:53: 458s 14:dd:7d:45:6e:92:c8:bd:ed:1b:33:22:d0:aa:26: 458s 11:7a:af:af:62:25:15:0e:c7:d5:8b:f5:50:16:62: 458s 7d:94:ac:e8:25:10:f5:ad:ff 458s Exponent: 65537 (0x10001) 458s X509v3 extensions: 458s X509v3 Authority Key Identifier: 458s 8D:29:A7:90:8D:1C:B0:70:DB:0B:A0:DE:98:10:46:0B:4B:B2:0D:B5 458s X509v3 Basic Constraints: 458s CA:FALSE 458s Netscape Cert Type: 458s SSL Client, S/MIME 458s Netscape Comment: 458s Test Organization Root CA trusted Certificate 458s X509v3 Subject Key Identifier: 458s 7E:45:E1:1A:E6:05:B5:7E:DB:16:28:0A:3F:CB:FE:3E:99:1F:17:C7 458s X509v3 Key Usage: critical 458s Digital Signature, Non Repudiation, Key Encipherment 458s X509v3 Extended Key Usage: 458s TLS Web Client Authentication, E-mail Protection 458s X509v3 Subject Alternative Name: 458s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 458s Signature Algorithm: sha256WithRSAEncryption 458s Signature Value: 458s 96:12:5d:d3:39:0f:32:67:e5:03:47:74:18:71:af:9c:fe:02: 458s 12:31:05:66:31:ac:64:65:1f:65:4a:20:89:a0:27:23:89:dc: 458s 53:f5:dd:55:ef:ab:5b:4d:4e:f1:40:bc:eb:a5:ac:31:b6:74: 458s 83:71:c8:5c:e4:4f:a4:d2:2d:e8:c9:ff:e5:fb:a9:a7:8f:3a: 458s 97:fc:d8:4d:d2:91:e9:9f:b9:c1:d8:a6:b1:2b:90:ce:c2:f1: 458s 34:14:9a:c2:c1:26:9f:ec:9c:22:d2:c1:06:4c:f9:ae:bc:aa: 458s 93:a8:cb:e0:e0:5c:a7:ab:43:e1:52:5c:34:f8:49:0a:a8:29: 458s 5d:45 458s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-9bLCCU/SSSD-child-927-auth.pem 459s + found_md5=Modulus=B2D6417A0BD349713056D927397CBC23337A68BDE97F16C7D12CF76366F57362F8DDC14BC16BCE3D6AECDA547136A3139BBD88204ED07E4B5D022DD547325605FA4317C00A8BDFDC1B7E21EDAA8136BD1C7AF78A085822745314DD7D456E92C8BDED1B3322D0AA26117AAFAF6225150EC7D58BF55016627D94ACE82510F5ADFF 459s + '[' Modulus=B2D6417A0BD349713056D927397CBC23337A68BDE97F16C7D12CF76366F57362F8DDC14BC16BCE3D6AECDA547136A3139BBD88204ED07E4B5D022DD547325605FA4317C00A8BDFDC1B7E21EDAA8136BD1C7AF78A085822745314DD7D456E92C8BDED1B3322D0AA26117AAFAF6225150EC7D58BF55016627D94ACE82510F5ADFF '!=' Modulus=B2D6417A0BD349713056D927397CBC23337A68BDE97F16C7D12CF76366F57362F8DDC14BC16BCE3D6AECDA547136A3139BBD88204ED07E4B5D022DD547325605FA4317C00A8BDFDC1B7E21EDAA8136BD1C7AF78A085822745314DD7D456E92C8BDED1B3322D0AA26117AAFAF6225150EC7D58BF55016627D94ACE82510F5ADFF ']' 459s + valid_certificate /tmp/sssd-softhsm2-9bLCCU/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-24305 /tmp/sssd-softhsm2-9bLCCU/test-root-CA.pem 459s + check_certificate /tmp/sssd-softhsm2-9bLCCU/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-24305 /tmp/sssd-softhsm2-9bLCCU/test-root-CA.pem 459s + local certificate=/tmp/sssd-softhsm2-9bLCCU/test-root-CA-trusted-certificate-0001.pem 459s + local key_pass=pass:random-root-ca-trusted-cert-0001-24305 459s + local key_ring=/tmp/sssd-softhsm2-9bLCCU/test-root-CA.pem 459s + local verify_option= 459s + prepare_softhsm2_card /tmp/sssd-softhsm2-9bLCCU/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-24305 459s + local certificate=/tmp/sssd-softhsm2-9bLCCU/test-root-CA-trusted-certificate-0001.pem 459s + local key_pass=pass:random-root-ca-trusted-cert-0001-24305 459s + local key_cn 459s + local key_name 459s + local tokens_dir 459s + local output_cert_file 459s + token_name= 459s ++ basename /tmp/sssd-softhsm2-9bLCCU/test-root-CA-trusted-certificate-0001.pem .pem 459s + key_name=test-root-CA-trusted-certificate-0001 459s ++ sed -n 's/ *commonName *= //p' 459s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-9bLCCU/test-root-CA-trusted-certificate-0001.pem 459s + key_cn='Test Organization Root Trusted Certificate 0001' 459s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 459s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-9bLCCU/softhsm2-test-root-CA-trusted-certificate-0001.conf 459s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-9bLCCU/softhsm2-test-root-CA-trusted-certificate-0001.conf 459s ++ basename /tmp/sssd-softhsm2-9bLCCU/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 459s Test Organization Root Tr Token 459s + tokens_dir=/tmp/sssd-softhsm2-9bLCCU/softhsm2-test-root-CA-trusted-certificate-0001 459s + token_name='Test Organization Root Tr Token' 459s + '[' '!' -e /tmp/sssd-softhsm2-9bLCCU/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 459s + '[' '!' -d /tmp/sssd-softhsm2-9bLCCU/softhsm2-test-root-CA-trusted-certificate-0001 ']' 459s + echo 'Test Organization Root Tr Token' 459s + '[' -n '' ']' 459s + local output_base_name=SSSD-child-28200 459s + local output_file=/tmp/sssd-softhsm2-9bLCCU/SSSD-child-28200.output 459s + output_cert_file=/tmp/sssd-softhsm2-9bLCCU/SSSD-child-28200.pem 459s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-9bLCCU/test-root-CA.pem 459s [p11_child[2392]] [main] (0x0400): p11_child started. 459s [p11_child[2392]] [main] (0x2000): Running in [pre-auth] mode. 459s [p11_child[2392]] [main] (0x2000): Running with effective IDs: [0][0]. 459s [p11_child[2392]] [main] (0x2000): Running with real IDs [0][0]. 459s [p11_child[2392]] [do_card] (0x4000): Module List: 459s [p11_child[2392]] [do_card] (0x4000): common name: [softhsm2]. 459s [p11_child[2392]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 459s [p11_child[2392]] [do_card] (0x4000): Description [SoftHSM slot ID 0x2d0cb919] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 459s [p11_child[2392]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 459s [p11_child[2392]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x2d0cb919][755808537] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 459s [p11_child[2392]] [do_card] (0x4000): Login NOT required. 459s [p11_child[2392]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 459s [p11_child[2392]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 459s [p11_child[2392]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Root Tr Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 459s [p11_child[2392]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x2d0cb919;slot-manufacturer=SoftHSM%20project;slot-id=755808537;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fe782113ad0cb919;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 459s [p11_child[2392]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 459s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-9bLCCU/SSSD-child-28200.output 459s + echo '-----BEGIN CERTIFICATE-----' 459s + tail -n1 /tmp/sssd-softhsm2-9bLCCU/SSSD-child-28200.output 459s + echo '-----END CERTIFICATE-----' 459s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-9bLCCU/SSSD-child-28200.pem 459s Certificate: 459s Data: 459s Version: 3 (0x2) 459s Serial Number: 3 (0x3) 459s Signature Algorithm: sha256WithRSAEncryption 459s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 459s Validity 459s Not Before: Nov 15 22:51:18 2024 GMT 459s Not After : Nov 15 22:51:18 2025 GMT 459s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 459s Subject Public Key Info: 459s Public Key Algorithm: rsaEncryption 459s Public-Key: (1024 bit) 459s Modulus: 459s 00:b2:d6:41:7a:0b:d3:49:71:30:56:d9:27:39:7c: 459s bc:23:33:7a:68:bd:e9:7f:16:c7:d1:2c:f7:63:66: 459s f5:73:62:f8:dd:c1:4b:c1:6b:ce:3d:6a:ec:da:54: 459s 71:36:a3:13:9b:bd:88:20:4e:d0:7e:4b:5d:02:2d: 459s d5:47:32:56:05:fa:43:17:c0:0a:8b:df:dc:1b:7e: 459s 21:ed:aa:81:36:bd:1c:7a:f7:8a:08:58:22:74:53: 459s 14:dd:7d:45:6e:92:c8:bd:ed:1b:33:22:d0:aa:26: 459s 11:7a:af:af:62:25:15:0e:c7:d5:8b:f5:50:16:62: 459s 7d:94:ac:e8:25:10:f5:ad:ff 459s Exponent: 65537 (0x10001) 459s X509v3 extensions: 459s X509v3 Authority Key Identifier: 459s 8D:29:A7:90:8D:1C:B0:70:DB:0B:A0:DE:98:10:46:0B:4B:B2:0D:B5 459s X509v3 Basic Constraints: 459s CA:FALSE 459s Netscape Cert Type: 459s SSL Client, S/MIME 459s Netscape Comment: 459s Test Organization Root CA trusted Certificate 459s X509v3 Subject Key Identifier: 459s 7E:45:E1:1A:E6:05:B5:7E:DB:16:28:0A:3F:CB:FE:3E:99:1F:17:C7 459s X509v3 Key Usage: critical 459s Digital Signature, Non Repudiation, Key Encipherment 459s X509v3 Extended Key Usage: 459s TLS Web Client Authentication, E-mail Protection 459s X509v3 Subject Alternative Name: 459s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 459s Signature Algorithm: sha256WithRSAEncryption 459s Signature Value: 459s 96:12:5d:d3:39:0f:32:67:e5:03:47:74:18:71:af:9c:fe:02: 459s 12:31:05:66:31:ac:64:65:1f:65:4a:20:89:a0:27:23:89:dc: 459s 53:f5:dd:55:ef:ab:5b:4d:4e:f1:40:bc:eb:a5:ac:31:b6:74: 459s 83:71:c8:5c:e4:4f:a4:d2:2d:e8:c9:ff:e5:fb:a9:a7:8f:3a: 459s 97:fc:d8:4d:d2:91:e9:9f:b9:c1:d8:a6:b1:2b:90:ce:c2:f1: 459s 34:14:9a:c2:c1:26:9f:ec:9c:22:d2:c1:06:4c:f9:ae:bc:aa: 459s 93:a8:cb:e0:e0:5c:a7:ab:43:e1:52:5c:34:f8:49:0a:a8:29: 459s 5d:45 459s + local found_md5 expected_md5 459s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-9bLCCU/test-root-CA-trusted-certificate-0001.pem 459s + expected_md5=Modulus=B2D6417A0BD349713056D927397CBC23337A68BDE97F16C7D12CF76366F57362F8DDC14BC16BCE3D6AECDA547136A3139BBD88204ED07E4B5D022DD547325605FA4317C00A8BDFDC1B7E21EDAA8136BD1C7AF78A085822745314DD7D456E92C8BDED1B3322D0AA26117AAFAF6225150EC7D58BF55016627D94ACE82510F5ADFF 459s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-9bLCCU/SSSD-child-28200.pem 459s + found_md5=Modulus=B2D6417A0BD349713056D927397CBC23337A68BDE97F16C7D12CF76366F57362F8DDC14BC16BCE3D6AECDA547136A3139BBD88204ED07E4B5D022DD547325605FA4317C00A8BDFDC1B7E21EDAA8136BD1C7AF78A085822745314DD7D456E92C8BDED1B3322D0AA26117AAFAF6225150EC7D58BF55016627D94ACE82510F5ADFF 459s + '[' Modulus=B2D6417A0BD349713056D927397CBC23337A68BDE97F16C7D12CF76366F57362F8DDC14BC16BCE3D6AECDA547136A3139BBD88204ED07E4B5D022DD547325605FA4317C00A8BDFDC1B7E21EDAA8136BD1C7AF78A085822745314DD7D456E92C8BDED1B3322D0AA26117AAFAF6225150EC7D58BF55016627D94ACE82510F5ADFF '!=' Modulus=B2D6417A0BD349713056D927397CBC23337A68BDE97F16C7D12CF76366F57362F8DDC14BC16BCE3D6AECDA547136A3139BBD88204ED07E4B5D022DD547325605FA4317C00A8BDFDC1B7E21EDAA8136BD1C7AF78A085822745314DD7D456E92C8BDED1B3322D0AA26117AAFAF6225150EC7D58BF55016627D94ACE82510F5ADFF ']' 459s + output_file=/tmp/sssd-softhsm2-9bLCCU/SSSD-child-28200-auth.output 459s ++ basename /tmp/sssd-softhsm2-9bLCCU/SSSD-child-28200-auth.output .output 459s + output_cert_file=/tmp/sssd-softhsm2-9bLCCU/SSSD-child-28200-auth.pem 459s + echo -n 053350 459s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-9bLCCU/test-root-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 '' --token_name 'Test Organization Root Tr Token' --module_name /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so 459s [p11_child[2400]] [main] (0x0400): p11_child started. 459s [p11_child[2400]] [main] (0x2000): Running in [auth] mode. 459s [p11_child[2400]] [main] (0x2000): Running with effective IDs: [0][0]. 459s [p11_child[2400]] [main] (0x2000): Running with real IDs [0][0]. 459s [p11_child[2400]] [do_card] (0x4000): Module List: 459s [p11_child[2400]] [do_card] (0x4000): common name: [softhsm2]. 459s [p11_child[2400]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 459s [p11_child[2400]] [do_card] (0x4000): Description [SoftHSM slot ID 0x2d0cb919] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 459s [p11_child[2400]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 459s [p11_child[2400]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x2d0cb919][755808537] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 459s [p11_child[2400]] [do_card] (0x4000): Login required. 459s [p11_child[2400]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 459s [p11_child[2400]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 459s [p11_child[2400]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so Test Organization Root Tr Token Test Organization Root Tr Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 459s [p11_child[2400]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x2d0cb919;slot-manufacturer=SoftHSM%20project;slot-id=755808537;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fe782113ad0cb919;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 459s [p11_child[2400]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 459s [p11_child[2400]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 459s [p11_child[2400]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 459s [p11_child[2400]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 459s [p11_child[2400]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 459s [p11_child[2400]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 459s [p11_child[2400]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 459s [p11_child[2400]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 459s [p11_child[2400]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 459s [p11_child[2400]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 459s [p11_child[2400]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 459s [p11_child[2400]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 459s [p11_child[2400]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 459s [p11_child[2400]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 459s [p11_child[2400]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 459s [p11_child[2400]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 459s [p11_child[2400]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 459s [p11_child[2400]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 459s [p11_child[2400]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 459s [p11_child[2400]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 459s [p11_child[2400]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 459s [p11_child[2400]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 459s [p11_child[2400]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 459s [p11_child[2400]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 459s [p11_child[2400]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 459s [p11_child[2400]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 459s [p11_child[2400]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 459s [p11_child[2400]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 459s [p11_child[2400]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 459s [p11_child[2400]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 459s [p11_child[2400]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 459s [p11_child[2400]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 459s [p11_child[2400]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 459s [p11_child[2400]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 459s [p11_child[2400]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 459s [p11_child[2400]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 459s [p11_child[2400]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 459s [p11_child[2400]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 459s [p11_child[2400]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 459s [p11_child[2400]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 459s [p11_child[2400]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 459s [p11_child[2400]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 459s [p11_child[2400]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 459s [p11_child[2400]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 459s [p11_child[2400]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 459s [p11_child[2400]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 459s [p11_child[2400]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 459s [p11_child[2400]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 459s [p11_child[2400]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 459s [p11_child[2400]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 459s [p11_child[2400]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 459s [p11_child[2400]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 459s [p11_child[2400]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 459s [p11_child[2400]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 459s [p11_child[2400]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 459s [p11_child[2400]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 459s [p11_child[2400]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 459s [p11_child[2400]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 459s [p11_child[2400]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 459s [p11_child[2400]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 459s [p11_child[2400]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 459s [p11_child[2400]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 459s [p11_child[2400]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 459s [p11_child[2400]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 459s [p11_child[2400]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 459s [p11_child[2400]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 459s [p11_child[2400]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 459s [p11_child[2400]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 459s [p11_child[2400]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 459s [p11_child[2400]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 459s [p11_child[2400]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 459s [p11_child[2400]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 459s [p11_child[2400]] [do_card] (0x4000): Certificate verified and validated. 459s [p11_child[2400]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 459s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-9bLCCU/SSSD-child-28200-auth.output 459s + echo '-----BEGIN CERTIFICATE-----' 459s + tail -n1 /tmp/sssd-softhsm2-9bLCCU/SSSD-child-28200-auth.output 459s + echo '-----END CERTIFICATE-----' 459s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-9bLCCU/SSSD-child-28200-auth.pem 459s Certificate: 459s Data: 459s Version: 3 (0x2) 459s Serial Number: 3 (0x3) 459s Signature Algorithm: sha256WithRSAEncryption 459s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 459s Validity 459s Not Before: Nov 15 22:51:18 2024 GMT 459s Not After : Nov 15 22:51:18 2025 GMT 459s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 459s Subject Public Key Info: 459s Public Key Algorithm: rsaEncryption 459s Public-Key: (1024 bit) 459s Modulus: 459s 00:b2:d6:41:7a:0b:d3:49:71:30:56:d9:27:39:7c: 459s bc:23:33:7a:68:bd:e9:7f:16:c7:d1:2c:f7:63:66: 459s f5:73:62:f8:dd:c1:4b:c1:6b:ce:3d:6a:ec:da:54: 459s 71:36:a3:13:9b:bd:88:20:4e:d0:7e:4b:5d:02:2d: 459s d5:47:32:56:05:fa:43:17:c0:0a:8b:df:dc:1b:7e: 459s 21:ed:aa:81:36:bd:1c:7a:f7:8a:08:58:22:74:53: 459s 14:dd:7d:45:6e:92:c8:bd:ed:1b:33:22:d0:aa:26: 459s 11:7a:af:af:62:25:15:0e:c7:d5:8b:f5:50:16:62: 459s 7d:94:ac:e8:25:10:f5:ad:ff 459s Exponent: 65537 (0x10001) 459s X509v3 extensions: 459s X509v3 Authority Key Identifier: 459s 8D:29:A7:90:8D:1C:B0:70:DB:0B:A0:DE:98:10:46:0B:4B:B2:0D:B5 459s X509v3 Basic Constraints: 459s CA:FALSE 459s Netscape Cert Type: 459s SSL Client, S/MIME 459s Netscape Comment: 459s Test Organization Root CA trusted Certificate 459s X509v3 Subject Key Identifier: 459s 7E:45:E1:1A:E6:05:B5:7E:DB:16:28:0A:3F:CB:FE:3E:99:1F:17:C7 459s X509v3 Key Usage: critical 459s Digital Signature, Non Repudiation, Key Encipherment 459s X509v3 Extended Key Usage: 459s TLS Web Client Authentication, E-mail Protection 459s X509v3 Subject Alternative Name: 459s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 459s Signature Algorithm: sha256WithRSAEncryption 459s Signature Value: 459s 96:12:5d:d3:39:0f:32:67:e5:03:47:74:18:71:af:9c:fe:02: 459s 12:31:05:66:31:ac:64:65:1f:65:4a:20:89:a0:27:23:89:dc: 459s 53:f5:dd:55:ef:ab:5b:4d:4e:f1:40:bc:eb:a5:ac:31:b6:74: 459s 83:71:c8:5c:e4:4f:a4:d2:2d:e8:c9:ff:e5:fb:a9:a7:8f:3a: 459s 97:fc:d8:4d:d2:91:e9:9f:b9:c1:d8:a6:b1:2b:90:ce:c2:f1: 459s 34:14:9a:c2:c1:26:9f:ec:9c:22:d2:c1:06:4c:f9:ae:bc:aa: 459s 93:a8:cb:e0:e0:5c:a7:ab:43:e1:52:5c:34:f8:49:0a:a8:29: 459s 5d:45 459s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-9bLCCU/SSSD-child-28200-auth.pem 459s + found_md5=Modulus=B2D6417A0BD349713056D927397CBC23337A68BDE97F16C7D12CF76366F57362F8DDC14BC16BCE3D6AECDA547136A3139BBD88204ED07E4B5D022DD547325605FA4317C00A8BDFDC1B7E21EDAA8136BD1C7AF78A085822745314DD7D456E92C8BDED1B3322D0AA26117AAFAF6225150EC7D58BF55016627D94ACE82510F5ADFF 459s + '[' Modulus=B2D6417A0BD349713056D927397CBC23337A68BDE97F16C7D12CF76366F57362F8DDC14BC16BCE3D6AECDA547136A3139BBD88204ED07E4B5D022DD547325605FA4317C00A8BDFDC1B7E21EDAA8136BD1C7AF78A085822745314DD7D456E92C8BDED1B3322D0AA26117AAFAF6225150EC7D58BF55016627D94ACE82510F5ADFF '!=' Modulus=B2D6417A0BD349713056D927397CBC23337A68BDE97F16C7D12CF76366F57362F8DDC14BC16BCE3D6AECDA547136A3139BBD88204ED07E4B5D022DD547325605FA4317C00A8BDFDC1B7E21EDAA8136BD1C7AF78A085822745314DD7D456E92C8BDED1B3322D0AA26117AAFAF6225150EC7D58BF55016627D94ACE82510F5ADFF ']' 459s + valid_certificate /tmp/sssd-softhsm2-9bLCCU/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-24305 /tmp/sssd-softhsm2-9bLCCU/test-root-CA.pem partial_chain 459s + check_certificate /tmp/sssd-softhsm2-9bLCCU/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-24305 /tmp/sssd-softhsm2-9bLCCU/test-root-CA.pem partial_chain 459s + local certificate=/tmp/sssd-softhsm2-9bLCCU/test-root-CA-trusted-certificate-0001.pem 459s + local key_pass=pass:random-root-ca-trusted-cert-0001-24305 459s + local key_ring=/tmp/sssd-softhsm2-9bLCCU/test-root-CA.pem 459s + local verify_option=partial_chain 459s + prepare_softhsm2_card /tmp/sssd-softhsm2-9bLCCU/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-24305 459s + local certificate=/tmp/sssd-softhsm2-9bLCCU/test-root-CA-trusted-certificate-0001.pem 459s + local key_pass=pass:random-root-ca-trusted-cert-0001-24305 459s + local key_cn 459s + local key_name 459s + local tokens_dir 459s + local output_cert_file 459s + token_name= 459s ++ basename /tmp/sssd-softhsm2-9bLCCU/test-root-CA-trusted-certificate-0001.pem .pem 459s + key_name=test-root-CA-trusted-certificate-0001 459s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-9bLCCU/test-root-CA-trusted-certificate-0001.pem 459s ++ sed -n 's/ *commonName *= //p' 459s + key_cn='Test Organization Root Trusted Certificate 0001' 459s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 459s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-9bLCCU/softhsm2-test-root-CA-trusted-certificate-0001.conf 459s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-9bLCCU/softhsm2-test-root-CA-trusted-certificate-0001.conf 459s ++ basename /tmp/sssd-softhsm2-9bLCCU/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 459s Test Organization Root Tr Token 459s + tokens_dir=/tmp/sssd-softhsm2-9bLCCU/softhsm2-test-root-CA-trusted-certificate-0001 459s + token_name='Test Organization Root Tr Token' 459s + '[' '!' -e /tmp/sssd-softhsm2-9bLCCU/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 459s + '[' '!' -d /tmp/sssd-softhsm2-9bLCCU/softhsm2-test-root-CA-trusted-certificate-0001 ']' 459s + echo 'Test Organization Root Tr Token' 459s + '[' -n partial_chain ']' 459s + local verify_arg=--verify=partial_chain 459s + local output_base_name=SSSD-child-29708 459s + local output_file=/tmp/sssd-softhsm2-9bLCCU/SSSD-child-29708.output 459s + output_cert_file=/tmp/sssd-softhsm2-9bLCCU/SSSD-child-29708.pem 459s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-9bLCCU/test-root-CA.pem 459s [p11_child[2410]] [main] (0x0400): p11_child started. 459s [p11_child[2410]] [main] (0x2000): Running in [pre-auth] mode. 459s [p11_child[2410]] [main] (0x2000): Running with effective IDs: [0][0]. 459s [p11_child[2410]] [main] (0x2000): Running with real IDs [0][0]. 459s [p11_child[2410]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 459s [p11_child[2410]] [do_card] (0x4000): Module List: 459s [p11_child[2410]] [do_card] (0x4000): common name: [softhsm2]. 459s [p11_child[2410]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 459s [p11_child[2410]] [do_card] (0x4000): Description [SoftHSM slot ID 0x2d0cb919] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 459s [p11_child[2410]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 459s [p11_child[2410]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x2d0cb919][755808537] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 459s [p11_child[2410]] [do_card] (0x4000): Login NOT required. 459s [p11_child[2410]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 459s [p11_child[2410]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 459s [p11_child[2410]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Root Tr Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 459s [p11_child[2410]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x2d0cb919;slot-manufacturer=SoftHSM%20project;slot-id=755808537;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fe782113ad0cb919;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 459s [p11_child[2410]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 459s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-9bLCCU/SSSD-child-29708.output 459s + echo '-----BEGIN CERTIFICATE-----' 459s + tail -n1 /tmp/sssd-softhsm2-9bLCCU/SSSD-child-29708.output 459s + echo '-----END CERTIFICATE-----' 459s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-9bLCCU/SSSD-child-29708.pem 459s Certificate: 459s Data: 459s Version: 3 (0x2) 459s Serial Number: 3 (0x3) 459s Signature Algorithm: sha256WithRSAEncryption 459s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 459s Validity 459s Not Before: Nov 15 22:51:18 2024 GMT 459s Not After : Nov 15 22:51:18 2025 GMT 459s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 459s Subject Public Key Info: 459s Public Key Algorithm: rsaEncryption 459s Public-Key: (1024 bit) 459s Modulus: 459s 00:b2:d6:41:7a:0b:d3:49:71:30:56:d9:27:39:7c: 459s bc:23:33:7a:68:bd:e9:7f:16:c7:d1:2c:f7:63:66: 459s f5:73:62:f8:dd:c1:4b:c1:6b:ce:3d:6a:ec:da:54: 459s 71:36:a3:13:9b:bd:88:20:4e:d0:7e:4b:5d:02:2d: 459s d5:47:32:56:05:fa:43:17:c0:0a:8b:df:dc:1b:7e: 459s 21:ed:aa:81:36:bd:1c:7a:f7:8a:08:58:22:74:53: 459s 14:dd:7d:45:6e:92:c8:bd:ed:1b:33:22:d0:aa:26: 459s 11:7a:af:af:62:25:15:0e:c7:d5:8b:f5:50:16:62: 459s 7d:94:ac:e8:25:10:f5:ad:ff 459s Exponent: 65537 (0x10001) 459s X509v3 extensions: 459s X509v3 Authority Key Identifier: 459s 8D:29:A7:90:8D:1C:B0:70:DB:0B:A0:DE:98:10:46:0B:4B:B2:0D:B5 459s X509v3 Basic Constraints: 459s CA:FALSE 459s Netscape Cert Type: 459s SSL Client, S/MIME 459s Netscape Comment: 459s Test Organization Root CA trusted Certificate 459s X509v3 Subject Key Identifier: 459s 7E:45:E1:1A:E6:05:B5:7E:DB:16:28:0A:3F:CB:FE:3E:99:1F:17:C7 459s X509v3 Key Usage: critical 459s Digital Signature, Non Repudiation, Key Encipherment 459s X509v3 Extended Key Usage: 459s TLS Web Client Authentication, E-mail Protection 459s X509v3 Subject Alternative Name: 459s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 459s Signature Algorithm: sha256WithRSAEncryption 459s Signature Value: 459s 96:12:5d:d3:39:0f:32:67:e5:03:47:74:18:71:af:9c:fe:02: 459s 12:31:05:66:31:ac:64:65:1f:65:4a:20:89:a0:27:23:89:dc: 459s 53:f5:dd:55:ef:ab:5b:4d:4e:f1:40:bc:eb:a5:ac:31:b6:74: 459s 83:71:c8:5c:e4:4f:a4:d2:2d:e8:c9:ff:e5:fb:a9:a7:8f:3a: 459s 97:fc:d8:4d:d2:91:e9:9f:b9:c1:d8:a6:b1:2b:90:ce:c2:f1: 459s 34:14:9a:c2:c1:26:9f:ec:9c:22:d2:c1:06:4c:f9:ae:bc:aa: 459s 93:a8:cb:e0:e0:5c:a7:ab:43:e1:52:5c:34:f8:49:0a:a8:29: 459s 5d:45 459s + local found_md5 expected_md5 459s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-9bLCCU/test-root-CA-trusted-certificate-0001.pem 459s + expected_md5=Modulus=B2D6417A0BD349713056D927397CBC23337A68BDE97F16C7D12CF76366F57362F8DDC14BC16BCE3D6AECDA547136A3139BBD88204ED07E4B5D022DD547325605FA4317C00A8BDFDC1B7E21EDAA8136BD1C7AF78A085822745314DD7D456E92C8BDED1B3322D0AA26117AAFAF6225150EC7D58BF55016627D94ACE82510F5ADFF 459s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-9bLCCU/SSSD-child-29708.pem 459s + found_md5=Modulus=B2D6417A0BD349713056D927397CBC23337A68BDE97F16C7D12CF76366F57362F8DDC14BC16BCE3D6AECDA547136A3139BBD88204ED07E4B5D022DD547325605FA4317C00A8BDFDC1B7E21EDAA8136BD1C7AF78A085822745314DD7D456E92C8BDED1B3322D0AA26117AAFAF6225150EC7D58BF55016627D94ACE82510F5ADFF 459s + '[' Modulus=B2D6417A0BD349713056D927397CBC23337A68BDE97F16C7D12CF76366F57362F8DDC14BC16BCE3D6AECDA547136A3139BBD88204ED07E4B5D022DD547325605FA4317C00A8BDFDC1B7E21EDAA8136BD1C7AF78A085822745314DD7D456E92C8BDED1B3322D0AA26117AAFAF6225150EC7D58BF55016627D94ACE82510F5ADFF '!=' Modulus=B2D6417A0BD349713056D927397CBC23337A68BDE97F16C7D12CF76366F57362F8DDC14BC16BCE3D6AECDA547136A3139BBD88204ED07E4B5D022DD547325605FA4317C00A8BDFDC1B7E21EDAA8136BD1C7AF78A085822745314DD7D456E92C8BDED1B3322D0AA26117AAFAF6225150EC7D58BF55016627D94ACE82510F5ADFF ']' 459s + output_file=/tmp/sssd-softhsm2-9bLCCU/SSSD-child-29708-auth.output 459s ++ basename /tmp/sssd-softhsm2-9bLCCU/SSSD-child-29708-auth.output .output 459s + output_cert_file=/tmp/sssd-softhsm2-9bLCCU/SSSD-child-29708-auth.pem 459s + echo -n 053350 459s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-9bLCCU/test-root-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Root Tr Token' --module_name /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so 459s [p11_child[2418]] [main] (0x0400): p11_child started. 459s [p11_child[2418]] [main] (0x2000): Running in [auth] mode. 459s [p11_child[2418]] [main] (0x2000): Running with effective IDs: [0][0]. 459s [p11_child[2418]] [main] (0x2000): Running with real IDs [0][0]. 459s [p11_child[2418]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 459s [p11_child[2418]] [do_card] (0x4000): Module List: 459s [p11_child[2418]] [do_card] (0x4000): common name: [softhsm2]. 459s [p11_child[2418]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 459s [p11_child[2418]] [do_card] (0x4000): Description [SoftHSM slot ID 0x2d0cb919] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 459s [p11_child[2418]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 459s [p11_child[2418]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x2d0cb919][755808537] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 459s [p11_child[2418]] [do_card] (0x4000): Login required. 459s [p11_child[2418]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 459s [p11_child[2418]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 459s [p11_child[2418]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so Test Organization Root Tr Token Test Organization Root Tr Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 459s [p11_child[2418]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x2d0cb919;slot-manufacturer=SoftHSM%20project;slot-id=755808537;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fe782113ad0cb919;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 459s [p11_child[2418]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 459s [p11_child[2418]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 459s [p11_child[2418]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 459s [p11_child[2418]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 459s [p11_child[2418]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 459s [p11_child[2418]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 459s [p11_child[2418]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 459s [p11_child[2418]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 459s [p11_child[2418]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 459s [p11_child[2418]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 459s [p11_child[2418]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 459s [p11_child[2418]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 459s [p11_child[2418]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 459s [p11_child[2418]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 459s [p11_child[2418]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 459s [p11_child[2418]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 459s [p11_child[2418]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 459s [p11_child[2418]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 459s [p11_child[2418]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 459s [p11_child[2418]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 459s [p11_child[2418]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 459s [p11_child[2418]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 459s [p11_child[2418]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 459s [p11_child[2418]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 459s [p11_child[2418]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 459s [p11_child[2418]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 459s [p11_child[2418]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 459s [p11_child[2418]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 459s [p11_child[2418]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 459s [p11_child[2418]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 459s [p11_child[2418]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 459s [p11_child[2418]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 459s [p11_child[2418]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 459s [p11_child[2418]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 459s [p11_child[2418]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 459s [p11_child[2418]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 459s [p11_child[2418]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 459s [p11_child[2418]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 459s [p11_child[2418]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 459s [p11_child[2418]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 459s [p11_child[2418]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 459s [p11_child[2418]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 459s [p11_child[2418]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 459s [p11_child[2418]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 459s [p11_child[2418]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 459s [p11_child[2418]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 459s [p11_child[2418]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 459s [p11_child[2418]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 459s [p11_child[2418]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 459s [p11_child[2418]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 459s [p11_child[2418]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 459s [p11_child[2418]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 459s [p11_child[2418]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 459s [p11_child[2418]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 459s [p11_child[2418]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 459s [p11_child[2418]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 459s [p11_child[2418]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 459s [p11_child[2418]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 459s [p11_child[2418]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 459s [p11_child[2418]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 459s [p11_child[2418]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 459s [p11_child[2418]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 459s [p11_child[2418]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 459s [p11_child[2418]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 459s [p11_child[2418]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 459s [p11_child[2418]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 459s [p11_child[2418]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 459s [p11_child[2418]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 459s [p11_child[2418]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 459s [p11_child[2418]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 459s [p11_child[2418]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 459s [p11_child[2418]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 459s [p11_child[2418]] [do_card] (0x4000): Certificate verified and validated. 459s [p11_child[2418]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 459s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-9bLCCU/SSSD-child-29708-auth.output 459s + echo '-----BEGIN CERTIFICATE-----' 459s + tail -n1 /tmp/sssd-softhsm2-9bLCCU/SSSD-child-29708-auth.output 459s + echo '-----END CERTIFICATE-----' 459s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-9bLCCU/SSSD-child-29708-auth.pem 459s Certificate: 459s Data: 459s Version: 3 (0x2) 459s Serial Number: 3 (0x3) 459s Signature Algorithm: sha256WithRSAEncryption 459s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 459s Validity 459s Not Before: Nov 15 22:51:18 2024 GMT 459s Not After : Nov 15 22:51:18 2025 GMT 459s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 459s Subject Public Key Info: 459s Public Key Algorithm: rsaEncryption 459s Public-Key: (1024 bit) 459s Modulus: 459s 00:b2:d6:41:7a:0b:d3:49:71:30:56:d9:27:39:7c: 459s bc:23:33:7a:68:bd:e9:7f:16:c7:d1:2c:f7:63:66: 459s f5:73:62:f8:dd:c1:4b:c1:6b:ce:3d:6a:ec:da:54: 459s 71:36:a3:13:9b:bd:88:20:4e:d0:7e:4b:5d:02:2d: 459s d5:47:32:56:05:fa:43:17:c0:0a:8b:df:dc:1b:7e: 459s 21:ed:aa:81:36:bd:1c:7a:f7:8a:08:58:22:74:53: 459s 14:dd:7d:45:6e:92:c8:bd:ed:1b:33:22:d0:aa:26: 459s 11:7a:af:af:62:25:15:0e:c7:d5:8b:f5:50:16:62: 459s 7d:94:ac:e8:25:10:f5:ad:ff 459s Exponent: 65537 (0x10001) 459s X509v3 extensions: 459s X509v3 Authority Key Identifier: 459s 8D:29:A7:90:8D:1C:B0:70:DB:0B:A0:DE:98:10:46:0B:4B:B2:0D:B5 459s X509v3 Basic Constraints: 459s CA:FALSE 459s Netscape Cert Type: 459s SSL Client, S/MIME 459s Netscape Comment: 459s Test Organization Root CA trusted Certificate 459s X509v3 Subject Key Identifier: 459s 7E:45:E1:1A:E6:05:B5:7E:DB:16:28:0A:3F:CB:FE:3E:99:1F:17:C7 459s X509v3 Key Usage: critical 459s Digital Signature, Non Repudiation, Key Encipherment 459s X509v3 Extended Key Usage: 459s TLS Web Client Authentication, E-mail Protection 459s X509v3 Subject Alternative Name: 459s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 459s Signature Algorithm: sha256WithRSAEncryption 459s Signature Value: 459s 96:12:5d:d3:39:0f:32:67:e5:03:47:74:18:71:af:9c:fe:02: 459s 12:31:05:66:31:ac:64:65:1f:65:4a:20:89:a0:27:23:89:dc: 459s 53:f5:dd:55:ef:ab:5b:4d:4e:f1:40:bc:eb:a5:ac:31:b6:74: 459s 83:71:c8:5c:e4:4f:a4:d2:2d:e8:c9:ff:e5:fb:a9:a7:8f:3a: 459s 97:fc:d8:4d:d2:91:e9:9f:b9:c1:d8:a6:b1:2b:90:ce:c2:f1: 459s 34:14:9a:c2:c1:26:9f:ec:9c:22:d2:c1:06:4c:f9:ae:bc:aa: 459s 93:a8:cb:e0:e0:5c:a7:ab:43:e1:52:5c:34:f8:49:0a:a8:29: 459s 5d:45 459s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-9bLCCU/SSSD-child-29708-auth.pem 459s + found_md5=Modulus=B2D6417A0BD349713056D927397CBC23337A68BDE97F16C7D12CF76366F57362F8DDC14BC16BCE3D6AECDA547136A3139BBD88204ED07E4B5D022DD547325605FA4317C00A8BDFDC1B7E21EDAA8136BD1C7AF78A085822745314DD7D456E92C8BDED1B3322D0AA26117AAFAF6225150EC7D58BF55016627D94ACE82510F5ADFF 459s + '[' Modulus=B2D6417A0BD349713056D927397CBC23337A68BDE97F16C7D12CF76366F57362F8DDC14BC16BCE3D6AECDA547136A3139BBD88204ED07E4B5D022DD547325605FA4317C00A8BDFDC1B7E21EDAA8136BD1C7AF78A085822745314DD7D456E92C8BDED1B3322D0AA26117AAFAF6225150EC7D58BF55016627D94ACE82510F5ADFF '!=' Modulus=B2D6417A0BD349713056D927397CBC23337A68BDE97F16C7D12CF76366F57362F8DDC14BC16BCE3D6AECDA547136A3139BBD88204ED07E4B5D022DD547325605FA4317C00A8BDFDC1B7E21EDAA8136BD1C7AF78A085822745314DD7D456E92C8BDED1B3322D0AA26117AAFAF6225150EC7D58BF55016627D94ACE82510F5ADFF ']' 459s + valid_certificate /tmp/sssd-softhsm2-9bLCCU/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-24305 /tmp/sssd-softhsm2-9bLCCU/test-full-chain-CA.pem 459s + check_certificate /tmp/sssd-softhsm2-9bLCCU/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-24305 /tmp/sssd-softhsm2-9bLCCU/test-full-chain-CA.pem 459s + local certificate=/tmp/sssd-softhsm2-9bLCCU/test-root-CA-trusted-certificate-0001.pem 459s + local key_pass=pass:random-root-ca-trusted-cert-0001-24305 459s + local key_ring=/tmp/sssd-softhsm2-9bLCCU/test-full-chain-CA.pem 459s + local verify_option= 459s + prepare_softhsm2_card /tmp/sssd-softhsm2-9bLCCU/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-24305 459s + local certificate=/tmp/sssd-softhsm2-9bLCCU/test-root-CA-trusted-certificate-0001.pem 459s + local key_pass=pass:random-root-ca-trusted-cert-0001-24305 459s + local key_cn 459s + local key_name 459s + local tokens_dir 459s + local output_cert_file 459s + token_name= 459s ++ basename /tmp/sssd-softhsm2-9bLCCU/test-root-CA-trusted-certificate-0001.pem .pem 459s + key_name=test-root-CA-trusted-certificate-0001 459s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-9bLCCU/test-root-CA-trusted-certificate-0001.pem 459s ++ sed -n 's/ *commonName *= //p' 460s + key_cn='Test Organization Root Trusted Certificate 0001' 460s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 460s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-9bLCCU/softhsm2-test-root-CA-trusted-certificate-0001.conf 460s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-9bLCCU/softhsm2-test-root-CA-trusted-certificate-0001.conf 460s ++ basename /tmp/sssd-softhsm2-9bLCCU/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 460s + tokens_dir=/tmp/sssd-softhsm2-9bLCCU/softhsm2-test-root-CA-trusted-certificate-0001 460s + token_name='Test Organization Root Tr Token' 460s Test Organization Root Tr Token 460s + '[' '!' -e /tmp/sssd-softhsm2-9bLCCU/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 460s + '[' '!' -d /tmp/sssd-softhsm2-9bLCCU/softhsm2-test-root-CA-trusted-certificate-0001 ']' 460s + echo 'Test Organization Root Tr Token' 460s + '[' -n '' ']' 460s + local output_base_name=SSSD-child-30761 460s + local output_file=/tmp/sssd-softhsm2-9bLCCU/SSSD-child-30761.output 460s + output_cert_file=/tmp/sssd-softhsm2-9bLCCU/SSSD-child-30761.pem 460s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-9bLCCU/test-full-chain-CA.pem 460s [p11_child[2428]] [main] (0x0400): p11_child started. 460s [p11_child[2428]] [main] (0x2000): Running in [pre-auth] mode. 460s [p11_child[2428]] [main] (0x2000): Running with effective IDs: [0][0]. 460s [p11_child[2428]] [main] (0x2000): Running with real IDs [0][0]. 460s [p11_child[2428]] [do_card] (0x4000): Module List: 460s [p11_child[2428]] [do_card] (0x4000): common name: [softhsm2]. 460s [p11_child[2428]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 460s [p11_child[2428]] [do_card] (0x4000): Description [SoftHSM slot ID 0x2d0cb919] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 460s [p11_child[2428]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 460s [p11_child[2428]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x2d0cb919][755808537] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 460s [p11_child[2428]] [do_card] (0x4000): Login NOT required. 460s [p11_child[2428]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 460s [p11_child[2428]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 460s [p11_child[2428]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Root Tr Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 460s [p11_child[2428]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x2d0cb919;slot-manufacturer=SoftHSM%20project;slot-id=755808537;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fe782113ad0cb919;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 460s [p11_child[2428]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 460s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-9bLCCU/SSSD-child-30761.output 460s + echo '-----BEGIN CERTIFICATE-----' 460s + tail -n1 /tmp/sssd-softhsm2-9bLCCU/SSSD-child-30761.output 460s + echo '-----END CERTIFICATE-----' 460s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-9bLCCU/SSSD-child-30761.pem 460s Certificate: 460s Data: 460s Version: 3 (0x2) 460s Serial Number: 3 (0x3) 460s Signature Algorithm: sha256WithRSAEncryption 460s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 460s Validity 460s Not Before: Nov 15 22:51:18 2024 GMT 460s Not After : Nov 15 22:51:18 2025 GMT 460s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 460s Subject Public Key Info: 460s Public Key Algorithm: rsaEncryption 460s Public-Key: (1024 bit) 460s Modulus: 460s 00:b2:d6:41:7a:0b:d3:49:71:30:56:d9:27:39:7c: 460s bc:23:33:7a:68:bd:e9:7f:16:c7:d1:2c:f7:63:66: 460s f5:73:62:f8:dd:c1:4b:c1:6b:ce:3d:6a:ec:da:54: 460s 71:36:a3:13:9b:bd:88:20:4e:d0:7e:4b:5d:02:2d: 460s d5:47:32:56:05:fa:43:17:c0:0a:8b:df:dc:1b:7e: 460s 21:ed:aa:81:36:bd:1c:7a:f7:8a:08:58:22:74:53: 460s 14:dd:7d:45:6e:92:c8:bd:ed:1b:33:22:d0:aa:26: 460s 11:7a:af:af:62:25:15:0e:c7:d5:8b:f5:50:16:62: 460s 7d:94:ac:e8:25:10:f5:ad:ff 460s Exponent: 65537 (0x10001) 460s X509v3 extensions: 460s X509v3 Authority Key Identifier: 460s 8D:29:A7:90:8D:1C:B0:70:DB:0B:A0:DE:98:10:46:0B:4B:B2:0D:B5 460s X509v3 Basic Constraints: 460s CA:FALSE 460s Netscape Cert Type: 460s SSL Client, S/MIME 460s Netscape Comment: 460s Test Organization Root CA trusted Certificate 460s X509v3 Subject Key Identifier: 460s 7E:45:E1:1A:E6:05:B5:7E:DB:16:28:0A:3F:CB:FE:3E:99:1F:17:C7 460s X509v3 Key Usage: critical 460s Digital Signature, Non Repudiation, Key Encipherment 460s X509v3 Extended Key Usage: 460s TLS Web Client Authentication, E-mail Protection 460s X509v3 Subject Alternative Name: 460s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 460s Signature Algorithm: sha256WithRSAEncryption 460s Signature Value: 460s 96:12:5d:d3:39:0f:32:67:e5:03:47:74:18:71:af:9c:fe:02: 460s 12:31:05:66:31:ac:64:65:1f:65:4a:20:89:a0:27:23:89:dc: 460s 53:f5:dd:55:ef:ab:5b:4d:4e:f1:40:bc:eb:a5:ac:31:b6:74: 460s 83:71:c8:5c:e4:4f:a4:d2:2d:e8:c9:ff:e5:fb:a9:a7:8f:3a: 460s 97:fc:d8:4d:d2:91:e9:9f:b9:c1:d8:a6:b1:2b:90:ce:c2:f1: 460s 34:14:9a:c2:c1:26:9f:ec:9c:22:d2:c1:06:4c:f9:ae:bc:aa: 460s 93:a8:cb:e0:e0:5c:a7:ab:43:e1:52:5c:34:f8:49:0a:a8:29: 460s 5d:45 460s + local found_md5 expected_md5 460s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-9bLCCU/test-root-CA-trusted-certificate-0001.pem 460s + expected_md5=Modulus=B2D6417A0BD349713056D927397CBC23337A68BDE97F16C7D12CF76366F57362F8DDC14BC16BCE3D6AECDA547136A3139BBD88204ED07E4B5D022DD547325605FA4317C00A8BDFDC1B7E21EDAA8136BD1C7AF78A085822745314DD7D456E92C8BDED1B3322D0AA26117AAFAF6225150EC7D58BF55016627D94ACE82510F5ADFF 460s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-9bLCCU/SSSD-child-30761.pem 460s + found_md5=Modulus=B2D6417A0BD349713056D927397CBC23337A68BDE97F16C7D12CF76366F57362F8DDC14BC16BCE3D6AECDA547136A3139BBD88204ED07E4B5D022DD547325605FA4317C00A8BDFDC1B7E21EDAA8136BD1C7AF78A085822745314DD7D456E92C8BDED1B3322D0AA26117AAFAF6225150EC7D58BF55016627D94ACE82510F5ADFF 460s + '[' Modulus=B2D6417A0BD349713056D927397CBC23337A68BDE97F16C7D12CF76366F57362F8DDC14BC16BCE3D6AECDA547136A3139BBD88204ED07E4B5D022DD547325605FA4317C00A8BDFDC1B7E21EDAA8136BD1C7AF78A085822745314DD7D456E92C8BDED1B3322D0AA26117AAFAF6225150EC7D58BF55016627D94ACE82510F5ADFF '!=' Modulus=B2D6417A0BD349713056D927397CBC23337A68BDE97F16C7D12CF76366F57362F8DDC14BC16BCE3D6AECDA547136A3139BBD88204ED07E4B5D022DD547325605FA4317C00A8BDFDC1B7E21EDAA8136BD1C7AF78A085822745314DD7D456E92C8BDED1B3322D0AA26117AAFAF6225150EC7D58BF55016627D94ACE82510F5ADFF ']' 460s + output_file=/tmp/sssd-softhsm2-9bLCCU/SSSD-child-30761-auth.output 460s ++ basename /tmp/sssd-softhsm2-9bLCCU/SSSD-child-30761-auth.output .output 460s + output_cert_file=/tmp/sssd-softhsm2-9bLCCU/SSSD-child-30761-auth.pem 460s + echo -n 053350 460s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-9bLCCU/test-full-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 '' --token_name 'Test Organization Root Tr Token' --module_name /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so 460s [p11_child[2436]] [main] (0x0400): p11_child started. 460s [p11_child[2436]] [main] (0x2000): Running in [auth] mode. 460s [p11_child[2436]] [main] (0x2000): Running with effective IDs: [0][0]. 460s [p11_child[2436]] [main] (0x2000): Running with real IDs [0][0]. 460s [p11_child[2436]] [do_card] (0x4000): Module List: 460s [p11_child[2436]] [do_card] (0x4000): common name: [softhsm2]. 460s [p11_child[2436]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 460s [p11_child[2436]] [do_card] (0x4000): Description [SoftHSM slot ID 0x2d0cb919] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 460s [p11_child[2436]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 460s [p11_child[2436]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x2d0cb919][755808537] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 460s [p11_child[2436]] [do_card] (0x4000): Login required. 460s [p11_child[2436]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 460s [p11_child[2436]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 460s [p11_child[2436]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so Test Organization Root Tr Token Test Organization Root Tr Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 460s [p11_child[2436]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x2d0cb919;slot-manufacturer=SoftHSM%20project;slot-id=755808537;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fe782113ad0cb919;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 460s [p11_child[2436]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 460s [p11_child[2436]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 460s [p11_child[2436]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 460s [p11_child[2436]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 460s [p11_child[2436]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 460s [p11_child[2436]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 460s [p11_child[2436]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 460s [p11_child[2436]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 460s [p11_child[2436]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 460s [p11_child[2436]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 460s [p11_child[2436]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 460s [p11_child[2436]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 460s [p11_child[2436]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 460s [p11_child[2436]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 460s [p11_child[2436]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 460s [p11_child[2436]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 460s [p11_child[2436]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 460s [p11_child[2436]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 460s [p11_child[2436]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 460s [p11_child[2436]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 460s [p11_child[2436]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 460s [p11_child[2436]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 460s [p11_child[2436]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 460s [p11_child[2436]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 460s [p11_child[2436]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 460s [p11_child[2436]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 460s [p11_child[2436]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 460s [p11_child[2436]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 460s [p11_child[2436]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 460s [p11_child[2436]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 460s [p11_child[2436]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 460s [p11_child[2436]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 460s [p11_child[2436]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 460s [p11_child[2436]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 460s [p11_child[2436]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 460s [p11_child[2436]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 460s [p11_child[2436]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 460s [p11_child[2436]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 460s [p11_child[2436]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 460s [p11_child[2436]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 460s [p11_child[2436]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 460s [p11_child[2436]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 460s [p11_child[2436]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 460s [p11_child[2436]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 460s [p11_child[2436]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 460s [p11_child[2436]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 460s [p11_child[2436]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 460s [p11_child[2436]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 460s [p11_child[2436]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 460s [p11_child[2436]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 460s [p11_child[2436]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 460s [p11_child[2436]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 460s [p11_child[2436]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 460s [p11_child[2436]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 460s [p11_child[2436]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 460s [p11_child[2436]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 460s [p11_child[2436]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 460s [p11_child[2436]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 460s [p11_child[2436]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 460s [p11_child[2436]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 460s [p11_child[2436]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 460s [p11_child[2436]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 460s [p11_child[2436]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 460s [p11_child[2436]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 460s [p11_child[2436]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 460s [p11_child[2436]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 460s [p11_child[2436]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 460s [p11_child[2436]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 460s [p11_child[2436]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 460s [p11_child[2436]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 460s [p11_child[2436]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 460s [p11_child[2436]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 460s [p11_child[2436]] [do_card] (0x4000): Certificate verified and validated. 460s [p11_child[2436]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 460s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-9bLCCU/SSSD-child-30761-auth.output 460s + echo '-----BEGIN CERTIFICATE-----' 460s + tail -n1 /tmp/sssd-softhsm2-9bLCCU/SSSD-child-30761-auth.output 460s + echo '-----END CERTIFICATE-----' 460s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-9bLCCU/SSSD-child-30761-auth.pem 460s Certificate: 460s Data: 460s Version: 3 (0x2) 460s Serial Number: 3 (0x3) 460s Signature Algorithm: sha256WithRSAEncryption 460s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 460s Validity 460s Not Before: Nov 15 22:51:18 2024 GMT 460s Not After : Nov 15 22:51:18 2025 GMT 460s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 460s Subject Public Key Info: 460s Public Key Algorithm: rsaEncryption 460s Public-Key: (1024 bit) 460s Modulus: 460s 00:b2:d6:41:7a:0b:d3:49:71:30:56:d9:27:39:7c: 460s bc:23:33:7a:68:bd:e9:7f:16:c7:d1:2c:f7:63:66: 460s f5:73:62:f8:dd:c1:4b:c1:6b:ce:3d:6a:ec:da:54: 460s 71:36:a3:13:9b:bd:88:20:4e:d0:7e:4b:5d:02:2d: 460s d5:47:32:56:05:fa:43:17:c0:0a:8b:df:dc:1b:7e: 460s 21:ed:aa:81:36:bd:1c:7a:f7:8a:08:58:22:74:53: 460s 14:dd:7d:45:6e:92:c8:bd:ed:1b:33:22:d0:aa:26: 460s 11:7a:af:af:62:25:15:0e:c7:d5:8b:f5:50:16:62: 460s 7d:94:ac:e8:25:10:f5:ad:ff 460s Exponent: 65537 (0x10001) 460s X509v3 extensions: 460s X509v3 Authority Key Identifier: 460s 8D:29:A7:90:8D:1C:B0:70:DB:0B:A0:DE:98:10:46:0B:4B:B2:0D:B5 460s X509v3 Basic Constraints: 460s CA:FALSE 460s Netscape Cert Type: 460s SSL Client, S/MIME 460s Netscape Comment: 460s Test Organization Root CA trusted Certificate 460s X509v3 Subject Key Identifier: 460s 7E:45:E1:1A:E6:05:B5:7E:DB:16:28:0A:3F:CB:FE:3E:99:1F:17:C7 460s X509v3 Key Usage: critical 460s Digital Signature, Non Repudiation, Key Encipherment 460s X509v3 Extended Key Usage: 460s TLS Web Client Authentication, E-mail Protection 460s X509v3 Subject Alternative Name: 460s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 460s Signature Algorithm: sha256WithRSAEncryption 460s Signature Value: 460s 96:12:5d:d3:39:0f:32:67:e5:03:47:74:18:71:af:9c:fe:02: 460s 12:31:05:66:31:ac:64:65:1f:65:4a:20:89:a0:27:23:89:dc: 460s 53:f5:dd:55:ef:ab:5b:4d:4e:f1:40:bc:eb:a5:ac:31:b6:74: 460s 83:71:c8:5c:e4:4f:a4:d2:2d:e8:c9:ff:e5:fb:a9:a7:8f:3a: 460s 97:fc:d8:4d:d2:91:e9:9f:b9:c1:d8:a6:b1:2b:90:ce:c2:f1: 460s 34:14:9a:c2:c1:26:9f:ec:9c:22:d2:c1:06:4c:f9:ae:bc:aa: 460s 93:a8:cb:e0:e0:5c:a7:ab:43:e1:52:5c:34:f8:49:0a:a8:29: 460s 5d:45 460s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-9bLCCU/SSSD-child-30761-auth.pem 460s + found_md5=Modulus=B2D6417A0BD349713056D927397CBC23337A68BDE97F16C7D12CF76366F57362F8DDC14BC16BCE3D6AECDA547136A3139BBD88204ED07E4B5D022DD547325605FA4317C00A8BDFDC1B7E21EDAA8136BD1C7AF78A085822745314DD7D456E92C8BDED1B3322D0AA26117AAFAF6225150EC7D58BF55016627D94ACE82510F5ADFF 460s + '[' Modulus=B2D6417A0BD349713056D927397CBC23337A68BDE97F16C7D12CF76366F57362F8DDC14BC16BCE3D6AECDA547136A3139BBD88204ED07E4B5D022DD547325605FA4317C00A8BDFDC1B7E21EDAA8136BD1C7AF78A085822745314DD7D456E92C8BDED1B3322D0AA26117AAFAF6225150EC7D58BF55016627D94ACE82510F5ADFF '!=' Modulus=B2D6417A0BD349713056D927397CBC23337A68BDE97F16C7D12CF76366F57362F8DDC14BC16BCE3D6AECDA547136A3139BBD88204ED07E4B5D022DD547325605FA4317C00A8BDFDC1B7E21EDAA8136BD1C7AF78A085822745314DD7D456E92C8BDED1B3322D0AA26117AAFAF6225150EC7D58BF55016627D94ACE82510F5ADFF ']' 460s + valid_certificate /tmp/sssd-softhsm2-9bLCCU/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-24305 /tmp/sssd-softhsm2-9bLCCU/test-full-chain-CA.pem partial_chain 460s + check_certificate /tmp/sssd-softhsm2-9bLCCU/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-24305 /tmp/sssd-softhsm2-9bLCCU/test-full-chain-CA.pem partial_chain 460s + local certificate=/tmp/sssd-softhsm2-9bLCCU/test-root-CA-trusted-certificate-0001.pem 460s + local key_pass=pass:random-root-ca-trusted-cert-0001-24305 460s + local key_ring=/tmp/sssd-softhsm2-9bLCCU/test-full-chain-CA.pem 460s + local verify_option=partial_chain 460s + prepare_softhsm2_card /tmp/sssd-softhsm2-9bLCCU/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-24305 460s + local certificate=/tmp/sssd-softhsm2-9bLCCU/test-root-CA-trusted-certificate-0001.pem 460s + local key_pass=pass:random-root-ca-trusted-cert-0001-24305 460s + local key_cn 460s + local key_name 460s + local tokens_dir 460s + local output_cert_file 460s + token_name= 460s ++ basename /tmp/sssd-softhsm2-9bLCCU/test-root-CA-trusted-certificate-0001.pem .pem 460s + key_name=test-root-CA-trusted-certificate-0001 460s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-9bLCCU/test-root-CA-trusted-certificate-0001.pem 460s ++ sed -n 's/ *commonName *= //p' 460s + key_cn='Test Organization Root Trusted Certificate 0001' 460s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 460s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-9bLCCU/softhsm2-test-root-CA-trusted-certificate-0001.conf 460s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-9bLCCU/softhsm2-test-root-CA-trusted-certificate-0001.conf 460s ++ basename /tmp/sssd-softhsm2-9bLCCU/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 460s + tokens_dir=/tmp/sssd-softhsm2-9bLCCU/softhsm2-test-root-CA-trusted-certificate-0001 460s + token_name='Test Organization Root Tr Token' 460s + '[' '!' -e /tmp/sssd-softhsm2-9bLCCU/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 460s + '[' '!' -d /tmp/sssd-softhsm2-9bLCCU/softhsm2-test-root-CA-trusted-certificate-0001 ']' 460s + echo 'Test Organization Root Tr Token' 460s + '[' -n partial_chain ']' 460s + local verify_arg=--verify=partial_chain 460s + local output_base_name=SSSD-child-8378 460s + local output_file=/tmp/sssd-softhsm2-9bLCCU/SSSD-child-8378.output 460s + output_cert_file=/tmp/sssd-softhsm2-9bLCCU/SSSD-child-8378.pem 460s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-9bLCCU/test-full-chain-CA.pem 460s Test Organization Root Tr Token 460s [p11_child[2446]] [main] (0x0400): p11_child started. 460s [p11_child[2446]] [main] (0x2000): Running in [pre-auth] mode. 460s [p11_child[2446]] [main] (0x2000): Running with effective IDs: [0][0]. 460s [p11_child[2446]] [main] (0x2000): Running with real IDs [0][0]. 460s [p11_child[2446]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 460s [p11_child[2446]] [do_card] (0x4000): Module List: 460s [p11_child[2446]] [do_card] (0x4000): common name: [softhsm2]. 460s [p11_child[2446]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 460s [p11_child[2446]] [do_card] (0x4000): Description [SoftHSM slot ID 0x2d0cb919] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 460s [p11_child[2446]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 460s [p11_child[2446]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x2d0cb919][755808537] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 460s [p11_child[2446]] [do_card] (0x4000): Login NOT required. 460s [p11_child[2446]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 460s [p11_child[2446]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 460s [p11_child[2446]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Root Tr Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 460s [p11_child[2446]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x2d0cb919;slot-manufacturer=SoftHSM%20project;slot-id=755808537;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fe782113ad0cb919;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 460s [p11_child[2446]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 460s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-9bLCCU/SSSD-child-8378.output 460s + echo '-----BEGIN CERTIFICATE-----' 460s + tail -n1 /tmp/sssd-softhsm2-9bLCCU/SSSD-child-8378.output 460s + echo '-----END CERTIFICATE-----' 460s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-9bLCCU/SSSD-child-8378.pem 460s Certificate: 460s Data: 460s Version: 3 (0x2) 460s Serial Number: 3 (0x3) 460s Signature Algorithm: sha256WithRSAEncryption 460s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 460s Validity 460s Not Before: Nov 15 22:51:18 2024 GMT 460s Not After : Nov 15 22:51:18 2025 GMT 460s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 460s Subject Public Key Info: 460s Public Key Algorithm: rsaEncryption 460s Public-Key: (1024 bit) 460s Modulus: 460s 00:b2:d6:41:7a:0b:d3:49:71:30:56:d9:27:39:7c: 460s bc:23:33:7a:68:bd:e9:7f:16:c7:d1:2c:f7:63:66: 460s f5:73:62:f8:dd:c1:4b:c1:6b:ce:3d:6a:ec:da:54: 460s 71:36:a3:13:9b:bd:88:20:4e:d0:7e:4b:5d:02:2d: 460s d5:47:32:56:05:fa:43:17:c0:0a:8b:df:dc:1b:7e: 460s 21:ed:aa:81:36:bd:1c:7a:f7:8a:08:58:22:74:53: 460s 14:dd:7d:45:6e:92:c8:bd:ed:1b:33:22:d0:aa:26: 460s 11:7a:af:af:62:25:15:0e:c7:d5:8b:f5:50:16:62: 460s 7d:94:ac:e8:25:10:f5:ad:ff 460s Exponent: 65537 (0x10001) 460s X509v3 extensions: 460s X509v3 Authority Key Identifier: 460s 8D:29:A7:90:8D:1C:B0:70:DB:0B:A0:DE:98:10:46:0B:4B:B2:0D:B5 460s X509v3 Basic Constraints: 460s CA:FALSE 460s Netscape Cert Type: 460s SSL Client, S/MIME 460s Netscape Comment: 460s Test Organization Root CA trusted Certificate 460s X509v3 Subject Key Identifier: 460s 7E:45:E1:1A:E6:05:B5:7E:DB:16:28:0A:3F:CB:FE:3E:99:1F:17:C7 460s X509v3 Key Usage: critical 460s Digital Signature, Non Repudiation, Key Encipherment 460s X509v3 Extended Key Usage: 460s TLS Web Client Authentication, E-mail Protection 460s X509v3 Subject Alternative Name: 460s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 460s Signature Algorithm: sha256WithRSAEncryption 460s Signature Value: 460s 96:12:5d:d3:39:0f:32:67:e5:03:47:74:18:71:af:9c:fe:02: 460s 12:31:05:66:31:ac:64:65:1f:65:4a:20:89:a0:27:23:89:dc: 460s 53:f5:dd:55:ef:ab:5b:4d:4e:f1:40:bc:eb:a5:ac:31:b6:74: 460s 83:71:c8:5c:e4:4f:a4:d2:2d:e8:c9:ff:e5:fb:a9:a7:8f:3a: 460s 97:fc:d8:4d:d2:91:e9:9f:b9:c1:d8:a6:b1:2b:90:ce:c2:f1: 460s 34:14:9a:c2:c1:26:9f:ec:9c:22:d2:c1:06:4c:f9:ae:bc:aa: 460s 93:a8:cb:e0:e0:5c:a7:ab:43:e1:52:5c:34:f8:49:0a:a8:29: 460s 5d:45 460s + local found_md5 expected_md5 460s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-9bLCCU/test-root-CA-trusted-certificate-0001.pem 460s + expected_md5=Modulus=B2D6417A0BD349713056D927397CBC23337A68BDE97F16C7D12CF76366F57362F8DDC14BC16BCE3D6AECDA547136A3139BBD88204ED07E4B5D022DD547325605FA4317C00A8BDFDC1B7E21EDAA8136BD1C7AF78A085822745314DD7D456E92C8BDED1B3322D0AA26117AAFAF6225150EC7D58BF55016627D94ACE82510F5ADFF 460s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-9bLCCU/SSSD-child-8378.pem 460s + found_md5=Modulus=B2D6417A0BD349713056D927397CBC23337A68BDE97F16C7D12CF76366F57362F8DDC14BC16BCE3D6AECDA547136A3139BBD88204ED07E4B5D022DD547325605FA4317C00A8BDFDC1B7E21EDAA8136BD1C7AF78A085822745314DD7D456E92C8BDED1B3322D0AA26117AAFAF6225150EC7D58BF55016627D94ACE82510F5ADFF 460s + '[' Modulus=B2D6417A0BD349713056D927397CBC23337A68BDE97F16C7D12CF76366F57362F8DDC14BC16BCE3D6AECDA547136A3139BBD88204ED07E4B5D022DD547325605FA4317C00A8BDFDC1B7E21EDAA8136BD1C7AF78A085822745314DD7D456E92C8BDED1B3322D0AA26117AAFAF6225150EC7D58BF55016627D94ACE82510F5ADFF '!=' Modulus=B2D6417A0BD349713056D927397CBC23337A68BDE97F16C7D12CF76366F57362F8DDC14BC16BCE3D6AECDA547136A3139BBD88204ED07E4B5D022DD547325605FA4317C00A8BDFDC1B7E21EDAA8136BD1C7AF78A085822745314DD7D456E92C8BDED1B3322D0AA26117AAFAF6225150EC7D58BF55016627D94ACE82510F5ADFF ']' 460s + output_file=/tmp/sssd-softhsm2-9bLCCU/SSSD-child-8378-auth.output 460s ++ basename /tmp/sssd-softhsm2-9bLCCU/SSSD-child-8378-auth.output .output 460s + output_cert_file=/tmp/sssd-softhsm2-9bLCCU/SSSD-child-8378-auth.pem 460s + echo -n 053350 460s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-9bLCCU/test-full-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Root Tr Token' --module_name /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so 460s [p11_child[2454]] [main] (0x0400): p11_child started. 460s [p11_child[2454]] [main] (0x2000): Running in [auth] mode. 460s [p11_child[2454]] [main] (0x2000): Running with effective IDs: [0][0]. 460s [p11_child[2454]] [main] (0x2000): Running with real IDs [0][0]. 460s [p11_child[2454]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 460s [p11_child[2454]] [do_card] (0x4000): Module List: 460s [p11_child[2454]] [do_card] (0x4000): common name: [softhsm2]. 460s [p11_child[2454]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 460s [p11_child[2454]] [do_card] (0x4000): Description [SoftHSM slot ID 0x2d0cb919] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 460s [p11_child[2454]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 460s [p11_child[2454]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x2d0cb919][755808537] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 460s [p11_child[2454]] [do_card] (0x4000): Login required. 460s [p11_child[2454]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 460s [p11_child[2454]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 460s [p11_child[2454]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so Test Organization Root Tr Token Test Organization Root Tr Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 460s [p11_child[2454]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x2d0cb919;slot-manufacturer=SoftHSM%20project;slot-id=755808537;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fe782113ad0cb919;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 460s [p11_child[2454]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 460s [p11_child[2454]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 460s [p11_child[2454]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 460s [p11_child[2454]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 460s [p11_child[2454]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 460s [p11_child[2454]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 460s [p11_child[2454]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 460s [p11_child[2454]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 460s [p11_child[2454]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 460s [p11_child[2454]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 460s [p11_child[2454]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 460s [p11_child[2454]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 460s [p11_child[2454]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 460s [p11_child[2454]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 460s [p11_child[2454]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 460s [p11_child[2454]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 460s [p11_child[2454]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 460s [p11_child[2454]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 460s [p11_child[2454]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 460s [p11_child[2454]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 460s [p11_child[2454]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 460s [p11_child[2454]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 460s [p11_child[2454]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 460s [p11_child[2454]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 460s [p11_child[2454]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 460s [p11_child[2454]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 460s [p11_child[2454]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 460s [p11_child[2454]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 460s [p11_child[2454]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 460s [p11_child[2454]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 460s [p11_child[2454]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 460s [p11_child[2454]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 460s [p11_child[2454]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 460s [p11_child[2454]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 460s [p11_child[2454]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 460s [p11_child[2454]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 460s [p11_child[2454]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 460s [p11_child[2454]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 460s [p11_child[2454]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 460s [p11_child[2454]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 460s [p11_child[2454]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 460s [p11_child[2454]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 460s [p11_child[2454]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 460s [p11_child[2454]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 460s [p11_child[2454]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 460s [p11_child[2454]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 460s [p11_child[2454]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 460s [p11_child[2454]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 460s [p11_child[2454]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 460s [p11_child[2454]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 460s [p11_child[2454]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 460s [p11_child[2454]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 460s [p11_child[2454]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 460s [p11_child[2454]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 460s [p11_child[2454]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 460s [p11_child[2454]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 460s [p11_child[2454]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 460s [p11_child[2454]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 460s [p11_child[2454]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 460s [p11_child[2454]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 460s [p11_child[2454]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 460s [p11_child[2454]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 460s [p11_child[2454]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 460s [p11_child[2454]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 460s [p11_child[2454]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 460s [p11_child[2454]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 460s [p11_child[2454]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 460s [p11_child[2454]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 460s [p11_child[2454]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 460s [p11_child[2454]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 460s [p11_child[2454]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 460s [p11_child[2454]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 460s [p11_child[2454]] [do_card] (0x4000): Certificate verified and validated. 460s [p11_child[2454]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 460s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-9bLCCU/SSSD-child-8378-auth.output 460s + echo '-----BEGIN CERTIFICATE-----' 460s + tail -n1 /tmp/sssd-softhsm2-9bLCCU/SSSD-child-8378-auth.output 460s + echo '-----END CERTIFICATE-----' 460s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-9bLCCU/SSSD-child-8378-auth.pem 460s Certificate: 460s Data: 460s Version: 3 (0x2) 460s Serial Number: 3 (0x3) 460s Signature Algorithm: sha256WithRSAEncryption 460s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 460s Validity 460s Not Before: Nov 15 22:51:18 2024 GMT 460s Not After : Nov 15 22:51:18 2025 GMT 460s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 460s Subject Public Key Info: 460s Public Key Algorithm: rsaEncryption 460s Public-Key: (1024 bit) 460s Modulus: 460s 00:b2:d6:41:7a:0b:d3:49:71:30:56:d9:27:39:7c: 460s bc:23:33:7a:68:bd:e9:7f:16:c7:d1:2c:f7:63:66: 460s f5:73:62:f8:dd:c1:4b:c1:6b:ce:3d:6a:ec:da:54: 460s 71:36:a3:13:9b:bd:88:20:4e:d0:7e:4b:5d:02:2d: 460s d5:47:32:56:05:fa:43:17:c0:0a:8b:df:dc:1b:7e: 460s 21:ed:aa:81:36:bd:1c:7a:f7:8a:08:58:22:74:53: 460s 14:dd:7d:45:6e:92:c8:bd:ed:1b:33:22:d0:aa:26: 460s 11:7a:af:af:62:25:15:0e:c7:d5:8b:f5:50:16:62: 460s 7d:94:ac:e8:25:10:f5:ad:ff 460s Exponent: 65537 (0x10001) 460s X509v3 extensions: 460s X509v3 Authority Key Identifier: 460s 8D:29:A7:90:8D:1C:B0:70:DB:0B:A0:DE:98:10:46:0B:4B:B2:0D:B5 460s X509v3 Basic Constraints: 460s CA:FALSE 460s Netscape Cert Type: 460s SSL Client, S/MIME 460s Netscape Comment: 460s Test Organization Root CA trusted Certificate 460s X509v3 Subject Key Identifier: 460s 7E:45:E1:1A:E6:05:B5:7E:DB:16:28:0A:3F:CB:FE:3E:99:1F:17:C7 460s X509v3 Key Usage: critical 460s Digital Signature, Non Repudiation, Key Encipherment 460s X509v3 Extended Key Usage: 460s TLS Web Client Authentication, E-mail Protection 460s X509v3 Subject Alternative Name: 460s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 460s Signature Algorithm: sha256WithRSAEncryption 460s Signature Value: 460s 96:12:5d:d3:39:0f:32:67:e5:03:47:74:18:71:af:9c:fe:02: 460s 12:31:05:66:31:ac:64:65:1f:65:4a:20:89:a0:27:23:89:dc: 460s 53:f5:dd:55:ef:ab:5b:4d:4e:f1:40:bc:eb:a5:ac:31:b6:74: 460s 83:71:c8:5c:e4:4f:a4:d2:2d:e8:c9:ff:e5:fb:a9:a7:8f:3a: 460s 97:fc:d8:4d:d2:91:e9:9f:b9:c1:d8:a6:b1:2b:90:ce:c2:f1: 460s 34:14:9a:c2:c1:26:9f:ec:9c:22:d2:c1:06:4c:f9:ae:bc:aa: 460s 93:a8:cb:e0:e0:5c:a7:ab:43:e1:52:5c:34:f8:49:0a:a8:29: 460s 5d:45 460s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-9bLCCU/SSSD-child-8378-auth.pem 460s + found_md5=Modulus=B2D6417A0BD349713056D927397CBC23337A68BDE97F16C7D12CF76366F57362F8DDC14BC16BCE3D6AECDA547136A3139BBD88204ED07E4B5D022DD547325605FA4317C00A8BDFDC1B7E21EDAA8136BD1C7AF78A085822745314DD7D456E92C8BDED1B3322D0AA26117AAFAF6225150EC7D58BF55016627D94ACE82510F5ADFF 460s + '[' Modulus=B2D6417A0BD349713056D927397CBC23337A68BDE97F16C7D12CF76366F57362F8DDC14BC16BCE3D6AECDA547136A3139BBD88204ED07E4B5D022DD547325605FA4317C00A8BDFDC1B7E21EDAA8136BD1C7AF78A085822745314DD7D456E92C8BDED1B3322D0AA26117AAFAF6225150EC7D58BF55016627D94ACE82510F5ADFF '!=' Modulus=B2D6417A0BD349713056D927397CBC23337A68BDE97F16C7D12CF76366F57362F8DDC14BC16BCE3D6AECDA547136A3139BBD88204ED07E4B5D022DD547325605FA4317C00A8BDFDC1B7E21EDAA8136BD1C7AF78A085822745314DD7D456E92C8BDED1B3322D0AA26117AAFAF6225150EC7D58BF55016627D94ACE82510F5ADFF ']' 460s + invalid_certificate /tmp/sssd-softhsm2-9bLCCU/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-24305 /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA.pem 460s + check_certificate /tmp/sssd-softhsm2-9bLCCU/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-24305 /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA.pem 460s + local certificate=/tmp/sssd-softhsm2-9bLCCU/test-root-CA-trusted-certificate-0001.pem 460s + local key_pass=pass:random-root-ca-trusted-cert-0001-24305 460s + local key_ring=/tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA.pem 460s + local verify_option= 460s + prepare_softhsm2_card /tmp/sssd-softhsm2-9bLCCU/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-24305 460s + local certificate=/tmp/sssd-softhsm2-9bLCCU/test-root-CA-trusted-certificate-0001.pem 460s + local key_pass=pass:random-root-ca-trusted-cert-0001-24305 460s + local key_cn 460s + local key_name 460s + local tokens_dir 460s + local output_cert_file 460s + token_name= 460s ++ basename /tmp/sssd-softhsm2-9bLCCU/test-root-CA-trusted-certificate-0001.pem .pem 460s + key_name=test-root-CA-trusted-certificate-0001 460s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-9bLCCU/test-root-CA-trusted-certificate-0001.pem 460s ++ sed -n 's/ *commonName *= //p' 461s + key_cn='Test Organization Root Trusted Certificate 0001' 461s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 461s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-9bLCCU/softhsm2-test-root-CA-trusted-certificate-0001.conf 461s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-9bLCCU/softhsm2-test-root-CA-trusted-certificate-0001.conf 461s ++ basename /tmp/sssd-softhsm2-9bLCCU/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 461s Test Organization Root Tr Token 461s + tokens_dir=/tmp/sssd-softhsm2-9bLCCU/softhsm2-test-root-CA-trusted-certificate-0001 461s + token_name='Test Organization Root Tr Token' 461s + '[' '!' -e /tmp/sssd-softhsm2-9bLCCU/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 461s + '[' '!' -d /tmp/sssd-softhsm2-9bLCCU/softhsm2-test-root-CA-trusted-certificate-0001 ']' 461s + echo 'Test Organization Root Tr Token' 461s + '[' -n '' ']' 461s + local output_base_name=SSSD-child-21556 461s + local output_file=/tmp/sssd-softhsm2-9bLCCU/SSSD-child-21556.output 461s + output_cert_file=/tmp/sssd-softhsm2-9bLCCU/SSSD-child-21556.pem 461s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA.pem 461s [p11_child[2464]] [main] (0x0400): p11_child started. 461s [p11_child[2464]] [main] (0x2000): Running in [pre-auth] mode. 461s [p11_child[2464]] [main] (0x2000): Running with effective IDs: [0][0]. 461s [p11_child[2464]] [main] (0x2000): Running with real IDs [0][0]. 461s [p11_child[2464]] [do_card] (0x4000): Module List: 461s [p11_child[2464]] [do_card] (0x4000): common name: [softhsm2]. 461s [p11_child[2464]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 461s [p11_child[2464]] [do_card] (0x4000): Description [SoftHSM slot ID 0x2d0cb919] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 461s [p11_child[2464]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 461s [p11_child[2464]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x2d0cb919][755808537] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 461s [p11_child[2464]] [do_card] (0x4000): Login NOT required. 461s [p11_child[2464]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 461s [p11_child[2464]] [do_verification] (0x0040): X509_verify_cert failed [0]. 461s [p11_child[2464]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 461s [p11_child[2464]] [read_certs] (0x0040): Certificate [Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] not valid, skipping. 461s [p11_child[2464]] [do_card] (0x4000): No certificate found. 461s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-9bLCCU/SSSD-child-21556.output 461s + return 2 461s + invalid_certificate /tmp/sssd-softhsm2-9bLCCU/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-24305 /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA.pem partial_chain 461s + check_certificate /tmp/sssd-softhsm2-9bLCCU/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-24305 /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA.pem partial_chain 461s + local certificate=/tmp/sssd-softhsm2-9bLCCU/test-root-CA-trusted-certificate-0001.pem 461s + local key_pass=pass:random-root-ca-trusted-cert-0001-24305 461s + local key_ring=/tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA.pem 461s + local verify_option=partial_chain 461s + prepare_softhsm2_card /tmp/sssd-softhsm2-9bLCCU/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-24305 461s + local certificate=/tmp/sssd-softhsm2-9bLCCU/test-root-CA-trusted-certificate-0001.pem 461s + local key_pass=pass:random-root-ca-trusted-cert-0001-24305 461s + local key_cn 461s + local key_name 461s + local tokens_dir 461s + local output_cert_file 461s + token_name= 461s ++ basename /tmp/sssd-softhsm2-9bLCCU/test-root-CA-trusted-certificate-0001.pem .pem 461s + key_name=test-root-CA-trusted-certificate-0001 461s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-9bLCCU/test-root-CA-trusted-certificate-0001.pem 461s ++ sed -n 's/ *commonName *= //p' 461s + key_cn='Test Organization Root Trusted Certificate 0001' 461s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 461s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-9bLCCU/softhsm2-test-root-CA-trusted-certificate-0001.conf 461s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-9bLCCU/softhsm2-test-root-CA-trusted-certificate-0001.conf 461s ++ basename /tmp/sssd-softhsm2-9bLCCU/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 461s Test Organization Root Tr Token 461s + tokens_dir=/tmp/sssd-softhsm2-9bLCCU/softhsm2-test-root-CA-trusted-certificate-0001 461s + token_name='Test Organization Root Tr Token' 461s + '[' '!' -e /tmp/sssd-softhsm2-9bLCCU/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 461s + '[' '!' -d /tmp/sssd-softhsm2-9bLCCU/softhsm2-test-root-CA-trusted-certificate-0001 ']' 461s + echo 'Test Organization Root Tr Token' 461s + '[' -n partial_chain ']' 461s + local verify_arg=--verify=partial_chain 461s + local output_base_name=SSSD-child-15772 461s + local output_file=/tmp/sssd-softhsm2-9bLCCU/SSSD-child-15772.output 461s + output_cert_file=/tmp/sssd-softhsm2-9bLCCU/SSSD-child-15772.pem 461s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA.pem 461s [p11_child[2471]] [main] (0x0400): p11_child started. 461s [p11_child[2471]] [main] (0x2000): Running in [pre-auth] mode. 461s [p11_child[2471]] [main] (0x2000): Running with effective IDs: [0][0]. 461s [p11_child[2471]] [main] (0x2000): Running with real IDs [0][0]. 461s [p11_child[2471]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 461s [p11_child[2471]] [do_card] (0x4000): Module List: 461s [p11_child[2471]] [do_card] (0x4000): common name: [softhsm2]. 461s [p11_child[2471]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 461s [p11_child[2471]] [do_card] (0x4000): Description [SoftHSM slot ID 0x2d0cb919] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 461s [p11_child[2471]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 461s [p11_child[2471]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x2d0cb919][755808537] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 461s [p11_child[2471]] [do_card] (0x4000): Login NOT required. 461s [p11_child[2471]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 461s [p11_child[2471]] [do_verification] (0x0040): X509_verify_cert failed [0]. 461s [p11_child[2471]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 461s [p11_child[2471]] [read_certs] (0x0040): Certificate [Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] not valid, skipping. 461s [p11_child[2471]] [do_card] (0x4000): No certificate found. 461s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-9bLCCU/SSSD-child-15772.output 461s + return 2 461s + invalid_certificate /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-5947 /dev/null 461s + check_certificate /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-5947 /dev/null 461s + local certificate=/tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA-trusted-certificate-0001.pem 461s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-5947 461s + local key_ring=/dev/null 461s + local verify_option= 461s + prepare_softhsm2_card /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-5947 461s + local certificate=/tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA-trusted-certificate-0001.pem 461s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-5947 461s + local key_cn 461s + local key_name 461s + local tokens_dir 461s + local output_cert_file 461s + token_name= 461s ++ basename /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA-trusted-certificate-0001.pem .pem 461s + key_name=test-intermediate-CA-trusted-certificate-0001 461s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA-trusted-certificate-0001.pem 461s ++ sed -n 's/ *commonName *= //p' 461s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 461s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 461s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-9bLCCU/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 461s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-9bLCCU/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 461s ++ basename /tmp/sssd-softhsm2-9bLCCU/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 461s + tokens_dir=/tmp/sssd-softhsm2-9bLCCU/softhsm2-test-intermediate-CA-trusted-certificate-0001 461s + token_name='Test Organization Interme Token' 461s + '[' '!' -e /tmp/sssd-softhsm2-9bLCCU/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 461s + local key_file 461s + local decrypted_key 461s + mkdir -p /tmp/sssd-softhsm2-9bLCCU/softhsm2-test-intermediate-CA-trusted-certificate-0001 461s + key_file=/tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA-trusted-certificate-0001-key.pem 461s + decrypted_key=/tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 461s + cat 461s + softhsm2-util --init-token --label 'Test Organization Interme Token' --pin 053350 --so-pin 053350 --free 461s Slot 0 has a free/uninitialized token. 461s The token has been initialized and is reassigned to slot 439199886 461s + softhsm2-util --show-slots 461s Available slots: 461s Slot 439199886 461s Slot info: 461s Description: SoftHSM slot ID 0x1a2da88e 461s Manufacturer ID: SoftHSM project 461s Hardware version: 2.6 461s Firmware version: 2.6 461s Token present: yes 461s Token info: 461s Manufacturer ID: SoftHSM project 461s Model: SoftHSM v2 461s Hardware version: 2.6 461s Firmware version: 2.6 461s Serial number: 74526afe1a2da88e 461s Initialized: yes 461s User PIN init.: yes 461s Label: Test Organization Interme Token 461s Slot 1 461s Slot info: 461s Description: SoftHSM slot ID 0x1 461s Manufacturer ID: SoftHSM project 461s Hardware version: 2.6 461s Firmware version: 2.6 461s Token present: yes 461s Token info: 461s Manufacturer ID: SoftHSM project 461s Model: SoftHSM v2 461s Hardware version: 2.6 461s Firmware version: 2.6 461s Serial number: 461s Initialized: no 461s User PIN init.: no 461s Label: 461s + p11tool --provider=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --write --no-mark-private --load-certificate=/tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA-trusted-certificate-0001.pem --login --set-pin=053350 --label 'Test Organization Intermediate Trusted Certificate 0001' --id 00112233445566778899FFAABBCCDDEEFF012345 461s + openssl rsa -passin pass:random-intermediate-ca-trusted-cert-0001-5947 -in /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA-trusted-certificate-0001-key.pem -out /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 461s writing RSA key 461s + p11tool --provider=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --write --load-privkey=/tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem --login --set-pin=053350 --label 'Test Organization Intermediate Trusted Certificate 0001 Key' --id 00112233445566778899FFAABBCCDDEEFF012345 461s + rm /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 461s + p11tool --provider=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --list-all 461s Object 0: 461s URL: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=74526afe1a2da88e;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert 461s Type: X.509 Certificate (RSA-1024) 461s Expires: Sat Nov 15 22:51:18 2025 461s Label: Test Organization Intermediate Trusted Certificate 0001 461s ID: 00:11:22:33:44:55:66:77:88:99:ff:aa:bb:cc:dd:ee:ff:01:23:45 461s 461s Test Organization Interme Token 461s + echo 'Test Organization Interme Token' 461s + '[' -n '' ']' 461s + local output_base_name=SSSD-child-29586 461s + local output_file=/tmp/sssd-softhsm2-9bLCCU/SSSD-child-29586.output 461s + output_cert_file=/tmp/sssd-softhsm2-9bLCCU/SSSD-child-29586.pem 461s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/dev/null 461s [p11_child[2487]] [main] (0x0400): p11_child started. 461s [p11_child[2487]] [main] (0x2000): Running in [pre-auth] mode. 461s [p11_child[2487]] [main] (0x2000): Running with effective IDs: [0][0]. 461s [p11_child[2487]] [main] (0x2000): Running with real IDs [0][0]. 461s [p11_child[2487]] [init_verification] (0x0040): X509_LOOKUP_load_file [/dev/null] failed [92274824][error:05800088:x509 certificate routines::no certificate or crl found]. 461s [p11_child[2487]] [do_work] (0x0040): init_verification failed. 461s [p11_child[2487]] [main] (0x0020): p11_child failed (5) 461s + return 2 461s + valid_certificate /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-5947 /dev/null no_verification 461s + check_certificate /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-5947 /dev/null no_verification 461s + local certificate=/tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA-trusted-certificate-0001.pem 461s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-5947 461s + local key_ring=/dev/null 461s + local verify_option=no_verification 461s + prepare_softhsm2_card /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-5947 461s + local certificate=/tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA-trusted-certificate-0001.pem 461s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-5947 461s + local key_cn 461s + local key_name 461s + local tokens_dir 461s + local output_cert_file 461s + token_name= 461s ++ basename /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA-trusted-certificate-0001.pem .pem 461s + key_name=test-intermediate-CA-trusted-certificate-0001 461s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA-trusted-certificate-0001.pem 461s ++ sed -n 's/ *commonName *= //p' 461s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 461s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 461s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-9bLCCU/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 461s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-9bLCCU/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 461s ++ basename /tmp/sssd-softhsm2-9bLCCU/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 461s Test Organization Interme Token 461s + tokens_dir=/tmp/sssd-softhsm2-9bLCCU/softhsm2-test-intermediate-CA-trusted-certificate-0001 461s + token_name='Test Organization Interme Token' 461s + '[' '!' -e /tmp/sssd-softhsm2-9bLCCU/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 461s + '[' '!' -d /tmp/sssd-softhsm2-9bLCCU/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 461s + echo 'Test Organization Interme Token' 461s + '[' -n no_verification ']' 461s + local verify_arg=--verify=no_verification 461s + local output_base_name=SSSD-child-17146 461s + local output_file=/tmp/sssd-softhsm2-9bLCCU/SSSD-child-17146.output 461s + output_cert_file=/tmp/sssd-softhsm2-9bLCCU/SSSD-child-17146.pem 461s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --verify=no_verification --ca_db=/dev/null 461s [p11_child[2493]] [main] (0x0400): p11_child started. 461s [p11_child[2493]] [main] (0x2000): Running in [pre-auth] mode. 461s [p11_child[2493]] [main] (0x2000): Running with effective IDs: [0][0]. 461s [p11_child[2493]] [main] (0x2000): Running with real IDs [0][0]. 461s [p11_child[2493]] [parse_cert_verify_opts] (0x0020): Found 'no_verification' option, disabling verification completely. This should not be used in production. 461s [p11_child[2493]] [do_card] (0x4000): Module List: 461s [p11_child[2493]] [do_card] (0x4000): common name: [softhsm2]. 461s [p11_child[2493]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 461s [p11_child[2493]] [do_card] (0x4000): Description [SoftHSM slot ID 0x1a2da88e] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 461s [p11_child[2493]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 461s [p11_child[2493]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x1a2da88e][439199886] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 461s [p11_child[2493]] [do_card] (0x4000): Login NOT required. 461s [p11_child[2493]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 461s [p11_child[2493]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Interme Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 461s [p11_child[2493]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x1a2da88e;slot-manufacturer=SoftHSM%20project;slot-id=439199886;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=74526afe1a2da88e;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 461s [p11_child[2493]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 461s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-9bLCCU/SSSD-child-17146.output 461s + echo '-----BEGIN CERTIFICATE-----' 461s + tail -n1 /tmp/sssd-softhsm2-9bLCCU/SSSD-child-17146.output 461s + echo '-----END CERTIFICATE-----' 461s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-9bLCCU/SSSD-child-17146.pem 461s Certificate: 461s Data: 461s Version: 3 (0x2) 461s Serial Number: 4 (0x4) 461s Signature Algorithm: sha256WithRSAEncryption 461s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 461s Validity 461s Not Before: Nov 15 22:51:18 2024 GMT 461s Not After : Nov 15 22:51:18 2025 GMT 461s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 461s Subject Public Key Info: 461s Public Key Algorithm: rsaEncryption 461s Public-Key: (1024 bit) 461s Modulus: 461s 00:cb:05:ec:d1:66:37:ba:27:9f:b9:fa:d4:47:42: 461s 49:66:35:0e:34:72:86:b2:a2:f8:e3:7c:69:94:da: 461s a9:6d:f4:c1:5d:2e:8b:45:55:e1:55:f1:1a:16:5f: 461s 19:b7:1b:44:ee:f2:2d:50:b0:6b:14:84:3f:4c:8b: 461s e3:b1:9b:4a:b9:b4:84:1e:db:bd:1e:69:54:50:f3: 461s d9:7c:35:9c:60:af:90:32:25:23:18:40:18:d2:23: 461s 86:54:e6:6b:8e:b9:a2:a9:71:fe:f7:a6:89:69:ce: 461s 8c:03:42:e7:73:7d:60:f4:9d:89:85:64:89:18:7a: 461s 00:48:47:e5:66:4a:21:cd:c9 461s Exponent: 65537 (0x10001) 461s X509v3 extensions: 461s X509v3 Authority Key Identifier: 461s 27:41:83:33:0F:3B:D1:38:5D:23:3B:2D:5F:C0:22:A2:98:49:19:00 461s X509v3 Basic Constraints: 461s CA:FALSE 461s Netscape Cert Type: 461s SSL Client, S/MIME 461s Netscape Comment: 461s Test Organization Intermediate CA trusted Certificate 461s X509v3 Subject Key Identifier: 461s 0E:DB:57:94:43:BC:1C:09:B9:2E:AE:06:E4:E3:90:0C:65:2D:C4:54 461s X509v3 Key Usage: critical 461s Digital Signature, Non Repudiation, Key Encipherment 461s X509v3 Extended Key Usage: 461s TLS Web Client Authentication, E-mail Protection 461s X509v3 Subject Alternative Name: 461s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 461s Signature Algorithm: sha256WithRSAEncryption 461s Signature Value: 461s 39:94:d0:47:70:c3:86:19:7b:3d:8b:72:65:02:8f:3b:8c:ce: 461s 2b:ef:48:72:51:c5:49:90:05:7b:f0:e9:6c:60:be:f9:86:9c: 461s 79:1b:8f:7e:4e:4a:61:c7:c4:e6:1e:99:20:6c:24:2e:41:4b: 461s 8e:36:32:71:ad:69:ab:d3:5b:37:3f:79:2a:9e:9b:c3:d4:c4: 461s d7:bd:38:86:1f:ae:57:9c:1b:2c:25:99:13:8a:03:0f:5c:eb: 461s b4:82:74:69:4e:f9:0d:2e:11:3c:a9:24:89:4d:ab:f8:ae:4b: 461s dd:59:38:4d:e1:82:f4:db:f8:ba:87:8c:bb:36:06:30:8c:25: 461s af:d1 461s + local found_md5 expected_md5 461s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA-trusted-certificate-0001.pem 461s + expected_md5=Modulus=CB05ECD16637BA279FB9FAD447424966350E347286B2A2F8E37C6994DAA96DF4C15D2E8B4555E155F11A165F19B71B44EEF22D50B06B14843F4C8BE3B19B4AB9B4841EDBBD1E695450F3D97C359C60AF90322523184018D2238654E66B8EB9A2A971FEF7A68969CE8C0342E7737D60F49D89856489187A004847E5664A21CDC9 461s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-9bLCCU/SSSD-child-17146.pem 461s + found_md5=Modulus=CB05ECD16637BA279FB9FAD447424966350E347286B2A2F8E37C6994DAA96DF4C15D2E8B4555E155F11A165F19B71B44EEF22D50B06B14843F4C8BE3B19B4AB9B4841EDBBD1E695450F3D97C359C60AF90322523184018D2238654E66B8EB9A2A971FEF7A68969CE8C0342E7737D60F49D89856489187A004847E5664A21CDC9 461s + '[' Modulus=CB05ECD16637BA279FB9FAD447424966350E347286B2A2F8E37C6994DAA96DF4C15D2E8B4555E155F11A165F19B71B44EEF22D50B06B14843F4C8BE3B19B4AB9B4841EDBBD1E695450F3D97C359C60AF90322523184018D2238654E66B8EB9A2A971FEF7A68969CE8C0342E7737D60F49D89856489187A004847E5664A21CDC9 '!=' Modulus=CB05ECD16637BA279FB9FAD447424966350E347286B2A2F8E37C6994DAA96DF4C15D2E8B4555E155F11A165F19B71B44EEF22D50B06B14843F4C8BE3B19B4AB9B4841EDBBD1E695450F3D97C359C60AF90322523184018D2238654E66B8EB9A2A971FEF7A68969CE8C0342E7737D60F49D89856489187A004847E5664A21CDC9 ']' 461s + output_file=/tmp/sssd-softhsm2-9bLCCU/SSSD-child-17146-auth.output 461s ++ basename /tmp/sssd-softhsm2-9bLCCU/SSSD-child-17146-auth.output .output 461s + output_cert_file=/tmp/sssd-softhsm2-9bLCCU/SSSD-child-17146-auth.pem 461s + echo -n 053350 461s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/dev/null --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=no_verification --token_name 'Test Organization Interme Token' --module_name /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so 461s [p11_child[2501]] [main] (0x0400): p11_child started. 461s [p11_child[2501]] [main] (0x2000): Running in [auth] mode. 461s [p11_child[2501]] [main] (0x2000): Running with effective IDs: [0][0]. 461s [p11_child[2501]] [main] (0x2000): Running with real IDs [0][0]. 461s [p11_child[2501]] [parse_cert_verify_opts] (0x0020): Found 'no_verification' option, disabling verification completely. This should not be used in production. 461s [p11_child[2501]] [do_card] (0x4000): Module List: 461s [p11_child[2501]] [do_card] (0x4000): common name: [softhsm2]. 461s [p11_child[2501]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 461s [p11_child[2501]] [do_card] (0x4000): Description [SoftHSM slot ID 0x1a2da88e] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 461s [p11_child[2501]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 461s [p11_child[2501]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x1a2da88e][439199886] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 461s [p11_child[2501]] [do_card] (0x4000): Login required. 461s [p11_child[2501]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 461s [p11_child[2501]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so Test Organization Interme Token Test Organization Interme Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 461s [p11_child[2501]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x1a2da88e;slot-manufacturer=SoftHSM%20project;slot-id=439199886;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=74526afe1a2da88e;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 461s [p11_child[2501]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 461s [p11_child[2501]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 461s [p11_child[2501]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 461s [p11_child[2501]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 461s [p11_child[2501]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 461s [p11_child[2501]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 461s [p11_child[2501]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 461s [p11_child[2501]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 461s [p11_child[2501]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 461s [p11_child[2501]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 461s [p11_child[2501]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 461s [p11_child[2501]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 461s [p11_child[2501]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 461s [p11_child[2501]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 461s [p11_child[2501]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 461s [p11_child[2501]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 461s [p11_child[2501]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 461s [p11_child[2501]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 461s [p11_child[2501]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 461s [p11_child[2501]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 461s [p11_child[2501]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 461s [p11_child[2501]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 461s [p11_child[2501]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 461s [p11_child[2501]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 461s [p11_child[2501]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 461s [p11_child[2501]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 461s [p11_child[2501]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 461s [p11_child[2501]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 461s [p11_child[2501]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 461s [p11_child[2501]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 461s [p11_child[2501]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 461s [p11_child[2501]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 461s [p11_child[2501]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 461s [p11_child[2501]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 461s [p11_child[2501]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 461s [p11_child[2501]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 461s [p11_child[2501]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 461s [p11_child[2501]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 461s [p11_child[2501]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 461s [p11_child[2501]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 461s [p11_child[2501]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 461s [p11_child[2501]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 461s [p11_child[2501]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 461s [p11_child[2501]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 461s [p11_child[2501]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 461s [p11_child[2501]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 461s [p11_child[2501]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 461s [p11_child[2501]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 461s [p11_child[2501]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 461s [p11_child[2501]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 461s [p11_child[2501]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 461s [p11_child[2501]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 461s [p11_child[2501]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 461s [p11_child[2501]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 461s [p11_child[2501]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 461s [p11_child[2501]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 461s [p11_child[2501]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 461s [p11_child[2501]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 461s [p11_child[2501]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 461s [p11_child[2501]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 461s [p11_child[2501]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 461s [p11_child[2501]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 461s [p11_child[2501]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 461s [p11_child[2501]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 461s [p11_child[2501]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 461s [p11_child[2501]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 461s [p11_child[2501]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 461s [p11_child[2501]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 461s [p11_child[2501]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 461s [p11_child[2501]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 461s [p11_child[2501]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 461s [p11_child[2501]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 461s [p11_child[2501]] [do_card] (0x4000): Certificate verified and validated. 461s [p11_child[2501]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 461s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-9bLCCU/SSSD-child-17146-auth.output 461s + echo '-----BEGIN CERTIFICATE-----' 461s + tail -n1 /tmp/sssd-softhsm2-9bLCCU/SSSD-child-17146-auth.output 461s + echo '-----END CERTIFICATE-----' 461s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-9bLCCU/SSSD-child-17146-auth.pem 461s Certificate: 461s Data: 461s Version: 3 (0x2) 461s Serial Number: 4 (0x4) 461s Signature Algorithm: sha256WithRSAEncryption 461s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 461s Validity 461s Not Before: Nov 15 22:51:18 2024 GMT 461s Not After : Nov 15 22:51:18 2025 GMT 461s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 461s Subject Public Key Info: 461s Public Key Algorithm: rsaEncryption 461s Public-Key: (1024 bit) 461s Modulus: 461s 00:cb:05:ec:d1:66:37:ba:27:9f:b9:fa:d4:47:42: 461s 49:66:35:0e:34:72:86:b2:a2:f8:e3:7c:69:94:da: 461s a9:6d:f4:c1:5d:2e:8b:45:55:e1:55:f1:1a:16:5f: 461s 19:b7:1b:44:ee:f2:2d:50:b0:6b:14:84:3f:4c:8b: 461s e3:b1:9b:4a:b9:b4:84:1e:db:bd:1e:69:54:50:f3: 461s d9:7c:35:9c:60:af:90:32:25:23:18:40:18:d2:23: 461s 86:54:e6:6b:8e:b9:a2:a9:71:fe:f7:a6:89:69:ce: 461s 8c:03:42:e7:73:7d:60:f4:9d:89:85:64:89:18:7a: 461s 00:48:47:e5:66:4a:21:cd:c9 461s Exponent: 65537 (0x10001) 461s X509v3 extensions: 461s X509v3 Authority Key Identifier: 461s 27:41:83:33:0F:3B:D1:38:5D:23:3B:2D:5F:C0:22:A2:98:49:19:00 461s X509v3 Basic Constraints: 461s CA:FALSE 461s Netscape Cert Type: 461s SSL Client, S/MIME 461s Netscape Comment: 461s Test Organization Intermediate CA trusted Certificate 461s X509v3 Subject Key Identifier: 461s 0E:DB:57:94:43:BC:1C:09:B9:2E:AE:06:E4:E3:90:0C:65:2D:C4:54 461s X509v3 Key Usage: critical 461s Digital Signature, Non Repudiation, Key Encipherment 461s X509v3 Extended Key Usage: 461s TLS Web Client Authentication, E-mail Protection 461s X509v3 Subject Alternative Name: 461s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 461s Signature Algorithm: sha256WithRSAEncryption 461s Signature Value: 461s 39:94:d0:47:70:c3:86:19:7b:3d:8b:72:65:02:8f:3b:8c:ce: 461s 2b:ef:48:72:51:c5:49:90:05:7b:f0:e9:6c:60:be:f9:86:9c: 461s 79:1b:8f:7e:4e:4a:61:c7:c4:e6:1e:99:20:6c:24:2e:41:4b: 461s 8e:36:32:71:ad:69:ab:d3:5b:37:3f:79:2a:9e:9b:c3:d4:c4: 461s d7:bd:38:86:1f:ae:57:9c:1b:2c:25:99:13:8a:03:0f:5c:eb: 461s b4:82:74:69:4e:f9:0d:2e:11:3c:a9:24:89:4d:ab:f8:ae:4b: 461s dd:59:38:4d:e1:82:f4:db:f8:ba:87:8c:bb:36:06:30:8c:25: 461s af:d1 461s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-9bLCCU/SSSD-child-17146-auth.pem 461s + found_md5=Modulus=CB05ECD16637BA279FB9FAD447424966350E347286B2A2F8E37C6994DAA96DF4C15D2E8B4555E155F11A165F19B71B44EEF22D50B06B14843F4C8BE3B19B4AB9B4841EDBBD1E695450F3D97C359C60AF90322523184018D2238654E66B8EB9A2A971FEF7A68969CE8C0342E7737D60F49D89856489187A004847E5664A21CDC9 461s + '[' Modulus=CB05ECD16637BA279FB9FAD447424966350E347286B2A2F8E37C6994DAA96DF4C15D2E8B4555E155F11A165F19B71B44EEF22D50B06B14843F4C8BE3B19B4AB9B4841EDBBD1E695450F3D97C359C60AF90322523184018D2238654E66B8EB9A2A971FEF7A68969CE8C0342E7737D60F49D89856489187A004847E5664A21CDC9 '!=' Modulus=CB05ECD16637BA279FB9FAD447424966350E347286B2A2F8E37C6994DAA96DF4C15D2E8B4555E155F11A165F19B71B44EEF22D50B06B14843F4C8BE3B19B4AB9B4841EDBBD1E695450F3D97C359C60AF90322523184018D2238654E66B8EB9A2A971FEF7A68969CE8C0342E7737D60F49D89856489187A004847E5664A21CDC9 ']' 461s + invalid_certificate /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-5947 /tmp/sssd-softhsm2-9bLCCU/test-root-CA.pem 461s + check_certificate /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-5947 /tmp/sssd-softhsm2-9bLCCU/test-root-CA.pem 461s + local certificate=/tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA-trusted-certificate-0001.pem 461s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-5947 461s + local key_ring=/tmp/sssd-softhsm2-9bLCCU/test-root-CA.pem 461s + local verify_option= 461s + prepare_softhsm2_card /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-5947 461s + local certificate=/tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA-trusted-certificate-0001.pem 461s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-5947 461s + local key_cn 461s + local key_name 461s + local tokens_dir 461s + local output_cert_file 461s + token_name= 461s ++ basename /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA-trusted-certificate-0001.pem .pem 461s + key_name=test-intermediate-CA-trusted-certificate-0001 461s ++ sed -n 's/ *commonName *= //p' 461s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA-trusted-certificate-0001.pem 461s Test Organization Interme Token 461s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 461s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 461s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-9bLCCU/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 461s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-9bLCCU/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 461s ++ basename /tmp/sssd-softhsm2-9bLCCU/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 461s + tokens_dir=/tmp/sssd-softhsm2-9bLCCU/softhsm2-test-intermediate-CA-trusted-certificate-0001 461s + token_name='Test Organization Interme Token' 461s + '[' '!' -e /tmp/sssd-softhsm2-9bLCCU/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 461s + '[' '!' -d /tmp/sssd-softhsm2-9bLCCU/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 461s + echo 'Test Organization Interme Token' 461s + '[' -n '' ']' 461s + local output_base_name=SSSD-child-17708 461s + local output_file=/tmp/sssd-softhsm2-9bLCCU/SSSD-child-17708.output 461s + output_cert_file=/tmp/sssd-softhsm2-9bLCCU/SSSD-child-17708.pem 461s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-9bLCCU/test-root-CA.pem 461s [p11_child[2511]] [main] (0x0400): p11_child started. 461s [p11_child[2511]] [main] (0x2000): Running in [pre-auth] mode. 461s [p11_child[2511]] [main] (0x2000): Running with effective IDs: [0][0]. 461s [p11_child[2511]] [main] (0x2000): Running with real IDs [0][0]. 461s [p11_child[2511]] [do_card] (0x4000): Module List: 461s [p11_child[2511]] [do_card] (0x4000): common name: [softhsm2]. 462s [p11_child[2511]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 462s [p11_child[2511]] [do_card] (0x4000): Description [SoftHSM slot ID 0x1a2da88e] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 462s [p11_child[2511]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 462s [p11_child[2511]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x1a2da88e][439199886] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 462s [p11_child[2511]] [do_card] (0x4000): Login NOT required. 462s [p11_child[2511]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 462s [p11_child[2511]] [do_verification] (0x0040): X509_verify_cert failed [0]. 462s [p11_child[2511]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 462s [p11_child[2511]] [read_certs] (0x0040): Certificate [Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] not valid, skipping. 462s [p11_child[2511]] [do_card] (0x4000): No certificate found. 462s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-9bLCCU/SSSD-child-17708.output 462s + return 2 462s + invalid_certificate /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-5947 /tmp/sssd-softhsm2-9bLCCU/test-root-CA.pem partial_chain 462s + check_certificate /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-5947 /tmp/sssd-softhsm2-9bLCCU/test-root-CA.pem partial_chain 462s + local certificate=/tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA-trusted-certificate-0001.pem 462s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-5947 462s + local key_ring=/tmp/sssd-softhsm2-9bLCCU/test-root-CA.pem 462s + local verify_option=partial_chain 462s + prepare_softhsm2_card /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-5947 462s + local certificate=/tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA-trusted-certificate-0001.pem 462s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-5947 462s + local key_cn 462s + local key_name 462s + local tokens_dir 462s + local output_cert_file 462s + token_name= 462s ++ basename /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA-trusted-certificate-0001.pem .pem 462s + key_name=test-intermediate-CA-trusted-certificate-0001 462s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA-trusted-certificate-0001.pem 462s ++ sed -n 's/ *commonName *= //p' 462s Test Organization Interme Token 462s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 462s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 462s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-9bLCCU/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 462s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-9bLCCU/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 462s ++ basename /tmp/sssd-softhsm2-9bLCCU/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 462s + tokens_dir=/tmp/sssd-softhsm2-9bLCCU/softhsm2-test-intermediate-CA-trusted-certificate-0001 462s + token_name='Test Organization Interme Token' 462s + '[' '!' -e /tmp/sssd-softhsm2-9bLCCU/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 462s + '[' '!' -d /tmp/sssd-softhsm2-9bLCCU/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 462s + echo 'Test Organization Interme Token' 462s + '[' -n partial_chain ']' 462s + local verify_arg=--verify=partial_chain 462s + local output_base_name=SSSD-child-8925 462s + local output_file=/tmp/sssd-softhsm2-9bLCCU/SSSD-child-8925.output 462s + output_cert_file=/tmp/sssd-softhsm2-9bLCCU/SSSD-child-8925.pem 462s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-9bLCCU/test-root-CA.pem 462s [p11_child[2518]] [main] (0x0400): p11_child started. 462s [p11_child[2518]] [main] (0x2000): Running in [pre-auth] mode. 462s [p11_child[2518]] [main] (0x2000): Running with effective IDs: [0][0]. 462s [p11_child[2518]] [main] (0x2000): Running with real IDs [0][0]. 462s [p11_child[2518]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 462s [p11_child[2518]] [do_card] (0x4000): Module List: 462s [p11_child[2518]] [do_card] (0x4000): common name: [softhsm2]. 462s [p11_child[2518]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 462s [p11_child[2518]] [do_card] (0x4000): Description [SoftHSM slot ID 0x1a2da88e] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 462s [p11_child[2518]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 462s [p11_child[2518]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x1a2da88e][439199886] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 462s [p11_child[2518]] [do_card] (0x4000): Login NOT required. 462s [p11_child[2518]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 462s [p11_child[2518]] [do_verification] (0x0040): X509_verify_cert failed [0]. 462s [p11_child[2518]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 462s [p11_child[2518]] [read_certs] (0x0040): Certificate [Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] not valid, skipping. 462s [p11_child[2518]] [do_card] (0x4000): No certificate found. 462s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-9bLCCU/SSSD-child-8925.output 462s + return 2 462s + valid_certificate /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-5947 /tmp/sssd-softhsm2-9bLCCU/test-full-chain-CA.pem 462s + check_certificate /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-5947 /tmp/sssd-softhsm2-9bLCCU/test-full-chain-CA.pem 462s + local certificate=/tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA-trusted-certificate-0001.pem 462s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-5947 462s + local key_ring=/tmp/sssd-softhsm2-9bLCCU/test-full-chain-CA.pem 462s + local verify_option= 462s + prepare_softhsm2_card /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-5947 462s + local certificate=/tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA-trusted-certificate-0001.pem 462s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-5947 462s + local key_cn 462s + local key_name 462s + local tokens_dir 462s + local output_cert_file 462s + token_name= 462s ++ basename /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA-trusted-certificate-0001.pem .pem 462s + key_name=test-intermediate-CA-trusted-certificate-0001 462s ++ sed -n 's/ *commonName *= //p' 462s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA-trusted-certificate-0001.pem 462s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 462s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 462s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-9bLCCU/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 462s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-9bLCCU/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 462s ++ basename /tmp/sssd-softhsm2-9bLCCU/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 462s + tokens_dir=/tmp/sssd-softhsm2-9bLCCU/softhsm2-test-intermediate-CA-trusted-certificate-0001 462s + token_name='Test Organization Interme Token' 462s + '[' '!' -e /tmp/sssd-softhsm2-9bLCCU/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 462s + '[' '!' -d /tmp/sssd-softhsm2-9bLCCU/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 462s + echo 'Test Organization Interme Token' 462s + '[' -n '' ']' 462s + local output_base_name=SSSD-child-5332 462s + local output_file=/tmp/sssd-softhsm2-9bLCCU/SSSD-child-5332.output 462s + output_cert_file=/tmp/sssd-softhsm2-9bLCCU/SSSD-child-5332.pem 462s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-9bLCCU/test-full-chain-CA.pem 462s Test Organization Interme Token 462s [p11_child[2525]] [main] (0x0400): p11_child started. 462s [p11_child[2525]] [main] (0x2000): Running in [pre-auth] mode. 462s [p11_child[2525]] [main] (0x2000): Running with effective IDs: [0][0]. 462s [p11_child[2525]] [main] (0x2000): Running with real IDs [0][0]. 462s [p11_child[2525]] [do_card] (0x4000): Module List: 462s [p11_child[2525]] [do_card] (0x4000): common name: [softhsm2]. 462s [p11_child[2525]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 462s [p11_child[2525]] [do_card] (0x4000): Description [SoftHSM slot ID 0x1a2da88e] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 462s [p11_child[2525]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 462s [p11_child[2525]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x1a2da88e][439199886] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 462s [p11_child[2525]] [do_card] (0x4000): Login NOT required. 462s [p11_child[2525]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 462s [p11_child[2525]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 462s [p11_child[2525]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Interme Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 462s [p11_child[2525]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x1a2da88e;slot-manufacturer=SoftHSM%20project;slot-id=439199886;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=74526afe1a2da88e;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 462s [p11_child[2525]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 462s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-9bLCCU/SSSD-child-5332.output 462s + echo '-----BEGIN CERTIFICATE-----' 462s + tail -n1 /tmp/sssd-softhsm2-9bLCCU/SSSD-child-5332.output 462s + echo '-----END CERTIFICATE-----' 462s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-9bLCCU/SSSD-child-5332.pem 462s Certificate: 462s Data: 462s Version: 3 (0x2) 462s Serial Number: 4 (0x4) 462s Signature Algorithm: sha256WithRSAEncryption 462s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 462s Validity 462s Not Before: Nov 15 22:51:18 2024 GMT 462s Not After : Nov 15 22:51:18 2025 GMT 462s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 462s Subject Public Key Info: 462s Public Key Algorithm: rsaEncryption 462s Public-Key: (1024 bit) 462s Modulus: 462s 00:cb:05:ec:d1:66:37:ba:27:9f:b9:fa:d4:47:42: 462s 49:66:35:0e:34:72:86:b2:a2:f8:e3:7c:69:94:da: 462s a9:6d:f4:c1:5d:2e:8b:45:55:e1:55:f1:1a:16:5f: 462s 19:b7:1b:44:ee:f2:2d:50:b0:6b:14:84:3f:4c:8b: 462s e3:b1:9b:4a:b9:b4:84:1e:db:bd:1e:69:54:50:f3: 462s d9:7c:35:9c:60:af:90:32:25:23:18:40:18:d2:23: 462s 86:54:e6:6b:8e:b9:a2:a9:71:fe:f7:a6:89:69:ce: 462s 8c:03:42:e7:73:7d:60:f4:9d:89:85:64:89:18:7a: 462s 00:48:47:e5:66:4a:21:cd:c9 462s Exponent: 65537 (0x10001) 462s X509v3 extensions: 462s X509v3 Authority Key Identifier: 462s 27:41:83:33:0F:3B:D1:38:5D:23:3B:2D:5F:C0:22:A2:98:49:19:00 462s X509v3 Basic Constraints: 462s CA:FALSE 462s Netscape Cert Type: 462s SSL Client, S/MIME 462s Netscape Comment: 462s Test Organization Intermediate CA trusted Certificate 462s X509v3 Subject Key Identifier: 462s 0E:DB:57:94:43:BC:1C:09:B9:2E:AE:06:E4:E3:90:0C:65:2D:C4:54 462s X509v3 Key Usage: critical 462s Digital Signature, Non Repudiation, Key Encipherment 462s X509v3 Extended Key Usage: 462s TLS Web Client Authentication, E-mail Protection 462s X509v3 Subject Alternative Name: 462s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 462s Signature Algorithm: sha256WithRSAEncryption 462s Signature Value: 462s 39:94:d0:47:70:c3:86:19:7b:3d:8b:72:65:02:8f:3b:8c:ce: 462s 2b:ef:48:72:51:c5:49:90:05:7b:f0:e9:6c:60:be:f9:86:9c: 462s 79:1b:8f:7e:4e:4a:61:c7:c4:e6:1e:99:20:6c:24:2e:41:4b: 462s 8e:36:32:71:ad:69:ab:d3:5b:37:3f:79:2a:9e:9b:c3:d4:c4: 462s d7:bd:38:86:1f:ae:57:9c:1b:2c:25:99:13:8a:03:0f:5c:eb: 462s b4:82:74:69:4e:f9:0d:2e:11:3c:a9:24:89:4d:ab:f8:ae:4b: 462s dd:59:38:4d:e1:82:f4:db:f8:ba:87:8c:bb:36:06:30:8c:25: 462s af:d1 462s + local found_md5 expected_md5 462s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA-trusted-certificate-0001.pem 462s + expected_md5=Modulus=CB05ECD16637BA279FB9FAD447424966350E347286B2A2F8E37C6994DAA96DF4C15D2E8B4555E155F11A165F19B71B44EEF22D50B06B14843F4C8BE3B19B4AB9B4841EDBBD1E695450F3D97C359C60AF90322523184018D2238654E66B8EB9A2A971FEF7A68969CE8C0342E7737D60F49D89856489187A004847E5664A21CDC9 462s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-9bLCCU/SSSD-child-5332.pem 462s + found_md5=Modulus=CB05ECD16637BA279FB9FAD447424966350E347286B2A2F8E37C6994DAA96DF4C15D2E8B4555E155F11A165F19B71B44EEF22D50B06B14843F4C8BE3B19B4AB9B4841EDBBD1E695450F3D97C359C60AF90322523184018D2238654E66B8EB9A2A971FEF7A68969CE8C0342E7737D60F49D89856489187A004847E5664A21CDC9 462s + '[' Modulus=CB05ECD16637BA279FB9FAD447424966350E347286B2A2F8E37C6994DAA96DF4C15D2E8B4555E155F11A165F19B71B44EEF22D50B06B14843F4C8BE3B19B4AB9B4841EDBBD1E695450F3D97C359C60AF90322523184018D2238654E66B8EB9A2A971FEF7A68969CE8C0342E7737D60F49D89856489187A004847E5664A21CDC9 '!=' Modulus=CB05ECD16637BA279FB9FAD447424966350E347286B2A2F8E37C6994DAA96DF4C15D2E8B4555E155F11A165F19B71B44EEF22D50B06B14843F4C8BE3B19B4AB9B4841EDBBD1E695450F3D97C359C60AF90322523184018D2238654E66B8EB9A2A971FEF7A68969CE8C0342E7737D60F49D89856489187A004847E5664A21CDC9 ']' 462s + output_file=/tmp/sssd-softhsm2-9bLCCU/SSSD-child-5332-auth.output 462s ++ basename /tmp/sssd-softhsm2-9bLCCU/SSSD-child-5332-auth.output .output 462s + output_cert_file=/tmp/sssd-softhsm2-9bLCCU/SSSD-child-5332-auth.pem 462s + echo -n 053350 462s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-9bLCCU/test-full-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 '' --token_name 'Test Organization Interme Token' --module_name /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so 462s [p11_child[2533]] [main] (0x0400): p11_child started. 462s [p11_child[2533]] [main] (0x2000): Running in [auth] mode. 462s [p11_child[2533]] [main] (0x2000): Running with effective IDs: [0][0]. 462s [p11_child[2533]] [main] (0x2000): Running with real IDs [0][0]. 462s [p11_child[2533]] [do_card] (0x4000): Module List: 462s [p11_child[2533]] [do_card] (0x4000): common name: [softhsm2]. 462s [p11_child[2533]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 462s [p11_child[2533]] [do_card] (0x4000): Description [SoftHSM slot ID 0x1a2da88e] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 462s [p11_child[2533]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 462s [p11_child[2533]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x1a2da88e][439199886] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 462s [p11_child[2533]] [do_card] (0x4000): Login required. 462s [p11_child[2533]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 462s [p11_child[2533]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 462s [p11_child[2533]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so Test Organization Interme Token Test Organization Interme Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 462s [p11_child[2533]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x1a2da88e;slot-manufacturer=SoftHSM%20project;slot-id=439199886;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=74526afe1a2da88e;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 462s [p11_child[2533]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 462s [p11_child[2533]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 462s [p11_child[2533]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 462s [p11_child[2533]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 462s [p11_child[2533]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 462s [p11_child[2533]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 462s [p11_child[2533]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 462s [p11_child[2533]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 462s [p11_child[2533]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 462s [p11_child[2533]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 462s [p11_child[2533]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 462s [p11_child[2533]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 462s [p11_child[2533]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 462s [p11_child[2533]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 462s [p11_child[2533]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 462s [p11_child[2533]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 462s [p11_child[2533]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 462s [p11_child[2533]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 462s [p11_child[2533]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 462s [p11_child[2533]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 462s [p11_child[2533]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 462s [p11_child[2533]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 462s [p11_child[2533]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 462s [p11_child[2533]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 462s [p11_child[2533]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 462s [p11_child[2533]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 462s [p11_child[2533]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 462s [p11_child[2533]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 462s [p11_child[2533]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 462s [p11_child[2533]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 462s [p11_child[2533]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 462s [p11_child[2533]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 462s [p11_child[2533]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 462s [p11_child[2533]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 462s [p11_child[2533]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 462s [p11_child[2533]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 462s [p11_child[2533]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 462s [p11_child[2533]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 462s [p11_child[2533]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 462s [p11_child[2533]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 462s [p11_child[2533]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 462s [p11_child[2533]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 462s [p11_child[2533]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 462s [p11_child[2533]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 462s [p11_child[2533]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 462s [p11_child[2533]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 462s [p11_child[2533]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 462s [p11_child[2533]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 462s [p11_child[2533]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 462s [p11_child[2533]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 462s [p11_child[2533]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 462s [p11_child[2533]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 462s [p11_child[2533]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 462s [p11_child[2533]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 462s [p11_child[2533]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 462s [p11_child[2533]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 462s [p11_child[2533]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 462s [p11_child[2533]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 462s [p11_child[2533]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 462s [p11_child[2533]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 462s [p11_child[2533]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 462s [p11_child[2533]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 462s [p11_child[2533]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 462s [p11_child[2533]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 462s [p11_child[2533]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 462s [p11_child[2533]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 462s [p11_child[2533]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 462s [p11_child[2533]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 462s [p11_child[2533]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 462s [p11_child[2533]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 462s [p11_child[2533]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 462s [p11_child[2533]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 462s [p11_child[2533]] [do_card] (0x4000): Certificate verified and validated. 462s [p11_child[2533]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 462s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-9bLCCU/SSSD-child-5332-auth.output 462s + echo '-----BEGIN CERTIFICATE-----' 462s + tail -n1 /tmp/sssd-softhsm2-9bLCCU/SSSD-child-5332-auth.output 462s + echo '-----END CERTIFICATE-----' 462s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-9bLCCU/SSSD-child-5332-auth.pem 462s Certificate: 462s Data: 462s Version: 3 (0x2) 462s Serial Number: 4 (0x4) 462s Signature Algorithm: sha256WithRSAEncryption 462s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 462s Validity 462s Not Before: Nov 15 22:51:18 2024 GMT 462s Not After : Nov 15 22:51:18 2025 GMT 462s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 462s Subject Public Key Info: 462s Public Key Algorithm: rsaEncryption 462s Public-Key: (1024 bit) 462s Modulus: 462s 00:cb:05:ec:d1:66:37:ba:27:9f:b9:fa:d4:47:42: 462s 49:66:35:0e:34:72:86:b2:a2:f8:e3:7c:69:94:da: 462s a9:6d:f4:c1:5d:2e:8b:45:55:e1:55:f1:1a:16:5f: 462s 19:b7:1b:44:ee:f2:2d:50:b0:6b:14:84:3f:4c:8b: 462s e3:b1:9b:4a:b9:b4:84:1e:db:bd:1e:69:54:50:f3: 462s d9:7c:35:9c:60:af:90:32:25:23:18:40:18:d2:23: 462s 86:54:e6:6b:8e:b9:a2:a9:71:fe:f7:a6:89:69:ce: 462s 8c:03:42:e7:73:7d:60:f4:9d:89:85:64:89:18:7a: 462s 00:48:47:e5:66:4a:21:cd:c9 462s Exponent: 65537 (0x10001) 462s X509v3 extensions: 462s X509v3 Authority Key Identifier: 462s 27:41:83:33:0F:3B:D1:38:5D:23:3B:2D:5F:C0:22:A2:98:49:19:00 462s X509v3 Basic Constraints: 462s CA:FALSE 462s Netscape Cert Type: 462s SSL Client, S/MIME 462s Netscape Comment: 462s Test Organization Intermediate CA trusted Certificate 462s X509v3 Subject Key Identifier: 462s 0E:DB:57:94:43:BC:1C:09:B9:2E:AE:06:E4:E3:90:0C:65:2D:C4:54 462s X509v3 Key Usage: critical 462s Digital Signature, Non Repudiation, Key Encipherment 462s X509v3 Extended Key Usage: 462s TLS Web Client Authentication, E-mail Protection 462s X509v3 Subject Alternative Name: 462s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 462s Signature Algorithm: sha256WithRSAEncryption 462s Signature Value: 462s 39:94:d0:47:70:c3:86:19:7b:3d:8b:72:65:02:8f:3b:8c:ce: 462s 2b:ef:48:72:51:c5:49:90:05:7b:f0:e9:6c:60:be:f9:86:9c: 462s 79:1b:8f:7e:4e:4a:61:c7:c4:e6:1e:99:20:6c:24:2e:41:4b: 462s 8e:36:32:71:ad:69:ab:d3:5b:37:3f:79:2a:9e:9b:c3:d4:c4: 462s d7:bd:38:86:1f:ae:57:9c:1b:2c:25:99:13:8a:03:0f:5c:eb: 462s b4:82:74:69:4e:f9:0d:2e:11:3c:a9:24:89:4d:ab:f8:ae:4b: 462s dd:59:38:4d:e1:82:f4:db:f8:ba:87:8c:bb:36:06:30:8c:25: 462s af:d1 462s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-9bLCCU/SSSD-child-5332-auth.pem 462s + found_md5=Modulus=CB05ECD16637BA279FB9FAD447424966350E347286B2A2F8E37C6994DAA96DF4C15D2E8B4555E155F11A165F19B71B44EEF22D50B06B14843F4C8BE3B19B4AB9B4841EDBBD1E695450F3D97C359C60AF90322523184018D2238654E66B8EB9A2A971FEF7A68969CE8C0342E7737D60F49D89856489187A004847E5664A21CDC9 462s + '[' Modulus=CB05ECD16637BA279FB9FAD447424966350E347286B2A2F8E37C6994DAA96DF4C15D2E8B4555E155F11A165F19B71B44EEF22D50B06B14843F4C8BE3B19B4AB9B4841EDBBD1E695450F3D97C359C60AF90322523184018D2238654E66B8EB9A2A971FEF7A68969CE8C0342E7737D60F49D89856489187A004847E5664A21CDC9 '!=' Modulus=CB05ECD16637BA279FB9FAD447424966350E347286B2A2F8E37C6994DAA96DF4C15D2E8B4555E155F11A165F19B71B44EEF22D50B06B14843F4C8BE3B19B4AB9B4841EDBBD1E695450F3D97C359C60AF90322523184018D2238654E66B8EB9A2A971FEF7A68969CE8C0342E7737D60F49D89856489187A004847E5664A21CDC9 ']' 462s + valid_certificate /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-5947 /tmp/sssd-softhsm2-9bLCCU/test-full-chain-CA.pem partial_chain 462s + check_certificate /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-5947 /tmp/sssd-softhsm2-9bLCCU/test-full-chain-CA.pem partial_chain 462s + local certificate=/tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA-trusted-certificate-0001.pem 462s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-5947 462s + local key_ring=/tmp/sssd-softhsm2-9bLCCU/test-full-chain-CA.pem 462s + local verify_option=partial_chain 462s + prepare_softhsm2_card /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-5947 462s + local certificate=/tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA-trusted-certificate-0001.pem 462s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-5947 462s + local key_cn 462s + local key_name 462s + local tokens_dir 462s + local output_cert_file 462s + token_name= 462s ++ basename /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA-trusted-certificate-0001.pem .pem 462s + key_name=test-intermediate-CA-trusted-certificate-0001 462s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA-trusted-certificate-0001.pem 462s ++ sed -n 's/ *commonName *= //p' 462s Test Organization Interme Token 462s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 462s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 462s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-9bLCCU/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 462s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-9bLCCU/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 462s ++ basename /tmp/sssd-softhsm2-9bLCCU/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 462s + tokens_dir=/tmp/sssd-softhsm2-9bLCCU/softhsm2-test-intermediate-CA-trusted-certificate-0001 462s + token_name='Test Organization Interme Token' 462s + '[' '!' -e /tmp/sssd-softhsm2-9bLCCU/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 462s + '[' '!' -d /tmp/sssd-softhsm2-9bLCCU/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 462s + echo 'Test Organization Interme Token' 462s + '[' -n partial_chain ']' 462s + local verify_arg=--verify=partial_chain 462s + local output_base_name=SSSD-child-21339 462s + local output_file=/tmp/sssd-softhsm2-9bLCCU/SSSD-child-21339.output 462s + output_cert_file=/tmp/sssd-softhsm2-9bLCCU/SSSD-child-21339.pem 462s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-9bLCCU/test-full-chain-CA.pem 462s [p11_child[2543]] [main] (0x0400): p11_child started. 462s [p11_child[2543]] [main] (0x2000): Running in [pre-auth] mode. 462s [p11_child[2543]] [main] (0x2000): Running with effective IDs: [0][0]. 462s [p11_child[2543]] [main] (0x2000): Running with real IDs [0][0]. 462s [p11_child[2543]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 462s [p11_child[2543]] [do_card] (0x4000): Module List: 462s [p11_child[2543]] [do_card] (0x4000): common name: [softhsm2]. 462s [p11_child[2543]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 462s [p11_child[2543]] [do_card] (0x4000): Description [SoftHSM slot ID 0x1a2da88e] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 462s [p11_child[2543]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 462s [p11_child[2543]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x1a2da88e][439199886] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 462s [p11_child[2543]] [do_card] (0x4000): Login NOT required. 462s [p11_child[2543]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 462s [p11_child[2543]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 462s [p11_child[2543]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Interme Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 462s [p11_child[2543]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x1a2da88e;slot-manufacturer=SoftHSM%20project;slot-id=439199886;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=74526afe1a2da88e;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 462s [p11_child[2543]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 462s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-9bLCCU/SSSD-child-21339.output 462s + echo '-----BEGIN CERTIFICATE-----' 462s + tail -n1 /tmp/sssd-softhsm2-9bLCCU/SSSD-child-21339.output 462s + echo '-----END CERTIFICATE-----' 462s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-9bLCCU/SSSD-child-21339.pem 462s Certificate: 462s Data: 462s Version: 3 (0x2) 462s Serial Number: 4 (0x4) 462s Signature Algorithm: sha256WithRSAEncryption 462s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 462s Validity 462s Not Before: Nov 15 22:51:18 2024 GMT 462s Not After : Nov 15 22:51:18 2025 GMT 462s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 462s Subject Public Key Info: 462s Public Key Algorithm: rsaEncryption 462s Public-Key: (1024 bit) 462s Modulus: 462s 00:cb:05:ec:d1:66:37:ba:27:9f:b9:fa:d4:47:42: 462s 49:66:35:0e:34:72:86:b2:a2:f8:e3:7c:69:94:da: 462s a9:6d:f4:c1:5d:2e:8b:45:55:e1:55:f1:1a:16:5f: 462s 19:b7:1b:44:ee:f2:2d:50:b0:6b:14:84:3f:4c:8b: 462s e3:b1:9b:4a:b9:b4:84:1e:db:bd:1e:69:54:50:f3: 462s d9:7c:35:9c:60:af:90:32:25:23:18:40:18:d2:23: 462s 86:54:e6:6b:8e:b9:a2:a9:71:fe:f7:a6:89:69:ce: 462s 8c:03:42:e7:73:7d:60:f4:9d:89:85:64:89:18:7a: 462s 00:48:47:e5:66:4a:21:cd:c9 462s Exponent: 65537 (0x10001) 462s X509v3 extensions: 462s X509v3 Authority Key Identifier: 462s 27:41:83:33:0F:3B:D1:38:5D:23:3B:2D:5F:C0:22:A2:98:49:19:00 462s X509v3 Basic Constraints: 462s CA:FALSE 462s Netscape Cert Type: 462s SSL Client, S/MIME 462s Netscape Comment: 462s Test Organization Intermediate CA trusted Certificate 462s X509v3 Subject Key Identifier: 462s 0E:DB:57:94:43:BC:1C:09:B9:2E:AE:06:E4:E3:90:0C:65:2D:C4:54 462s X509v3 Key Usage: critical 462s Digital Signature, Non Repudiation, Key Encipherment 462s X509v3 Extended Key Usage: 462s TLS Web Client Authentication, E-mail Protection 462s X509v3 Subject Alternative Name: 462s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 462s Signature Algorithm: sha256WithRSAEncryption 462s Signature Value: 462s 39:94:d0:47:70:c3:86:19:7b:3d:8b:72:65:02:8f:3b:8c:ce: 462s 2b:ef:48:72:51:c5:49:90:05:7b:f0:e9:6c:60:be:f9:86:9c: 462s 79:1b:8f:7e:4e:4a:61:c7:c4:e6:1e:99:20:6c:24:2e:41:4b: 462s 8e:36:32:71:ad:69:ab:d3:5b:37:3f:79:2a:9e:9b:c3:d4:c4: 462s d7:bd:38:86:1f:ae:57:9c:1b:2c:25:99:13:8a:03:0f:5c:eb: 462s b4:82:74:69:4e:f9:0d:2e:11:3c:a9:24:89:4d:ab:f8:ae:4b: 462s dd:59:38:4d:e1:82:f4:db:f8:ba:87:8c:bb:36:06:30:8c:25: 462s af:d1 462s + local found_md5 expected_md5 462s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA-trusted-certificate-0001.pem 462s + expected_md5=Modulus=CB05ECD16637BA279FB9FAD447424966350E347286B2A2F8E37C6994DAA96DF4C15D2E8B4555E155F11A165F19B71B44EEF22D50B06B14843F4C8BE3B19B4AB9B4841EDBBD1E695450F3D97C359C60AF90322523184018D2238654E66B8EB9A2A971FEF7A68969CE8C0342E7737D60F49D89856489187A004847E5664A21CDC9 462s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-9bLCCU/SSSD-child-21339.pem 463s + found_md5=Modulus=CB05ECD16637BA279FB9FAD447424966350E347286B2A2F8E37C6994DAA96DF4C15D2E8B4555E155F11A165F19B71B44EEF22D50B06B14843F4C8BE3B19B4AB9B4841EDBBD1E695450F3D97C359C60AF90322523184018D2238654E66B8EB9A2A971FEF7A68969CE8C0342E7737D60F49D89856489187A004847E5664A21CDC9 463s + '[' Modulus=CB05ECD16637BA279FB9FAD447424966350E347286B2A2F8E37C6994DAA96DF4C15D2E8B4555E155F11A165F19B71B44EEF22D50B06B14843F4C8BE3B19B4AB9B4841EDBBD1E695450F3D97C359C60AF90322523184018D2238654E66B8EB9A2A971FEF7A68969CE8C0342E7737D60F49D89856489187A004847E5664A21CDC9 '!=' Modulus=CB05ECD16637BA279FB9FAD447424966350E347286B2A2F8E37C6994DAA96DF4C15D2E8B4555E155F11A165F19B71B44EEF22D50B06B14843F4C8BE3B19B4AB9B4841EDBBD1E695450F3D97C359C60AF90322523184018D2238654E66B8EB9A2A971FEF7A68969CE8C0342E7737D60F49D89856489187A004847E5664A21CDC9 ']' 463s + output_file=/tmp/sssd-softhsm2-9bLCCU/SSSD-child-21339-auth.output 463s ++ basename /tmp/sssd-softhsm2-9bLCCU/SSSD-child-21339-auth.output .output 463s + output_cert_file=/tmp/sssd-softhsm2-9bLCCU/SSSD-child-21339-auth.pem 463s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-9bLCCU/test-full-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Interme Token' --module_name /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so 463s [p11_child[2551]] [main] (0x0400): p11_child started. 463s [p11_child[2551]] [main] (0x2000): Running in [auth] mode. 463s [p11_child[2551]] [main] (0x2000): Running with effective IDs: [0][0]. 463s [p11_child[2551]] [main] (0x2000): Running with real IDs [0][0]. 463s [p11_child[2551]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 463s + echo -n 053350 463s [p11_child[2551]] [do_card] (0x4000): Module List: 463s [p11_child[2551]] [do_card] (0x4000): common name: [softhsm2]. 463s [p11_child[2551]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 463s [p11_child[2551]] [do_card] (0x4000): Description [SoftHSM slot ID 0x1a2da88e] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 463s [p11_child[2551]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 463s [p11_child[2551]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x1a2da88e][439199886] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 463s [p11_child[2551]] [do_card] (0x4000): Login required. 463s [p11_child[2551]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 463s [p11_child[2551]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 463s [p11_child[2551]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so Test Organization Interme Token Test Organization Interme Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 463s [p11_child[2551]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x1a2da88e;slot-manufacturer=SoftHSM%20project;slot-id=439199886;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=74526afe1a2da88e;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 463s [p11_child[2551]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 463s [p11_child[2551]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 463s [p11_child[2551]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 463s [p11_child[2551]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 463s [p11_child[2551]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 463s [p11_child[2551]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 463s [p11_child[2551]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 463s [p11_child[2551]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 463s [p11_child[2551]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 463s [p11_child[2551]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 463s [p11_child[2551]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 463s [p11_child[2551]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 463s [p11_child[2551]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 463s [p11_child[2551]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 463s [p11_child[2551]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 463s [p11_child[2551]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 463s [p11_child[2551]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 463s [p11_child[2551]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 463s [p11_child[2551]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 463s [p11_child[2551]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 463s [p11_child[2551]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 463s [p11_child[2551]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 463s [p11_child[2551]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 463s [p11_child[2551]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 463s [p11_child[2551]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 463s [p11_child[2551]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 463s [p11_child[2551]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 463s [p11_child[2551]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 463s [p11_child[2551]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 463s [p11_child[2551]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 463s [p11_child[2551]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 463s [p11_child[2551]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 463s [p11_child[2551]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 463s [p11_child[2551]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 463s [p11_child[2551]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 463s [p11_child[2551]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 463s [p11_child[2551]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 463s [p11_child[2551]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 463s [p11_child[2551]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 463s [p11_child[2551]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 463s [p11_child[2551]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 463s [p11_child[2551]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 463s [p11_child[2551]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 463s [p11_child[2551]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 463s [p11_child[2551]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 463s [p11_child[2551]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 463s [p11_child[2551]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 463s [p11_child[2551]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 463s [p11_child[2551]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 463s [p11_child[2551]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 463s [p11_child[2551]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 463s [p11_child[2551]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 463s [p11_child[2551]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 463s [p11_child[2551]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 463s [p11_child[2551]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 463s [p11_child[2551]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 463s [p11_child[2551]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 463s [p11_child[2551]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 463s [p11_child[2551]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 463s [p11_child[2551]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 463s [p11_child[2551]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 463s [p11_child[2551]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 463s [p11_child[2551]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 463s [p11_child[2551]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 463s [p11_child[2551]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 463s [p11_child[2551]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 463s [p11_child[2551]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 463s [p11_child[2551]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 463s [p11_child[2551]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 463s [p11_child[2551]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 463s [p11_child[2551]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 463s [p11_child[2551]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 463s [p11_child[2551]] [do_card] (0x4000): Certificate verified and validated. 463s [p11_child[2551]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 463s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-9bLCCU/SSSD-child-21339-auth.output 463s + echo '-----BEGIN CERTIFICATE-----' 463s + tail -n1 /tmp/sssd-softhsm2-9bLCCU/SSSD-child-21339-auth.output 463s + echo '-----END CERTIFICATE-----' 463s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-9bLCCU/SSSD-child-21339-auth.pem 463s Certificate: 463s Data: 463s Version: 3 (0x2) 463s Serial Number: 4 (0x4) 463s Signature Algorithm: sha256WithRSAEncryption 463s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 463s Validity 463s Not Before: Nov 15 22:51:18 2024 GMT 463s Not After : Nov 15 22:51:18 2025 GMT 463s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 463s Subject Public Key Info: 463s Public Key Algorithm: rsaEncryption 463s Public-Key: (1024 bit) 463s Modulus: 463s 00:cb:05:ec:d1:66:37:ba:27:9f:b9:fa:d4:47:42: 463s 49:66:35:0e:34:72:86:b2:a2:f8:e3:7c:69:94:da: 463s a9:6d:f4:c1:5d:2e:8b:45:55:e1:55:f1:1a:16:5f: 463s 19:b7:1b:44:ee:f2:2d:50:b0:6b:14:84:3f:4c:8b: 463s e3:b1:9b:4a:b9:b4:84:1e:db:bd:1e:69:54:50:f3: 463s d9:7c:35:9c:60:af:90:32:25:23:18:40:18:d2:23: 463s 86:54:e6:6b:8e:b9:a2:a9:71:fe:f7:a6:89:69:ce: 463s 8c:03:42:e7:73:7d:60:f4:9d:89:85:64:89:18:7a: 463s 00:48:47:e5:66:4a:21:cd:c9 463s Exponent: 65537 (0x10001) 463s X509v3 extensions: 463s X509v3 Authority Key Identifier: 463s 27:41:83:33:0F:3B:D1:38:5D:23:3B:2D:5F:C0:22:A2:98:49:19:00 463s X509v3 Basic Constraints: 463s CA:FALSE 463s Netscape Cert Type: 463s SSL Client, S/MIME 463s Netscape Comment: 463s Test Organization Intermediate CA trusted Certificate 463s X509v3 Subject Key Identifier: 463s 0E:DB:57:94:43:BC:1C:09:B9:2E:AE:06:E4:E3:90:0C:65:2D:C4:54 463s X509v3 Key Usage: critical 463s Digital Signature, Non Repudiation, Key Encipherment 463s X509v3 Extended Key Usage: 463s TLS Web Client Authentication, E-mail Protection 463s X509v3 Subject Alternative Name: 463s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 463s Signature Algorithm: sha256WithRSAEncryption 463s Signature Value: 463s 39:94:d0:47:70:c3:86:19:7b:3d:8b:72:65:02:8f:3b:8c:ce: 463s 2b:ef:48:72:51:c5:49:90:05:7b:f0:e9:6c:60:be:f9:86:9c: 463s 79:1b:8f:7e:4e:4a:61:c7:c4:e6:1e:99:20:6c:24:2e:41:4b: 463s 8e:36:32:71:ad:69:ab:d3:5b:37:3f:79:2a:9e:9b:c3:d4:c4: 463s d7:bd:38:86:1f:ae:57:9c:1b:2c:25:99:13:8a:03:0f:5c:eb: 463s b4:82:74:69:4e:f9:0d:2e:11:3c:a9:24:89:4d:ab:f8:ae:4b: 463s dd:59:38:4d:e1:82:f4:db:f8:ba:87:8c:bb:36:06:30:8c:25: 463s af:d1 463s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-9bLCCU/SSSD-child-21339-auth.pem 463s + found_md5=Modulus=CB05ECD16637BA279FB9FAD447424966350E347286B2A2F8E37C6994DAA96DF4C15D2E8B4555E155F11A165F19B71B44EEF22D50B06B14843F4C8BE3B19B4AB9B4841EDBBD1E695450F3D97C359C60AF90322523184018D2238654E66B8EB9A2A971FEF7A68969CE8C0342E7737D60F49D89856489187A004847E5664A21CDC9 463s + '[' Modulus=CB05ECD16637BA279FB9FAD447424966350E347286B2A2F8E37C6994DAA96DF4C15D2E8B4555E155F11A165F19B71B44EEF22D50B06B14843F4C8BE3B19B4AB9B4841EDBBD1E695450F3D97C359C60AF90322523184018D2238654E66B8EB9A2A971FEF7A68969CE8C0342E7737D60F49D89856489187A004847E5664A21CDC9 '!=' Modulus=CB05ECD16637BA279FB9FAD447424966350E347286B2A2F8E37C6994DAA96DF4C15D2E8B4555E155F11A165F19B71B44EEF22D50B06B14843F4C8BE3B19B4AB9B4841EDBBD1E695450F3D97C359C60AF90322523184018D2238654E66B8EB9A2A971FEF7A68969CE8C0342E7737D60F49D89856489187A004847E5664A21CDC9 ']' 463s + invalid_certificate /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-5947 /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA.pem 463s + check_certificate /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-5947 /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA.pem 463s + local certificate=/tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA-trusted-certificate-0001.pem 463s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-5947 463s + local key_ring=/tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA.pem 463s + local verify_option= 463s + prepare_softhsm2_card /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-5947 463s + local certificate=/tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA-trusted-certificate-0001.pem 463s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-5947 463s + local key_cn 463s + local key_name 463s + local tokens_dir 463s + local output_cert_file 463s + token_name= 463s ++ basename /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA-trusted-certificate-0001.pem .pem 463s + key_name=test-intermediate-CA-trusted-certificate-0001 463s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA-trusted-certificate-0001.pem 463s ++ sed -n 's/ *commonName *= //p' 463s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 463s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 463s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-9bLCCU/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 463s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-9bLCCU/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 463s ++ basename /tmp/sssd-softhsm2-9bLCCU/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 463s Test Organization Interme Token 463s + tokens_dir=/tmp/sssd-softhsm2-9bLCCU/softhsm2-test-intermediate-CA-trusted-certificate-0001 463s + token_name='Test Organization Interme Token' 463s + '[' '!' -e /tmp/sssd-softhsm2-9bLCCU/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 463s + '[' '!' -d /tmp/sssd-softhsm2-9bLCCU/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 463s + echo 'Test Organization Interme Token' 463s + '[' -n '' ']' 463s + local output_base_name=SSSD-child-9896 463s + local output_file=/tmp/sssd-softhsm2-9bLCCU/SSSD-child-9896.output 463s + output_cert_file=/tmp/sssd-softhsm2-9bLCCU/SSSD-child-9896.pem 463s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA.pem 463s [p11_child[2561]] [main] (0x0400): p11_child started. 463s [p11_child[2561]] [main] (0x2000): Running in [pre-auth] mode. 463s [p11_child[2561]] [main] (0x2000): Running with effective IDs: [0][0]. 463s [p11_child[2561]] [main] (0x2000): Running with real IDs [0][0]. 463s [p11_child[2561]] [do_card] (0x4000): Module List: 463s [p11_child[2561]] [do_card] (0x4000): common name: [softhsm2]. 463s [p11_child[2561]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 463s [p11_child[2561]] [do_card] (0x4000): Description [SoftHSM slot ID 0x1a2da88e] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 463s [p11_child[2561]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 463s [p11_child[2561]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x1a2da88e][439199886] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 463s [p11_child[2561]] [do_card] (0x4000): Login NOT required. 463s [p11_child[2561]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 463s [p11_child[2561]] [do_verification] (0x0040): X509_verify_cert failed [0]. 463s [p11_child[2561]] [do_verification] (0x0040): X509_verify_cert failed [2][unable to get issuer certificate]. 463s [p11_child[2561]] [read_certs] (0x0040): Certificate [Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] not valid, skipping. 463s [p11_child[2561]] [do_card] (0x4000): No certificate found. 463s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-9bLCCU/SSSD-child-9896.output 463s + return 2 463s + valid_certificate /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-5947 /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA.pem partial_chain 463s + check_certificate /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-5947 /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA.pem partial_chain 463s + local certificate=/tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA-trusted-certificate-0001.pem 463s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-5947 463s + local key_ring=/tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA.pem 463s + local verify_option=partial_chain 463s + prepare_softhsm2_card /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-5947 463s + local certificate=/tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA-trusted-certificate-0001.pem 463s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-5947 463s + local key_cn 463s + local key_name 463s + local tokens_dir 463s + local output_cert_file 463s + token_name= 463s ++ basename /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA-trusted-certificate-0001.pem .pem 463s + key_name=test-intermediate-CA-trusted-certificate-0001 463s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA-trusted-certificate-0001.pem 463s ++ sed -n 's/ *commonName *= //p' 463s Test Organization Interme Token 463s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 463s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 463s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-9bLCCU/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 463s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-9bLCCU/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 463s ++ basename /tmp/sssd-softhsm2-9bLCCU/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 463s + tokens_dir=/tmp/sssd-softhsm2-9bLCCU/softhsm2-test-intermediate-CA-trusted-certificate-0001 463s + token_name='Test Organization Interme Token' 463s + '[' '!' -e /tmp/sssd-softhsm2-9bLCCU/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 463s + '[' '!' -d /tmp/sssd-softhsm2-9bLCCU/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 463s + echo 'Test Organization Interme Token' 463s + '[' -n partial_chain ']' 463s + local verify_arg=--verify=partial_chain 463s + local output_base_name=SSSD-child-15544 463s + local output_file=/tmp/sssd-softhsm2-9bLCCU/SSSD-child-15544.output 463s + output_cert_file=/tmp/sssd-softhsm2-9bLCCU/SSSD-child-15544.pem 463s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA.pem 463s [p11_child[2568]] [main] (0x0400): p11_child started. 463s [p11_child[2568]] [main] (0x2000): Running in [pre-auth] mode. 463s [p11_child[2568]] [main] (0x2000): Running with effective IDs: [0][0]. 463s [p11_child[2568]] [main] (0x2000): Running with real IDs [0][0]. 463s [p11_child[2568]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 463s [p11_child[2568]] [do_card] (0x4000): Module List: 463s [p11_child[2568]] [do_card] (0x4000): common name: [softhsm2]. 463s [p11_child[2568]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 463s [p11_child[2568]] [do_card] (0x4000): Description [SoftHSM slot ID 0x1a2da88e] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 463s [p11_child[2568]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 463s [p11_child[2568]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x1a2da88e][439199886] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 463s [p11_child[2568]] [do_card] (0x4000): Login NOT required. 463s [p11_child[2568]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 463s [p11_child[2568]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 463s [p11_child[2568]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Interme Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 463s [p11_child[2568]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x1a2da88e;slot-manufacturer=SoftHSM%20project;slot-id=439199886;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=74526afe1a2da88e;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 463s [p11_child[2568]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 463s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-9bLCCU/SSSD-child-15544.output 463s + echo '-----BEGIN CERTIFICATE-----' 463s + tail -n1 /tmp/sssd-softhsm2-9bLCCU/SSSD-child-15544.output 463s + echo '-----END CERTIFICATE-----' 463s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-9bLCCU/SSSD-child-15544.pem 463s Certificate: 463s Data: 463s Version: 3 (0x2) 463s Serial Number: 4 (0x4) 463s Signature Algorithm: sha256WithRSAEncryption 463s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 463s Validity 463s Not Before: Nov 15 22:51:18 2024 GMT 463s Not After : Nov 15 22:51:18 2025 GMT 463s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 463s Subject Public Key Info: 463s Public Key Algorithm: rsaEncryption 463s Public-Key: (1024 bit) 463s Modulus: 463s 00:cb:05:ec:d1:66:37:ba:27:9f:b9:fa:d4:47:42: 463s 49:66:35:0e:34:72:86:b2:a2:f8:e3:7c:69:94:da: 463s a9:6d:f4:c1:5d:2e:8b:45:55:e1:55:f1:1a:16:5f: 463s 19:b7:1b:44:ee:f2:2d:50:b0:6b:14:84:3f:4c:8b: 463s e3:b1:9b:4a:b9:b4:84:1e:db:bd:1e:69:54:50:f3: 463s d9:7c:35:9c:60:af:90:32:25:23:18:40:18:d2:23: 463s 86:54:e6:6b:8e:b9:a2:a9:71:fe:f7:a6:89:69:ce: 463s 8c:03:42:e7:73:7d:60:f4:9d:89:85:64:89:18:7a: 463s 00:48:47:e5:66:4a:21:cd:c9 463s Exponent: 65537 (0x10001) 463s X509v3 extensions: 463s X509v3 Authority Key Identifier: 463s 27:41:83:33:0F:3B:D1:38:5D:23:3B:2D:5F:C0:22:A2:98:49:19:00 463s X509v3 Basic Constraints: 463s CA:FALSE 463s Netscape Cert Type: 463s SSL Client, S/MIME 463s Netscape Comment: 463s Test Organization Intermediate CA trusted Certificate 463s X509v3 Subject Key Identifier: 463s 0E:DB:57:94:43:BC:1C:09:B9:2E:AE:06:E4:E3:90:0C:65:2D:C4:54 463s X509v3 Key Usage: critical 463s Digital Signature, Non Repudiation, Key Encipherment 463s X509v3 Extended Key Usage: 463s TLS Web Client Authentication, E-mail Protection 463s X509v3 Subject Alternative Name: 463s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 463s Signature Algorithm: sha256WithRSAEncryption 463s Signature Value: 463s 39:94:d0:47:70:c3:86:19:7b:3d:8b:72:65:02:8f:3b:8c:ce: 463s 2b:ef:48:72:51:c5:49:90:05:7b:f0:e9:6c:60:be:f9:86:9c: 463s 79:1b:8f:7e:4e:4a:61:c7:c4:e6:1e:99:20:6c:24:2e:41:4b: 463s 8e:36:32:71:ad:69:ab:d3:5b:37:3f:79:2a:9e:9b:c3:d4:c4: 463s d7:bd:38:86:1f:ae:57:9c:1b:2c:25:99:13:8a:03:0f:5c:eb: 463s b4:82:74:69:4e:f9:0d:2e:11:3c:a9:24:89:4d:ab:f8:ae:4b: 463s dd:59:38:4d:e1:82:f4:db:f8:ba:87:8c:bb:36:06:30:8c:25: 463s af:d1 463s + local found_md5 expected_md5 463s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA-trusted-certificate-0001.pem 463s + expected_md5=Modulus=CB05ECD16637BA279FB9FAD447424966350E347286B2A2F8E37C6994DAA96DF4C15D2E8B4555E155F11A165F19B71B44EEF22D50B06B14843F4C8BE3B19B4AB9B4841EDBBD1E695450F3D97C359C60AF90322523184018D2238654E66B8EB9A2A971FEF7A68969CE8C0342E7737D60F49D89856489187A004847E5664A21CDC9 463s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-9bLCCU/SSSD-child-15544.pem 463s + found_md5=Modulus=CB05ECD16637BA279FB9FAD447424966350E347286B2A2F8E37C6994DAA96DF4C15D2E8B4555E155F11A165F19B71B44EEF22D50B06B14843F4C8BE3B19B4AB9B4841EDBBD1E695450F3D97C359C60AF90322523184018D2238654E66B8EB9A2A971FEF7A68969CE8C0342E7737D60F49D89856489187A004847E5664A21CDC9 463s + '[' Modulus=CB05ECD16637BA279FB9FAD447424966350E347286B2A2F8E37C6994DAA96DF4C15D2E8B4555E155F11A165F19B71B44EEF22D50B06B14843F4C8BE3B19B4AB9B4841EDBBD1E695450F3D97C359C60AF90322523184018D2238654E66B8EB9A2A971FEF7A68969CE8C0342E7737D60F49D89856489187A004847E5664A21CDC9 '!=' Modulus=CB05ECD16637BA279FB9FAD447424966350E347286B2A2F8E37C6994DAA96DF4C15D2E8B4555E155F11A165F19B71B44EEF22D50B06B14843F4C8BE3B19B4AB9B4841EDBBD1E695450F3D97C359C60AF90322523184018D2238654E66B8EB9A2A971FEF7A68969CE8C0342E7737D60F49D89856489187A004847E5664A21CDC9 ']' 463s + output_file=/tmp/sssd-softhsm2-9bLCCU/SSSD-child-15544-auth.output 463s ++ basename /tmp/sssd-softhsm2-9bLCCU/SSSD-child-15544-auth.output .output 463s + output_cert_file=/tmp/sssd-softhsm2-9bLCCU/SSSD-child-15544-auth.pem 463s + echo -n 053350 463s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-9bLCCU/test-intermediate-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Interme Token' --module_name /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so 463s [p11_child[2576]] [main] (0x0400): p11_child started. 463s [p11_child[2576]] [main] (0x2000): Running in [auth] mode. 463s [p11_child[2576]] [main] (0x2000): Running with effective IDs: [0][0]. 463s [p11_child[2576]] [main] (0x2000): Running with real IDs [0][0]. 463s [p11_child[2576]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 463s [p11_child[2576]] [do_card] (0x4000): Module List: 463s [p11_child[2576]] [do_card] (0x4000): common name: [softhsm2]. 463s [p11_child[2576]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 463s [p11_child[2576]] [do_card] (0x4000): Description [SoftHSM slot ID 0x1a2da88e] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 463s [p11_child[2576]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 463s [p11_child[2576]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x1a2da88e][439199886] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 463s [p11_child[2576]] [do_card] (0x4000): Login required. 463s [p11_child[2576]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 463s [p11_child[2576]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 463s [p11_child[2576]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so Test Organization Interme Token Test Organization Interme Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 463s [p11_child[2576]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x1a2da88e;slot-manufacturer=SoftHSM%20project;slot-id=439199886;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=74526afe1a2da88e;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 463s [p11_child[2576]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 463s [p11_child[2576]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 463s [p11_child[2576]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 463s [p11_child[2576]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 463s [p11_child[2576]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 463s [p11_child[2576]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 463s [p11_child[2576]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 463s [p11_child[2576]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 463s [p11_child[2576]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 463s [p11_child[2576]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 463s [p11_child[2576]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 463s [p11_child[2576]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 463s [p11_child[2576]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 463s [p11_child[2576]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 463s [p11_child[2576]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 463s [p11_child[2576]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 463s [p11_child[2576]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 463s [p11_child[2576]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 463s [p11_child[2576]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 463s [p11_child[2576]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 463s [p11_child[2576]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 463s [p11_child[2576]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 463s [p11_child[2576]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 463s [p11_child[2576]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 463s [p11_child[2576]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 463s [p11_child[2576]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 463s [p11_child[2576]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 463s [p11_child[2576]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 463s [p11_child[2576]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 463s [p11_child[2576]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 463s [p11_child[2576]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 463s [p11_child[2576]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 463s [p11_child[2576]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 463s [p11_child[2576]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 463s [p11_child[2576]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 463s [p11_child[2576]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 463s [p11_child[2576]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 463s [p11_child[2576]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 463s [p11_child[2576]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 463s [p11_child[2576]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 463s [p11_child[2576]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 463s [p11_child[2576]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 463s [p11_child[2576]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 463s [p11_child[2576]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 463s [p11_child[2576]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 463s [p11_child[2576]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 463s [p11_child[2576]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 463s [p11_child[2576]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 463s [p11_child[2576]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 463s [p11_child[2576]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 463s [p11_child[2576]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 463s [p11_child[2576]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 463s [p11_child[2576]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 463s [p11_child[2576]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 463s [p11_child[2576]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 463s [p11_child[2576]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 463s [p11_child[2576]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 463s [p11_child[2576]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 463s [p11_child[2576]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 463s [p11_child[2576]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 463s [p11_child[2576]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 463s [p11_child[2576]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 463s [p11_child[2576]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 463s [p11_child[2576]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 463s [p11_child[2576]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 463s [p11_child[2576]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 463s [p11_child[2576]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 463s [p11_child[2576]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 463s [p11_child[2576]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 463s [p11_child[2576]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 463s [p11_child[2576]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 463s [p11_child[2576]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 463s [p11_child[2576]] [do_card] (0x4000): Certificate verified and validated. 463s [p11_child[2576]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 463s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-9bLCCU/SSSD-child-15544-auth.output 463s + echo '-----BEGIN CERTIFICATE-----' 463s + tail -n1 /tmp/sssd-softhsm2-9bLCCU/SSSD-child-15544-auth.output 463s + echo '-----END CERTIFICATE-----' 463s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-9bLCCU/SSSD-child-15544-auth.pem 463s Certificate: 463s Data: 463s Version: 3 (0x2) 463s Serial Number: 4 (0x4) 463s Signature Algorithm: sha256WithRSAEncryption 463s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 463s Validity 463s Not Before: Nov 15 22:51:18 2024 GMT 463s Not After : Nov 15 22:51:18 2025 GMT 463s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 463s Subject Public Key Info: 463s Public Key Algorithm: rsaEncryption 463s Public-Key: (1024 bit) 463s Modulus: 463s 00:cb:05:ec:d1:66:37:ba:27:9f:b9:fa:d4:47:42: 463s 49:66:35:0e:34:72:86:b2:a2:f8:e3:7c:69:94:da: 463s a9:6d:f4:c1:5d:2e:8b:45:55:e1:55:f1:1a:16:5f: 463s 19:b7:1b:44:ee:f2:2d:50:b0:6b:14:84:3f:4c:8b: 463s e3:b1:9b:4a:b9:b4:84:1e:db:bd:1e:69:54:50:f3: 463s d9:7c:35:9c:60:af:90:32:25:23:18:40:18:d2:23: 463s 86:54:e6:6b:8e:b9:a2:a9:71:fe:f7:a6:89:69:ce: 463s 8c:03:42:e7:73:7d:60:f4:9d:89:85:64:89:18:7a: 463s 00:48:47:e5:66:4a:21:cd:c9 463s Exponent: 65537 (0x10001) 463s X509v3 extensions: 463s X509v3 Authority Key Identifier: 463s 27:41:83:33:0F:3B:D1:38:5D:23:3B:2D:5F:C0:22:A2:98:49:19:00 463s X509v3 Basic Constraints: 463s CA:FALSE 463s Netscape Cert Type: 463s SSL Client, S/MIME 463s Netscape Comment: 463s Test Organization Intermediate CA trusted Certificate 463s X509v3 Subject Key Identifier: 463s 0E:DB:57:94:43:BC:1C:09:B9:2E:AE:06:E4:E3:90:0C:65:2D:C4:54 463s X509v3 Key Usage: critical 463s Digital Signature, Non Repudiation, Key Encipherment 463s X509v3 Extended Key Usage: 463s TLS Web Client Authentication, E-mail Protection 463s X509v3 Subject Alternative Name: 463s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 463s Signature Algorithm: sha256WithRSAEncryption 463s Signature Value: 463s 39:94:d0:47:70:c3:86:19:7b:3d:8b:72:65:02:8f:3b:8c:ce: 463s 2b:ef:48:72:51:c5:49:90:05:7b:f0:e9:6c:60:be:f9:86:9c: 463s 79:1b:8f:7e:4e:4a:61:c7:c4:e6:1e:99:20:6c:24:2e:41:4b: 463s 8e:36:32:71:ad:69:ab:d3:5b:37:3f:79:2a:9e:9b:c3:d4:c4: 463s d7:bd:38:86:1f:ae:57:9c:1b:2c:25:99:13:8a:03:0f:5c:eb: 463s b4:82:74:69:4e:f9:0d:2e:11:3c:a9:24:89:4d:ab:f8:ae:4b: 463s dd:59:38:4d:e1:82:f4:db:f8:ba:87:8c:bb:36:06:30:8c:25: 463s af:d1 463s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-9bLCCU/SSSD-child-15544-auth.pem 463s + found_md5=Modulus=CB05ECD16637BA279FB9FAD447424966350E347286B2A2F8E37C6994DAA96DF4C15D2E8B4555E155F11A165F19B71B44EEF22D50B06B14843F4C8BE3B19B4AB9B4841EDBBD1E695450F3D97C359C60AF90322523184018D2238654E66B8EB9A2A971FEF7A68969CE8C0342E7737D60F49D89856489187A004847E5664A21CDC9 463s + '[' Modulus=CB05ECD16637BA279FB9FAD447424966350E347286B2A2F8E37C6994DAA96DF4C15D2E8B4555E155F11A165F19B71B44EEF22D50B06B14843F4C8BE3B19B4AB9B4841EDBBD1E695450F3D97C359C60AF90322523184018D2238654E66B8EB9A2A971FEF7A68969CE8C0342E7737D60F49D89856489187A004847E5664A21CDC9 '!=' Modulus=CB05ECD16637BA279FB9FAD447424966350E347286B2A2F8E37C6994DAA96DF4C15D2E8B4555E155F11A165F19B71B44EEF22D50B06B14843F4C8BE3B19B4AB9B4841EDBBD1E695450F3D97C359C60AF90322523184018D2238654E66B8EB9A2A971FEF7A68969CE8C0342E7737D60F49D89856489187A004847E5664A21CDC9 ']' 463s + invalid_certificate /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-16232 /tmp/sssd-softhsm2-9bLCCU/test-root-CA.pem 463s + check_certificate /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-16232 /tmp/sssd-softhsm2-9bLCCU/test-root-CA.pem 463s + local certificate=/tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-trusted-certificate-0001.pem 463s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-16232 463s + local key_ring=/tmp/sssd-softhsm2-9bLCCU/test-root-CA.pem 463s + local verify_option= 463s + prepare_softhsm2_card /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-16232 463s + local certificate=/tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-trusted-certificate-0001.pem 463s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-16232 463s + local key_cn 463s + local key_name 463s + local tokens_dir 463s + local output_cert_file 463s + token_name= 463s ++ basename /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 463s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 463s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-trusted-certificate-0001.pem 463s ++ sed -n 's/ *commonName *= //p' 463s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 463s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 463s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-9bLCCU/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 463s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-9bLCCU/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 463s ++ basename /tmp/sssd-softhsm2-9bLCCU/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 463s + tokens_dir=/tmp/sssd-softhsm2-9bLCCU/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 463s + token_name='Test Organization Sub Int Token' 463s + '[' '!' -e /tmp/sssd-softhsm2-9bLCCU/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 463s + local key_file 463s + local decrypted_key 463s + mkdir -p /tmp/sssd-softhsm2-9bLCCU/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 463s + key_file=/tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-trusted-certificate-0001-key.pem 463s + decrypted_key=/tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 463s + cat 463s + softhsm2-util --init-token --label 'Test Organization Sub Int Token' --pin 053350 --so-pin 053350 --free 463s Slot 0 has a free/uninitialized token. 463s The token has been initialized and is reassigned to slot 2093743094 463s + softhsm2-util --show-slots 463s Available slots: 463s Slot 2093743094 463s Slot info: 463s Description: SoftHSM slot ID 0x7ccbfbf6 463s Manufacturer ID: SoftHSM project 463s Hardware version: 2.6 463s Firmware version: 2.6 463s Token present: yes 463s Token info: 463s Manufacturer ID: SoftHSM project 463s Model: SoftHSM v2 463s Hardware version: 2.6 463s Firmware version: 2.6 463s Serial number: 4415d92dfccbfbf6 463s Initialized: yes 463s User PIN init.: yes 463s Label: Test Organization Sub Int Token 463s Slot 1 463s Slot info: 463s Description: SoftHSM slot ID 0x1 463s Manufacturer ID: SoftHSM project 463s Hardware version: 2.6 463s Firmware version: 2.6 463s Token present: yes 463s Token info: 463s Manufacturer ID: SoftHSM project 463s Model: SoftHSM v2 463s Hardware version: 2.6 463s Firmware version: 2.6 463s Serial number: 463s Initialized: no 463s User PIN init.: no 463s Label: 463s + p11tool --provider=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --write --no-mark-private --load-certificate=/tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-trusted-certificate-0001.pem --login --set-pin=053350 --label 'Test Organization Sub Intermediate Trusted Certificate 0001' --id 00112233445566778899FFAABBCCDDEEFF012345 463s + openssl rsa -passin pass:random-sub-intermediate-ca-trusted-cert-0001-16232 -in /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-trusted-certificate-0001-key.pem -out /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 463s writing RSA key 463s + p11tool --provider=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --write --load-privkey=/tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem --login --set-pin=053350 --label 'Test Organization Sub Intermediate Trusted Certificate 0001 Key' --id 00112233445566778899FFAABBCCDDEEFF012345 464s + rm /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 464s + p11tool --provider=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --list-all 464s Object 0: 464s URL: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=4415d92dfccbfbf6;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert 464s Type: X.509 Certificate (RSA-1024) 464s Expires: Sat Nov 15 22:51:19 2025 464s Label: Test Organization Sub Intermediate Trusted Certificate 0001 464s ID: 00:11:22:33:44:55:66:77:88:99:ff:aa:bb:cc:dd:ee:ff:01:23:45 464s 464s Test Organization Sub Int Token 464s + echo 'Test Organization Sub Int Token' 464s + '[' -n '' ']' 464s + local output_base_name=SSSD-child-18076 464s + local output_file=/tmp/sssd-softhsm2-9bLCCU/SSSD-child-18076.output 464s + output_cert_file=/tmp/sssd-softhsm2-9bLCCU/SSSD-child-18076.pem 464s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-9bLCCU/test-root-CA.pem 464s [p11_child[2595]] [main] (0x0400): p11_child started. 464s [p11_child[2595]] [main] (0x2000): Running in [pre-auth] mode. 464s [p11_child[2595]] [main] (0x2000): Running with effective IDs: [0][0]. 464s [p11_child[2595]] [main] (0x2000): Running with real IDs [0][0]. 464s [p11_child[2595]] [do_card] (0x4000): Module List: 464s [p11_child[2595]] [do_card] (0x4000): common name: [softhsm2]. 464s [p11_child[2595]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 464s [p11_child[2595]] [do_card] (0x4000): Description [SoftHSM slot ID 0x7ccbfbf6] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 464s [p11_child[2595]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 464s [p11_child[2595]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x7ccbfbf6][2093743094] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 464s [p11_child[2595]] [do_card] (0x4000): Login NOT required. 464s [p11_child[2595]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 464s [p11_child[2595]] [do_verification] (0x0040): X509_verify_cert failed [0]. 464s [p11_child[2595]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 464s [p11_child[2595]] [read_certs] (0x0040): Certificate [Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] not valid, skipping. 464s [p11_child[2595]] [do_card] (0x4000): No certificate found. 464s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-9bLCCU/SSSD-child-18076.output 464s + return 2 464s + invalid_certificate /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-16232 /tmp/sssd-softhsm2-9bLCCU/test-root-CA.pem partial_chain 464s + check_certificate /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-16232 /tmp/sssd-softhsm2-9bLCCU/test-root-CA.pem partial_chain 464s + local certificate=/tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-trusted-certificate-0001.pem 464s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-16232 464s + local key_ring=/tmp/sssd-softhsm2-9bLCCU/test-root-CA.pem 464s + local verify_option=partial_chain 464s + prepare_softhsm2_card /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-16232 464s + local certificate=/tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-trusted-certificate-0001.pem 464s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-16232 464s + local key_cn 464s + local key_name 464s + local tokens_dir 464s + local output_cert_file 464s + token_name= 464s ++ basename /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 464s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 464s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-trusted-certificate-0001.pem 464s ++ sed -n 's/ *commonName *= //p' 464s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 464s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 464s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-9bLCCU/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 464s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-9bLCCU/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 464s ++ basename /tmp/sssd-softhsm2-9bLCCU/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 464s Test Organization Sub Int Token 464s + tokens_dir=/tmp/sssd-softhsm2-9bLCCU/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 464s + token_name='Test Organization Sub Int Token' 464s + '[' '!' -e /tmp/sssd-softhsm2-9bLCCU/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 464s + '[' '!' -d /tmp/sssd-softhsm2-9bLCCU/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 464s + echo 'Test Organization Sub Int Token' 464s + '[' -n partial_chain ']' 464s + local verify_arg=--verify=partial_chain 464s + local output_base_name=SSSD-child-9609 464s + local output_file=/tmp/sssd-softhsm2-9bLCCU/SSSD-child-9609.output 464s + output_cert_file=/tmp/sssd-softhsm2-9bLCCU/SSSD-child-9609.pem 464s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-9bLCCU/test-root-CA.pem 464s [p11_child[2602]] [main] (0x0400): p11_child started. 464s [p11_child[2602]] [main] (0x2000): Running in [pre-auth] mode. 464s [p11_child[2602]] [main] (0x2000): Running with effective IDs: [0][0]. 464s [p11_child[2602]] [main] (0x2000): Running with real IDs [0][0]. 464s [p11_child[2602]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 464s [p11_child[2602]] [do_card] (0x4000): Module List: 464s [p11_child[2602]] [do_card] (0x4000): common name: [softhsm2]. 464s [p11_child[2602]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 464s [p11_child[2602]] [do_card] (0x4000): Description [SoftHSM slot ID 0x7ccbfbf6] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 464s [p11_child[2602]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 464s [p11_child[2602]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x7ccbfbf6][2093743094] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 464s [p11_child[2602]] [do_card] (0x4000): Login NOT required. 464s [p11_child[2602]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 464s [p11_child[2602]] [do_verification] (0x0040): X509_verify_cert failed [0]. 464s [p11_child[2602]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 464s [p11_child[2602]] [read_certs] (0x0040): Certificate [Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] not valid, skipping. 464s [p11_child[2602]] [do_card] (0x4000): No certificate found. 464s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-9bLCCU/SSSD-child-9609.output 464s + return 2 464s + valid_certificate /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-16232 /tmp/sssd-softhsm2-9bLCCU/test-full-chain-CA.pem 464s + check_certificate /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-16232 /tmp/sssd-softhsm2-9bLCCU/test-full-chain-CA.pem 464s + local certificate=/tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-trusted-certificate-0001.pem 464s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-16232 464s + local key_ring=/tmp/sssd-softhsm2-9bLCCU/test-full-chain-CA.pem 464s + local verify_option= 464s + prepare_softhsm2_card /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-16232 464s + local certificate=/tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-trusted-certificate-0001.pem 464s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-16232 464s + local key_cn 464s + local key_name 464s + local tokens_dir 464s + local output_cert_file 464s + token_name= 464s ++ basename /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 464s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 464s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-trusted-certificate-0001.pem 464s ++ sed -n 's/ *commonName *= //p' 464s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 464s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 464s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-9bLCCU/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 464s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-9bLCCU/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 464s ++ basename /tmp/sssd-softhsm2-9bLCCU/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 464s + tokens_dir=/tmp/sssd-softhsm2-9bLCCU/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 464s + token_name='Test Organization Sub Int Token' 464s + '[' '!' -e /tmp/sssd-softhsm2-9bLCCU/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 464s + '[' '!' -d /tmp/sssd-softhsm2-9bLCCU/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 464s + echo 'Test Organization Sub Int Token' 464s + '[' -n '' ']' 464s + local output_base_name=SSSD-child-29120 464s + local output_file=/tmp/sssd-softhsm2-9bLCCU/SSSD-child-29120.output 464s + output_cert_file=/tmp/sssd-softhsm2-9bLCCU/SSSD-child-29120.pem 464s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-9bLCCU/test-full-chain-CA.pem 464s Test Organization Sub Int Token 464s [p11_child[2609]] [main] (0x0400): p11_child started. 464s [p11_child[2609]] [main] (0x2000): Running in [pre-auth] mode. 464s [p11_child[2609]] [main] (0x2000): Running with effective IDs: [0][0]. 464s [p11_child[2609]] [main] (0x2000): Running with real IDs [0][0]. 464s [p11_child[2609]] [do_card] (0x4000): Module List: 464s [p11_child[2609]] [do_card] (0x4000): common name: [softhsm2]. 464s [p11_child[2609]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 464s [p11_child[2609]] [do_card] (0x4000): Description [SoftHSM slot ID 0x7ccbfbf6] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 464s [p11_child[2609]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 464s [p11_child[2609]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x7ccbfbf6][2093743094] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 464s [p11_child[2609]] [do_card] (0x4000): Login NOT required. 464s [p11_child[2609]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 464s [p11_child[2609]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 464s [p11_child[2609]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Sub Int Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 464s [p11_child[2609]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x7ccbfbf6;slot-manufacturer=SoftHSM%20project;slot-id=2093743094;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=4415d92dfccbfbf6;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 464s [p11_child[2609]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 464s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-9bLCCU/SSSD-child-29120.output 464s + echo '-----BEGIN CERTIFICATE-----' 464s + tail -n1 /tmp/sssd-softhsm2-9bLCCU/SSSD-child-29120.output 464s + echo '-----END CERTIFICATE-----' 464s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-9bLCCU/SSSD-child-29120.pem 464s Certificate: 464s Data: 464s Version: 3 (0x2) 464s Serial Number: 5 (0x5) 464s Signature Algorithm: sha256WithRSAEncryption 464s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 464s Validity 464s Not Before: Nov 15 22:51:19 2024 GMT 464s Not After : Nov 15 22:51:19 2025 GMT 464s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 464s Subject Public Key Info: 464s Public Key Algorithm: rsaEncryption 464s Public-Key: (1024 bit) 464s Modulus: 464s 00:9f:0b:59:f9:86:33:69:c9:9d:ce:dd:9f:6c:3c: 464s 8f:99:4c:ef:c3:a3:4f:eb:e0:75:c3:2b:63:91:cb: 464s 6c:1d:4e:87:09:42:fa:ce:bf:19:58:73:31:95:35: 464s a4:63:e4:8a:d4:6a:61:39:61:77:d2:3f:40:e3:67: 464s 61:8b:c6:fc:46:a8:21:b3:9b:f6:15:49:f6:f7:25: 464s cb:f4:cb:47:de:da:18:2e:b4:7a:d9:4e:1b:2c:09: 464s 80:20:39:ea:e8:3b:a2:16:92:94:1e:04:9a:8b:93: 464s 8b:44:c4:5f:81:05:66:9a:ad:c5:0a:d1:b8:ed:23: 464s 70:7a:01:0e:a2:06:95:33:39 464s Exponent: 65537 (0x10001) 464s X509v3 extensions: 464s X509v3 Authority Key Identifier: 464s 8D:43:1A:C1:9D:24:18:DA:45:27:0D:22:7F:EC:2E:E1:E9:FB:8D:BE 464s X509v3 Basic Constraints: 464s CA:FALSE 464s Netscape Cert Type: 464s SSL Client, S/MIME 464s Netscape Comment: 464s Test Organization Sub Intermediate CA trusted Certificate 464s X509v3 Subject Key Identifier: 464s 52:9F:42:82:0C:64:51:ED:F2:D3:88:B5:78:15:28:B4:B0:5D:CB:D4 464s X509v3 Key Usage: critical 464s Digital Signature, Non Repudiation, Key Encipherment 464s X509v3 Extended Key Usage: 464s TLS Web Client Authentication, E-mail Protection 464s X509v3 Subject Alternative Name: 464s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 464s Signature Algorithm: sha256WithRSAEncryption 464s Signature Value: 464s a2:04:ef:13:16:17:e9:be:50:13:a2:28:ef:87:6e:d9:37:d3: 464s 72:54:11:f3:ea:61:df:e1:28:75:ed:85:6f:1d:d5:ab:3f:5d: 464s 5c:e4:58:21:de:80:e0:f7:f4:84:61:09:49:3d:9b:54:27:fe: 464s 11:7a:ab:0c:cb:3b:ee:38:bd:2c:8e:8f:a5:88:2a:3f:7a:f6: 464s 17:cf:d8:6c:61:f5:a0:8b:95:37:c9:9d:f8:0a:f6:d7:42:9c: 464s c9:82:20:a8:56:74:e2:4b:80:c6:91:1d:47:d7:a1:04:f4:92: 464s f3:fd:6e:9a:b0:74:f4:f3:db:7d:e4:da:cc:cf:6f:bb:ae:f3: 464s e3:0d 464s + local found_md5 expected_md5 464s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-trusted-certificate-0001.pem 464s + expected_md5=Modulus=9F0B59F9863369C99DCEDD9F6C3C8F994CEFC3A34FEBE075C32B6391CB6C1D4E870942FACEBF195873319535A463E48AD46A61396177D23F40E367618BC6FC46A821B39BF61549F6F725CBF4CB47DEDA182EB47AD94E1B2C09802039EAE83BA21692941E049A8B938B44C45F8105669AADC50AD1B8ED23707A010EA206953339 464s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-9bLCCU/SSSD-child-29120.pem 464s + found_md5=Modulus=9F0B59F9863369C99DCEDD9F6C3C8F994CEFC3A34FEBE075C32B6391CB6C1D4E870942FACEBF195873319535A463E48AD46A61396177D23F40E367618BC6FC46A821B39BF61549F6F725CBF4CB47DEDA182EB47AD94E1B2C09802039EAE83BA21692941E049A8B938B44C45F8105669AADC50AD1B8ED23707A010EA206953339 464s + '[' Modulus=9F0B59F9863369C99DCEDD9F6C3C8F994CEFC3A34FEBE075C32B6391CB6C1D4E870942FACEBF195873319535A463E48AD46A61396177D23F40E367618BC6FC46A821B39BF61549F6F725CBF4CB47DEDA182EB47AD94E1B2C09802039EAE83BA21692941E049A8B938B44C45F8105669AADC50AD1B8ED23707A010EA206953339 '!=' Modulus=9F0B59F9863369C99DCEDD9F6C3C8F994CEFC3A34FEBE075C32B6391CB6C1D4E870942FACEBF195873319535A463E48AD46A61396177D23F40E367618BC6FC46A821B39BF61549F6F725CBF4CB47DEDA182EB47AD94E1B2C09802039EAE83BA21692941E049A8B938B44C45F8105669AADC50AD1B8ED23707A010EA206953339 ']' 464s + output_file=/tmp/sssd-softhsm2-9bLCCU/SSSD-child-29120-auth.output 464s ++ basename /tmp/sssd-softhsm2-9bLCCU/SSSD-child-29120-auth.output .output 464s + output_cert_file=/tmp/sssd-softhsm2-9bLCCU/SSSD-child-29120-auth.pem 464s + echo -n 053350 464s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-9bLCCU/test-full-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 '' --token_name 'Test Organization Sub Int Token' --module_name /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so 464s [p11_child[2617]] [main] (0x0400): p11_child started. 464s [p11_child[2617]] [main] (0x2000): Running in [auth] mode. 464s [p11_child[2617]] [main] (0x2000): Running with effective IDs: [0][0]. 464s [p11_child[2617]] [main] (0x2000): Running with real IDs [0][0]. 464s [p11_child[2617]] [do_card] (0x4000): Module List: 464s [p11_child[2617]] [do_card] (0x4000): common name: [softhsm2]. 464s [p11_child[2617]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 464s [p11_child[2617]] [do_card] (0x4000): Description [SoftHSM slot ID 0x7ccbfbf6] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 464s [p11_child[2617]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 464s [p11_child[2617]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x7ccbfbf6][2093743094] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 464s [p11_child[2617]] [do_card] (0x4000): Login required. 464s [p11_child[2617]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 464s [p11_child[2617]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 464s [p11_child[2617]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so Test Organization Sub Int Token Test Organization Sub Int Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 464s [p11_child[2617]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x7ccbfbf6;slot-manufacturer=SoftHSM%20project;slot-id=2093743094;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=4415d92dfccbfbf6;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 464s [p11_child[2617]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 464s [p11_child[2617]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 464s [p11_child[2617]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 464s [p11_child[2617]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 464s [p11_child[2617]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 464s [p11_child[2617]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 464s [p11_child[2617]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 464s [p11_child[2617]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 464s [p11_child[2617]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 464s [p11_child[2617]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 464s [p11_child[2617]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 464s [p11_child[2617]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 464s [p11_child[2617]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 464s [p11_child[2617]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 464s [p11_child[2617]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 464s [p11_child[2617]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 464s [p11_child[2617]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 464s [p11_child[2617]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 464s [p11_child[2617]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 464s [p11_child[2617]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 464s [p11_child[2617]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 464s [p11_child[2617]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 464s [p11_child[2617]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 464s [p11_child[2617]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 464s [p11_child[2617]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 464s [p11_child[2617]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 464s [p11_child[2617]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 464s [p11_child[2617]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 464s [p11_child[2617]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 464s [p11_child[2617]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 464s [p11_child[2617]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 464s [p11_child[2617]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 464s [p11_child[2617]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 464s [p11_child[2617]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 464s [p11_child[2617]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 464s [p11_child[2617]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 464s [p11_child[2617]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 464s [p11_child[2617]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 464s [p11_child[2617]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 464s [p11_child[2617]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 464s [p11_child[2617]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 464s [p11_child[2617]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 464s [p11_child[2617]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 464s [p11_child[2617]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 464s [p11_child[2617]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 464s [p11_child[2617]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 464s [p11_child[2617]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 464s [p11_child[2617]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 464s [p11_child[2617]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 464s [p11_child[2617]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 464s [p11_child[2617]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 464s [p11_child[2617]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 464s [p11_child[2617]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 464s [p11_child[2617]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 464s [p11_child[2617]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 464s [p11_child[2617]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 464s [p11_child[2617]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 464s [p11_child[2617]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 464s [p11_child[2617]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 464s [p11_child[2617]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 464s [p11_child[2617]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 464s [p11_child[2617]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 464s [p11_child[2617]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 464s [p11_child[2617]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 464s [p11_child[2617]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 464s [p11_child[2617]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 464s [p11_child[2617]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 464s [p11_child[2617]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 464s [p11_child[2617]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 464s [p11_child[2617]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 464s [p11_child[2617]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 464s [p11_child[2617]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 464s [p11_child[2617]] [do_card] (0x4000): Certificate verified and validated. 464s [p11_child[2617]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 464s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-9bLCCU/SSSD-child-29120-auth.output 464s + echo '-----BEGIN CERTIFICATE-----' 464s + tail -n1 /tmp/sssd-softhsm2-9bLCCU/SSSD-child-29120-auth.output 464s + echo '-----END CERTIFICATE-----' 464s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-9bLCCU/SSSD-child-29120-auth.pem 464s Certificate: 464s Data: 464s Version: 3 (0x2) 464s Serial Number: 5 (0x5) 464s Signature Algorithm: sha256WithRSAEncryption 464s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 464s Validity 464s Not Before: Nov 15 22:51:19 2024 GMT 464s Not After : Nov 15 22:51:19 2025 GMT 464s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 464s Subject Public Key Info: 464s Public Key Algorithm: rsaEncryption 464s Public-Key: (1024 bit) 464s Modulus: 464s 00:9f:0b:59:f9:86:33:69:c9:9d:ce:dd:9f:6c:3c: 464s 8f:99:4c:ef:c3:a3:4f:eb:e0:75:c3:2b:63:91:cb: 464s 6c:1d:4e:87:09:42:fa:ce:bf:19:58:73:31:95:35: 464s a4:63:e4:8a:d4:6a:61:39:61:77:d2:3f:40:e3:67: 464s 61:8b:c6:fc:46:a8:21:b3:9b:f6:15:49:f6:f7:25: 464s cb:f4:cb:47:de:da:18:2e:b4:7a:d9:4e:1b:2c:09: 464s 80:20:39:ea:e8:3b:a2:16:92:94:1e:04:9a:8b:93: 464s 8b:44:c4:5f:81:05:66:9a:ad:c5:0a:d1:b8:ed:23: 464s 70:7a:01:0e:a2:06:95:33:39 464s Exponent: 65537 (0x10001) 464s X509v3 extensions: 464s X509v3 Authority Key Identifier: 464s 8D:43:1A:C1:9D:24:18:DA:45:27:0D:22:7F:EC:2E:E1:E9:FB:8D:BE 464s X509v3 Basic Constraints: 464s CA:FALSE 464s Netscape Cert Type: 464s SSL Client, S/MIME 464s Netscape Comment: 464s Test Organization Sub Intermediate CA trusted Certificate 464s X509v3 Subject Key Identifier: 464s 52:9F:42:82:0C:64:51:ED:F2:D3:88:B5:78:15:28:B4:B0:5D:CB:D4 464s X509v3 Key Usage: critical 464s Digital Signature, Non Repudiation, Key Encipherment 464s X509v3 Extended Key Usage: 464s TLS Web Client Authentication, E-mail Protection 464s X509v3 Subject Alternative Name: 464s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 464s Signature Algorithm: sha256WithRSAEncryption 464s Signature Value: 464s a2:04:ef:13:16:17:e9:be:50:13:a2:28:ef:87:6e:d9:37:d3: 464s 72:54:11:f3:ea:61:df:e1:28:75:ed:85:6f:1d:d5:ab:3f:5d: 464s 5c:e4:58:21:de:80:e0:f7:f4:84:61:09:49:3d:9b:54:27:fe: 464s 11:7a:ab:0c:cb:3b:ee:38:bd:2c:8e:8f:a5:88:2a:3f:7a:f6: 464s 17:cf:d8:6c:61:f5:a0:8b:95:37:c9:9d:f8:0a:f6:d7:42:9c: 464s c9:82:20:a8:56:74:e2:4b:80:c6:91:1d:47:d7:a1:04:f4:92: 464s f3:fd:6e:9a:b0:74:f4:f3:db:7d:e4:da:cc:cf:6f:bb:ae:f3: 464s e3:0d 464s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-9bLCCU/SSSD-child-29120-auth.pem 464s + found_md5=Modulus=9F0B59F9863369C99DCEDD9F6C3C8F994CEFC3A34FEBE075C32B6391CB6C1D4E870942FACEBF195873319535A463E48AD46A61396177D23F40E367618BC6FC46A821B39BF61549F6F725CBF4CB47DEDA182EB47AD94E1B2C09802039EAE83BA21692941E049A8B938B44C45F8105669AADC50AD1B8ED23707A010EA206953339 464s + '[' Modulus=9F0B59F9863369C99DCEDD9F6C3C8F994CEFC3A34FEBE075C32B6391CB6C1D4E870942FACEBF195873319535A463E48AD46A61396177D23F40E367618BC6FC46A821B39BF61549F6F725CBF4CB47DEDA182EB47AD94E1B2C09802039EAE83BA21692941E049A8B938B44C45F8105669AADC50AD1B8ED23707A010EA206953339 '!=' Modulus=9F0B59F9863369C99DCEDD9F6C3C8F994CEFC3A34FEBE075C32B6391CB6C1D4E870942FACEBF195873319535A463E48AD46A61396177D23F40E367618BC6FC46A821B39BF61549F6F725CBF4CB47DEDA182EB47AD94E1B2C09802039EAE83BA21692941E049A8B938B44C45F8105669AADC50AD1B8ED23707A010EA206953339 ']' 464s + valid_certificate /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-16232 /tmp/sssd-softhsm2-9bLCCU/test-full-chain-CA.pem partial_chain 464s + check_certificate /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-16232 /tmp/sssd-softhsm2-9bLCCU/test-full-chain-CA.pem partial_chain 464s + local certificate=/tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-trusted-certificate-0001.pem 464s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-16232 464s + local key_ring=/tmp/sssd-softhsm2-9bLCCU/test-full-chain-CA.pem 464s + local verify_option=partial_chain 464s + prepare_softhsm2_card /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-16232 464s + local certificate=/tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-trusted-certificate-0001.pem 464s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-16232 464s + local key_cn 464s + local key_name 464s + local tokens_dir 464s + local output_cert_file 464s + token_name= 464s ++ basename /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 464s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 464s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-trusted-certificate-0001.pem 464s ++ sed -n 's/ *commonName *= //p' 464s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 464s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 464s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-9bLCCU/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 464s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-9bLCCU/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 464s ++ basename /tmp/sssd-softhsm2-9bLCCU/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 464s + tokens_dir=/tmp/sssd-softhsm2-9bLCCU/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 464s + token_name='Test Organization Sub Int Token' 464s + '[' '!' -e /tmp/sssd-softhsm2-9bLCCU/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 464s + '[' '!' -d /tmp/sssd-softhsm2-9bLCCU/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 464s + echo 'Test Organization Sub Int Token' 464s + '[' -n partial_chain ']' 464s + local verify_arg=--verify=partial_chain 464s + local output_base_name=SSSD-child-31387 464s + local output_file=/tmp/sssd-softhsm2-9bLCCU/SSSD-child-31387.output 464s + output_cert_file=/tmp/sssd-softhsm2-9bLCCU/SSSD-child-31387.pem 464s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-9bLCCU/test-full-chain-CA.pem 464s Test Organization Sub Int Token 464s [p11_child[2627]] [main] (0x0400): p11_child started. 464s [p11_child[2627]] [main] (0x2000): Running in [pre-auth] mode. 464s [p11_child[2627]] [main] (0x2000): Running with effective IDs: [0][0]. 464s [p11_child[2627]] [main] (0x2000): Running with real IDs [0][0]. 464s [p11_child[2627]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 464s [p11_child[2627]] [do_card] (0x4000): Module List: 464s [p11_child[2627]] [do_card] (0x4000): common name: [softhsm2]. 464s [p11_child[2627]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 464s [p11_child[2627]] [do_card] (0x4000): Description [SoftHSM slot ID 0x7ccbfbf6] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 464s [p11_child[2627]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 464s [p11_child[2627]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x7ccbfbf6][2093743094] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 464s [p11_child[2627]] [do_card] (0x4000): Login NOT required. 464s [p11_child[2627]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 464s [p11_child[2627]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 464s [p11_child[2627]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Sub Int Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 464s [p11_child[2627]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x7ccbfbf6;slot-manufacturer=SoftHSM%20project;slot-id=2093743094;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=4415d92dfccbfbf6;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 464s [p11_child[2627]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 464s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-9bLCCU/SSSD-child-31387.output 464s + echo '-----BEGIN CERTIFICATE-----' 464s + tail -n1 /tmp/sssd-softhsm2-9bLCCU/SSSD-child-31387.output 464s + echo '-----END CERTIFICATE-----' 464s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-9bLCCU/SSSD-child-31387.pem 464s Certificate: 464s Data: 464s Version: 3 (0x2) 464s Serial Number: 5 (0x5) 464s Signature Algorithm: sha256WithRSAEncryption 464s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 464s Validity 464s Not Before: Nov 15 22:51:19 2024 GMT 464s Not After : Nov 15 22:51:19 2025 GMT 464s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 464s Subject Public Key Info: 464s Public Key Algorithm: rsaEncryption 464s Public-Key: (1024 bit) 464s Modulus: 464s 00:9f:0b:59:f9:86:33:69:c9:9d:ce:dd:9f:6c:3c: 464s 8f:99:4c:ef:c3:a3:4f:eb:e0:75:c3:2b:63:91:cb: 464s 6c:1d:4e:87:09:42:fa:ce:bf:19:58:73:31:95:35: 464s a4:63:e4:8a:d4:6a:61:39:61:77:d2:3f:40:e3:67: 464s 61:8b:c6:fc:46:a8:21:b3:9b:f6:15:49:f6:f7:25: 464s cb:f4:cb:47:de:da:18:2e:b4:7a:d9:4e:1b:2c:09: 464s 80:20:39:ea:e8:3b:a2:16:92:94:1e:04:9a:8b:93: 464s 8b:44:c4:5f:81:05:66:9a:ad:c5:0a:d1:b8:ed:23: 464s 70:7a:01:0e:a2:06:95:33:39 464s Exponent: 65537 (0x10001) 464s X509v3 extensions: 464s X509v3 Authority Key Identifier: 464s 8D:43:1A:C1:9D:24:18:DA:45:27:0D:22:7F:EC:2E:E1:E9:FB:8D:BE 464s X509v3 Basic Constraints: 464s CA:FALSE 464s Netscape Cert Type: 464s SSL Client, S/MIME 464s Netscape Comment: 464s Test Organization Sub Intermediate CA trusted Certificate 464s X509v3 Subject Key Identifier: 464s 52:9F:42:82:0C:64:51:ED:F2:D3:88:B5:78:15:28:B4:B0:5D:CB:D4 464s X509v3 Key Usage: critical 464s Digital Signature, Non Repudiation, Key Encipherment 464s X509v3 Extended Key Usage: 464s TLS Web Client Authentication, E-mail Protection 464s X509v3 Subject Alternative Name: 464s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 464s Signature Algorithm: sha256WithRSAEncryption 464s Signature Value: 464s a2:04:ef:13:16:17:e9:be:50:13:a2:28:ef:87:6e:d9:37:d3: 464s 72:54:11:f3:ea:61:df:e1:28:75:ed:85:6f:1d:d5:ab:3f:5d: 464s 5c:e4:58:21:de:80:e0:f7:f4:84:61:09:49:3d:9b:54:27:fe: 464s 11:7a:ab:0c:cb:3b:ee:38:bd:2c:8e:8f:a5:88:2a:3f:7a:f6: 464s 17:cf:d8:6c:61:f5:a0:8b:95:37:c9:9d:f8:0a:f6:d7:42:9c: 464s c9:82:20:a8:56:74:e2:4b:80:c6:91:1d:47:d7:a1:04:f4:92: 464s f3:fd:6e:9a:b0:74:f4:f3:db:7d:e4:da:cc:cf:6f:bb:ae:f3: 464s e3:0d 464s + local found_md5 expected_md5 464s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-trusted-certificate-0001.pem 465s + expected_md5=Modulus=9F0B59F9863369C99DCEDD9F6C3C8F994CEFC3A34FEBE075C32B6391CB6C1D4E870942FACEBF195873319535A463E48AD46A61396177D23F40E367618BC6FC46A821B39BF61549F6F725CBF4CB47DEDA182EB47AD94E1B2C09802039EAE83BA21692941E049A8B938B44C45F8105669AADC50AD1B8ED23707A010EA206953339 465s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-9bLCCU/SSSD-child-31387.pem 465s + found_md5=Modulus=9F0B59F9863369C99DCEDD9F6C3C8F994CEFC3A34FEBE075C32B6391CB6C1D4E870942FACEBF195873319535A463E48AD46A61396177D23F40E367618BC6FC46A821B39BF61549F6F725CBF4CB47DEDA182EB47AD94E1B2C09802039EAE83BA21692941E049A8B938B44C45F8105669AADC50AD1B8ED23707A010EA206953339 465s + '[' Modulus=9F0B59F9863369C99DCEDD9F6C3C8F994CEFC3A34FEBE075C32B6391CB6C1D4E870942FACEBF195873319535A463E48AD46A61396177D23F40E367618BC6FC46A821B39BF61549F6F725CBF4CB47DEDA182EB47AD94E1B2C09802039EAE83BA21692941E049A8B938B44C45F8105669AADC50AD1B8ED23707A010EA206953339 '!=' Modulus=9F0B59F9863369C99DCEDD9F6C3C8F994CEFC3A34FEBE075C32B6391CB6C1D4E870942FACEBF195873319535A463E48AD46A61396177D23F40E367618BC6FC46A821B39BF61549F6F725CBF4CB47DEDA182EB47AD94E1B2C09802039EAE83BA21692941E049A8B938B44C45F8105669AADC50AD1B8ED23707A010EA206953339 ']' 465s + output_file=/tmp/sssd-softhsm2-9bLCCU/SSSD-child-31387-auth.output 465s ++ basename /tmp/sssd-softhsm2-9bLCCU/SSSD-child-31387-auth.output .output 465s + output_cert_file=/tmp/sssd-softhsm2-9bLCCU/SSSD-child-31387-auth.pem 465s + echo -n 053350 465s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-9bLCCU/test-full-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Sub Int Token' --module_name /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so 465s [p11_child[2635]] [main] (0x0400): p11_child started. 465s [p11_child[2635]] [main] (0x2000): Running in [auth] mode. 465s [p11_child[2635]] [main] (0x2000): Running with effective IDs: [0][0]. 465s [p11_child[2635]] [main] (0x2000): Running with real IDs [0][0]. 465s [p11_child[2635]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 465s [p11_child[2635]] [do_card] (0x4000): Module List: 465s [p11_child[2635]] [do_card] (0x4000): common name: [softhsm2]. 465s [p11_child[2635]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 465s [p11_child[2635]] [do_card] (0x4000): Description [SoftHSM slot ID 0x7ccbfbf6] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 465s [p11_child[2635]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 465s [p11_child[2635]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x7ccbfbf6][2093743094] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 465s [p11_child[2635]] [do_card] (0x4000): Login required. 465s [p11_child[2635]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 465s [p11_child[2635]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 465s [p11_child[2635]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so Test Organization Sub Int Token Test Organization Sub Int Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 465s [p11_child[2635]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x7ccbfbf6;slot-manufacturer=SoftHSM%20project;slot-id=2093743094;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=4415d92dfccbfbf6;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 465s [p11_child[2635]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 465s [p11_child[2635]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 465s [p11_child[2635]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 465s [p11_child[2635]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 465s [p11_child[2635]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 465s [p11_child[2635]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 465s [p11_child[2635]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 465s [p11_child[2635]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 465s [p11_child[2635]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 465s [p11_child[2635]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 465s [p11_child[2635]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 465s [p11_child[2635]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 465s [p11_child[2635]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 465s [p11_child[2635]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 465s [p11_child[2635]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 465s [p11_child[2635]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 465s [p11_child[2635]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 465s [p11_child[2635]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 465s [p11_child[2635]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 465s [p11_child[2635]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 465s [p11_child[2635]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 465s [p11_child[2635]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 465s [p11_child[2635]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 465s [p11_child[2635]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 465s [p11_child[2635]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 465s [p11_child[2635]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 465s [p11_child[2635]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 465s [p11_child[2635]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 465s [p11_child[2635]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 465s [p11_child[2635]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 465s [p11_child[2635]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 465s [p11_child[2635]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 465s [p11_child[2635]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 465s [p11_child[2635]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 465s [p11_child[2635]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 465s [p11_child[2635]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 465s [p11_child[2635]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 465s [p11_child[2635]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 465s [p11_child[2635]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 465s [p11_child[2635]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 465s [p11_child[2635]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 465s [p11_child[2635]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 465s [p11_child[2635]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 465s [p11_child[2635]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 465s [p11_child[2635]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 465s [p11_child[2635]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 465s [p11_child[2635]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 465s [p11_child[2635]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 465s [p11_child[2635]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 465s [p11_child[2635]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 465s [p11_child[2635]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 465s [p11_child[2635]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 465s [p11_child[2635]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 465s [p11_child[2635]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 465s [p11_child[2635]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 465s [p11_child[2635]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 465s [p11_child[2635]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 465s [p11_child[2635]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 465s [p11_child[2635]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 465s [p11_child[2635]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 465s [p11_child[2635]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 465s [p11_child[2635]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 465s [p11_child[2635]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 465s [p11_child[2635]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 465s [p11_child[2635]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 465s [p11_child[2635]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 465s [p11_child[2635]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 465s [p11_child[2635]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 465s [p11_child[2635]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 465s [p11_child[2635]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 465s [p11_child[2635]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 465s [p11_child[2635]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 465s [p11_child[2635]] [do_card] (0x4000): Certificate verified and validated. 465s [p11_child[2635]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 465s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-9bLCCU/SSSD-child-31387-auth.output 465s + echo '-----BEGIN CERTIFICATE-----' 465s + tail -n1 /tmp/sssd-softhsm2-9bLCCU/SSSD-child-31387-auth.output 465s + echo '-----END CERTIFICATE-----' 465s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-9bLCCU/SSSD-child-31387-auth.pem 465s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-9bLCCU/SSSD-child-31387-auth.pem 465s Certificate: 465s Data: 465s Version: 3 (0x2) 465s Serial Number: 5 (0x5) 465s Signature Algorithm: sha256WithRSAEncryption 465s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 465s Validity 465s Not Before: Nov 15 22:51:19 2024 GMT 465s Not After : Nov 15 22:51:19 2025 GMT 465s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 465s Subject Public Key Info: 465s Public Key Algorithm: rsaEncryption 465s Public-Key: (1024 bit) 465s Modulus: 465s 00:9f:0b:59:f9:86:33:69:c9:9d:ce:dd:9f:6c:3c: 465s 8f:99:4c:ef:c3:a3:4f:eb:e0:75:c3:2b:63:91:cb: 465s 6c:1d:4e:87:09:42:fa:ce:bf:19:58:73:31:95:35: 465s a4:63:e4:8a:d4:6a:61:39:61:77:d2:3f:40:e3:67: 465s 61:8b:c6:fc:46:a8:21:b3:9b:f6:15:49:f6:f7:25: 465s cb:f4:cb:47:de:da:18:2e:b4:7a:d9:4e:1b:2c:09: 465s 80:20:39:ea:e8:3b:a2:16:92:94:1e:04:9a:8b:93: 465s 8b:44:c4:5f:81:05:66:9a:ad:c5:0a:d1:b8:ed:23: 465s 70:7a:01:0e:a2:06:95:33:39 465s Exponent: 65537 (0x10001) 465s X509v3 extensions: 465s X509v3 Authority Key Identifier: 465s 8D:43:1A:C1:9D:24:18:DA:45:27:0D:22:7F:EC:2E:E1:E9:FB:8D:BE 465s X509v3 Basic Constraints: 465s CA:FALSE 465s Netscape Cert Type: 465s SSL Client, S/MIME 465s Netscape Comment: 465s Test Organization Sub Intermediate CA trusted Certificate 465s X509v3 Subject Key Identifier: 465s 52:9F:42:82:0C:64:51:ED:F2:D3:88:B5:78:15:28:B4:B0:5D:CB:D4 465s X509v3 Key Usage: critical 465s Digital Signature, Non Repudiation, Key Encipherment 465s X509v3 Extended Key Usage: 465s TLS Web Client Authentication, E-mail Protection 465s X509v3 Subject Alternative Name: 465s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 465s Signature Algorithm: sha256WithRSAEncryption 465s Signature Value: 465s a2:04:ef:13:16:17:e9:be:50:13:a2:28:ef:87:6e:d9:37:d3: 465s 72:54:11:f3:ea:61:df:e1:28:75:ed:85:6f:1d:d5:ab:3f:5d: 465s 5c:e4:58:21:de:80:e0:f7:f4:84:61:09:49:3d:9b:54:27:fe: 465s 11:7a:ab:0c:cb:3b:ee:38:bd:2c:8e:8f:a5:88:2a:3f:7a:f6: 465s 17:cf:d8:6c:61:f5:a0:8b:95:37:c9:9d:f8:0a:f6:d7:42:9c: 465s c9:82:20:a8:56:74:e2:4b:80:c6:91:1d:47:d7:a1:04:f4:92: 465s f3:fd:6e:9a:b0:74:f4:f3:db:7d:e4:da:cc:cf:6f:bb:ae:f3: 465s e3:0d 465s + found_md5=Modulus=9F0B59F9863369C99DCEDD9F6C3C8F994CEFC3A34FEBE075C32B6391CB6C1D4E870942FACEBF195873319535A463E48AD46A61396177D23F40E367618BC6FC46A821B39BF61549F6F725CBF4CB47DEDA182EB47AD94E1B2C09802039EAE83BA21692941E049A8B938B44C45F8105669AADC50AD1B8ED23707A010EA206953339 465s + '[' Modulus=9F0B59F9863369C99DCEDD9F6C3C8F994CEFC3A34FEBE075C32B6391CB6C1D4E870942FACEBF195873319535A463E48AD46A61396177D23F40E367618BC6FC46A821B39BF61549F6F725CBF4CB47DEDA182EB47AD94E1B2C09802039EAE83BA21692941E049A8B938B44C45F8105669AADC50AD1B8ED23707A010EA206953339 '!=' Modulus=9F0B59F9863369C99DCEDD9F6C3C8F994CEFC3A34FEBE075C32B6391CB6C1D4E870942FACEBF195873319535A463E48AD46A61396177D23F40E367618BC6FC46A821B39BF61549F6F725CBF4CB47DEDA182EB47AD94E1B2C09802039EAE83BA21692941E049A8B938B44C45F8105669AADC50AD1B8ED23707A010EA206953339 ']' 465s + invalid_certificate /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-16232 /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA.pem 465s + check_certificate /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-16232 /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA.pem 465s + local certificate=/tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-trusted-certificate-0001.pem 465s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-16232 465s + local key_ring=/tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA.pem 465s + local verify_option= 465s + prepare_softhsm2_card /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-16232 465s + local certificate=/tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-trusted-certificate-0001.pem 465s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-16232 465s + local key_cn 465s + local key_name 465s + local tokens_dir 465s + local output_cert_file 465s + token_name= 465s ++ basename /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 465s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 465s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-trusted-certificate-0001.pem 465s ++ sed -n 's/ *commonName *= //p' 465s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 465s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 465s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-9bLCCU/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 465s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-9bLCCU/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 465s ++ basename /tmp/sssd-softhsm2-9bLCCU/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 465s Test Organization Sub Int Token 465s + tokens_dir=/tmp/sssd-softhsm2-9bLCCU/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 465s + token_name='Test Organization Sub Int Token' 465s + '[' '!' -e /tmp/sssd-softhsm2-9bLCCU/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 465s + '[' '!' -d /tmp/sssd-softhsm2-9bLCCU/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 465s + echo 'Test Organization Sub Int Token' 465s + '[' -n '' ']' 465s + local output_base_name=SSSD-child-28158 465s + local output_file=/tmp/sssd-softhsm2-9bLCCU/SSSD-child-28158.output 465s + output_cert_file=/tmp/sssd-softhsm2-9bLCCU/SSSD-child-28158.pem 465s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA.pem 465s [p11_child[2645]] [main] (0x0400): p11_child started. 465s [p11_child[2645]] [main] (0x2000): Running in [pre-auth] mode. 465s [p11_child[2645]] [main] (0x2000): Running with effective IDs: [0][0]. 465s [p11_child[2645]] [main] (0x2000): Running with real IDs [0][0]. 465s [p11_child[2645]] [do_card] (0x4000): Module List: 465s [p11_child[2645]] [do_card] (0x4000): common name: [softhsm2]. 465s [p11_child[2645]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 465s [p11_child[2645]] [do_card] (0x4000): Description [SoftHSM slot ID 0x7ccbfbf6] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 465s [p11_child[2645]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 465s [p11_child[2645]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x7ccbfbf6][2093743094] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 465s [p11_child[2645]] [do_card] (0x4000): Login NOT required. 465s [p11_child[2645]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 465s [p11_child[2645]] [do_verification] (0x0040): X509_verify_cert failed [0]. 465s [p11_child[2645]] [do_verification] (0x0040): X509_verify_cert failed [2][unable to get issuer certificate]. 465s [p11_child[2645]] [read_certs] (0x0040): Certificate [Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] not valid, skipping. 465s [p11_child[2645]] [do_card] (0x4000): No certificate found. 465s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-9bLCCU/SSSD-child-28158.output 465s + return 2 465s + invalid_certificate /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-16232 /tmp/sssd-softhsm2-9bLCCU/test-root-intermediate-chain-CA.pem partial_chain 465s + check_certificate /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-16232 /tmp/sssd-softhsm2-9bLCCU/test-root-intermediate-chain-CA.pem partial_chain 465s + local certificate=/tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-trusted-certificate-0001.pem 465s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-16232 465s + local key_ring=/tmp/sssd-softhsm2-9bLCCU/test-root-intermediate-chain-CA.pem 465s + local verify_option=partial_chain 465s + prepare_softhsm2_card /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-16232 465s + local certificate=/tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-trusted-certificate-0001.pem 465s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-16232 465s + local key_cn 465s + local key_name 465s + local tokens_dir 465s + local output_cert_file 465s + token_name= 465s ++ basename /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 465s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 465s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-trusted-certificate-0001.pem 465s ++ sed -n 's/ *commonName *= //p' 465s Test Organization Sub Int Token 465s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 465s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 465s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-9bLCCU/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 465s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-9bLCCU/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 465s ++ basename /tmp/sssd-softhsm2-9bLCCU/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 465s + tokens_dir=/tmp/sssd-softhsm2-9bLCCU/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 465s + token_name='Test Organization Sub Int Token' 465s + '[' '!' -e /tmp/sssd-softhsm2-9bLCCU/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 465s + '[' '!' -d /tmp/sssd-softhsm2-9bLCCU/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 465s + echo 'Test Organization Sub Int Token' 465s + '[' -n partial_chain ']' 465s + local verify_arg=--verify=partial_chain 465s + local output_base_name=SSSD-child-31647 465s + local output_file=/tmp/sssd-softhsm2-9bLCCU/SSSD-child-31647.output 465s + output_cert_file=/tmp/sssd-softhsm2-9bLCCU/SSSD-child-31647.pem 465s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-9bLCCU/test-root-intermediate-chain-CA.pem 465s [p11_child[2652]] [main] (0x0400): p11_child started. 465s [p11_child[2652]] [main] (0x2000): Running in [pre-auth] mode. 465s [p11_child[2652]] [main] (0x2000): Running with effective IDs: [0][0]. 465s [p11_child[2652]] [main] (0x2000): Running with real IDs [0][0]. 465s [p11_child[2652]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 465s [p11_child[2652]] [do_card] (0x4000): Module List: 465s [p11_child[2652]] [do_card] (0x4000): common name: [softhsm2]. 465s [p11_child[2652]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 465s [p11_child[2652]] [do_card] (0x4000): Description [SoftHSM slot ID 0x7ccbfbf6] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 465s [p11_child[2652]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 465s [p11_child[2652]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x7ccbfbf6][2093743094] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 465s [p11_child[2652]] [do_card] (0x4000): Login NOT required. 465s [p11_child[2652]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 465s [p11_child[2652]] [do_verification] (0x0040): X509_verify_cert failed [0]. 465s [p11_child[2652]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 465s [p11_child[2652]] [read_certs] (0x0040): Certificate [Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] not valid, skipping. 465s [p11_child[2652]] [do_card] (0x4000): No certificate found. 465s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-9bLCCU/SSSD-child-31647.output 465s + return 2 465s + valid_certificate /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-16232 /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA.pem partial_chain 465s + check_certificate /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-16232 /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA.pem partial_chain 465s + local certificate=/tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-trusted-certificate-0001.pem 465s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-16232 465s + local key_ring=/tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA.pem 465s + local verify_option=partial_chain 465s + prepare_softhsm2_card /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-16232 465s + local certificate=/tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-trusted-certificate-0001.pem 465s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-16232 465s + local key_cn 465s + local key_name 465s + local tokens_dir 465s + local output_cert_file 465s + token_name= 465s ++ basename /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 465s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 465s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-trusted-certificate-0001.pem 465s ++ sed -n 's/ *commonName *= //p' 465s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 465s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 465s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-9bLCCU/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 465s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-9bLCCU/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 465s ++ basename /tmp/sssd-softhsm2-9bLCCU/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 465s Test Organization Sub Int Token 465s + tokens_dir=/tmp/sssd-softhsm2-9bLCCU/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 465s + token_name='Test Organization Sub Int Token' 465s + '[' '!' -e /tmp/sssd-softhsm2-9bLCCU/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 465s + '[' '!' -d /tmp/sssd-softhsm2-9bLCCU/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 465s + echo 'Test Organization Sub Int Token' 465s + '[' -n partial_chain ']' 465s + local verify_arg=--verify=partial_chain 465s + local output_base_name=SSSD-child-1059 465s + local output_file=/tmp/sssd-softhsm2-9bLCCU/SSSD-child-1059.output 465s + output_cert_file=/tmp/sssd-softhsm2-9bLCCU/SSSD-child-1059.pem 465s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA.pem 465s [p11_child[2659]] [main] (0x0400): p11_child started. 465s [p11_child[2659]] [main] (0x2000): Running in [pre-auth] mode. 465s [p11_child[2659]] [main] (0x2000): Running with effective IDs: [0][0]. 465s [p11_child[2659]] [main] (0x2000): Running with real IDs [0][0]. 465s [p11_child[2659]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 465s [p11_child[2659]] [do_card] (0x4000): Module List: 465s [p11_child[2659]] [do_card] (0x4000): common name: [softhsm2]. 465s [p11_child[2659]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 465s [p11_child[2659]] [do_card] (0x4000): Description [SoftHSM slot ID 0x7ccbfbf6] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 465s [p11_child[2659]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 465s [p11_child[2659]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x7ccbfbf6][2093743094] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 465s [p11_child[2659]] [do_card] (0x4000): Login NOT required. 465s [p11_child[2659]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 465s [p11_child[2659]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 465s [p11_child[2659]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Sub Int Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 465s [p11_child[2659]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x7ccbfbf6;slot-manufacturer=SoftHSM%20project;slot-id=2093743094;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=4415d92dfccbfbf6;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 465s [p11_child[2659]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 465s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-9bLCCU/SSSD-child-1059.output 465s + echo '-----BEGIN CERTIFICATE-----' 465s + tail -n1 /tmp/sssd-softhsm2-9bLCCU/SSSD-child-1059.output 465s + echo '-----END CERTIFICATE-----' 465s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-9bLCCU/SSSD-child-1059.pem 465s + local found_md5 expected_md5 465s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-trusted-certificate-0001.pem 465s Certificate: 465s Data: 465s Version: 3 (0x2) 465s Serial Number: 5 (0x5) 465s Signature Algorithm: sha256WithRSAEncryption 465s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 465s Validity 465s Not Before: Nov 15 22:51:19 2024 GMT 465s Not After : Nov 15 22:51:19 2025 GMT 465s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 465s Subject Public Key Info: 465s Public Key Algorithm: rsaEncryption 465s Public-Key: (1024 bit) 465s Modulus: 465s 00:9f:0b:59:f9:86:33:69:c9:9d:ce:dd:9f:6c:3c: 465s 8f:99:4c:ef:c3:a3:4f:eb:e0:75:c3:2b:63:91:cb: 465s 6c:1d:4e:87:09:42:fa:ce:bf:19:58:73:31:95:35: 465s a4:63:e4:8a:d4:6a:61:39:61:77:d2:3f:40:e3:67: 465s 61:8b:c6:fc:46:a8:21:b3:9b:f6:15:49:f6:f7:25: 465s cb:f4:cb:47:de:da:18:2e:b4:7a:d9:4e:1b:2c:09: 465s 80:20:39:ea:e8:3b:a2:16:92:94:1e:04:9a:8b:93: 465s 8b:44:c4:5f:81:05:66:9a:ad:c5:0a:d1:b8:ed:23: 465s 70:7a:01:0e:a2:06:95:33:39 465s Exponent: 65537 (0x10001) 465s X509v3 extensions: 465s X509v3 Authority Key Identifier: 465s 8D:43:1A:C1:9D:24:18:DA:45:27:0D:22:7F:EC:2E:E1:E9:FB:8D:BE 465s X509v3 Basic Constraints: 465s CA:FALSE 465s Netscape Cert Type: 465s SSL Client, S/MIME 465s Netscape Comment: 465s Test Organization Sub Intermediate CA trusted Certificate 465s X509v3 Subject Key Identifier: 465s 52:9F:42:82:0C:64:51:ED:F2:D3:88:B5:78:15:28:B4:B0:5D:CB:D4 465s X509v3 Key Usage: critical 465s Digital Signature, Non Repudiation, Key Encipherment 465s X509v3 Extended Key Usage: 465s TLS Web Client Authentication, E-mail Protection 465s X509v3 Subject Alternative Name: 465s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 465s Signature Algorithm: sha256WithRSAEncryption 465s Signature Value: 465s a2:04:ef:13:16:17:e9:be:50:13:a2:28:ef:87:6e:d9:37:d3: 465s 72:54:11:f3:ea:61:df:e1:28:75:ed:85:6f:1d:d5:ab:3f:5d: 465s 5c:e4:58:21:de:80:e0:f7:f4:84:61:09:49:3d:9b:54:27:fe: 465s 11:7a:ab:0c:cb:3b:ee:38:bd:2c:8e:8f:a5:88:2a:3f:7a:f6: 465s 17:cf:d8:6c:61:f5:a0:8b:95:37:c9:9d:f8:0a:f6:d7:42:9c: 465s c9:82:20:a8:56:74:e2:4b:80:c6:91:1d:47:d7:a1:04:f4:92: 465s f3:fd:6e:9a:b0:74:f4:f3:db:7d:e4:da:cc:cf:6f:bb:ae:f3: 465s e3:0d 465s + expected_md5=Modulus=9F0B59F9863369C99DCEDD9F6C3C8F994CEFC3A34FEBE075C32B6391CB6C1D4E870942FACEBF195873319535A463E48AD46A61396177D23F40E367618BC6FC46A821B39BF61549F6F725CBF4CB47DEDA182EB47AD94E1B2C09802039EAE83BA21692941E049A8B938B44C45F8105669AADC50AD1B8ED23707A010EA206953339 465s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-9bLCCU/SSSD-child-1059.pem 465s + found_md5=Modulus=9F0B59F9863369C99DCEDD9F6C3C8F994CEFC3A34FEBE075C32B6391CB6C1D4E870942FACEBF195873319535A463E48AD46A61396177D23F40E367618BC6FC46A821B39BF61549F6F725CBF4CB47DEDA182EB47AD94E1B2C09802039EAE83BA21692941E049A8B938B44C45F8105669AADC50AD1B8ED23707A010EA206953339 465s + '[' Modulus=9F0B59F9863369C99DCEDD9F6C3C8F994CEFC3A34FEBE075C32B6391CB6C1D4E870942FACEBF195873319535A463E48AD46A61396177D23F40E367618BC6FC46A821B39BF61549F6F725CBF4CB47DEDA182EB47AD94E1B2C09802039EAE83BA21692941E049A8B938B44C45F8105669AADC50AD1B8ED23707A010EA206953339 '!=' Modulus=9F0B59F9863369C99DCEDD9F6C3C8F994CEFC3A34FEBE075C32B6391CB6C1D4E870942FACEBF195873319535A463E48AD46A61396177D23F40E367618BC6FC46A821B39BF61549F6F725CBF4CB47DEDA182EB47AD94E1B2C09802039EAE83BA21692941E049A8B938B44C45F8105669AADC50AD1B8ED23707A010EA206953339 ']' 465s + output_file=/tmp/sssd-softhsm2-9bLCCU/SSSD-child-1059-auth.output 465s ++ basename /tmp/sssd-softhsm2-9bLCCU/SSSD-child-1059-auth.output .output 465s + output_cert_file=/tmp/sssd-softhsm2-9bLCCU/SSSD-child-1059-auth.pem 465s + echo -n 053350 465s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Sub Int Token' --module_name /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so 465s [p11_child[2667]] [main] (0x0400): p11_child started. 465s [p11_child[2667]] [main] (0x2000): Running in [auth] mode. 465s [p11_child[2667]] [main] (0x2000): Running with effective IDs: [0][0]. 465s [p11_child[2667]] [main] (0x2000): Running with real IDs [0][0]. 465s [p11_child[2667]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 465s [p11_child[2667]] [do_card] (0x4000): Module List: 465s [p11_child[2667]] [do_card] (0x4000): common name: [softhsm2]. 465s [p11_child[2667]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 465s [p11_child[2667]] [do_card] (0x4000): Description [SoftHSM slot ID 0x7ccbfbf6] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 465s [p11_child[2667]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 465s [p11_child[2667]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x7ccbfbf6][2093743094] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 465s [p11_child[2667]] [do_card] (0x4000): Login required. 465s [p11_child[2667]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 465s [p11_child[2667]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 465s [p11_child[2667]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so Test Organization Sub Int Token Test Organization Sub Int Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 465s [p11_child[2667]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x7ccbfbf6;slot-manufacturer=SoftHSM%20project;slot-id=2093743094;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=4415d92dfccbfbf6;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 465s [p11_child[2667]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 465s [p11_child[2667]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 465s [p11_child[2667]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 465s [p11_child[2667]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 465s [p11_child[2667]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 465s [p11_child[2667]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 465s [p11_child[2667]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 465s [p11_child[2667]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 465s [p11_child[2667]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 465s [p11_child[2667]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 465s [p11_child[2667]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 465s [p11_child[2667]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 465s [p11_child[2667]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 465s [p11_child[2667]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 465s [p11_child[2667]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 465s [p11_child[2667]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 465s [p11_child[2667]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 465s [p11_child[2667]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 465s [p11_child[2667]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 465s [p11_child[2667]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 465s [p11_child[2667]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 465s [p11_child[2667]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 465s [p11_child[2667]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 465s [p11_child[2667]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 465s [p11_child[2667]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 465s [p11_child[2667]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 465s [p11_child[2667]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 465s [p11_child[2667]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 465s [p11_child[2667]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 465s [p11_child[2667]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 465s [p11_child[2667]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 465s [p11_child[2667]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 465s [p11_child[2667]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 465s [p11_child[2667]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 465s [p11_child[2667]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 465s [p11_child[2667]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 465s [p11_child[2667]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 465s [p11_child[2667]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 465s [p11_child[2667]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 465s [p11_child[2667]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 465s [p11_child[2667]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 465s [p11_child[2667]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 465s [p11_child[2667]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 465s [p11_child[2667]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 465s [p11_child[2667]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 465s [p11_child[2667]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 465s [p11_child[2667]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 465s [p11_child[2667]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 465s [p11_child[2667]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 465s [p11_child[2667]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 465s [p11_child[2667]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 465s [p11_child[2667]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 465s [p11_child[2667]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 465s [p11_child[2667]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 465s [p11_child[2667]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 465s [p11_child[2667]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 465s [p11_child[2667]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 465s [p11_child[2667]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 465s [p11_child[2667]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 465s [p11_child[2667]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 465s [p11_child[2667]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 465s [p11_child[2667]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 465s [p11_child[2667]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 465s [p11_child[2667]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 465s [p11_child[2667]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 465s [p11_child[2667]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 465s [p11_child[2667]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 465s [p11_child[2667]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 465s [p11_child[2667]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 465s [p11_child[2667]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 465s [p11_child[2667]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 465s [p11_child[2667]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 465s [p11_child[2667]] [do_card] (0x4000): Certificate verified and validated. 465s [p11_child[2667]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 465s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-9bLCCU/SSSD-child-1059-auth.output 465s + echo '-----BEGIN CERTIFICATE-----' 465s + tail -n1 /tmp/sssd-softhsm2-9bLCCU/SSSD-child-1059-auth.output 465s + echo '-----END CERTIFICATE-----' 465s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-9bLCCU/SSSD-child-1059-auth.pem 465s Certificate: 465s Data: 465s Version: 3 (0x2) 465s Serial Number: 5 (0x5) 465s Signature Algorithm: sha256WithRSAEncryption 465s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 465s Validity 465s Not Before: Nov 15 22:51:19 2024 GMT 465s Not After : Nov 15 22:51:19 2025 GMT 465s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 465s Subject Public Key Info: 465s Public Key Algorithm: rsaEncryption 465s Public-Key: (1024 bit) 465s Modulus: 465s 00:9f:0b:59:f9:86:33:69:c9:9d:ce:dd:9f:6c:3c: 465s 8f:99:4c:ef:c3:a3:4f:eb:e0:75:c3:2b:63:91:cb: 465s 6c:1d:4e:87:09:42:fa:ce:bf:19:58:73:31:95:35: 465s a4:63:e4:8a:d4:6a:61:39:61:77:d2:3f:40:e3:67: 465s 61:8b:c6:fc:46:a8:21:b3:9b:f6:15:49:f6:f7:25: 465s cb:f4:cb:47:de:da:18:2e:b4:7a:d9:4e:1b:2c:09: 465s 80:20:39:ea:e8:3b:a2:16:92:94:1e:04:9a:8b:93: 465s 8b:44:c4:5f:81:05:66:9a:ad:c5:0a:d1:b8:ed:23: 465s 70:7a:01:0e:a2:06:95:33:39 465s Exponent: 65537 (0x10001) 465s X509v3 extensions: 465s X509v3 Authority Key Identifier: 465s 8D:43:1A:C1:9D:24:18:DA:45:27:0D:22:7F:EC:2E:E1:E9:FB:8D:BE 465s X509v3 Basic Constraints: 465s CA:FALSE 465s Netscape Cert Type: 465s SSL Client, S/MIME 465s Netscape Comment: 465s Test Organization Sub Intermediate CA trusted Certificate 465s X509v3 Subject Key Identifier: 465s 52:9F:42:82:0C:64:51:ED:F2:D3:88:B5:78:15:28:B4:B0:5D:CB:D4 465s X509v3 Key Usage: critical 465s Digital Signature, Non Repudiation, Key Encipherment 465s X509v3 Extended Key Usage: 465s TLS Web Client Authentication, E-mail Protection 465s X509v3 Subject Alternative Name: 465s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 465s Signature Algorithm: sha256WithRSAEncryption 465s Signature Value: 465s a2:04:ef:13:16:17:e9:be:50:13:a2:28:ef:87:6e:d9:37:d3: 465s 72:54:11:f3:ea:61:df:e1:28:75:ed:85:6f:1d:d5:ab:3f:5d: 465s 5c:e4:58:21:de:80:e0:f7:f4:84:61:09:49:3d:9b:54:27:fe: 465s 11:7a:ab:0c:cb:3b:ee:38:bd:2c:8e:8f:a5:88:2a:3f:7a:f6: 465s 17:cf:d8:6c:61:f5:a0:8b:95:37:c9:9d:f8:0a:f6:d7:42:9c: 465s c9:82:20:a8:56:74:e2:4b:80:c6:91:1d:47:d7:a1:04:f4:92: 465s f3:fd:6e:9a:b0:74:f4:f3:db:7d:e4:da:cc:cf:6f:bb:ae:f3: 465s e3:0d 465s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-9bLCCU/SSSD-child-1059-auth.pem 465s + found_md5=Modulus=9F0B59F9863369C99DCEDD9F6C3C8F994CEFC3A34FEBE075C32B6391CB6C1D4E870942FACEBF195873319535A463E48AD46A61396177D23F40E367618BC6FC46A821B39BF61549F6F725CBF4CB47DEDA182EB47AD94E1B2C09802039EAE83BA21692941E049A8B938B44C45F8105669AADC50AD1B8ED23707A010EA206953339 465s + '[' Modulus=9F0B59F9863369C99DCEDD9F6C3C8F994CEFC3A34FEBE075C32B6391CB6C1D4E870942FACEBF195873319535A463E48AD46A61396177D23F40E367618BC6FC46A821B39BF61549F6F725CBF4CB47DEDA182EB47AD94E1B2C09802039EAE83BA21692941E049A8B938B44C45F8105669AADC50AD1B8ED23707A010EA206953339 '!=' Modulus=9F0B59F9863369C99DCEDD9F6C3C8F994CEFC3A34FEBE075C32B6391CB6C1D4E870942FACEBF195873319535A463E48AD46A61396177D23F40E367618BC6FC46A821B39BF61549F6F725CBF4CB47DEDA182EB47AD94E1B2C09802039EAE83BA21692941E049A8B938B44C45F8105669AADC50AD1B8ED23707A010EA206953339 ']' 465s + valid_certificate /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-16232 /tmp/sssd-softhsm2-9bLCCU/test-intermediate-sub-chain-CA.pem partial_chain 465s + check_certificate /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-16232 /tmp/sssd-softhsm2-9bLCCU/test-intermediate-sub-chain-CA.pem partial_chain 465s + local certificate=/tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-trusted-certificate-0001.pem 465s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-16232 465s + local key_ring=/tmp/sssd-softhsm2-9bLCCU/test-intermediate-sub-chain-CA.pem 465s + local verify_option=partial_chain 465s + prepare_softhsm2_card /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-16232 465s + local certificate=/tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-trusted-certificate-0001.pem 465s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-16232 465s + local key_cn 465s + local key_name 465s + local tokens_dir 465s + local output_cert_file 465s + token_name= 465s ++ basename /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 465s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 465s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-trusted-certificate-0001.pem 465s ++ sed -n 's/ *commonName *= //p' 466s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 466s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 466s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-9bLCCU/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 466s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-9bLCCU/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 466s ++ basename /tmp/sssd-softhsm2-9bLCCU/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 466s + tokens_dir=/tmp/sssd-softhsm2-9bLCCU/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 466s + token_name='Test Organization Sub Int Token' 466s + '[' '!' -e /tmp/sssd-softhsm2-9bLCCU/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 466s + '[' '!' -d /tmp/sssd-softhsm2-9bLCCU/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 466s + echo 'Test Organization Sub Int Token' 466s + '[' -n partial_chain ']' 466s + local verify_arg=--verify=partial_chain 466s + local output_base_name=SSSD-child-27208 466s + local output_file=/tmp/sssd-softhsm2-9bLCCU/SSSD-child-27208.output 466s + output_cert_file=/tmp/sssd-softhsm2-9bLCCU/SSSD-child-27208.pem 466s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-9bLCCU/test-intermediate-sub-chain-CA.pem 466s Test Organization Sub Int Token 466s [p11_child[2677]] [main] (0x0400): p11_child started. 466s [p11_child[2677]] [main] (0x2000): Running in [pre-auth] mode. 466s [p11_child[2677]] [main] (0x2000): Running with effective IDs: [0][0]. 466s [p11_child[2677]] [main] (0x2000): Running with real IDs [0][0]. 466s [p11_child[2677]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 466s [p11_child[2677]] [do_card] (0x4000): Module List: 466s [p11_child[2677]] [do_card] (0x4000): common name: [softhsm2]. 466s [p11_child[2677]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 466s [p11_child[2677]] [do_card] (0x4000): Description [SoftHSM slot ID 0x7ccbfbf6] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 466s [p11_child[2677]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 466s [p11_child[2677]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x7ccbfbf6][2093743094] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 466s [p11_child[2677]] [do_card] (0x4000): Login NOT required. 466s [p11_child[2677]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 466s [p11_child[2677]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 466s [p11_child[2677]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Sub Int Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 466s [p11_child[2677]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x7ccbfbf6;slot-manufacturer=SoftHSM%20project;slot-id=2093743094;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=4415d92dfccbfbf6;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 466s [p11_child[2677]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 466s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-9bLCCU/SSSD-child-27208.output 466s + echo '-----BEGIN CERTIFICATE-----' 466s + tail -n1 /tmp/sssd-softhsm2-9bLCCU/SSSD-child-27208.output 466s + echo '-----END CERTIFICATE-----' 466s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-9bLCCU/SSSD-child-27208.pem 466s Certificate: 466s Data: 466s Version: 3 (0x2) 466s Serial Number: 5 (0x5) 466s Signature Algorithm: sha256WithRSAEncryption 466s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 466s Validity 466s Not Before: Nov 15 22:51:19 2024 GMT 466s Not After : Nov 15 22:51:19 2025 GMT 466s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 466s Subject Public Key Info: 466s Public Key Algorithm: rsaEncryption 466s Public-Key: (1024 bit) 466s Modulus: 466s 00:9f:0b:59:f9:86:33:69:c9:9d:ce:dd:9f:6c:3c: 466s 8f:99:4c:ef:c3:a3:4f:eb:e0:75:c3:2b:63:91:cb: 466s 6c:1d:4e:87:09:42:fa:ce:bf:19:58:73:31:95:35: 466s a4:63:e4:8a:d4:6a:61:39:61:77:d2:3f:40:e3:67: 466s 61:8b:c6:fc:46:a8:21:b3:9b:f6:15:49:f6:f7:25: 466s cb:f4:cb:47:de:da:18:2e:b4:7a:d9:4e:1b:2c:09: 466s 80:20:39:ea:e8:3b:a2:16:92:94:1e:04:9a:8b:93: 466s 8b:44:c4:5f:81:05:66:9a:ad:c5:0a:d1:b8:ed:23: 466s 70:7a:01:0e:a2:06:95:33:39 466s Exponent: 65537 (0x10001) 466s X509v3 extensions: 466s X509v3 Authority Key Identifier: 466s 8D:43:1A:C1:9D:24:18:DA:45:27:0D:22:7F:EC:2E:E1:E9:FB:8D:BE 466s X509v3 Basic Constraints: 466s CA:FALSE 466s Netscape Cert Type: 466s SSL Client, S/MIME 466s Netscape Comment: 466s Test Organization Sub Intermediate CA trusted Certificate 466s X509v3 Subject Key Identifier: 466s 52:9F:42:82:0C:64:51:ED:F2:D3:88:B5:78:15:28:B4:B0:5D:CB:D4 466s X509v3 Key Usage: critical 466s Digital Signature, Non Repudiation, Key Encipherment 466s X509v3 Extended Key Usage: 466s TLS Web Client Authentication, E-mail Protection 466s X509v3 Subject Alternative Name: 466s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 466s Signature Algorithm: sha256WithRSAEncryption 466s Signature Value: 466s a2:04:ef:13:16:17:e9:be:50:13:a2:28:ef:87:6e:d9:37:d3: 466s 72:54:11:f3:ea:61:df:e1:28:75:ed:85:6f:1d:d5:ab:3f:5d: 466s 5c:e4:58:21:de:80:e0:f7:f4:84:61:09:49:3d:9b:54:27:fe: 466s 11:7a:ab:0c:cb:3b:ee:38:bd:2c:8e:8f:a5:88:2a:3f:7a:f6: 466s 17:cf:d8:6c:61:f5:a0:8b:95:37:c9:9d:f8:0a:f6:d7:42:9c: 466s c9:82:20:a8:56:74:e2:4b:80:c6:91:1d:47:d7:a1:04:f4:92: 466s f3:fd:6e:9a:b0:74:f4:f3:db:7d:e4:da:cc:cf:6f:bb:ae:f3: 466s e3:0d 466s + local found_md5 expected_md5 466s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-9bLCCU/test-sub-intermediate-CA-trusted-certificate-0001.pem 466s + expected_md5=Modulus=9F0B59F9863369C99DCEDD9F6C3C8F994CEFC3A34FEBE075C32B6391CB6C1D4E870942FACEBF195873319535A463E48AD46A61396177D23F40E367618BC6FC46A821B39BF61549F6F725CBF4CB47DEDA182EB47AD94E1B2C09802039EAE83BA21692941E049A8B938B44C45F8105669AADC50AD1B8ED23707A010EA206953339 466s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-9bLCCU/SSSD-child-27208.pem 466s + found_md5=Modulus=9F0B59F9863369C99DCEDD9F6C3C8F994CEFC3A34FEBE075C32B6391CB6C1D4E870942FACEBF195873319535A463E48AD46A61396177D23F40E367618BC6FC46A821B39BF61549F6F725CBF4CB47DEDA182EB47AD94E1B2C09802039EAE83BA21692941E049A8B938B44C45F8105669AADC50AD1B8ED23707A010EA206953339 466s + '[' Modulus=9F0B59F9863369C99DCEDD9F6C3C8F994CEFC3A34FEBE075C32B6391CB6C1D4E870942FACEBF195873319535A463E48AD46A61396177D23F40E367618BC6FC46A821B39BF61549F6F725CBF4CB47DEDA182EB47AD94E1B2C09802039EAE83BA21692941E049A8B938B44C45F8105669AADC50AD1B8ED23707A010EA206953339 '!=' Modulus=9F0B59F9863369C99DCEDD9F6C3C8F994CEFC3A34FEBE075C32B6391CB6C1D4E870942FACEBF195873319535A463E48AD46A61396177D23F40E367618BC6FC46A821B39BF61549F6F725CBF4CB47DEDA182EB47AD94E1B2C09802039EAE83BA21692941E049A8B938B44C45F8105669AADC50AD1B8ED23707A010EA206953339 ']' 466s + output_file=/tmp/sssd-softhsm2-9bLCCU/SSSD-child-27208-auth.output 466s ++ basename /tmp/sssd-softhsm2-9bLCCU/SSSD-child-27208-auth.output .output 466s + output_cert_file=/tmp/sssd-softhsm2-9bLCCU/SSSD-child-27208-auth.pem 466s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-9bLCCU/test-intermediate-sub-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Sub Int Token' --module_name /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so 466s + echo -n 053350 466s [p11_child[2685]] [main] (0x0400): p11_child started. 466s [p11_child[2685]] [main] (0x2000): Running in [auth] mode. 466s [p11_child[2685]] [main] (0x2000): Running with effective IDs: [0][0]. 466s [p11_child[2685]] [main] (0x2000): Running with real IDs [0][0]. 466s [p11_child[2685]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 466s [p11_child[2685]] [do_card] (0x4000): Module List: 466s [p11_child[2685]] [do_card] (0x4000): common name: [softhsm2]. 466s [p11_child[2685]] [do_card] (0x4000): dll name: [/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 466s [p11_child[2685]] [do_card] (0x4000): Description [SoftHSM slot ID 0x7ccbfbf6] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 466s [p11_child[2685]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 466s [p11_child[2685]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x7ccbfbf6][2093743094] of module [0][/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so]. 466s [p11_child[2685]] [do_card] (0x4000): Login required. 466s [p11_child[2685]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 466s [p11_child[2685]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 466s [p11_child[2685]] [do_card] (0x4000): /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so Test Organization Sub Int Token Test Organization Sub Int Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 466s [p11_child[2685]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x7ccbfbf6;slot-manufacturer=SoftHSM%20project;slot-id=2093743094;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=4415d92dfccbfbf6;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 466s [p11_child[2685]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 466s [p11_child[2685]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 466s [p11_child[2685]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 466s [p11_child[2685]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 466s [p11_child[2685]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 466s [p11_child[2685]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 466s [p11_child[2685]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 466s [p11_child[2685]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 466s [p11_child[2685]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 466s [p11_child[2685]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 466s [p11_child[2685]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 466s [p11_child[2685]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 466s [p11_child[2685]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 466s [p11_child[2685]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 466s [p11_child[2685]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 466s [p11_child[2685]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 466s [p11_child[2685]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 466s [p11_child[2685]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 466s [p11_child[2685]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 466s [p11_child[2685]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 466s [p11_child[2685]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 466s [p11_child[2685]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 466s [p11_child[2685]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 466s [p11_child[2685]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 466s [p11_child[2685]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 466s [p11_child[2685]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 466s [p11_child[2685]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 466s [p11_child[2685]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 466s [p11_child[2685]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 466s [p11_child[2685]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 466s [p11_child[2685]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 466s [p11_child[2685]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 466s [p11_child[2685]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 466s [p11_child[2685]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 466s [p11_child[2685]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 466s [p11_child[2685]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 466s [p11_child[2685]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 466s [p11_child[2685]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 466s [p11_child[2685]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 466s [p11_child[2685]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 466s [p11_child[2685]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 466s [p11_child[2685]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 466s [p11_child[2685]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 466s [p11_child[2685]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 466s [p11_child[2685]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 466s [p11_child[2685]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 466s [p11_child[2685]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 466s [p11_child[2685]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 466s [p11_child[2685]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 466s [p11_child[2685]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 466s [p11_child[2685]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 466s [p11_child[2685]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 466s [p11_child[2685]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 466s [p11_child[2685]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 466s [p11_child[2685]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 466s [p11_child[2685]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 466s [p11_child[2685]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 466s [p11_child[2685]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 466s [p11_child[2685]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 466s [p11_child[2685]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 466s [p11_child[2685]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 466s [p11_child[2685]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 466s [p11_child[2685]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 466s [p11_child[2685]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 466s [p11_child[2685]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 466s [p11_child[2685]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 466s [p11_child[2685]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 466s [p11_child[2685]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 466s [p11_child[2685]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 466s [p11_child[2685]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 466s [p11_child[2685]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 466s [p11_child[2685]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 466s [p11_child[2685]] [do_card] (0x4000): Certificate verified and validated. 466s [p11_child[2685]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 466s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-9bLCCU/SSSD-child-27208-auth.output 466s + echo '-----BEGIN CERTIFICATE-----' 466s + tail -n1 /tmp/sssd-softhsm2-9bLCCU/SSSD-child-27208-auth.output 466s + echo '-----END CERTIFICATE-----' 466s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-9bLCCU/SSSD-child-27208-auth.pem 466s Certificate: 466s Data: 466s Version: 3 (0x2) 466s Serial Number: 5 (0x5) 466s Signature Algorithm: sha256WithRSAEncryption 466s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 466s Validity 466s Not Before: Nov 15 22:51:19 2024 GMT 466s Not After : Nov 15 22:51:19 2025 GMT 466s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 466s Subject Public Key Info: 466s Public Key Algorithm: rsaEncryption 466s Public-Key: (1024 bit) 466s Modulus: 466s 00:9f:0b:59:f9:86:33:69:c9:9d:ce:dd:9f:6c:3c: 466s 8f:99:4c:ef:c3:a3:4f:eb:e0:75:c3:2b:63:91:cb: 466s 6c:1d:4e:87:09:42:fa:ce:bf:19:58:73:31:95:35: 466s a4:63:e4:8a:d4:6a:61:39:61:77:d2:3f:40:e3:67: 466s 61:8b:c6:fc:46:a8:21:b3:9b:f6:15:49:f6:f7:25: 466s cb:f4:cb:47:de:da:18:2e:b4:7a:d9:4e:1b:2c:09: 466s 80:20:39:ea:e8:3b:a2:16:92:94:1e:04:9a:8b:93: 466s 8b:44:c4:5f:81:05:66:9a:ad:c5:0a:d1:b8:ed:23: 466s 70:7a:01:0e:a2:06:95:33:39 466s Exponent: 65537 (0x10001) 466s X509v3 extensions: 466s X509v3 Authority Key Identifier: 466s 8D:43:1A:C1:9D:24:18:DA:45:27:0D:22:7F:EC:2E:E1:E9:FB:8D:BE 466s X509v3 Basic Constraints: 466s CA:FALSE 466s Netscape Cert Type: 466s SSL Client, S/MIME 466s Netscape Comment: 466s Test Organization Sub Intermediate CA trusted Certificate 466s X509v3 Subject Key Identifier: 466s 52:9F:42:82:0C:64:51:ED:F2:D3:88:B5:78:15:28:B4:B0:5D:CB:D4 466s X509v3 Key Usage: critical 466s Digital Signature, Non Repudiation, Key Encipherment 466s X509v3 Extended Key Usage: 466s TLS Web Client Authentication, E-mail Protection 466s X509v3 Subject Alternative Name: 466s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 466s Signature Algorithm: sha256WithRSAEncryption 466s Signature Value: 466s a2:04:ef:13:16:17:e9:be:50:13:a2:28:ef:87:6e:d9:37:d3: 466s 72:54:11:f3:ea:61:df:e1:28:75:ed:85:6f:1d:d5:ab:3f:5d: 466s 5c:e4:58:21:de:80:e0:f7:f4:84:61:09:49:3d:9b:54:27:fe: 466s 11:7a:ab:0c:cb:3b:ee:38:bd:2c:8e:8f:a5:88:2a:3f:7a:f6: 466s 17:cf:d8:6c:61:f5:a0:8b:95:37:c9:9d:f8:0a:f6:d7:42:9c: 466s c9:82:20:a8:56:74:e2:4b:80:c6:91:1d:47:d7:a1:04:f4:92: 466s f3:fd:6e:9a:b0:74:f4:f3:db:7d:e4:da:cc:cf:6f:bb:ae:f3: 466s e3:0d 466s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-9bLCCU/SSSD-child-27208-auth.pem 466s + found_md5=Modulus=9F0B59F9863369C99DCEDD9F6C3C8F994CEFC3A34FEBE075C32B6391CB6C1D4E870942FACEBF195873319535A463E48AD46A61396177D23F40E367618BC6FC46A821B39BF61549F6F725CBF4CB47DEDA182EB47AD94E1B2C09802039EAE83BA21692941E049A8B938B44C45F8105669AADC50AD1B8ED23707A010EA206953339 466s + '[' Modulus=9F0B59F9863369C99DCEDD9F6C3C8F994CEFC3A34FEBE075C32B6391CB6C1D4E870942FACEBF195873319535A463E48AD46A61396177D23F40E367618BC6FC46A821B39BF61549F6F725CBF4CB47DEDA182EB47AD94E1B2C09802039EAE83BA21692941E049A8B938B44C45F8105669AADC50AD1B8ED23707A010EA206953339 '!=' Modulus=9F0B59F9863369C99DCEDD9F6C3C8F994CEFC3A34FEBE075C32B6391CB6C1D4E870942FACEBF195873319535A463E48AD46A61396177D23F40E367618BC6FC46A821B39BF61549F6F725CBF4CB47DEDA182EB47AD94E1B2C09802039EAE83BA21692941E049A8B938B44C45F8105669AADC50AD1B8ED23707A010EA206953339 ']' 466s + set +x 466s 466s Test completed, Root CA and intermediate issued certificates verified! 466s autopkgtest [22:51:27]: test sssd-softhism2-certificates-tests.sh: -----------------------] 467s autopkgtest [22:51:28]: test sssd-softhism2-certificates-tests.sh: - - - - - - - - - - results - - - - - - - - - - 467s sssd-softhism2-certificates-tests.sh PASS 467s autopkgtest [22:51:28]: test sssd-smart-card-pam-auth-configs: preparing testbed 469s Reading package lists... 469s Building dependency tree... 469s Reading state information... 469s Starting pkgProblemResolver with broken count: 0 469s Starting 2 pkgProblemResolver with broken count: 0 469s Done 469s The following additional packages will be installed: 469s pamtester 469s The following NEW packages will be installed: 469s autopkgtest-satdep pamtester 469s 0 upgraded, 2 newly installed, 0 to remove and 0 not upgraded. 469s Need to get 14.6 kB/15.4 kB of archives. 469s After this operation, 86.0 kB of additional disk space will be used. 469s Get:1 /tmp/autopkgtest.HhFPuo/4-autopkgtest-satdep.deb autopkgtest-satdep ppc64el 0 [760 B] 470s Get:2 http://ftpmaster.internal/ubuntu noble/universe ppc64el pamtester ppc64el 0.1.2-4 [14.6 kB] 470s Fetched 14.6 kB in 0s (66.5 kB/s) 470s Selecting previously unselected package pamtester. 470s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 72974 files and directories currently installed.) 470s Preparing to unpack .../pamtester_0.1.2-4_ppc64el.deb ... 470s Unpacking pamtester (0.1.2-4) ... 470s Selecting previously unselected package autopkgtest-satdep. 470s Preparing to unpack .../4-autopkgtest-satdep.deb ... 470s Unpacking autopkgtest-satdep (0) ... 470s Setting up pamtester (0.1.2-4) ... 470s Setting up autopkgtest-satdep (0) ... 470s Processing triggers for man-db (2.12.0-4build2) ... 474s (Reading database ... 72980 files and directories currently installed.) 474s Removing autopkgtest-satdep (0) ... 474s autopkgtest [22:51:35]: test sssd-smart-card-pam-auth-configs: env OFFLINE_MODE=1 bash debian/tests/sssd-smart-card-pam-auth-configs-tester.sh 474s autopkgtest [22:51:35]: test sssd-smart-card-pam-auth-configs: [----------------------- 475s + '[' -z ubuntu ']' 475s + export DEBIAN_FRONTEND=noninteractive 475s + DEBIAN_FRONTEND=noninteractive 475s + required_tools=(pamtester softhsm2-util sssd) 475s + [[ ! -v OFFLINE_MODE ]] 475s + for cmd in "${required_tools[@]}" 475s + command -v pamtester 475s + for cmd in "${required_tools[@]}" 475s + command -v softhsm2-util 475s + for cmd in "${required_tools[@]}" 475s + command -v sssd 475s + PIN=123456 475s ++ mktemp -d -t sssd-softhsm2-certs-XXXXXX 475s + tmpdir=/tmp/sssd-softhsm2-certs-WJtbX9 475s + backupsdir= 475s + alternative_pam_configs=(sss-smart-card-optional sss-smart-card-required) 475s + declare -a restore_paths 475s + declare -a delete_paths 475s + trap handle_exit EXIT 475s ++ dirname debian/tests/sssd-smart-card-pam-auth-configs-tester.sh 475s + tester=debian/tests/sssd-softhism2-certificates-tests.sh 475s + '[' '!' -e debian/tests/sssd-softhism2-certificates-tests.sh ']' 475s + '[' '!' -e debian/tests/sssd-softhism2-certificates-tests.sh ']' 475s + export PIN TEST_TMPDIR=/tmp/sssd-softhsm2-certs-WJtbX9 GENERATE_SMART_CARDS=1 KEEP_TEMPORARY_FILES=1 NO_SSSD_TESTS=1 475s + TEST_TMPDIR=/tmp/sssd-softhsm2-certs-WJtbX9 475s + GENERATE_SMART_CARDS=1 475s + KEEP_TEMPORARY_FILES=1 475s + NO_SSSD_TESTS=1 475s + bash debian/tests/sssd-softhism2-certificates-tests.sh 475s + '[' -z ubuntu ']' 475s + required_tools=(p11tool openssl softhsm2-util) 475s + for cmd in "${required_tools[@]}" 475s + command -v p11tool 475s + for cmd in "${required_tools[@]}" 475s + command -v openssl 475s + for cmd in "${required_tools[@]}" 475s + command -v softhsm2-util 475s + PIN=123456 475s +++ find /usr/lib/softhsm/libsofthsm2.so 475s +++ head -n 1 475s ++ realpath /usr/lib/softhsm/libsofthsm2.so 475s + SOFTHSM2_MODULE=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so 475s + SSSD_P11_CHILD=/usr/libexec/sssd/p11_child 475s + TOKEN_ID=00112233445566778899FFAABBCCDDEEFF012345 475s + '[' '!' -v NO_SSSD_TESTS ']' 475s + '[' '!' -e /usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so ']' 475s + tmpdir=/tmp/sssd-softhsm2-certs-WJtbX9 475s + keys_size=1024 475s + [[ ! -v KEEP_TEMPORARY_FILES ]] 475s + trap 'set +x; echo -e "\nUnexpected failure!!!"' ERR 475s + echo -n 01 475s + touch /tmp/sssd-softhsm2-certs-WJtbX9/index.txt 475s + mkdir -p /tmp/sssd-softhsm2-certs-WJtbX9/new_certs 475s + cat 475s + root_ca_key_pass=pass:random-root-CA-password-4750 475s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-certs-WJtbX9/test-root-CA-key.pem -passout pass:random-root-CA-password-4750 1024 475s + openssl req -passin pass:random-root-CA-password-4750 -batch -config /tmp/sssd-softhsm2-certs-WJtbX9/test-root-CA.config -x509 -new -nodes -key /tmp/sssd-softhsm2-certs-WJtbX9/test-root-CA-key.pem -sha256 -days 1024 -set_serial 0 -extensions v3_ca -out /tmp/sssd-softhsm2-certs-WJtbX9/test-root-CA.pem 475s + openssl x509 -noout -in /tmp/sssd-softhsm2-certs-WJtbX9/test-root-CA.pem 475s + cat 475s + intermediate_ca_key_pass=pass:random-intermediate-CA-password-4032 475s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-certs-WJtbX9/test-intermediate-CA-key.pem -passout pass:random-intermediate-CA-password-4032 1024 475s + openssl req -batch -new -nodes -passin pass:random-intermediate-CA-password-4032 -config /tmp/sssd-softhsm2-certs-WJtbX9/test-intermediate-CA.config -key /tmp/sssd-softhsm2-certs-WJtbX9/test-intermediate-CA-key.pem -passout pass:random-root-CA-password-4750 -sha256 -extensions v3_ca -out /tmp/sssd-softhsm2-certs-WJtbX9/test-intermediate-CA-certificate-request.pem 475s + openssl req -text -noout -in /tmp/sssd-softhsm2-certs-WJtbX9/test-intermediate-CA-certificate-request.pem 475s Certificate Request: 475s Data: 475s Version: 1 (0x0) 475s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 475s Subject Public Key Info: 475s Public Key Algorithm: rsaEncryption 475s Public-Key: (1024 bit) 475s Modulus: 475s 00:e2:62:e2:ca:78:f9:86:f3:25:0f:93:50:e3:b9: 475s 7e:d0:8b:4c:d7:2f:bb:6b:d7:f6:f2:d5:f2:17:44: 475s a8:ca:16:09:de:1f:24:12:9a:ac:f5:4a:3f:26:67: 475s b6:17:85:1d:a3:64:b7:59:9f:e7:09:2e:60:93:e5: 475s 34:af:89:f2:68:3c:4f:da:46:94:20:1d:d6:e8:33: 475s 93:b2:99:28:71:5a:47:a8:ee:30:26:ce:87:bc:cc: 475s c3:0d:6a:4d:30:28:93:3a:f3:70:c7:83:f9:4f:78: 475s 89:04:c9:bb:49:bd:e2:28:22:1b:b3:ce:72:13:55: 475s c3:45:8f:c1:91:8b:8f:17:65 475s Exponent: 65537 (0x10001) 475s Attributes: 475s (none) 475s Requested Extensions: 475s Signature Algorithm: sha256WithRSAEncryption 475s Signature Value: 475s 0d:35:18:63:f4:b6:6a:db:5d:3d:c1:05:41:54:75:1f:17:e8: 475s dc:ae:9f:ff:3a:05:1e:7b:f5:05:e7:f1:f0:5e:42:9b:b4:6e: 475s 14:45:4d:a8:db:99:0a:0e:a8:5b:1f:51:50:57:c1:07:60:f8: 475s fe:7c:4d:e6:be:46:f6:21:56:67:34:87:9b:a1:ca:a3:e7:24: 475s a5:36:05:11:b8:47:a7:53:f4:11:f9:86:94:40:7e:d9:bd:43: 475s c3:34:3d:3e:46:e4:08:52:3f:2d:90:b9:b3:37:71:22:15:99: 475s 9a:b3:cc:ad:e1:72:5d:3a:66:10:c9:4c:54:81:bf:5b:01:00: 475s 78:4f 475s + openssl ca -batch -notext -config /tmp/sssd-softhsm2-certs-WJtbX9/test-root-CA.config -passin pass:random-root-CA-password-4750 -keyfile /tmp/sssd-softhsm2-certs-WJtbX9/test-root-CA-key.pem -in /tmp/sssd-softhsm2-certs-WJtbX9/test-intermediate-CA-certificate-request.pem -days 365 -extensions v3_intermediate_ca -out /tmp/sssd-softhsm2-certs-WJtbX9/test-intermediate-CA.pem 475s Using configuration from /tmp/sssd-softhsm2-certs-WJtbX9/test-root-CA.config 475s Check that the request matches the signature 475s Signature ok 475s Certificate Details: 475s Serial Number: 1 (0x1) 475s Validity 475s Not Before: Nov 15 22:51:36 2024 GMT 475s Not After : Nov 15 22:51:36 2025 GMT 475s Subject: 475s organizationName = Test Organization 475s organizationalUnitName = Test Organization Unit 475s commonName = Test Organization Intermediate CA 475s X509v3 extensions: 475s X509v3 Subject Key Identifier: 475s BB:5A:13:61:90:C1:A0:63:25:95:91:09:69:A4:EC:20:D3:D4:D0:0D 475s X509v3 Authority Key Identifier: 475s keyid:90:88:F9:47:A8:BA:BF:74:CE:E3:17:6F:DA:45:FE:06:02:7A:2F:51 475s DirName:/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root CA 475s serial:00 475s X509v3 Basic Constraints: 475s CA:TRUE 475s X509v3 Key Usage: critical 475s Digital Signature, Certificate Sign, CRL Sign 475s Certificate is to be certified until Nov 15 22:51:36 2025 GMT (365 days) 475s 475s Write out database with 1 new entries 475s Database updated 475s + openssl x509 -noout -in /tmp/sssd-softhsm2-certs-WJtbX9/test-intermediate-CA.pem 475s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-WJtbX9/test-root-CA.pem /tmp/sssd-softhsm2-certs-WJtbX9/test-intermediate-CA.pem 475s /tmp/sssd-softhsm2-certs-WJtbX9/test-intermediate-CA.pem: OK 475s + cat 475s + sub_intermediate_ca_key_pass=pass:random-sub-intermediate-CA-password-3711 475s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-certs-WJtbX9/test-sub-intermediate-CA-key.pem -passout pass:random-sub-intermediate-CA-password-3711 1024 475s + openssl req -batch -new -nodes -passin pass:random-sub-intermediate-CA-password-3711 -config /tmp/sssd-softhsm2-certs-WJtbX9/test-sub-intermediate-CA.config -key /tmp/sssd-softhsm2-certs-WJtbX9/test-sub-intermediate-CA-key.pem -passout pass:random-intermediate-CA-password-4032 -sha256 -extensions v3_ca -out /tmp/sssd-softhsm2-certs-WJtbX9/test-sub-intermediate-CA-certificate-request.pem 475s + openssl req -text -noout -in /tmp/sssd-softhsm2-certs-WJtbX9/test-sub-intermediate-CA-certificate-request.pem 475s Certificate Request: 475s Data: 475s Version: 1 (0x0) 475s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 475s Subject Public Key Info: 475s Public Key Algorithm: rsaEncryption 475s Public-Key: (1024 bit) 475s Modulus: 475s 00:d3:c6:15:ec:06:56:55:48:39:ae:0f:1e:c1:e5: 475s 71:43:3c:5d:7c:2b:a4:3c:34:d7:b6:8f:54:59:48: 475s a7:90:97:12:3e:30:39:29:28:2b:79:93:ff:da:e3: 475s 96:43:e2:69:f6:d4:bd:0a:04:3a:f6:40:c3:0d:0d: 475s 4a:d3:13:c7:ca:1a:c6:61:78:fd:02:eb:ed:e0:db: 475s f8:64:09:cb:71:bb:12:2e:d1:cc:ba:ea:98:c3:6a: 475s 8e:7d:00:ec:d1:aa:8e:82:ef:a9:d6:73:23:f9:91: 475s 4a:e3:5d:32:3d:90:84:40:53:fc:56:10:1e:09:d2: 475s 50:84:1d:88:c3:03:30:c8:05 475s Exponent: 65537 (0x10001) 475s Attributes: 475s (none) 475s Requested Extensions: 475s Signature Algorithm: sha256WithRSAEncryption 475s Signature Value: 475s 47:37:b7:b0:ca:f1:39:1f:c6:68:38:16:40:cf:fe:23:26:96: 475s 1a:c1:01:01:3f:3a:b9:b9:c8:6d:b8:3b:ce:15:b9:73:cb:d9: 475s 53:b1:2e:cc:28:3d:e3:cb:18:37:e1:48:ed:7d:f0:1a:ef:7e: 475s 04:63:72:ce:af:e9:24:26:fc:f2:29:93:fb:16:cb:30:e5:70: 475s d0:22:72:dd:a1:e9:96:3d:60:3e:4d:b8:58:15:be:fc:6b:a1: 475s 7a:ca:e5:f4:c7:ee:c5:e1:c3:69:1f:c8:4b:35:a6:30:d6:0a: 475s 7b:ad:f4:7f:b3:7f:a2:15:27:fb:6b:91:f2:3a:96:1b:d7:93: 475s c3:23 475s + openssl ca -batch -notext -config /tmp/sssd-softhsm2-certs-WJtbX9/test-intermediate-CA.config -passin pass:random-intermediate-CA-password-4032 -keyfile /tmp/sssd-softhsm2-certs-WJtbX9/test-intermediate-CA-key.pem -in /tmp/sssd-softhsm2-certs-WJtbX9/test-sub-intermediate-CA-certificate-request.pem -days 365 -extensions v3_intermediate_ca -out /tmp/sssd-softhsm2-certs-WJtbX9/test-sub-intermediate-CA.pem 475s Using configuration from /tmp/sssd-softhsm2-certs-WJtbX9/test-intermediate-CA.config 475s Check that the request matches the signature 475s Signature ok 475s Certificate Details: 475s Serial Number: 2 (0x2) 475s Validity 475s Not Before: Nov 15 22:51:36 2024 GMT 475s Not After : Nov 15 22:51:36 2025 GMT 475s Subject: 475s organizationName = Test Organization 475s organizationalUnitName = Test Organization Unit 475s commonName = Test Organization Sub Intermediate CA 475s X509v3 extensions: 475s X509v3 Subject Key Identifier: 475s 73:D4:81:62:6C:A7:59:C7:51:0B:E4:86:B6:4B:29:40:31:2D:99:AE 475s X509v3 Authority Key Identifier: 475s keyid:BB:5A:13:61:90:C1:A0:63:25:95:91:09:69:A4:EC:20:D3:D4:D0:0D 475s DirName:/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root CA 475s serial:01 475s X509v3 Basic Constraints: 475s CA:TRUE 475s X509v3 Key Usage: critical 475s Digital Signature, Certificate Sign, CRL Sign 475s Certificate is to be certified until Nov 15 22:51:36 2025 GMT (365 days) 475s 475s Write out database with 1 new entries 475s Database updated 475s + openssl x509 -noout -in /tmp/sssd-softhsm2-certs-WJtbX9/test-sub-intermediate-CA.pem 475s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-certs-WJtbX9/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-WJtbX9/test-sub-intermediate-CA.pem 475s /tmp/sssd-softhsm2-certs-WJtbX9/test-sub-intermediate-CA.pem: OK 475s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-certs-WJtbX9/test-root-CA.pem /tmp/sssd-softhsm2-certs-WJtbX9/test-sub-intermediate-CA.pem 475s + local cmd=openssl 475s + shift 475s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-WJtbX9/test-root-CA.pem /tmp/sssd-softhsm2-certs-WJtbX9/test-sub-intermediate-CA.pem 475s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 475s error 20 at 0 depth lookup: unable to get local issuer certificate 475s error /tmp/sssd-softhsm2-certs-WJtbX9/test-sub-intermediate-CA.pem: verification failed 475s + cat 475s + root_ca_trusted_cert_0001_key_pass=pass:random-root-ca-trusted-cert-0001-10783 475s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-certs-WJtbX9/test-root-CA-trusted-certificate-0001-key.pem -passout pass:random-root-ca-trusted-cert-0001-10783 1024 475s + openssl req -new -nodes -reqexts req_exts -passin pass:random-root-ca-trusted-cert-0001-10783 -key /tmp/sssd-softhsm2-certs-WJtbX9/test-root-CA-trusted-certificate-0001-key.pem -config /tmp/sssd-softhsm2-certs-WJtbX9/test-root-CA-trusted-certificate-0001.config -out /tmp/sssd-softhsm2-certs-WJtbX9/test-root-CA-trusted-certificate-0001-request.pem 475s + openssl req -text -noout -in /tmp/sssd-softhsm2-certs-WJtbX9/test-root-CA-trusted-certificate-0001-request.pem 475s Certificate Request: 475s Data: 475s Version: 1 (0x0) 475s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 475s Subject Public Key Info: 475s Public Key Algorithm: rsaEncryption 475s Public-Key: (1024 bit) 475s Modulus: 475s 00:a1:10:46:7a:85:6d:a5:9f:97:34:00:7f:e3:14: 475s 81:24:bd:e8:1b:2a:eb:46:41:e3:6e:e1:cc:97:7f: 475s d0:15:66:3f:f3:34:14:dc:e1:27:ce:6b:0b:4e:18: 475s 8f:23:3e:01:a4:aa:03:a9:b3:91:81:49:73:92:aa: 475s 19:e3:c9:5b:74:e9:2b:3d:b0:6b:f9:0b:a0:38:e9: 475s 94:7b:a9:f6:01:7e:6b:80:10:3c:58:c2:34:f8:6c: 475s 80:a4:46:32:a0:f8:fe:bb:50:c2:98:4b:b6:f8:3e: 475s b8:73:0a:ea:d3:19:76:e4:1c:54:73:98:67:6d:ce: 475s 67:4d:33:a2:ec:9d:f6:76:4f 475s Exponent: 65537 (0x10001) 475s Attributes: 475s Requested Extensions: 475s X509v3 Basic Constraints: 475s CA:FALSE 475s Netscape Cert Type: 475s SSL Client, S/MIME 475s Netscape Comment: 475s Test Organization Root CA trusted Certificate 475s X509v3 Subject Key Identifier: 475s AA:3D:3D:61:4D:0A:B9:50:47:30:89:9B:3A:F9:7C:2C:D8:EA:32:0E 475s X509v3 Key Usage: critical 475s Digital Signature, Non Repudiation, Key Encipherment 475s X509v3 Extended Key Usage: 475s TLS Web Client Authentication, E-mail Protection 475s X509v3 Subject Alternative Name: 475s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 475s Signature Algorithm: sha256WithRSAEncryption 475s Signature Value: 475s 4b:52:6d:80:a3:9c:4b:62:60:a2:64:a6:a6:f3:44:2b:a6:7d: 475s b1:9f:26:d1:9c:89:da:ae:32:eb:83:38:3c:b0:f3:cf:68:c5: 475s 55:db:86:95:30:14:f2:44:c8:09:67:13:92:b1:94:3a:96:a9: 475s c4:8c:69:c5:d0:8d:3d:b9:05:37:80:19:be:21:61:74:66:f1: 475s c9:29:d5:ca:b6:f3:bb:b4:ab:04:c9:60:b9:b9:a5:8f:d3:79: 475s bb:65:6b:d6:0a:b7:39:e6:3c:3e:03:c1:6a:aa:c4:1a:de:5d: 475s ed:cf:f0:11:b0:92:19:0e:cc:45:d7:d0:d5:39:ce:fd:5d:16: 475s 0d:e5 475s + openssl ca -batch -notext -config /tmp/sssd-softhsm2-certs-WJtbX9/test-root-CA.config -passin pass:random-root-CA-password-4750 -keyfile /tmp/sssd-softhsm2-certs-WJtbX9/test-root-CA-key.pem -in /tmp/sssd-softhsm2-certs-WJtbX9/test-root-CA-trusted-certificate-0001-request.pem -days 365 -extensions usr_cert -out /tmp/sssd-softhsm2-certs-WJtbX9/test-root-CA-trusted-certificate-0001.pem 475s Using configuration from /tmp/sssd-softhsm2-certs-WJtbX9/test-root-CA.config 475s Check that the request matches the signature 475s Signature ok 475s Certificate Details: 475s Serial Number: 3 (0x3) 475s Validity 475s Not Before: Nov 15 22:51:36 2024 GMT 475s Not After : Nov 15 22:51:36 2025 GMT 475s Subject: 475s organizationName = Test Organization 475s organizationalUnitName = Test Organization Unit 475s commonName = Test Organization Root Trusted Certificate 0001 475s X509v3 extensions: 475s X509v3 Authority Key Identifier: 475s 90:88:F9:47:A8:BA:BF:74:CE:E3:17:6F:DA:45:FE:06:02:7A:2F:51 475s X509v3 Basic Constraints: 475s CA:FALSE 475s Netscape Cert Type: 475s SSL Client, S/MIME 475s Netscape Comment: 475s Test Organization Root CA trusted Certificate 475s X509v3 Subject Key Identifier: 475s AA:3D:3D:61:4D:0A:B9:50:47:30:89:9B:3A:F9:7C:2C:D8:EA:32:0E 475s X509v3 Key Usage: critical 475s Digital Signature, Non Repudiation, Key Encipherment 475s X509v3 Extended Key Usage: 475s TLS Web Client Authentication, E-mail Protection 475s X509v3 Subject Alternative Name: 475s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 475s Certificate is to be certified until Nov 15 22:51:36 2025 GMT (365 days) 475s 475s Write out database with 1 new entries 475s Database updated 475s + openssl x509 -noout -in /tmp/sssd-softhsm2-certs-WJtbX9/test-root-CA-trusted-certificate-0001.pem 475s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-WJtbX9/test-root-CA.pem /tmp/sssd-softhsm2-certs-WJtbX9/test-root-CA-trusted-certificate-0001.pem 475s /tmp/sssd-softhsm2-certs-WJtbX9/test-root-CA-trusted-certificate-0001.pem: OK 475s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-certs-WJtbX9/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-WJtbX9/test-root-CA-trusted-certificate-0001.pem 475s + local cmd=openssl 475s + shift 475s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-WJtbX9/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-WJtbX9/test-root-CA-trusted-certificate-0001.pem 475s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 475s error 20 at 0 depth lookup: unable to get local issuer certificate 475s error /tmp/sssd-softhsm2-certs-WJtbX9/test-root-CA-trusted-certificate-0001.pem: verification failed 475s + cat 475s + intermediate_ca_trusted_cert_0001_key_pass=pass:random-intermediate-ca-trusted-cert-0001-1962 475s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-certs-WJtbX9/test-intermediate-CA-trusted-certificate-0001-key.pem -passout pass:random-intermediate-ca-trusted-cert-0001-1962 1024 476s + openssl req -new -nodes -reqexts req_exts -passin pass:random-intermediate-ca-trusted-cert-0001-1962 -key /tmp/sssd-softhsm2-certs-WJtbX9/test-intermediate-CA-trusted-certificate-0001-key.pem -config /tmp/sssd-softhsm2-certs-WJtbX9/test-intermediate-CA-trusted-certificate-0001.config -out /tmp/sssd-softhsm2-certs-WJtbX9/test-intermediate-CA-trusted-certificate-0001-request.pem 476s + openssl req -text -noout -in /tmp/sssd-softhsm2-certs-WJtbX9/test-intermediate-CA-trusted-certificate-0001-request.pem 476s Certificate Request: 476s Data: 476s Version: 1 (0x0) 476s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 476s Subject Public Key Info: 476s Public Key Algorithm: rsaEncryption 476s Public-Key: (1024 bit) 476s Modulus: 476s 00:ad:0e:4d:47:d4:a8:d5:70:d6:14:7a:fa:78:fa: 476s 3e:d7:38:3f:d3:38:12:c2:bd:2d:ba:fe:f6:24:97: 476s 87:97:a3:00:39:96:d5:b5:c3:aa:db:66:f4:df:20: 476s a4:a1:69:a6:bc:66:4a:2e:70:81:3f:90:bd:7b:f1: 476s ca:f7:a0:f2:61:d7:b2:33:e6:ba:be:0b:ab:86:86: 476s 66:76:26:68:76:70:37:15:7b:d9:ee:f6:e4:3b:e7: 476s 76:42:fa:48:87:e2:f9:e2:ec:0c:4d:8a:a3:42:6e: 476s c6:ab:2d:e1:b2:fa:6c:69:09:cc:c4:af:7d:37:8c: 476s de:8f:80:be:f3:9e:99:f1:eb 476s Exponent: 65537 (0x10001) 476s Attributes: 476s Requested Extensions: 476s X509v3 Basic Constraints: 476s CA:FALSE 476s Netscape Cert Type: 476s SSL Client, S/MIME 476s Netscape Comment: 476s Test Organization Intermediate CA trusted Certificate 476s X509v3 Subject Key Identifier: 476s 53:E8:B2:C3:F0:16:28:D5:43:EA:21:06:CB:73:97:F2:76:93:DD:27 476s X509v3 Key Usage: critical 476s Digital Signature, Non Repudiation, Key Encipherment 476s X509v3 Extended Key Usage: 476s TLS Web Client Authentication, E-mail Protection 476s X509v3 Subject Alternative Name: 476s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 476s Signature Algorithm: sha256WithRSAEncryption 476s Signature Value: 476s 9b:0f:a7:41:69:b2:98:dc:f3:b6:8a:bb:32:a6:93:c0:83:bb: 476s c2:b3:95:ca:80:de:22:6c:81:a0:19:f6:f6:f0:4c:ee:b3:35: 476s 17:47:20:8f:71:0a:ba:d1:a7:b0:9b:0e:82:b1:bf:6b:9b:5c: 476s ef:f6:f1:ef:bf:96:bd:3a:31:5a:41:1c:d3:be:58:c6:f0:84: 476s 6a:a4:27:8c:16:79:41:13:81:0e:c7:1d:9c:d0:f9:7b:2a:1c: 476s 9e:30:dc:d3:c7:a0:e5:a2:3f:0c:b9:80:ea:d4:e8:41:30:b1: 476s 32:c6:24:4f:a8:98:61:a2:d0:72:7a:6f:be:13:66:09:5c:2f: 476s b4:6b 476s + openssl ca -passin pass:random-intermediate-CA-password-4032 -config /tmp/sssd-softhsm2-certs-WJtbX9/test-intermediate-CA.config -batch -notext -keyfile /tmp/sssd-softhsm2-certs-WJtbX9/test-intermediate-CA-key.pem -in /tmp/sssd-softhsm2-certs-WJtbX9/test-intermediate-CA-trusted-certificate-0001-request.pem -days 365 -extensions usr_cert -out /tmp/sssd-softhsm2-certs-WJtbX9/test-intermediate-CA-trusted-certificate-0001.pem 476s Using configuration from /tmp/sssd-softhsm2-certs-WJtbX9/test-intermediate-CA.config 476s Check that the request matches the signature 476s Signature ok 476s Certificate Details: 476s Serial Number: 4 (0x4) 476s Validity 476s Not Before: Nov 15 22:51:37 2024 GMT 476s Not After : Nov 15 22:51:37 2025 GMT 476s Subject: 476s organizationName = Test Organization 476s organizationalUnitName = Test Organization Unit 476s commonName = Test Organization Intermediate Trusted Certificate 0001 476s X509v3 extensions: 476s X509v3 Authority Key Identifier: 476s BB:5A:13:61:90:C1:A0:63:25:95:91:09:69:A4:EC:20:D3:D4:D0:0D 476s X509v3 Basic Constraints: 476s CA:FALSE 476s Netscape Cert Type: 476s SSL Client, S/MIME 476s Netscape Comment: 476s Test Organization Intermediate CA trusted Certificate 476s X509v3 Subject Key Identifier: 476s 53:E8:B2:C3:F0:16:28:D5:43:EA:21:06:CB:73:97:F2:76:93:DD:27 476s X509v3 Key Usage: critical 476s Digital Signature, Non Repudiation, Key Encipherment 476s X509v3 Extended Key Usage: 476s TLS Web Client Authentication, E-mail Protection 476s X509v3 Subject Alternative Name: 476s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 476s Certificate is to be certified until Nov 15 22:51:37 2025 GMT (365 days) 476s 476s Write out database with 1 new entries 476s Database updated 476s + openssl x509 -noout -in /tmp/sssd-softhsm2-certs-WJtbX9/test-intermediate-CA-trusted-certificate-0001.pem 476s + echo 'This certificate should not be trusted fully' 476s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-certs-WJtbX9/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-WJtbX9/test-intermediate-CA-trusted-certificate-0001.pem 476s + local cmd=openssl 476s + shift 476s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-WJtbX9/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-WJtbX9/test-intermediate-CA-trusted-certificate-0001.pem 476s This certificate should not be trusted fully 476s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 476s error 2 at 1 depth lookup: unable to get issuer certificate 476s error /tmp/sssd-softhsm2-certs-WJtbX9/test-intermediate-CA-trusted-certificate-0001.pem: verification failed 476s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-certs-WJtbX9/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-WJtbX9/test-intermediate-CA-trusted-certificate-0001.pem 476s /tmp/sssd-softhsm2-certs-WJtbX9/test-intermediate-CA-trusted-certificate-0001.pem: OK 476s + cat 476s + sub_intermediate_ca_trusted_cert_0001_key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-11563 476s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-certs-WJtbX9/test-sub-intermediate-CA-trusted-certificate-0001-key.pem -passout pass:random-sub-intermediate-ca-trusted-cert-0001-11563 1024 476s + openssl req -new -nodes -reqexts req_exts -passin pass:random-sub-intermediate-ca-trusted-cert-0001-11563 -key /tmp/sssd-softhsm2-certs-WJtbX9/test-sub-intermediate-CA-trusted-certificate-0001-key.pem -config /tmp/sssd-softhsm2-certs-WJtbX9/test-sub-intermediate-CA-trusted-certificate-0001.config -out /tmp/sssd-softhsm2-certs-WJtbX9/test-sub-intermediate-CA-trusted-certificate-0001-request.pem 476s Certificate Request: 476s Data: 476s Version: 1 (0x0) 476s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 476s Subject Public Key Info: 476s Public Key Algorithm: rsaEncryption 476s Public-Key: (1024 bit) 476s Modulus: 476s 00:d2:9a:41:68:6c:a1:70:65:2b:2f:78:3c:1b:16: 476s 13:f8:46:c5:de:7f:56:dd:65:00:06:5d:4c:d1:66: 476s 7d:b7:75:eb:f5:f1:b0:43:eb:f2:33:0e:81:da:0e: 476s e3:f4:bf:8a:d5:6e:e2:df:ed:31:08:bb:ef:dd:1d: 476s 80:b7:46:b4:69:85:5e:30:69:1c:18:26:5f:7e:2e: 476s 6c:ab:de:40:36:09:c7:66:eb:10:ac:52:5a:c9:07: 476s 1e:f5:63:35:37:93:f2:7f:50:ba:8a:e2:b4:32:76: 476s ea:07:58:78:8b:43:e8:1e:b1:7e:41:3a:b0:92:fd: 476s 70:08:0b:ab:4a:03:47:a5:63 476s Exponent: 65537 (0x10001) 476s Attributes: 476s Requested Extensions: 476s X509v3 Basic Constraints: 476s CA:FALSE 476s Netscape Cert Type: 476s SSL Client, S/MIME 476s Netscape Comment: 476s Test Organization Sub Intermediate CA trusted Certificate 476s X509v3 Subject Key Identifier: 476s 15:33:C5:14:D1:36:8A:41:B8:73:F9:3B:C4:83:87:FD:1C:7A:B8:B8 476s X509v3 Key Usage: critical 476s Digital Signature, Non Repudiation, Key Encipherment 476s X509v3 Extended Key Usage: 476s TLS Web Client Authentication, E-mail Protection 476s X509v3 Subject Alternative Name: 476s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 476s Signature Algorithm: sha256WithRSAEncryption 476s Signature Value: 476s 7f:0d:bd:0d:03:5e:ee:12:38:e5:f0:7f:0a:f6:69:62:57:bb: 476s 0a:b8:8a:c9:38:6c:8c:f6:44:19:6b:7f:2f:4a:75:9c:09:0d: 476s 72:89:c0:03:59:05:b8:a8:d8:1e:1d:e9:d6:24:2b:bf:e1:5e: 476s e3:2d:69:fe:ab:bb:33:72:c7:95:1c:17:4d:62:bb:c7:2c:1a: 476s db:0e:75:59:6a:09:83:ef:b2:2f:f6:99:4d:5d:6e:f5:98:95: 476s 0d:16:93:b3:cf:70:b0:78:77:39:be:e3:fc:cd:7d:85:bb:bf: 476s 1c:e4:01:52:cf:06:90:dd:39:b3:01:9a:61:06:9d:e0:a9:40: 476s 7b:cb 476s + openssl req -text -noout -in /tmp/sssd-softhsm2-certs-WJtbX9/test-sub-intermediate-CA-trusted-certificate-0001-request.pem 476s + openssl ca -passin pass:random-sub-intermediate-CA-password-3711 -config /tmp/sssd-softhsm2-certs-WJtbX9/test-sub-intermediate-CA.config -batch -notext -keyfile /tmp/sssd-softhsm2-certs-WJtbX9/test-sub-intermediate-CA-key.pem -in /tmp/sssd-softhsm2-certs-WJtbX9/test-sub-intermediate-CA-trusted-certificate-0001-request.pem -days 365 -extensions usr_cert -out /tmp/sssd-softhsm2-certs-WJtbX9/test-sub-intermediate-CA-trusted-certificate-0001.pem 476s Using configuration from /tmp/sssd-softhsm2-certs-WJtbX9/test-sub-intermediate-CA.config 476s Check that the request matches the signature 476s Signature ok 476s Certificate Details: 476s Serial Number: 5 (0x5) 476s Validity 476s Not Before: Nov 15 22:51:37 2024 GMT 476s Not After : Nov 15 22:51:37 2025 GMT 476s Subject: 476s organizationName = Test Organization 476s organizationalUnitName = Test Organization Unit 476s commonName = Test Organization Sub Intermediate Trusted Certificate 0001 476s X509v3 extensions: 476s X509v3 Authority Key Identifier: 476s 73:D4:81:62:6C:A7:59:C7:51:0B:E4:86:B6:4B:29:40:31:2D:99:AE 476s X509v3 Basic Constraints: 476s CA:FALSE 476s Netscape Cert Type: 476s SSL Client, S/MIME 476s Netscape Comment: 476s Test Organization Sub Intermediate CA trusted Certificate 476s X509v3 Subject Key Identifier: 476s 15:33:C5:14:D1:36:8A:41:B8:73:F9:3B:C4:83:87:FD:1C:7A:B8:B8 476s X509v3 Key Usage: critical 476s Digital Signature, Non Repudiation, Key Encipherment 476s X509v3 Extended Key Usage: 476s TLS Web Client Authentication, E-mail Protection 476s X509v3 Subject Alternative Name: 476s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 476s Certificate is to be certified until Nov 15 22:51:37 2025 GMT (365 days) 476s 476s Write out database with 1 new entries 476s Database updated 476s + openssl x509 -noout -in /tmp/sssd-softhsm2-certs-WJtbX9/test-sub-intermediate-CA-trusted-certificate-0001.pem 476s This certificate should not be trusted fully 476s + echo 'This certificate should not be trusted fully' 476s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-certs-WJtbX9/test-sub-intermediate-CA.pem /tmp/sssd-softhsm2-certs-WJtbX9/test-sub-intermediate-CA-trusted-certificate-0001.pem 476s + local cmd=openssl 476s + shift 476s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-WJtbX9/test-sub-intermediate-CA.pem /tmp/sssd-softhsm2-certs-WJtbX9/test-sub-intermediate-CA-trusted-certificate-0001.pem 476s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 476s error 2 at 1 depth lookup: unable to get issuer certificate 476s error /tmp/sssd-softhsm2-certs-WJtbX9/test-sub-intermediate-CA-trusted-certificate-0001.pem: verification failed 476s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-certs-WJtbX9/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-WJtbX9/test-sub-intermediate-CA-trusted-certificate-0001.pem 476s + local cmd=openssl 476s + shift 476s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-WJtbX9/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-WJtbX9/test-sub-intermediate-CA-trusted-certificate-0001.pem 476s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 476s error 20 at 0 depth lookup: unable to get local issuer certificate 476s error /tmp/sssd-softhsm2-certs-WJtbX9/test-sub-intermediate-CA-trusted-certificate-0001.pem: verification failed 476s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-certs-WJtbX9/test-sub-intermediate-CA.pem /tmp/sssd-softhsm2-certs-WJtbX9/test-sub-intermediate-CA-trusted-certificate-0001.pem 476s /tmp/sssd-softhsm2-certs-WJtbX9/test-sub-intermediate-CA-trusted-certificate-0001.pem: OK 476s + expect_fail openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-certs-WJtbX9/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-WJtbX9/test-sub-intermediate-CA-trusted-certificate-0001.pem 476s + local cmd=openssl 476s + shift 476s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-certs-WJtbX9/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-WJtbX9/test-sub-intermediate-CA-trusted-certificate-0001.pem 476s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 476s error 20 at 0 depth lookup: unable to get local issuer certificate 476s error /tmp/sssd-softhsm2-certs-WJtbX9/test-sub-intermediate-CA-trusted-certificate-0001.pem: verification failed 476s Building a the full-chain CA file... 476s + echo 'Building a the full-chain CA file...' 476s + cat /tmp/sssd-softhsm2-certs-WJtbX9/test-root-CA.pem /tmp/sssd-softhsm2-certs-WJtbX9/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-WJtbX9/test-sub-intermediate-CA.pem 476s + cat /tmp/sssd-softhsm2-certs-WJtbX9/test-root-CA.pem /tmp/sssd-softhsm2-certs-WJtbX9/test-intermediate-CA.pem 476s + cat /tmp/sssd-softhsm2-certs-WJtbX9/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-WJtbX9/test-sub-intermediate-CA.pem 476s + openssl crl2pkcs7 -nocrl -certfile /tmp/sssd-softhsm2-certs-WJtbX9/test-full-chain-CA.pem 476s + openssl pkcs7 -print_certs -noout 476s subject=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 476s issuer=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 476s 476s subject=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 476s issuer=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 476s 476s subject=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 476s issuer=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 476s 476s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-WJtbX9/test-full-chain-CA.pem /tmp/sssd-softhsm2-certs-WJtbX9/test-intermediate-CA.pem 476s /tmp/sssd-softhsm2-certs-WJtbX9/test-intermediate-CA.pem: OK 476s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-WJtbX9/test-full-chain-CA.pem /tmp/sssd-softhsm2-certs-WJtbX9/test-root-CA-trusted-certificate-0001.pem 476s /tmp/sssd-softhsm2-certs-WJtbX9/test-root-CA-trusted-certificate-0001.pem: OK 476s /tmp/sssd-softhsm2-certs-WJtbX9/test-intermediate-CA-trusted-certificate-0001.pem: OK 476s /tmp/sssd-softhsm2-certs-WJtbX9/test-root-intermediate-chain-CA.pem: OK 476s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-WJtbX9/test-full-chain-CA.pem /tmp/sssd-softhsm2-certs-WJtbX9/test-intermediate-CA-trusted-certificate-0001.pem 476s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-WJtbX9/test-full-chain-CA.pem /tmp/sssd-softhsm2-certs-WJtbX9/test-root-intermediate-chain-CA.pem 476s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-WJtbX9/test-full-chain-CA.pem /tmp/sssd-softhsm2-certs-WJtbX9/test-sub-intermediate-CA-trusted-certificate-0001.pem 476s /tmp/sssd-softhsm2-certs-WJtbX9/test-sub-intermediate-CA-trusted-certificate-0001.pem: OK 476s Certificates generation completed! 476s + echo 'Certificates generation completed!' 476s + [[ -v NO_SSSD_TESTS ]] 476s + [[ -v GENERATE_SMART_CARDS ]] 476s + prepare_softhsm2_card /tmp/sssd-softhsm2-certs-WJtbX9/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-10783 476s + local certificate=/tmp/sssd-softhsm2-certs-WJtbX9/test-root-CA-trusted-certificate-0001.pem 476s + local key_pass=pass:random-root-ca-trusted-cert-0001-10783 476s + local key_cn 476s + local key_name 476s + local tokens_dir 476s + local output_cert_file 476s + token_name= 476s ++ basename /tmp/sssd-softhsm2-certs-WJtbX9/test-root-CA-trusted-certificate-0001.pem .pem 476s + key_name=test-root-CA-trusted-certificate-0001 476s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-certs-WJtbX9/test-root-CA-trusted-certificate-0001.pem 476s ++ sed -n 's/ *commonName *= //p' 476s + key_cn='Test Organization Root Trusted Certificate 0001' 476s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 476s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-certs-WJtbX9/softhsm2-test-root-CA-trusted-certificate-0001.conf 476s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-certs-WJtbX9/softhsm2-test-root-CA-trusted-certificate-0001.conf 476s ++ basename /tmp/sssd-softhsm2-certs-WJtbX9/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 476s + tokens_dir=/tmp/sssd-softhsm2-certs-WJtbX9/softhsm2-test-root-CA-trusted-certificate-0001 476s + token_name='Test Organization Root Tr Token' 476s + '[' '!' -e /tmp/sssd-softhsm2-certs-WJtbX9/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 476s + local key_file 476s + local decrypted_key 476s + mkdir -p /tmp/sssd-softhsm2-certs-WJtbX9/softhsm2-test-root-CA-trusted-certificate-0001 476s + key_file=/tmp/sssd-softhsm2-certs-WJtbX9/test-root-CA-trusted-certificate-0001-key.pem 476s + decrypted_key=/tmp/sssd-softhsm2-certs-WJtbX9/test-root-CA-trusted-certificate-0001-key-decrypted.pem 476s + cat 476s + softhsm2-util --init-token --label 'Test Organization Root Tr Token' --pin 123456 --so-pin 123456 --free 476s Slot 0 has a free/uninitialized token. 476s The token has been initialized and is reassigned to slot 1249388692 476s + softhsm2-util --show-slots 476s Available slots: 476s Slot 1249388692 476s Slot info: 476s Description: SoftHSM slot ID 0x4a782894 476s Manufacturer ID: SoftHSM project 476s Hardware version: 2.6 476s Firmware version: 2.6 476s Token present: yes 476s Token info: 476s Manufacturer ID: SoftHSM project 476s Model: SoftHSM v2 476s Hardware version: 2.6 476s Firmware version: 2.6 476s Serial number: 2590168bca782894 476s Initialized: yes 476s User PIN init.: yes 476s Label: Test Organization Root Tr Token 476s Slot 1 476s Slot info: 476s Description: SoftHSM slot ID 0x1 476s Manufacturer ID: SoftHSM project 476s Hardware version: 2.6 476s Firmware version: 2.6 476s Token present: yes 476s Token info: 476s Manufacturer ID: SoftHSM project 476s Model: SoftHSM v2 476s Hardware version: 2.6 476s Firmware version: 2.6 476s Serial number: 476s Initialized: no 476s User PIN init.: no 476s Label: 476s + p11tool --provider=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --write --no-mark-private --load-certificate=/tmp/sssd-softhsm2-certs-WJtbX9/test-root-CA-trusted-certificate-0001.pem --login --set-pin=123456 --label 'Test Organization Root Trusted Certificate 0001' --id 00112233445566778899FFAABBCCDDEEFF012345 476s + openssl rsa -passin pass:random-root-ca-trusted-cert-0001-10783 -in /tmp/sssd-softhsm2-certs-WJtbX9/test-root-CA-trusted-certificate-0001-key.pem -out /tmp/sssd-softhsm2-certs-WJtbX9/test-root-CA-trusted-certificate-0001-key-decrypted.pem 476s writing RSA key 476s + p11tool --provider=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --write --load-privkey=/tmp/sssd-softhsm2-certs-WJtbX9/test-root-CA-trusted-certificate-0001-key-decrypted.pem --login --set-pin=123456 --label 'Test Organization Root Trusted Certificate 0001 Key' --id 00112233445566778899FFAABBCCDDEEFF012345 476s + rm /tmp/sssd-softhsm2-certs-WJtbX9/test-root-CA-trusted-certificate-0001-key-decrypted.pem 476s + p11tool --provider=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --list-all 476s Object 0: 476s URL: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=2590168bca782894;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert 476s Type: X.509 Certificate (RSA-1024) 476s Expires: Sat Nov 15 22:51:36 2025 476s Label: Test Organization Root Trusted Certificate 0001 476s ID: 00:11:22:33:44:55:66:77:88:99:ff:aa:bb:cc:dd:ee:ff:01:23:45 476s 476s Test Organization Root Tr Token 476s + echo 'Test Organization Root Tr Token' 476s + prepare_softhsm2_card /tmp/sssd-softhsm2-certs-WJtbX9/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-1962 476s + local certificate=/tmp/sssd-softhsm2-certs-WJtbX9/test-intermediate-CA-trusted-certificate-0001.pem 476s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-1962 476s + local key_cn 476s + local key_name 476s + local tokens_dir 476s + local output_cert_file 476s + token_name= 476s ++ basename /tmp/sssd-softhsm2-certs-WJtbX9/test-intermediate-CA-trusted-certificate-0001.pem .pem 476s + key_name=test-intermediate-CA-trusted-certificate-0001 476s ++ sed -n 's/ *commonName *= //p' 476s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-certs-WJtbX9/test-intermediate-CA-trusted-certificate-0001.pem 476s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 476s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 476s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-certs-WJtbX9/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 476s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-certs-WJtbX9/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 476s ++ basename /tmp/sssd-softhsm2-certs-WJtbX9/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 476s + tokens_dir=/tmp/sssd-softhsm2-certs-WJtbX9/softhsm2-test-intermediate-CA-trusted-certificate-0001 476s + token_name='Test Organization Interme Token' 476s + '[' '!' -e /tmp/sssd-softhsm2-certs-WJtbX9/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 476s + local key_file 476s + local decrypted_key 476s + mkdir -p /tmp/sssd-softhsm2-certs-WJtbX9/softhsm2-test-intermediate-CA-trusted-certificate-0001 476s + key_file=/tmp/sssd-softhsm2-certs-WJtbX9/test-intermediate-CA-trusted-certificate-0001-key.pem 476s + decrypted_key=/tmp/sssd-softhsm2-certs-WJtbX9/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 476s + cat 476s + softhsm2-util --init-token --label 'Test Organization Interme Token' --pin 123456 --so-pin 123456 --free 476s Slot 0 has a free/uninitialized token. 476s The token has been initialized and is reassigned to slot 1705548254 476s + softhsm2-util --show-slots 476s Available slots: 476s Slot 1705548254 476s Slot info: 476s Description: SoftHSM slot ID 0x65a899de 476s Manufacturer ID: SoftHSM project 476s Hardware version: 2.6 476s Firmware version: 2.6 476s Token present: yes 476s Token info: 476s Manufacturer ID: SoftHSM project 476s Model: SoftHSM v2 476s Hardware version: 2.6 476s Firmware version: 2.6 476s Serial number: ca5fd31b65a899de 476s Initialized: yes 476s User PIN init.: yes 476s Label: Test Organization Interme Token 476s Slot 1 476s Slot info: 476s Description: SoftHSM slot ID 0x1 476s Manufacturer ID: SoftHSM project 476s Hardware version: 2.6 476s Firmware version: 2.6 476s Token present: yes 476s Token info: 476s Manufacturer ID: SoftHSM project 476s Model: SoftHSM v2 476s Hardware version: 2.6 476s Firmware version: 2.6 476s Serial number: 476s Initialized: no 476s User PIN init.: no 476s Label: 476s + p11tool --provider=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --write --no-mark-private --load-certificate=/tmp/sssd-softhsm2-certs-WJtbX9/test-intermediate-CA-trusted-certificate-0001.pem --login --set-pin=123456 --label 'Test Organization Intermediate Trusted Certificate 0001' --id 00112233445566778899FFAABBCCDDEEFF012345 476s + openssl rsa -passin pass:random-intermediate-ca-trusted-cert-0001-1962 -in /tmp/sssd-softhsm2-certs-WJtbX9/test-intermediate-CA-trusted-certificate-0001-key.pem -out /tmp/sssd-softhsm2-certs-WJtbX9/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 476s writing RSA key 476s + p11tool --provider=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --write --load-privkey=/tmp/sssd-softhsm2-certs-WJtbX9/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem --login --set-pin=123456 --label 'Test Organization Intermediate Trusted Certificate 0001 Key' --id 00112233445566778899FFAABBCCDDEEFF012345 476s + rm /tmp/sssd-softhsm2-certs-WJtbX9/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 476s + p11tool --provider=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --list-all 476s + echo 'Test Organization Interme Token' 476s + prepare_softhsm2_card /tmp/sssd-softhsm2-certs-WJtbX9/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-11563 476s + local certificate=/tmp/sssd-softhsm2-certs-WJtbX9/test-sub-intermediate-CA-trusted-certificate-0001.pem 476s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-11563 476s + local key_cn 476s + local key_name 476s + local tokens_dir 476s + local output_cert_file 476s + token_name= 476s ++ basename /tmp/sssd-softhsm2-certs-WJtbX9/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 476s Object 0: 476s URL: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=ca5fd31b65a899de;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert 476s Type: X.509 Certificate (RSA-1024) 476s Expires: Sat Nov 15 22:51:37 2025 476s Label: Test Organization Intermediate Trusted Certificate 0001 476s ID: 00:11:22:33:44:55:66:77:88:99:ff:aa:bb:cc:dd:ee:ff:01:23:45 476s 476s Test Organization Interme Token 476s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 476s ++ sed -n 's/ *commonName *= //p' 476s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-certs-WJtbX9/test-sub-intermediate-CA-trusted-certificate-0001.pem 477s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 477s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 477s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-certs-WJtbX9/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 477s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-certs-WJtbX9/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 477s ++ basename /tmp/sssd-softhsm2-certs-WJtbX9/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 477s + tokens_dir=/tmp/sssd-softhsm2-certs-WJtbX9/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 477s + token_name='Test Organization Sub Int Token' 477s + '[' '!' -e /tmp/sssd-softhsm2-certs-WJtbX9/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 477s + local key_file 477s + local decrypted_key 477s + mkdir -p /tmp/sssd-softhsm2-certs-WJtbX9/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 477s + key_file=/tmp/sssd-softhsm2-certs-WJtbX9/test-sub-intermediate-CA-trusted-certificate-0001-key.pem 477s + decrypted_key=/tmp/sssd-softhsm2-certs-WJtbX9/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 477s + cat 477s + softhsm2-util --init-token --label 'Test Organization Sub Int Token' --pin 123456 --so-pin 123456 --free 477s Slot 0 has a free/uninitialized token. 477s The token has been initialized and is reassigned to slot 8943932 477s + softhsm2-util --show-slots 477s + p11tool --provider=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --write --no-mark-private --load-certificate=/tmp/sssd-softhsm2-certs-WJtbX9/test-sub-intermediate-CA-trusted-certificate-0001.pem --login --set-pin=123456 --label 'Test Organization Sub Intermediate Trusted Certificate 0001' --id 00112233445566778899FFAABBCCDDEEFF012345 477s Available slots: 477s Slot 8943932 477s Slot info: 477s Description: SoftHSM slot ID 0x88793c 477s Manufacturer ID: SoftHSM project 477s Hardware version: 2.6 477s Firmware version: 2.6 477s Token present: yes 477s Token info: 477s Manufacturer ID: SoftHSM project 477s Model: SoftHSM v2 477s Hardware version: 2.6 477s Firmware version: 2.6 477s Serial number: 2e390b830088793c 477s Initialized: yes 477s User PIN init.: yes 477s Label: Test Organization Sub Int Token 477s Slot 1 477s Slot info: 477s Description: SoftHSM slot ID 0x1 477s Manufacturer ID: SoftHSM project 477s Hardware version: 2.6 477s Firmware version: 2.6 477s Token present: yes 477s Token info: 477s Manufacturer ID: SoftHSM project 477s Model: SoftHSM v2 477s Hardware version: 2.6 477s Firmware version: 2.6 477s Serial number: 477s Initialized: no 477s User PIN init.: no 477s Label: 477s + openssl rsa -passin pass:random-sub-intermediate-ca-trusted-cert-0001-11563 -in /tmp/sssd-softhsm2-certs-WJtbX9/test-sub-intermediate-CA-trusted-certificate-0001-key.pem -out /tmp/sssd-softhsm2-certs-WJtbX9/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 477s writing RSA key 477s + p11tool --provider=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --write --load-privkey=/tmp/sssd-softhsm2-certs-WJtbX9/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem --login --set-pin=123456 --label 'Test Organization Sub Intermediate Trusted Certificate 0001 Key' --id 00112233445566778899FFAABBCCDDEEFF012345 477s + rm /tmp/sssd-softhsm2-certs-WJtbX9/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 477s + p11tool --provider=/usr/lib/powerpc64le-linux-gnu/softhsm/libsofthsm2.so --list-all 477s Object 0: 477s URL: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=2e390b830088793c;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert 477s Type: X.509 Certificate (RSA-1024) 477s Expires: Sat Nov 15 22:51:37 2025 477s Label: Test Organization Sub Intermediate Trusted Certificate 0001 477s ID: 00:11:22:33:44:55:66:77:88:99:ff:aa:bb:cc:dd:ee:ff:01:23:45 477s 477s Test Organization Sub Int Token 477s Certificates generation completed! 477s + echo 'Test Organization Sub Int Token' 477s + echo 'Certificates generation completed!' 477s + exit 0 477s + find /tmp/sssd-softhsm2-certs-WJtbX9 -type d -exec chmod 777 '{}' ';' 477s + find /tmp/sssd-softhsm2-certs-WJtbX9 -type f -exec chmod 666 '{}' ';' 477s + backup_file /etc/sssd/sssd.conf 477s + '[' -z '' ']' 477s ++ mktemp -d -t sssd-softhsm2-backups-XXXXXX 477s + backupsdir=/tmp/sssd-softhsm2-backups-F2WZiu 477s + '[' -e /etc/sssd/sssd.conf ']' 477s + delete_paths+=("$1") 477s + rm -f /etc/sssd/sssd.conf 477s ++ runuser -u ubuntu -- sh -c 'echo ~' 477s + user_home=/home/ubuntu 477s + mkdir -p /home/ubuntu 477s + chown ubuntu:ubuntu /home/ubuntu 477s ++ runuser -u ubuntu -- sh -c 'echo ${XDG_CONFIG_HOME:-~/.config}' 477s + user_config=/home/ubuntu/.config 477s + system_config=/etc 477s + softhsm2_conf_paths=("${AUTOPKGTEST_NORMAL_USER}:$user_config/softhsm2/softhsm2.conf" "root:$system_config/softhsm/softhsm2.conf") 477s + for path_pair in "${softhsm2_conf_paths[@]}" 477s + IFS=: 477s + read -r -a path 477s + path=/home/ubuntu/.config/softhsm2/softhsm2.conf 477s + backup_file /home/ubuntu/.config/softhsm2/softhsm2.conf 477s + '[' -z /tmp/sssd-softhsm2-backups-F2WZiu ']' 477s + '[' -e /home/ubuntu/.config/softhsm2/softhsm2.conf ']' 477s + delete_paths+=("$1") 477s + rm -f /home/ubuntu/.config/softhsm2/softhsm2.conf 477s + for path_pair in "${softhsm2_conf_paths[@]}" 477s + IFS=: 477s + read -r -a path 477s + path=/etc/softhsm/softhsm2.conf 477s + backup_file /etc/softhsm/softhsm2.conf 477s + '[' -z /tmp/sssd-softhsm2-backups-F2WZiu ']' 477s + '[' -e /etc/softhsm/softhsm2.conf ']' 477s ++ dirname /etc/softhsm/softhsm2.conf 477s + local back_dir=/tmp/sssd-softhsm2-backups-F2WZiu//etc/softhsm 477s ++ basename /etc/softhsm/softhsm2.conf 477s + local back_path=/tmp/sssd-softhsm2-backups-F2WZiu//etc/softhsm/softhsm2.conf 477s + '[' '!' -e /tmp/sssd-softhsm2-backups-F2WZiu//etc/softhsm/softhsm2.conf ']' 477s + mkdir -p /tmp/sssd-softhsm2-backups-F2WZiu//etc/softhsm 477s + cp -a /etc/softhsm/softhsm2.conf /tmp/sssd-softhsm2-backups-F2WZiu//etc/softhsm/softhsm2.conf 477s + restore_paths+=("$back_path") 477s + rm -f /etc/softhsm/softhsm2.conf 477s + test_authentication login /tmp/sssd-softhsm2-certs-WJtbX9/softhsm2-test-root-CA-trusted-certificate-0001.conf /tmp/sssd-softhsm2-certs-WJtbX9/test-full-chain-CA.pem 477s + pam_service=login 477s + certificate_config=/tmp/sssd-softhsm2-certs-WJtbX9/softhsm2-test-root-CA-trusted-certificate-0001.conf 477s + ca_db=/tmp/sssd-softhsm2-certs-WJtbX9/test-full-chain-CA.pem 477s + verification_options= 477s + mkdir -p -m 700 /etc/sssd 477s Using CA DB '/tmp/sssd-softhsm2-certs-WJtbX9/test-full-chain-CA.pem' with verification options: '' 477s + echo 'Using CA DB '\''/tmp/sssd-softhsm2-certs-WJtbX9/test-full-chain-CA.pem'\'' with verification options: '\'''\''' 477s + cat 477s + chmod 600 /etc/sssd/sssd.conf 477s + for path_pair in "${softhsm2_conf_paths[@]}" 477s + IFS=: 477s + read -r -a path 477s + user=ubuntu 477s + path=/home/ubuntu/.config/softhsm2/softhsm2.conf 477s ++ dirname /home/ubuntu/.config/softhsm2/softhsm2.conf 477s + runuser -u ubuntu -- mkdir -p /home/ubuntu/.config/softhsm2 477s + runuser -u ubuntu -- ln -sf /tmp/sssd-softhsm2-certs-WJtbX9/softhsm2-test-root-CA-trusted-certificate-0001.conf /home/ubuntu/.config/softhsm2/softhsm2.conf 477s + grep 'Test Organization' 477s + runuser -u ubuntu -- softhsm2-util --show-slots 477s Label: Test Organization Root Tr Token 477s + for path_pair in "${softhsm2_conf_paths[@]}" 477s + IFS=: 477s + read -r -a path 477s + user=root 477s + path=/etc/softhsm/softhsm2.conf 477s ++ dirname /etc/softhsm/softhsm2.conf 477s + runuser -u root -- mkdir -p /etc/softhsm 477s + runuser -u root -- ln -sf /tmp/sssd-softhsm2-certs-WJtbX9/softhsm2-test-root-CA-trusted-certificate-0001.conf /etc/softhsm/softhsm2.conf 477s + runuser -u root -- softhsm2-util --show-slots 477s + grep 'Test Organization' 477s Label: Test Organization Root Tr Token 477s + systemctl restart sssd 477s + pam-auth-update --disable sss-smart-card-optional sss-smart-card-required 478s + for alternative in "${alternative_pam_configs[@]}" 478s + pam-auth-update --enable sss-smart-card-optional 478s + cat /etc/pam.d/common-auth 478s # 478s # /etc/pam.d/common-auth - authentication settings common to all services 478s # 478s # This file is included from other service-specific PAM config files, 478s # and should contain a list of the authentication modules that define 478s # the central authentication scheme for use on the system 478s # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the 478s # traditional Unix authentication mechanisms. 478s # 478s # As of pam 1.0.1-6, this file is managed by pam-auth-update by default. 478s # To take advantage of this, it is recommended that you configure any 478s # local modules either before or after the default block, and use 478s # pam-auth-update to manage selection of other modules. See 478s # pam-auth-update(8) for details. 478s 478s # here are the per-package modules (the "Primary" block) 478s auth [success=3 default=ignore] pam_sss.so allow_missing_name try_cert_auth 478s auth [success=2 default=ignore] pam_unix.so nullok try_first_pass 478s auth [success=1 default=ignore] pam_sss.so use_first_pass 478s # here's the fallback if no module succeeds 478s auth requisite pam_deny.so 478s # prime the stack with a positive return value if there isn't one already; 478s # this avoids us returning an error just because nothing sets a success code 478s # since the modules above will each just jump around 478s auth required pam_permit.so 478s # and here are more per-package modules (the "Additional" block) 478s auth optional pam_cap.so 478s # end of pam-auth-update config 478s + echo -n -e 123456 478s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 478s pamtester: invoking pam_start(login, ubuntu, ...) 478s pamtester: performing operation - authenticate 478s PIN for Test Organization Root Tr Token: pamtester: successfully authenticated 478s + runuser -u ubuntu -- pamtester -v login '' authenticate 478s + echo -n -e 123456 478s pamtester: invoking pam_start(login, , ...) 478s pamtester: performing operation - authenticate 478s PIN for Test Organization Root Tr Token: pamtester: successfully authenticated 478s + echo -n -e wrong123456 478s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 478s pamtester: invoking pam_start(login, ubuntu, ...) 478s pamtester: performing operation - authenticate 481s PIN for Test Organization Root Tr Token: Password: pamtester: Authentication failure 481s + echo -n -e wrong123456 481s + runuser -u ubuntu -- pamtester -v login '' authenticate 481s pamtester: invoking pam_start(login, , ...) 481s pamtester: performing operation - authenticate 485s PIN for Test Organization Root Tr Token: Password: pamtester: Authentication failure 485s + echo -n -e 123456 485s + pamtester -v login root authenticate 485s pamtester: invoking pam_start(login, root, ...) 485s pamtester: performing operation - authenticate 489s Password: pamtester: Authentication failure 489s + for alternative in "${alternative_pam_configs[@]}" 489s + pam-auth-update --enable sss-smart-card-required 489s + cat /etc/pam.d/common-auth 489s + echo -n -e 123456 489s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 489s PAM configuration 489s ----------------- 489s 489s Incompatible PAM profiles selected. 489s 489s The following PAM profiles cannot be used together: 489s 489s SSS required smart card authentication, SSS optional smart card 489s authentication 489s 489s Please select a different set of modules to enable. 489s 489s # 489s # /etc/pam.d/common-auth - authentication settings common to all services 489s # 489s # This file is included from other service-specific PAM config files, 489s # and should contain a list of the authentication modules that define 489s # the central authentication scheme for use on the system 489s # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the 489s # traditional Unix authentication mechanisms. 489s # 489s # As of pam 1.0.1-6, this file is managed by pam-auth-update by default. 489s # To take advantage of this, it is recommended that you configure any 489s # local modules either before or after the default block, and use 489s # pam-auth-update to manage selection of other modules. See 489s # pam-auth-update(8) for details. 489s 489s # here are the per-package modules (the "Primary" block) 489s auth [success=3 ignore=ignore default=die] pam_sss.so allow_missing_name require_cert_auth 489s auth [success=2 default=ignore] pam_unix.so nullok try_first_pass 489s auth [success=1 default=ignore] pam_sss.so use_first_pass 489s # here's the fallback if no module succeeds 489s auth requisite pam_deny.so 489s # prime the stack with a positive return value if there isn't one already; 489s # this avoids us returning an error just because nothing sets a success code 489s # since the modules above will each just jump around 489s auth required pam_permit.so 489s # and here are more per-package modules (the "Additional" block) 489s auth optional pam_cap.so 489s # end of pam-auth-update config 489s pamtester: invoking pam_start(login, ubuntu, ...) 489s pamtester: performing operation - authenticate 489s PIN for Test Organization Root Tr Token: pamtester: successfully authenticated 489s + echo -n -e 123456 489s + runuser -u ubuntu -- pamtester -v login '' authenticate 489s pamtester: invoking pam_start(login, , ...) 489s pamtester: performing operation - authenticate 489s PIN for Test Organization Root Tr Token: pamtester: successfully authenticated 489s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 489s + echo -n -e wrong123456 489s pamtester: invoking pam_start(login, ubuntu, ...) 489s pamtester: performing operation - authenticate 492s PIN for Test Organization Root Tr Token: pamtester: Authentication failure 492s + echo -n -e wrong123456 492s + runuser -u ubuntu -- pamtester -v login '' authenticate 492s pamtester: invoking pam_start(login, , ...) 492s pamtester: performing operation - authenticate 495s PIN for Test Organization Root Tr Token: pamtester: Authentication failure 495s + echo -n -e 123456 495s + pamtester -v login root authenticate 495s pamtester: invoking pam_start(login, root, ...) 495s pamtester: performing operation - authenticate 498s pamtester: Authentication service cannot retrieve authentication info 498s + test_authentication login /tmp/sssd-softhsm2-certs-WJtbX9/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf /tmp/sssd-softhsm2-certs-WJtbX9/test-full-chain-CA.pem 498s + pam_service=login 498s + certificate_config=/tmp/sssd-softhsm2-certs-WJtbX9/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 498s + ca_db=/tmp/sssd-softhsm2-certs-WJtbX9/test-full-chain-CA.pem 498s + verification_options= 498s + mkdir -p -m 700 /etc/sssd 498s + echo 'Using CA DB '\''/tmp/sssd-softhsm2-certs-WJtbX9/test-full-chain-CA.pem'\'' with verification options: '\'''\''' 498s + cat 498s Using CA DB '/tmp/sssd-softhsm2-certs-WJtbX9/test-full-chain-CA.pem' with verification options: '' 498s + chmod 600 /etc/sssd/sssd.conf 498s + for path_pair in "${softhsm2_conf_paths[@]}" 498s + IFS=: 498s + read -r -a path 498s + user=ubuntu 498s + path=/home/ubuntu/.config/softhsm2/softhsm2.conf 498s ++ dirname /home/ubuntu/.config/softhsm2/softhsm2.conf 498s Label: Test Organization Sub Int Token 498s + runuser -u ubuntu -- mkdir -p /home/ubuntu/.config/softhsm2 498s + runuser -u ubuntu -- ln -sf /tmp/sssd-softhsm2-certs-WJtbX9/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf /home/ubuntu/.config/softhsm2/softhsm2.conf 498s + runuser -u ubuntu -- softhsm2-util --show-slots 498s + grep 'Test Organization' 498s + for path_pair in "${softhsm2_conf_paths[@]}" 498s + IFS=: 498s + read -r -a path 498s + user=root 498s + path=/etc/softhsm/softhsm2.conf 498s ++ dirname /etc/softhsm/softhsm2.conf 498s + runuser -u root -- mkdir -p /etc/softhsm 498s + runuser -u root -- ln -sf /tmp/sssd-softhsm2-certs-WJtbX9/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf /etc/softhsm/softhsm2.conf 498s + runuser -u root -- softhsm2-util --show-slots 498s + grep 'Test Organization' 498s Label: Test Organization Sub Int Token 498s + systemctl restart sssd 498s + pam-auth-update --disable sss-smart-card-optional sss-smart-card-required 499s + for alternative in "${alternative_pam_configs[@]}" 499s + pam-auth-update --enable sss-smart-card-optional 499s + cat /etc/pam.d/common-auth 499s # 499s # /etc/pam.d/common-auth - authentication settings common to all services 499s # 499s # This file is included from other service-specific PAM config files, 499s # and should contain a list of the authentication modules that define 499s # the central authentication scheme for use on the system 499s # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the 499s # traditional Unix authentication mechanisms. 499s # 499s # As of pam 1.0.1-6, this file is managed by pam-auth-update by default. 499s # To take advantage of this, it is recommended that you configure any 499s # local modules either before or after the default block, and use 499s # pam-auth-update to manage selection of other modules. See 499s # pam-auth-update(8) for details. 499s 499s # here are the per-package modules (the "Primary" block) 499s auth [success=3 default=ignore] pam_sss.so allow_missing_name try_cert_auth 499s auth [success=2 default=ignore] pam_unix.so nullok try_first_pass 499s auth [success=1 default=ignore] pam_sss.so use_first_pass 499s # here's the fallback if no module succeeds 499s auth requisite pam_deny.so 499s # prime the stack with a positive return value if there isn't one already; 499s # this avoids us returning an error just because nothing sets a success code 499s # since the modules above will each just jump around 499s auth required pam_permit.so 499s # and here are more per-package modules (the "Additional" block) 499s auth optional pam_cap.so 499s # end of pam-auth-update config 499s + echo -n -e 123456 499s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 499s pamtester: invoking pam_start(login, ubuntu, ...) 499s pamtester: performing operation - authenticate 499s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 499s + echo -n -e 123456 499s + runuser -u ubuntu -- pamtester -v login '' authenticate 499s pamtester: invoking pam_start(login, , ...) 499s pamtester: performing operation - authenticate 499s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 499s + echo -n -e wrong123456 499s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 499s pamtester: invoking pam_start(login, ubuntu, ...) 499s pamtester: performing operation - authenticate 502s PIN for Test Organization Sub Int Token: Password: pamtester: Authentication failure 502s + echo -n -e wrong123456 502s + runuser -u ubuntu -- pamtester -v login '' authenticate 502s pamtester: invoking pam_start(login, , ...) 502s pamtester: performing operation - authenticate 506s PIN for Test Organization Sub Int Token: Password: pamtester: Authentication failure 506s + echo -n -e 123456 506s + pamtester -v login root authenticate 506s pamtester: invoking pam_start(login, root, ...) 506s pamtester: performing operation - authenticate 509s Password: pamtester: Authentication failure 509s + for alternative in "${alternative_pam_configs[@]}" 509s + pam-auth-update --enable sss-smart-card-required 509s PAM configuration 509s ----------------- 509s 509s Incompatible PAM profiles selected. 509s 509s The following PAM profiles cannot be used together: 509s 509s SSS required smart card authentication, SSS optional smart card 509s authentication 509s 509s Please select a different set of modules to enable. 509s 509s + cat /etc/pam.d/common-auth 509s # 509s # /etc/pam.d/common-auth - authentication settings common to all services 509s # 509s # This file is included from other service-specific PAM config files, 509s # and should contain a list of the authentication modules that define 509s # the central authentication scheme for use on the system 509s # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the 509s # traditional Unix authentication mechanisms. 509s # 509s # As of pam 1.0.1-6, this file is managed by pam-auth-update by default. 509s # To take advantage of this, it is recommended that you configure any 509s # local modules either before or after the default block, and use 509s # pam-auth-update to manage selection of other modules. See 509s # pam-auth-update(8) for details. 509s 509s # here are the per-package modules (the "Primary" block) 509s auth [success=3 ignore=ignore default=die] pam_sss.so allow_missing_name require_cert_auth 509s auth [success=2 default=ignore] pam_unix.so nullok try_first_pass 509s auth [success=1 default=ignore] pam_sss.so use_first_pass 509s # here's the fallback if no module succeeds 509s auth requisite pam_deny.so 509s # prime the stack with a positive return value if there isn't one already; 509s # this avoids us returning an error just because nothing sets a success code 509s # since the modules above will each just jump around 509s auth required pam_permit.so 509s # and here are more per-package modules (the "Additional" block) 509s auth optional pam_cap.so 509s # end of pam-auth-update config 509s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 509s + echo -n -e 123456 509s pamtester: invoking pam_start(login, ubuntu, ...) 509s pamtester: performing operation - authenticate 509s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 509s + runuser -u ubuntu -- pamtester -v login '' authenticate 509s + echo -n -e 123456 509s pamtester: invoking pam_start(login, , ...) 509s pamtester: performing operation - authenticate 509s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 509s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 509s + echo -n -e wrong123456 509s pamtester: invoking pam_start(login, ubuntu, ...) 509s pamtester: performing operation - authenticate 513s PIN for Test Organization Sub Int Token: pamtester: Authentication failure 513s + echo -n -e wrong123456 513s + runuser -u ubuntu -- pamtester -v login '' authenticate 513s pamtester: invoking pam_start(login, , ...) 513s pamtester: performing operation - authenticate 516s PIN for Test Organization Sub Int Token: pamtester: Authentication failure 516s + echo -n -e 123456 516s + pamtester -v login root authenticate 516s pamtester: invoking pam_start(login, root, ...) 516s pamtester: performing operation - authenticate 519s pamtester: Authentication service cannot retrieve authentication info 519s + test_authentication login /tmp/sssd-softhsm2-certs-WJtbX9/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf /tmp/sssd-softhsm2-certs-WJtbX9/test-sub-intermediate-CA.pem partial_chain 519s + pam_service=login 519s + certificate_config=/tmp/sssd-softhsm2-certs-WJtbX9/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 519s + ca_db=/tmp/sssd-softhsm2-certs-WJtbX9/test-sub-intermediate-CA.pem 519s + verification_options=partial_chain 519s + mkdir -p -m 700 /etc/sssd 519s Using CA DB '/tmp/sssd-softhsm2-certs-WJtbX9/test-sub-intermediate-CA.pem' with verification options: 'partial_chain' 519s + echo 'Using CA DB '\''/tmp/sssd-softhsm2-certs-WJtbX9/test-sub-intermediate-CA.pem'\'' with verification options: '\''partial_chain'\''' 519s + cat 519s + chmod 600 /etc/sssd/sssd.conf 519s Label: Test Organization Sub Int Token 519s + for path_pair in "${softhsm2_conf_paths[@]}" 519s + IFS=: 519s + read -r -a path 519s + user=ubuntu 519s + path=/home/ubuntu/.config/softhsm2/softhsm2.conf 519s ++ dirname /home/ubuntu/.config/softhsm2/softhsm2.conf 519s + runuser -u ubuntu -- mkdir -p /home/ubuntu/.config/softhsm2 519s + runuser -u ubuntu -- ln -sf /tmp/sssd-softhsm2-certs-WJtbX9/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf /home/ubuntu/.config/softhsm2/softhsm2.conf 519s + runuser -u ubuntu -- softhsm2-util --show-slots 519s + grep 'Test Organization' 519s + for path_pair in "${softhsm2_conf_paths[@]}" 519s + IFS=: 519s + read -r -a path 519s + user=root 519s + path=/etc/softhsm/softhsm2.conf 519s ++ dirname /etc/softhsm/softhsm2.conf 519s + runuser -u root -- mkdir -p /etc/softhsm 519s + runuser -u root -- ln -sf /tmp/sssd-softhsm2-certs-WJtbX9/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf /etc/softhsm/softhsm2.conf 519s + grep 'Test Organization' 519s + runuser -u root -- softhsm2-util --show-slots 519s Label: Test Organization Sub Int Token 519s + systemctl restart sssd 519s + pam-auth-update --disable sss-smart-card-optional sss-smart-card-required 520s + for alternative in "${alternative_pam_configs[@]}" 520s + pam-auth-update --enable sss-smart-card-optional 520s # 520s # /etc/pam.d/common-auth - authentication settings common to all services 520s # 520s # This file is included from other service-specific PAM config files, 520s # and should contain a list of the authentication modules that define 520s # the central authentication scheme for use on the system 520s # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the 520s # traditional Unix authentication mechanisms. 520s # 520s # As of pam 1.0.1-6, this file is managed by pam-auth-update by default. 520s # To take advantage of this, it is recommended that you configure any 520s # local modules either before or after the default block, and use 520s # pam-auth-update to manage selection of other modules. See 520s # pam-auth-update(8) for details. 520s 520s # here are the per-package modules (the "Primary" block) 520s auth [success=3 default=ignore] pam_sss.so allow_missing_name try_cert_auth 520s auth [success=2 default=ignore] pam_unix.so nullok try_first_pass 520s auth [success=1 default=ignore] pam_sss.so use_first_pass 520s # here's the fallback if no module succeeds 520s auth requisite pam_deny.so 520s # prime the stack with a positive return value if there isn't one already; 520s # this avoids us returning an error just because nothing sets a success code 520s # since the modules above will each just jump around 520s auth required pam_permit.so 520s # and here are more per-package modules (the "Additional" block) 520s auth optional pam_cap.so 520s # end of pam-auth-update config 520s + cat /etc/pam.d/common-auth 520s + echo -n -e 123456 520s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 520s pamtester: invoking pam_start(login, ubuntu, ...) 520s pamtester: performing operation - authenticate 520s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 520s + echo -n -e 123456 520s + runuser -u ubuntu -- pamtester -v login '' authenticate 520s pamtester: invoking pam_start(login, , ...) 520s pamtester: performing operation - authenticate 520s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 520s + echo -n -e wrong123456 520s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 520s pamtester: invoking pam_start(login, ubuntu, ...) 520s pamtester: performing operation - authenticate 524s PIN for Test Organization Sub Int Token: Password: pamtester: Authentication failure 524s + echo -n -e wrong123456 524s + runuser -u ubuntu -- pamtester -v login '' authenticate 524s pamtester: invoking pam_start(login, , ...) 524s pamtester: performing operation - authenticate 526s PIN for Test Organization Sub Int Token: Password: pamtester: Authentication failure 526s + echo -n -e 123456 526s + pamtester -v login root authenticate 526s pamtester: invoking pam_start(login, root, ...) 526s pamtester: performing operation - authenticate 529s Password: pamtester: Authentication failure 529s + for alternative in "${alternative_pam_configs[@]}" 529s + pam-auth-update --enable sss-smart-card-required 530s PAM configuration 530s ----------------- 530s 530s Incompatible PAM profiles selected. 530s 530s The following PAM profiles cannot be used together: 530s 530s SSS required smart card authentication, SSS optional smart card 530s authentication 530s 530s Please select a different set of modules to enable. 530s 530s + cat /etc/pam.d/common-auth 530s # 530s # /etc/pam.d/common-auth - authentication settings common to all services 530s # 530s # This file is included from other service-specific PAM config files, 530s # and should contain a list of the authentication modules that define 530s # the central authentication scheme for use on the system 530s # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the 530s # traditional Unix authentication mechanisms. 530s # 530s # As of pam 1.0.1-6, this file is managed by pam-auth-update by default. 530s # To take advantage of this, it is recommended that you configure any 530s # local modules either before or after the default block, and use 530s # pam-auth-update to manage selection of other modules. See 530s # pam-auth-update(8) for details. 530s 530s # here are the per-package modules (the "Primary" block) 530s auth [success=3 ignore=ignore default=die] pam_sss.so allow_missing_name require_cert_auth 530s auth [success=2 default=ignore] pam_unix.so nullok try_first_pass 530s auth [success=1 default=ignore] pam_sss.so use_first_pass 530s # here's the fallback if no module succeeds 530s auth requisite pam_deny.so 530s # prime the stack with a positive return value if there isn't one already; 530s # this avoids us returning an error just because nothing sets a success code 530s # since the modules above will each just jump around 530s auth required pam_permit.so 530s # and here are more per-package modules (the "Additional" block) 530s auth optional pam_cap.so 530s # end of pam-auth-update config 530s + echo -n -e 123456 530s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 530s pamtester: invoking pam_start(login, ubuntu, ...) 530s pamtester: performing operation - authenticate 530s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 530s + echo -n -e 123456 530s + runuser -u ubuntu -- pamtester -v login '' authenticate 530s pamtester: invoking pam_start(login, , ...) 530s pamtester: performing operation - authenticate 530s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 530s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 530s + echo -n -e wrong123456 530s pamtester: invoking pam_start(login, ubuntu, ...) 530s pamtester: performing operation - authenticate 532s PIN for Test Organization Sub Int Token: pamtester: Authentication failure 532s + echo -n -e wrong123456 532s + runuser -u ubuntu -- pamtester -v login '' authenticate 532s pamtester: invoking pam_start(login, , ...) 532s pamtester: performing operation - authenticate 535s PIN for Test Organization Sub Int Token: pamtester: Authentication failure 535s + pamtester -v login root authenticate 535s + echo -n -e 123456 535s pamtester: invoking pam_start(login, root, ...) 535s pamtester: performing operation - authenticate 538s pamtester: Authentication service cannot retrieve authentication info 538s + handle_exit 538s + exit_code=0 538s + restore_changes 538s + for path in "${restore_paths[@]}" 538s + local original_path 538s ++ realpath --strip --relative-base=/tmp/sssd-softhsm2-backups-F2WZiu /tmp/sssd-softhsm2-backups-F2WZiu//etc/softhsm/softhsm2.conf 538s + original_path=/etc/softhsm/softhsm2.conf 538s + rm /etc/softhsm/softhsm2.conf 538s + mv /tmp/sssd-softhsm2-backups-F2WZiu//etc/softhsm/softhsm2.conf /etc/softhsm/softhsm2.conf 538s + for path in "${delete_paths[@]}" 538s + rm -f /etc/sssd/sssd.conf 538s + for path in "${delete_paths[@]}" 538s + rm -f /home/ubuntu/.config/softhsm2/softhsm2.conf 538s + pam-auth-update --disable sss-smart-card-optional sss-smart-card-required 538s + '[' -e /etc/sssd/sssd.conf ']' 538s + systemctl stop sssd 538s + '[' -e /etc/softhsm/softhsm2.conf ']' 538s + chmod 600 /etc/softhsm/softhsm2.conf 538s + rm -rf /tmp/sssd-softhsm2-certs-WJtbX9 538s + '[' 0 = 0 ']' 538s + rm -rf /tmp/sssd-softhsm2-backups-F2WZiu 538s Script completed successfully! 538s + set +x 539s autopkgtest [22:52:40]: test sssd-smart-card-pam-auth-configs: -----------------------] 539s sssd-smart-card-pam-auth-configs PASS 539s autopkgtest [22:52:40]: test sssd-smart-card-pam-auth-configs: - - - - - - - - - - results - - - - - - - - - - 540s autopkgtest [22:52:41]: @@@@@@@@@@@@@@@@@@@@ summary 540s ldap-user-group-ldap-auth PASS 540s ldap-user-group-krb5-auth PASS 540s sssd-softhism2-certificates-tests.sh PASS 540s sssd-smart-card-pam-auth-configs PASS 552s virt: nova [W] Using flock in prodstack6-ppc64el 552s virt: Creating nova instance adt-noble-ppc64el-sssd-20241115-224341-juju-7f2275-prod-proposed-migration-environment-2-95739731-b4a9-466b-9a7c-3fb928445741 from image adt/ubuntu-noble-ppc64el-server-20241115.img (UUID 13d97d21-5ddc-4f16-977b-66468b0f48d6)... 552s virt: nova [W] Using flock in prodstack6-ppc64el 552s virt: Creating nova instance adt-noble-ppc64el-sssd-20241115-224341-juju-7f2275-prod-proposed-migration-environment-2-95739731-b4a9-466b-9a7c-3fb928445741 from image adt/ubuntu-noble-ppc64el-server-20241115.img (UUID 13d97d21-5ddc-4f16-977b-66468b0f48d6)...