0s autopkgtest [01:14:14]: starting date: 2024-03-05 0s autopkgtest [01:14:14]: git checkout: d9c0295 adt_testbed.py: supress warnings from apt using a shell pipeline 0s autopkgtest [01:14:14]: host juju-7f2275-prod-proposed-migration-environment-3; command line: /home/ubuntu/autopkgtest/runner/autopkgtest --output-dir /tmp/autopkgtest-work.1f_j92c6/out --timeout-copy=6000 --setup-commands /home/ubuntu/autopkgtest-cloud/worker-config-production/setup-canonical.sh --setup-commands /home/ubuntu/autopkgtest/setup-commands/setup-testbed --apt-pocket=proposed=src:jose,src:openssl --apt-upgrade sssd --timeout-short=300 --timeout-copy=20000 --timeout-build=20000 '--env=ADT_TEST_TRIGGERS=jose/11-3build1 openssl/3.0.10-1ubuntu5' -- ssh -s /home/ubuntu/autopkgtest/ssh-setup/nova -- --flavor autopkgtest --security-groups autopkgtest-juju-7f2275-prod-proposed-migration-environment-3@bos02-s390x-7.secgroup --name adt-noble-s390x-sssd-20240305-011414-juju-7f2275-prod-proposed-migration-environment-3 --image adt/ubuntu-noble-s390x-server --keyname testbed-juju-7f2275-prod-proposed-migration-environment-3 --net-id=net_prod-proposed-migration -e TERM=linux -e ''"'"'http_proxy=http://squid.internal:3128'"'"'' -e ''"'"'https_proxy=http://squid.internal:3128'"'"'' -e ''"'"'no_proxy=127.0.0.1,127.0.1.1,login.ubuntu.com,localhost,localdomain,novalocal,internal,archive.ubuntu.com,ports.ubuntu.com,security.ubuntu.com,ddebs.ubuntu.com,changelogs.ubuntu.com,launchpadlibrarian.net,launchpadcontent.net,launchpad.net,10.24.0.0/24,keystone.ps5.canonical.com,objectstorage.prodstack5.canonical.com'"'"'' --mirror=http://ftpmaster.internal/ubuntu/ 137s autopkgtest [01:16:31]: @@@@@@@@@@@@@@@@@@@@ test bed setup 137s Get:1 http://ftpmaster.internal/ubuntu noble-proposed InRelease [117 kB] 137s Get:2 http://ftpmaster.internal/ubuntu noble-proposed/multiverse Sources [23.8 kB] 137s Get:3 http://ftpmaster.internal/ubuntu noble-proposed/universe Sources [1756 kB] 138s Get:4 http://ftpmaster.internal/ubuntu noble-proposed/restricted Sources [3976 B] 138s Get:5 http://ftpmaster.internal/ubuntu noble-proposed/main Sources [313 kB] 138s Get:6 http://ftpmaster.internal/ubuntu noble-proposed/main s390x Packages [412 kB] 138s Get:7 http://ftpmaster.internal/ubuntu noble-proposed/main s390x c-n-f Metadata [3032 B] 138s Get:8 http://ftpmaster.internal/ubuntu noble-proposed/restricted s390x Packages [1372 B] 138s Get:9 http://ftpmaster.internal/ubuntu noble-proposed/restricted s390x c-n-f Metadata [116 B] 138s Get:10 http://ftpmaster.internal/ubuntu noble-proposed/universe s390x Packages [1936 kB] 139s Get:11 http://ftpmaster.internal/ubuntu noble-proposed/universe s390x c-n-f Metadata [7292 B] 139s Get:12 http://ftpmaster.internal/ubuntu noble-proposed/multiverse s390x Packages [12.5 kB] 139s Get:13 http://ftpmaster.internal/ubuntu noble-proposed/multiverse s390x c-n-f Metadata [116 B] 140s Fetched 4586 kB in 2s (1942 kB/s) 140s Reading package lists... 146s Reading package lists... 147s Building dependency tree... 147s Reading state information... 147s Calculating upgrade... 147s The following packages will be REMOVED: 147s libssl3 147s The following NEW packages will be installed: 147s libssl3t64 147s The following packages will be upgraded: 147s dbus dbus-bin dbus-daemon dbus-session-bus-common dbus-system-bus-common 147s dbus-user-session gcc-13-base libdbus-1-3 libksba8 openssl 147s 10 upgraded, 1 newly installed, 1 to remove and 0 not upgraded. 147s Need to get 3395 kB of archives. 147s After this operation, 12.3 kB of additional disk space will be used. 147s Get:1 http://ftpmaster.internal/ubuntu noble-proposed/main s390x openssl s390x 3.0.10-1ubuntu5 [1005 kB] 148s Get:2 http://ftpmaster.internal/ubuntu noble-proposed/main s390x libssl3t64 s390x 3.0.10-1ubuntu5 [1648 kB] 148s Get:3 http://ftpmaster.internal/ubuntu noble/main s390x gcc-13-base s390x 13.2.0-17ubuntu2 [47.4 kB] 148s Get:4 http://ftpmaster.internal/ubuntu noble/main s390x dbus-system-bus-common all 1.14.10-4ubuntu1 [81.4 kB] 148s Get:5 http://ftpmaster.internal/ubuntu noble/main s390x dbus-session-bus-common all 1.14.10-4ubuntu1 [80.2 kB] 148s Get:6 http://ftpmaster.internal/ubuntu noble/main s390x dbus-user-session s390x 1.14.10-4ubuntu1 [9956 B] 148s Get:7 http://ftpmaster.internal/ubuntu noble/main s390x dbus-daemon s390x 1.14.10-4ubuntu1 [118 kB] 148s Get:8 http://ftpmaster.internal/ubuntu noble/main s390x dbus-bin s390x 1.14.10-4ubuntu1 [41.4 kB] 148s Get:9 http://ftpmaster.internal/ubuntu noble/main s390x dbus s390x 1.14.10-4ubuntu1 [24.3 kB] 148s Get:10 http://ftpmaster.internal/ubuntu noble/main s390x libdbus-1-3 s390x 1.14.10-4ubuntu1 [213 kB] 148s Get:11 http://ftpmaster.internal/ubuntu noble/main s390x libksba8 s390x 1.6.6-1 [126 kB] 149s Fetched 3395 kB in 1s (3818 kB/s) 149s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 52194 files and directories currently installed.) 149s Preparing to unpack .../openssl_3.0.10-1ubuntu5_s390x.deb ... 149s Unpacking openssl (3.0.10-1ubuntu5) over (3.0.10-1ubuntu4) ... 149s dpkg: libssl3:s390x: dependency problems, but removing anyway as you requested: 149s wget depends on libssl3 (>= 3.0.0). 149s tnftp depends on libssl3 (>= 3.0.0). 149s tcpdump depends on libssl3 (>= 3.0.0). 149s systemd-resolved depends on libssl3 (>= 3.0.0). 149s systemd depends on libssl3 (>= 3.0.0). 149s sudo depends on libssl3 (>= 3.0.0). 149s s390-tools depends on libssl3 (>= 3.0.0). 149s rsync depends on libssl3 (>= 3.0.0). 149s python3-cryptography depends on libssl3 (>= 3.0.0). 149s openssh-server depends on libssl3 (>= 3.0.10). 149s openssh-client depends on libssl3 (>= 3.0.10). 149s linux-headers-6.8.0-11-generic depends on libssl3 (>= 3.0.0). 149s libsystemd-shared:s390x depends on libssl3 (>= 3.0.0). 149s libssh-4:s390x depends on libssl3 (>= 3.0.0). 149s libsasl2-modules:s390x depends on libssl3 (>= 3.0.0). 149s libsasl2-2:s390x depends on libssl3 (>= 3.0.0). 149s libpython3.12-minimal:s390x depends on libssl3 (>= 3.0.0). 149s libpython3.11-minimal:s390x depends on libssl3 (>= 3.0.0). 149s libnvme1 depends on libssl3 (>= 3.0.0). 149s libkrb5-3:s390x depends on libssl3 (>= 3.0.0). 149s libkmod2:s390x depends on libssl3 (>= 3.0.0). 149s libfido2-1:s390x depends on libssl3 (>= 3.0.0). 149s libcurl4:s390x depends on libssl3 (>= 3.0.0). 149s libcryptsetup12:s390x depends on libssl3 (>= 3.0.0). 149s kmod depends on libssl3 (>= 3.0.0). 149s dhcpcd-base depends on libssl3 (>= 3.0.0). 149s bind9-libs:s390x depends on libssl3 (>= 3.0.0). 149s 149s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 52194 files and directories currently installed.) 149s Removing libssl3:s390x (3.0.10-1ubuntu4) ... 149s Selecting previously unselected package libssl3t64:s390x. 149s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 52183 files and directories currently installed.) 149s Preparing to unpack .../0-libssl3t64_3.0.10-1ubuntu5_s390x.deb ... 149s Unpacking libssl3t64:s390x (3.0.10-1ubuntu5) ... 149s Preparing to unpack .../1-gcc-13-base_13.2.0-17ubuntu2_s390x.deb ... 149s Unpacking gcc-13-base:s390x (13.2.0-17ubuntu2) over (13.2.0-16ubuntu1) ... 149s Preparing to unpack .../2-dbus-system-bus-common_1.14.10-4ubuntu1_all.deb ... 149s Unpacking dbus-system-bus-common (1.14.10-4ubuntu1) over (1.14.10-3ubuntu1) ... 149s Preparing to unpack .../3-dbus-session-bus-common_1.14.10-4ubuntu1_all.deb ... 149s Unpacking dbus-session-bus-common (1.14.10-4ubuntu1) over (1.14.10-3ubuntu1) ... 149s Preparing to unpack .../4-dbus-user-session_1.14.10-4ubuntu1_s390x.deb ... 149s Unpacking dbus-user-session (1.14.10-4ubuntu1) over (1.14.10-3ubuntu1) ... 149s Preparing to unpack .../5-dbus-daemon_1.14.10-4ubuntu1_s390x.deb ... 149s Unpacking dbus-daemon (1.14.10-4ubuntu1) over (1.14.10-3ubuntu1) ... 149s Preparing to unpack .../6-dbus-bin_1.14.10-4ubuntu1_s390x.deb ... 149s Unpacking dbus-bin (1.14.10-4ubuntu1) over (1.14.10-3ubuntu1) ... 149s Preparing to unpack .../7-dbus_1.14.10-4ubuntu1_s390x.deb ... 149s Unpacking dbus (1.14.10-4ubuntu1) over (1.14.10-3ubuntu1) ... 149s Preparing to unpack .../8-libdbus-1-3_1.14.10-4ubuntu1_s390x.deb ... 149s Unpacking libdbus-1-3:s390x (1.14.10-4ubuntu1) over (1.14.10-3ubuntu1) ... 149s Preparing to unpack .../9-libksba8_1.6.6-1_s390x.deb ... 149s Unpacking libksba8:s390x (1.6.6-1) over (1.6.5-2) ... 149s Setting up libksba8:s390x (1.6.6-1) ... 149s Setting up libssl3t64:s390x (3.0.10-1ubuntu5) ... 149s Setting up gcc-13-base:s390x (13.2.0-17ubuntu2) ... 149s Setting up libdbus-1-3:s390x (1.14.10-4ubuntu1) ... 149s Setting up dbus-session-bus-common (1.14.10-4ubuntu1) ... 149s Setting up dbus-system-bus-common (1.14.10-4ubuntu1) ... 149s Setting up openssl (3.0.10-1ubuntu5) ... 149s Setting up dbus-bin (1.14.10-4ubuntu1) ... 149s Setting up dbus-daemon (1.14.10-4ubuntu1) ... 149s Setting up dbus-user-session (1.14.10-4ubuntu1) ... 149s Setting up dbus (1.14.10-4ubuntu1) ... 149s A reboot is required to replace the running dbus-daemon. 149s Please reboot the system when convenient. 149s Processing triggers for man-db (2.12.0-3) ... 150s Processing triggers for libc-bin (2.39-0ubuntu2) ... 150s W: Target Packages (main/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 150s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 150s W: Target CNF (main/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 150s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 150s W: Target Packages (universe/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 150s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 150s W: Target CNF (universe/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 150s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 150s W: Target Packages (restricted/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 150s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 150s W: Target CNF (restricted/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 150s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 150s W: Target Packages (multiverse/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 150s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 150s W: Target CNF (multiverse/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 150s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 150s W: Target Packages (main/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 150s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 150s W: Target CNF (main/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 150s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 150s W: Target Packages (universe/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 150s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 150s W: Target CNF (universe/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 150s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 150s W: Target Packages (restricted/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 150s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 150s W: Target CNF (restricted/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 150s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 150s W: Target Packages (multiverse/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 150s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 150s W: Target CNF (multiverse/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 150s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 150s W: Target Packages (main/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 150s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 150s W: Target CNF (main/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 150s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 150s W: Target Packages (universe/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 150s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 150s W: Target CNF (universe/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 150s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 150s W: Target Packages (restricted/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 150s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 150s W: Target CNF (restricted/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 150s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 150s W: Target Packages (multiverse/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 150s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 150s W: Target CNF (multiverse/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 150s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 151s Reading package lists... 151s Building dependency tree... 151s Reading state information... 151s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 151s Unknown architecture, assuming PC-style ttyS0 151s sh: Attempting to set up Debian/Ubuntu apt sources automatically 151s sh: Distribution appears to be Ubuntu 155s Reading package lists... 155s Building dependency tree... 155s Reading state information... 155s eatmydata is already the newest version (131-1). 155s dbus is already the newest version (1.14.10-4ubuntu1). 155s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 155s W: Target Packages (main/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 155s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 155s W: Target CNF (main/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 155s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 155s W: Target Packages (universe/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 155s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 155s W: Target CNF (universe/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 155s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 155s W: Target Packages (restricted/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 155s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 155s W: Target CNF (restricted/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 155s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 155s W: Target Packages (multiverse/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 155s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 155s W: Target CNF (multiverse/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 155s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 155s W: Target Packages (main/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 155s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 155s W: Target CNF (main/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 155s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 155s W: Target Packages (universe/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 155s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 155s W: Target CNF (universe/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 155s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 155s W: Target Packages (restricted/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 155s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 155s W: Target CNF (restricted/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 155s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 155s W: Target Packages (multiverse/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 155s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 155s W: Target CNF (multiverse/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 155s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 155s W: Target Packages (main/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 155s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 155s W: Target CNF (main/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 155s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 155s W: Target Packages (universe/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 155s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 155s W: Target CNF (universe/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 155s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 155s W: Target Packages (restricted/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 155s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 155s W: Target CNF (restricted/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 155s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 155s W: Target Packages (multiverse/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 155s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 155s W: Target CNF (multiverse/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 155s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 155s Reading package lists... 155s Building dependency tree... 155s Reading state information... 156s rng-tools-debian is already the newest version (2.4). 156s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 156s Reading package lists... 156s Building dependency tree... 156s Reading state information... 157s haveged is already the newest version (1.9.14-1ubuntu1). 157s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 157s Reading package lists... 157s Building dependency tree... 157s Reading state information... 157s The following packages will be REMOVED: 157s cloud-init* python3-configobj* python3-debconf* 157s 0 upgraded, 0 newly installed, 3 to remove and 0 not upgraded. 157s After this operation, 3248 kB disk space will be freed. 157s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 52196 files and directories currently installed.) 157s Removing cloud-init (24.1-0ubuntu1) ... 158s Removing python3-configobj (5.0.8-3) ... 158s Removing python3-debconf (1.5.86) ... 158s Processing triggers for man-db (2.12.0-3) ... 158s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 51807 files and directories currently installed.) 158s Purging configuration files for cloud-init (24.1-0ubuntu1) ... 159s dpkg: warning: while removing cloud-init, directory '/etc/cloud/cloud.cfg.d' not empty so not removed 159s Processing triggers for rsyslog (8.2312.0-3ubuntu3) ... 160s Reading package lists... 160s Building dependency tree... 160s Reading state information... 160s linux-generic is already the newest version (6.8.0-11.11+1). 160s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 160s Hit:1 http://ftpmaster.internal/ubuntu noble InRelease 160s Hit:2 http://ftpmaster.internal/ubuntu noble-updates InRelease 161s Hit:3 http://ftpmaster.internal/ubuntu noble-security InRelease 161s Hit:4 http://ftpmaster.internal/ubuntu noble-proposed InRelease 161s Hit:5 http://ftpmaster.internal/ubuntu noble-backports InRelease 164s Reading package lists... 164s W: Target Packages (main/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 164s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 164s W: Target CNF (main/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 164s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 164s W: Target Packages (universe/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 164s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 164s W: Target CNF (universe/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 164s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 164s W: Target Packages (restricted/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 164s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 164s W: Target CNF (restricted/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 164s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 164s W: Target Packages (multiverse/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 164s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 164s W: Target CNF (multiverse/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 164s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 164s W: Target Packages (main/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 164s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 164s W: Target CNF (main/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 164s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 164s W: Target Packages (universe/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 164s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 164s W: Target CNF (universe/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 164s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 164s W: Target Packages (restricted/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 164s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 164s W: Target CNF (restricted/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 164s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 164s W: Target Packages (multiverse/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 164s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 164s W: Target CNF (multiverse/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 164s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 164s W: Target Packages (main/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 164s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 164s W: Target CNF (main/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 164s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 164s W: Target Packages (universe/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 164s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 164s W: Target CNF (universe/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 164s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 164s W: Target Packages (restricted/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 164s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 164s W: Target CNF (restricted/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 164s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 164s W: Target Packages (multiverse/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 164s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 164s W: Target CNF (multiverse/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 164s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 164s W: Target Packages (main/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 164s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 164s W: Target CNF (main/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 164s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 164s W: Target Packages (universe/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 164s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 164s W: Target CNF (universe/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 164s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 164s W: Target Packages (restricted/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 164s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 164s W: Target CNF (restricted/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 164s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 164s W: Target Packages (multiverse/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 164s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 164s W: Target CNF (multiverse/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 164s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 164s W: Target Packages (main/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 164s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 164s W: Target CNF (main/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 164s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 164s W: Target Packages (universe/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 164s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 164s W: Target CNF (universe/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 164s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 164s W: Target Packages (restricted/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 164s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 164s W: Target CNF (restricted/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 164s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 164s W: Target Packages (multiverse/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 164s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 164s W: Target CNF (multiverse/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 164s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 164s W: Target Packages (main/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 164s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 164s W: Target CNF (main/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 164s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 164s W: Target Packages (universe/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 164s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 164s W: Target CNF (universe/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 164s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 164s W: Target Packages (restricted/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 164s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 164s W: Target CNF (restricted/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 164s WReading package lists...: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 164s W: Target Packages (multiverse/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 164s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 164s W: Target CNF (multiverse/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 164s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 164s 165s Building dependency tree... 165s Reading state information... 165s Calculating upgrade... 165s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 165s Reading package lists... 165s Building dependency tree... 165s Reading state information... 166s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 166s autopkgtest [01:17:00]: rebooting testbed after setup commands that affected boot 183s autopkgtest [01:17:17]: testbed running kernel: Linux 6.8.0-11-generic #11-Ubuntu SMP Tue Feb 13 23:45:46 UTC 2024 184s autopkgtest [01:17:18]: testbed dpkg architecture: s390x 185s autopkgtest [01:17:19]: @@@@@@@@@@@@@@@@@@@@ apt-source sssd 186s W: Target Packages (main/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 186s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 186s W: Target CNF (main/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 186s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 186s W: Target Packages (universe/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 186s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 186s W: Target CNF (universe/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 186s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 186s W: Target Packages (restricted/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 186s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 186s W: Target CNF (restricted/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 186s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 186s W: Target Packages (multiverse/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 186s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 186s W: Target CNF (multiverse/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 186s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 186s W: Target Packages (main/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 186s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 186s W: Target CNF (main/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 186s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 186s W: Target Packages (universe/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 186s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 186s W: Target CNF (universe/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 186s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 186s W: Target Packages (restricted/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 186s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 186s W: Target CNF (restricted/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 186s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 186s W: Target Packages (multiverse/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 186s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 186s W: Target CNF (multiverse/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 186s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 186s W: Target Packages (main/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 186s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 186s W: Target CNF (main/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 186s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 186s W: Target Packages (universe/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 186s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 186s W: Target CNF (universe/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 186s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 186s W: Target Packages (restricted/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 186s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 186s W: Target CNF (restricted/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 186s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 186s W: Target Packages (multiverse/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 186s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 186s W: Target CNF (multiverse/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 186s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 198s Get:1 http://ftpmaster.internal/ubuntu noble/main sssd 2.9.4-1ubuntu1 (dsc) [5269 B] 198s Get:2 http://ftpmaster.internal/ubuntu noble/main sssd 2.9.4-1ubuntu1 (tar) [7983 kB] 198s Get:3 http://ftpmaster.internal/ubuntu noble/main sssd 2.9.4-1ubuntu1 (asc) [833 B] 198s Get:4 http://ftpmaster.internal/ubuntu noble/main sssd 2.9.4-1ubuntu1 (diff) [48.4 kB] 198s gpgv: Signature made Mon Feb 26 21:56:54 2024 UTC 198s gpgv: using RSA key E92FD0B36B14F1F4D8E0EB2F106DA1C8C3CBBF14 198s gpgv: Can't check signature: No public key 198s dpkg-source: warning: cannot verify inline signature for ./sssd_2.9.4-1ubuntu1.dsc: no acceptable signature found 199s autopkgtest [01:17:33]: testing package sssd version 2.9.4-1ubuntu1 199s autopkgtest [01:17:33]: build not needed 205s autopkgtest [01:17:39]: test ldap-user-group-ldap-auth: preparing testbed 207s Reading package lists... 207s Building dependency tree... 207s Reading state information... 207s Correcting dependencies...Starting pkgProblemResolver with broken count: 0 207s Starting 2 pkgProblemResolver with broken count: 0 207s Done 207s Done 208s Starting pkgProblemResolver with broken count: 0 208s Starting 2 pkgProblemResolver with broken count: 0 208s Done 208s The following additional packages will be installed: 208s expect ldap-utils libavahi-client3 libavahi-common-data libavahi-common3 208s libbasicobjects0 libc-ares2 libcollection4 libcrack2 libdhash1 208s libevent-2.1-7 libini-config5 libipa-hbac-dev libipa-hbac0 libjose0 libkrad0 208s libldb2 libltdl7 libnfsidmap1 libnss-sss libnss-sudo libodbc2 208s libpam-pwquality libpam-sss libpath-utils1 libpwquality-common libpwquality1 208s libref-array1 libsmbclient libsss-certmap-dev libsss-certmap0 208s libsss-idmap-dev libsss-idmap0 libsss-nss-idmap-dev libsss-nss-idmap0 208s libsss-sudo libtalloc2 libtcl8.6 libtdb1 libtevent0 libverto-libevent1 208s libverto1 libwbclient0 python3-libipa-hbac python3-libsss-nss-idmap 208s python3-sss samba-libs slapd sssd sssd-ad sssd-ad-common sssd-common 208s sssd-dbus sssd-idp sssd-ipa sssd-kcm sssd-krb5 sssd-krb5-common sssd-ldap 208s sssd-passkey sssd-proxy sssd-tools tcl-expect tcl8.6 208s Suggested packages: 208s tk8.6 libsasl2-modules-gssapi-mit | libsasl2-modules-gssapi-heimdal 208s odbc-postgresql tdsodbc adcli libsasl2-modules-ldap tcl-tclreadline 208s Recommended packages: 208s cracklib-runtime libsasl2-modules-gssapi-mit 208s | libsasl2-modules-gssapi-heimdal 208s The following NEW packages will be installed: 208s expect ldap-utils libavahi-client3 libavahi-common-data libavahi-common3 208s libbasicobjects0 libc-ares2 libcollection4 libcrack2 libdhash1 208s libevent-2.1-7 libini-config5 libipa-hbac-dev libipa-hbac0 libjose0 libkrad0 208s libldb2 libltdl7 libnfsidmap1 libnss-sss libnss-sudo libodbc2 208s libpam-pwquality libpam-sss libpath-utils1 libpwquality-common libpwquality1 208s libref-array1 libsmbclient libsss-certmap-dev libsss-certmap0 208s libsss-idmap-dev libsss-idmap0 libsss-nss-idmap-dev libsss-nss-idmap0 208s libsss-sudo libtalloc2 libtcl8.6 libtdb1 libtevent0 libverto-libevent1 208s libverto1 libwbclient0 python3-libipa-hbac python3-libsss-nss-idmap 208s python3-sss samba-libs slapd sssd sssd-ad sssd-ad-common sssd-common 208s sssd-dbus sssd-idp sssd-ipa sssd-kcm sssd-krb5 sssd-krb5-common sssd-ldap 208s sssd-passkey sssd-proxy sssd-tools tcl-expect tcl8.6 208s 0 upgraded, 64 newly installed, 0 to remove and 0 not upgraded. 208s 1 not fully installed or removed. 208s Need to get 12.9 MB of archives. 208s After this operation, 50.0 MB of additional disk space will be used. 208s Get:1 http://ftpmaster.internal/ubuntu noble/main s390x libtalloc2 s390x 2.4.2-1 [28.3 kB] 208s Get:2 http://ftpmaster.internal/ubuntu noble/main s390x libtdb1 s390x 1.4.10-1 [49.9 kB] 208s Get:3 http://ftpmaster.internal/ubuntu noble/main s390x libtevent0 s390x 0.16.1-1 [43.1 kB] 208s Get:4 http://ftpmaster.internal/ubuntu noble/main s390x libldb2 s390x 2:2.8.0+samba4.19.5+dfsg-1ubuntu1 [191 kB] 208s Get:5 http://ftpmaster.internal/ubuntu noble/main s390x python3-sss s390x 2.9.4-1ubuntu1 [46.6 kB] 208s Get:6 http://ftpmaster.internal/ubuntu noble/main s390x libsss-idmap0 s390x 2.9.4-1ubuntu1 [22.1 kB] 208s Get:7 http://ftpmaster.internal/ubuntu noble/main s390x libnss-sss s390x 2.9.4-1ubuntu1 [32.6 kB] 208s Get:8 http://ftpmaster.internal/ubuntu noble/main s390x libcrack2 s390x 2.9.6-5.1 [29.6 kB] 208s Get:9 http://ftpmaster.internal/ubuntu noble/main s390x libpwquality-common all 1.4.5-3 [7658 B] 208s Get:10 http://ftpmaster.internal/ubuntu noble/main s390x libpwquality1 s390x 1.4.5-3 [14.7 kB] 208s Get:11 http://ftpmaster.internal/ubuntu noble/main s390x libpam-pwquality s390x 1.4.5-3 [11.6 kB] 208s Get:12 http://ftpmaster.internal/ubuntu noble/main s390x libpam-sss s390x 2.9.4-1ubuntu1 [51.9 kB] 208s Get:13 http://ftpmaster.internal/ubuntu noble/main s390x libc-ares2 s390x 1.27.0-1 [79.2 kB] 208s Get:14 http://ftpmaster.internal/ubuntu noble/main s390x libdhash1 s390x 0.6.2-2 [8648 B] 209s Get:15 http://ftpmaster.internal/ubuntu noble/main s390x libbasicobjects0 s390x 0.6.2-2 [5476 B] 209s Get:16 http://ftpmaster.internal/ubuntu noble/main s390x libcollection4 s390x 0.6.2-2 [23.2 kB] 209s Get:17 http://ftpmaster.internal/ubuntu noble/main s390x libpath-utils1 s390x 0.6.2-2 [8994 B] 209s Get:18 http://ftpmaster.internal/ubuntu noble/main s390x libref-array1 s390x 0.6.2-2 [6880 B] 209s Get:19 http://ftpmaster.internal/ubuntu noble/main s390x libini-config5 s390x 0.6.2-2 [45.3 kB] 209s Get:20 http://ftpmaster.internal/ubuntu noble/main s390x libnfsidmap1 s390x 1:2.6.3-3ubuntu1 [49.0 kB] 209s Get:21 http://ftpmaster.internal/ubuntu noble/main s390x libsss-certmap0 s390x 2.9.4-1ubuntu1 [46.7 kB] 209s Get:22 http://ftpmaster.internal/ubuntu noble/main s390x libsss-nss-idmap0 s390x 2.9.4-1ubuntu1 [31.4 kB] 209s Get:23 http://ftpmaster.internal/ubuntu noble/main s390x sssd-common s390x 2.9.4-1ubuntu1 [1125 kB] 209s Get:24 http://ftpmaster.internal/ubuntu noble/main s390x libavahi-common-data s390x 0.8-13ubuntu2 [29.5 kB] 209s Get:25 http://ftpmaster.internal/ubuntu noble/main s390x libavahi-common3 s390x 0.8-13ubuntu2 [23.8 kB] 209s Get:26 http://ftpmaster.internal/ubuntu noble/main s390x libavahi-client3 s390x 0.8-13ubuntu2 [26.7 kB] 209s Get:27 http://ftpmaster.internal/ubuntu noble/main s390x libwbclient0 s390x 2:4.19.5+dfsg-1ubuntu1 [70.3 kB] 209s Get:28 http://ftpmaster.internal/ubuntu noble/main s390x samba-libs s390x 2:4.19.5+dfsg-1ubuntu1 [6231 kB] 210s Get:29 http://ftpmaster.internal/ubuntu noble/main s390x sssd-ad-common s390x 2.9.4-1ubuntu1 [74.8 kB] 210s Get:30 http://ftpmaster.internal/ubuntu noble/main s390x sssd-krb5-common s390x 2.9.4-1ubuntu1 [90.3 kB] 210s Get:31 http://ftpmaster.internal/ubuntu noble/main s390x libsmbclient s390x 2:4.19.5+dfsg-1ubuntu1 [65.1 kB] 210s Get:32 http://ftpmaster.internal/ubuntu noble/main s390x sssd-ad s390x 2.9.4-1ubuntu1 [133 kB] 210s Get:33 http://ftpmaster.internal/ubuntu noble/main s390x libipa-hbac0 s390x 2.9.4-1ubuntu1 [16.8 kB] 210s Get:34 http://ftpmaster.internal/ubuntu noble/main s390x sssd-ipa s390x 2.9.4-1ubuntu1 [215 kB] 210s Get:35 http://ftpmaster.internal/ubuntu noble/main s390x sssd-krb5 s390x 2.9.4-1ubuntu1 [14.4 kB] 210s Get:36 http://ftpmaster.internal/ubuntu noble/main s390x sssd-ldap s390x 2.9.4-1ubuntu1 [31.0 kB] 210s Get:37 http://ftpmaster.internal/ubuntu noble/main s390x sssd-proxy s390x 2.9.4-1ubuntu1 [43.9 kB] 210s Get:38 http://ftpmaster.internal/ubuntu noble/main s390x sssd s390x 2.9.4-1ubuntu1 [4120 B] 210s Get:39 http://ftpmaster.internal/ubuntu noble/main s390x sssd-dbus s390x 2.9.4-1ubuntu1 [101 kB] 210s Get:40 http://ftpmaster.internal/ubuntu noble-proposed/universe s390x libjose0 s390x 11-3build1 [45.3 kB] 210s Get:41 http://ftpmaster.internal/ubuntu noble/main s390x libevent-2.1-7 s390x 2.1.12-stable-9 [144 kB] 210s Get:42 http://ftpmaster.internal/ubuntu noble/main s390x libverto-libevent1 s390x 0.3.1-1ubuntu5 [5810 B] 210s Get:43 http://ftpmaster.internal/ubuntu noble/main s390x libverto1 s390x 0.3.1-1ubuntu5 [10.6 kB] 210s Get:44 http://ftpmaster.internal/ubuntu noble/main s390x libkrad0 s390x 1.20.1-5build1 [22.0 kB] 210s Get:45 http://ftpmaster.internal/ubuntu noble/universe s390x sssd-idp s390x 2.9.4-1ubuntu1 [27.3 kB] 210s Get:46 http://ftpmaster.internal/ubuntu noble/universe s390x sssd-kcm s390x 2.9.4-1ubuntu1 [137 kB] 210s Get:47 http://ftpmaster.internal/ubuntu noble/universe s390x sssd-passkey s390x 2.9.4-1ubuntu1 [32.3 kB] 210s Get:48 http://ftpmaster.internal/ubuntu noble/main s390x sssd-tools s390x 2.9.4-1ubuntu1 [97.6 kB] 210s Get:49 http://ftpmaster.internal/ubuntu noble/main s390x libipa-hbac-dev s390x 2.9.4-1ubuntu1 [6660 B] 210s Get:50 http://ftpmaster.internal/ubuntu noble/main s390x libsss-certmap-dev s390x 2.9.4-1ubuntu1 [5734 B] 210s Get:51 http://ftpmaster.internal/ubuntu noble/main s390x libsss-idmap-dev s390x 2.9.4-1ubuntu1 [8376 B] 210s Get:52 http://ftpmaster.internal/ubuntu noble/main s390x libsss-nss-idmap-dev s390x 2.9.4-1ubuntu1 [6708 B] 210s Get:53 http://ftpmaster.internal/ubuntu noble/universe s390x libnss-sudo all 1.9.15p5-3ubuntu1 [14.9 kB] 210s Get:54 http://ftpmaster.internal/ubuntu noble/universe s390x libsss-sudo s390x 2.9.4-1ubuntu1 [21.3 kB] 210s Get:55 http://ftpmaster.internal/ubuntu noble/universe s390x python3-libipa-hbac s390x 2.9.4-1ubuntu1 [16.9 kB] 210s Get:56 http://ftpmaster.internal/ubuntu noble/universe s390x python3-libsss-nss-idmap s390x 2.9.4-1ubuntu1 [9140 B] 210s Get:57 http://ftpmaster.internal/ubuntu noble/main s390x libltdl7 s390x 2.4.7-7 [41.6 kB] 210s Get:58 http://ftpmaster.internal/ubuntu noble/main s390x libodbc2 s390x 2.3.12-1 [164 kB] 210s Get:59 http://ftpmaster.internal/ubuntu noble/main s390x slapd s390x 2.6.7+dfsg-1~exp1ubuntu1 [1617 kB] 210s Get:60 http://ftpmaster.internal/ubuntu noble/main s390x ldap-utils s390x 2.6.7+dfsg-1~exp1ubuntu1 [165 kB] 210s Get:61 http://ftpmaster.internal/ubuntu noble/main s390x libtcl8.6 s390x 8.6.13+dfsg-2 [948 kB] 211s Get:62 http://ftpmaster.internal/ubuntu noble/main s390x tcl8.6 s390x 8.6.13+dfsg-2 [14.7 kB] 211s Get:63 http://ftpmaster.internal/ubuntu noble/universe s390x tcl-expect s390x 5.45.4-2build1 [99.7 kB] 211s Get:64 http://ftpmaster.internal/ubuntu noble/universe s390x expect s390x 5.45.4-2build1 [137 kB] 211s Preconfiguring packages ... 211s Fetched 12.9 MB in 3s (4825 kB/s) 211s Selecting previously unselected package libtalloc2:s390x. 211s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 51752 files and directories currently installed.) 211s Preparing to unpack .../00-libtalloc2_2.4.2-1_s390x.deb ... 211s Unpacking libtalloc2:s390x (2.4.2-1) ... 211s Selecting previously unselected package libtdb1:s390x. 211s Preparing to unpack .../01-libtdb1_1.4.10-1_s390x.deb ... 211s Unpacking libtdb1:s390x (1.4.10-1) ... 211s Selecting previously unselected package libtevent0:s390x. 211s Preparing to unpack .../02-libtevent0_0.16.1-1_s390x.deb ... 211s Unpacking libtevent0:s390x (0.16.1-1) ... 211s Selecting previously unselected package libldb2:s390x. 211s Preparing to unpack .../03-libldb2_2%3a2.8.0+samba4.19.5+dfsg-1ubuntu1_s390x.deb ... 211s Unpacking libldb2:s390x (2:2.8.0+samba4.19.5+dfsg-1ubuntu1) ... 211s Selecting previously unselected package python3-sss. 211s Preparing to unpack .../04-python3-sss_2.9.4-1ubuntu1_s390x.deb ... 211s Unpacking python3-sss (2.9.4-1ubuntu1) ... 211s Selecting previously unselected package libsss-idmap0. 211s Preparing to unpack .../05-libsss-idmap0_2.9.4-1ubuntu1_s390x.deb ... 211s Unpacking libsss-idmap0 (2.9.4-1ubuntu1) ... 211s Selecting previously unselected package libnss-sss:s390x. 211s Preparing to unpack .../06-libnss-sss_2.9.4-1ubuntu1_s390x.deb ... 211s Unpacking libnss-sss:s390x (2.9.4-1ubuntu1) ... 211s Selecting previously unselected package libcrack2:s390x. 211s Preparing to unpack .../07-libcrack2_2.9.6-5.1_s390x.deb ... 211s Unpacking libcrack2:s390x (2.9.6-5.1) ... 211s Selecting previously unselected package libpwquality-common. 211s Preparing to unpack .../08-libpwquality-common_1.4.5-3_all.deb ... 211s Unpacking libpwquality-common (1.4.5-3) ... 211s Selecting previously unselected package libpwquality1:s390x. 211s Preparing to unpack .../09-libpwquality1_1.4.5-3_s390x.deb ... 211s Unpacking libpwquality1:s390x (1.4.5-3) ... 211s Selecting previously unselected package libpam-pwquality:s390x. 211s Preparing to unpack .../10-libpam-pwquality_1.4.5-3_s390x.deb ... 211s Unpacking libpam-pwquality:s390x (1.4.5-3) ... 211s Selecting previously unselected package libpam-sss:s390x. 212s Preparing to unpack .../11-libpam-sss_2.9.4-1ubuntu1_s390x.deb ... 212s Unpacking libpam-sss:s390x (2.9.4-1ubuntu1) ... 212s Selecting previously unselected package libc-ares2:s390x. 212s Preparing to unpack .../12-libc-ares2_1.27.0-1_s390x.deb ... 212s Unpacking libc-ares2:s390x (1.27.0-1) ... 212s Selecting previously unselected package libdhash1:s390x. 212s Preparing to unpack .../13-libdhash1_0.6.2-2_s390x.deb ... 212s Unpacking libdhash1:s390x (0.6.2-2) ... 212s Selecting previously unselected package libbasicobjects0:s390x. 212s Preparing to unpack .../14-libbasicobjects0_0.6.2-2_s390x.deb ... 212s Unpacking libbasicobjects0:s390x (0.6.2-2) ... 212s Selecting previously unselected package libcollection4:s390x. 212s Preparing to unpack .../15-libcollection4_0.6.2-2_s390x.deb ... 212s Unpacking libcollection4:s390x (0.6.2-2) ... 212s Selecting previously unselected package libpath-utils1:s390x. 212s Preparing to unpack .../16-libpath-utils1_0.6.2-2_s390x.deb ... 212s Unpacking libpath-utils1:s390x (0.6.2-2) ... 212s Selecting previously unselected package libref-array1:s390x. 212s Preparing to unpack .../17-libref-array1_0.6.2-2_s390x.deb ... 212s Unpacking libref-array1:s390x (0.6.2-2) ... 212s Selecting previously unselected package libini-config5:s390x. 212s Preparing to unpack .../18-libini-config5_0.6.2-2_s390x.deb ... 212s Unpacking libini-config5:s390x (0.6.2-2) ... 212s Selecting previously unselected package libnfsidmap1:s390x. 212s Preparing to unpack .../19-libnfsidmap1_1%3a2.6.3-3ubuntu1_s390x.deb ... 212s Unpacking libnfsidmap1:s390x (1:2.6.3-3ubuntu1) ... 212s Selecting previously unselected package libsss-certmap0. 212s Preparing to unpack .../20-libsss-certmap0_2.9.4-1ubuntu1_s390x.deb ... 212s Unpacking libsss-certmap0 (2.9.4-1ubuntu1) ... 212s Selecting previously unselected package libsss-nss-idmap0. 212s Preparing to unpack .../21-libsss-nss-idmap0_2.9.4-1ubuntu1_s390x.deb ... 212s Unpacking libsss-nss-idmap0 (2.9.4-1ubuntu1) ... 212s Selecting previously unselected package sssd-common. 212s Preparing to unpack .../22-sssd-common_2.9.4-1ubuntu1_s390x.deb ... 212s Unpacking sssd-common (2.9.4-1ubuntu1) ... 212s Selecting previously unselected package libavahi-common-data:s390x. 212s Preparing to unpack .../23-libavahi-common-data_0.8-13ubuntu2_s390x.deb ... 212s Unpacking libavahi-common-data:s390x (0.8-13ubuntu2) ... 212s Selecting previously unselected package libavahi-common3:s390x. 212s Preparing to unpack .../24-libavahi-common3_0.8-13ubuntu2_s390x.deb ... 212s Unpacking libavahi-common3:s390x (0.8-13ubuntu2) ... 212s Selecting previously unselected package libavahi-client3:s390x. 212s Preparing to unpack .../25-libavahi-client3_0.8-13ubuntu2_s390x.deb ... 212s Unpacking libavahi-client3:s390x (0.8-13ubuntu2) ... 212s Selecting previously unselected package libwbclient0:s390x. 212s Preparing to unpack .../26-libwbclient0_2%3a4.19.5+dfsg-1ubuntu1_s390x.deb ... 212s Unpacking libwbclient0:s390x (2:4.19.5+dfsg-1ubuntu1) ... 212s Selecting previously unselected package samba-libs:s390x. 212s Preparing to unpack .../27-samba-libs_2%3a4.19.5+dfsg-1ubuntu1_s390x.deb ... 212s Unpacking samba-libs:s390x (2:4.19.5+dfsg-1ubuntu1) ... 212s Selecting previously unselected package sssd-ad-common. 212s Preparing to unpack .../28-sssd-ad-common_2.9.4-1ubuntu1_s390x.deb ... 212s Unpacking sssd-ad-common (2.9.4-1ubuntu1) ... 212s Selecting previously unselected package sssd-krb5-common. 212s Preparing to unpack .../29-sssd-krb5-common_2.9.4-1ubuntu1_s390x.deb ... 212s Unpacking sssd-krb5-common (2.9.4-1ubuntu1) ... 212s Selecting previously unselected package libsmbclient:s390x. 212s Preparing to unpack .../30-libsmbclient_2%3a4.19.5+dfsg-1ubuntu1_s390x.deb ... 212s Unpacking libsmbclient:s390x (2:4.19.5+dfsg-1ubuntu1) ... 212s Selecting previously unselected package sssd-ad. 212s Preparing to unpack .../31-sssd-ad_2.9.4-1ubuntu1_s390x.deb ... 212s Unpacking sssd-ad (2.9.4-1ubuntu1) ... 212s Selecting previously unselected package libipa-hbac0. 212s Preparing to unpack .../32-libipa-hbac0_2.9.4-1ubuntu1_s390x.deb ... 212s Unpacking libipa-hbac0 (2.9.4-1ubuntu1) ... 212s Selecting previously unselected package sssd-ipa. 212s Preparing to unpack .../33-sssd-ipa_2.9.4-1ubuntu1_s390x.deb ... 212s Unpacking sssd-ipa (2.9.4-1ubuntu1) ... 212s Selecting previously unselected package sssd-krb5. 212s Preparing to unpack .../34-sssd-krb5_2.9.4-1ubuntu1_s390x.deb ... 212s Unpacking sssd-krb5 (2.9.4-1ubuntu1) ... 212s Selecting previously unselected package sssd-ldap. 212s Preparing to unpack .../35-sssd-ldap_2.9.4-1ubuntu1_s390x.deb ... 212s Unpacking sssd-ldap (2.9.4-1ubuntu1) ... 212s Selecting previously unselected package sssd-proxy. 212s Preparing to unpack .../36-sssd-proxy_2.9.4-1ubuntu1_s390x.deb ... 212s Unpacking sssd-proxy (2.9.4-1ubuntu1) ... 212s Selecting previously unselected package sssd. 212s Preparing to unpack .../37-sssd_2.9.4-1ubuntu1_s390x.deb ... 212s Unpacking sssd (2.9.4-1ubuntu1) ... 212s Selecting previously unselected package sssd-dbus. 212s Preparing to unpack .../38-sssd-dbus_2.9.4-1ubuntu1_s390x.deb ... 212s Unpacking sssd-dbus (2.9.4-1ubuntu1) ... 212s Selecting previously unselected package libjose0:s390x. 212s Preparing to unpack .../39-libjose0_11-3build1_s390x.deb ... 212s Unpacking libjose0:s390x (11-3build1) ... 212s Selecting previously unselected package libevent-2.1-7:s390x. 212s Preparing to unpack .../40-libevent-2.1-7_2.1.12-stable-9_s390x.deb ... 212s Unpacking libevent-2.1-7:s390x (2.1.12-stable-9) ... 212s Selecting previously unselected package libverto-libevent1:s390x. 212s Preparing to unpack .../41-libverto-libevent1_0.3.1-1ubuntu5_s390x.deb ... 212s Unpacking libverto-libevent1:s390x (0.3.1-1ubuntu5) ... 212s Selecting previously unselected package libverto1:s390x. 212s Preparing to unpack .../42-libverto1_0.3.1-1ubuntu5_s390x.deb ... 212s Unpacking libverto1:s390x (0.3.1-1ubuntu5) ... 212s Selecting previously unselected package libkrad0:s390x. 212s Preparing to unpack .../43-libkrad0_1.20.1-5build1_s390x.deb ... 212s Unpacking libkrad0:s390x (1.20.1-5build1) ... 212s Selecting previously unselected package sssd-idp. 212s Preparing to unpack .../44-sssd-idp_2.9.4-1ubuntu1_s390x.deb ... 212s Unpacking sssd-idp (2.9.4-1ubuntu1) ... 212s Selecting previously unselected package sssd-kcm. 212s Preparing to unpack .../45-sssd-kcm_2.9.4-1ubuntu1_s390x.deb ... 212s Unpacking sssd-kcm (2.9.4-1ubuntu1) ... 212s Selecting previously unselected package sssd-passkey. 212s Preparing to unpack .../46-sssd-passkey_2.9.4-1ubuntu1_s390x.deb ... 212s Unpacking sssd-passkey (2.9.4-1ubuntu1) ... 212s Selecting previously unselected package sssd-tools. 212s Preparing to unpack .../47-sssd-tools_2.9.4-1ubuntu1_s390x.deb ... 212s Unpacking sssd-tools (2.9.4-1ubuntu1) ... 212s Selecting previously unselected package libipa-hbac-dev. 212s Preparing to unpack .../48-libipa-hbac-dev_2.9.4-1ubuntu1_s390x.deb ... 212s Unpacking libipa-hbac-dev (2.9.4-1ubuntu1) ... 212s Selecting previously unselected package libsss-certmap-dev. 212s Preparing to unpack .../49-libsss-certmap-dev_2.9.4-1ubuntu1_s390x.deb ... 212s Unpacking libsss-certmap-dev (2.9.4-1ubuntu1) ... 212s Selecting previously unselected package libsss-idmap-dev. 212s Preparing to unpack .../50-libsss-idmap-dev_2.9.4-1ubuntu1_s390x.deb ... 212s Unpacking libsss-idmap-dev (2.9.4-1ubuntu1) ... 212s Selecting previously unselected package libsss-nss-idmap-dev. 212s Preparing to unpack .../51-libsss-nss-idmap-dev_2.9.4-1ubuntu1_s390x.deb ... 213s Unpacking libsss-nss-idmap-dev (2.9.4-1ubuntu1) ... 213s Selecting previously unselected package libnss-sudo. 213s Preparing to unpack .../52-libnss-sudo_1.9.15p5-3ubuntu1_all.deb ... 213s Unpacking libnss-sudo (1.9.15p5-3ubuntu1) ... 213s Selecting previously unselected package libsss-sudo. 213s Preparing to unpack .../53-libsss-sudo_2.9.4-1ubuntu1_s390x.deb ... 213s Unpacking libsss-sudo (2.9.4-1ubuntu1) ... 213s Selecting previously unselected package python3-libipa-hbac. 213s Preparing to unpack .../54-python3-libipa-hbac_2.9.4-1ubuntu1_s390x.deb ... 213s Unpacking python3-libipa-hbac (2.9.4-1ubuntu1) ... 213s Selecting previously unselected package python3-libsss-nss-idmap. 213s Preparing to unpack .../55-python3-libsss-nss-idmap_2.9.4-1ubuntu1_s390x.deb ... 213s Unpacking python3-libsss-nss-idmap (2.9.4-1ubuntu1) ... 213s Selecting previously unselected package libltdl7:s390x. 213s Preparing to unpack .../56-libltdl7_2.4.7-7_s390x.deb ... 213s Unpacking libltdl7:s390x (2.4.7-7) ... 213s Selecting previously unselected package libodbc2:s390x. 213s Preparing to unpack .../57-libodbc2_2.3.12-1_s390x.deb ... 213s Unpacking libodbc2:s390x (2.3.12-1) ... 213s Selecting previously unselected package slapd. 213s Preparing to unpack .../58-slapd_2.6.7+dfsg-1~exp1ubuntu1_s390x.deb ... 213s Unpacking slapd (2.6.7+dfsg-1~exp1ubuntu1) ... 213s Selecting previously unselected package ldap-utils. 213s Preparing to unpack .../59-ldap-utils_2.6.7+dfsg-1~exp1ubuntu1_s390x.deb ... 213s Unpacking ldap-utils (2.6.7+dfsg-1~exp1ubuntu1) ... 213s Selecting previously unselected package libtcl8.6:s390x. 213s Preparing to unpack .../60-libtcl8.6_8.6.13+dfsg-2_s390x.deb ... 213s Unpacking libtcl8.6:s390x (8.6.13+dfsg-2) ... 213s Selecting previously unselected package tcl8.6. 213s Preparing to unpack .../61-tcl8.6_8.6.13+dfsg-2_s390x.deb ... 213s Unpacking tcl8.6 (8.6.13+dfsg-2) ... 213s Selecting previously unselected package tcl-expect:s390x. 213s Preparing to unpack .../62-tcl-expect_5.45.4-2build1_s390x.deb ... 213s Unpacking tcl-expect:s390x (5.45.4-2build1) ... 213s Selecting previously unselected package expect. 213s Preparing to unpack .../63-expect_5.45.4-2build1_s390x.deb ... 213s Unpacking expect (5.45.4-2build1) ... 213s Setting up libpwquality-common (1.4.5-3) ... 213s Setting up libpath-utils1:s390x (0.6.2-2) ... 213s Setting up libnfsidmap1:s390x (1:2.6.3-3ubuntu1) ... 213s Setting up libsss-idmap0 (2.9.4-1ubuntu1) ... 213s Setting up libbasicobjects0:s390x (0.6.2-2) ... 213s Setting up libsss-idmap-dev (2.9.4-1ubuntu1) ... 213s Setting up libtdb1:s390x (1.4.10-1) ... 213s Setting up libc-ares2:s390x (1.27.0-1) ... 213s Setting up ldap-utils (2.6.7+dfsg-1~exp1ubuntu1) ... 213s Setting up libjose0:s390x (11-3build1) ... 213s Setting up libwbclient0:s390x (2:4.19.5+dfsg-1ubuntu1) ... 213s Setting up libtalloc2:s390x (2.4.2-1) ... 213s Setting up libdhash1:s390x (0.6.2-2) ... 213s Setting up libtevent0:s390x (0.16.1-1) ... 213s Setting up libavahi-common-data:s390x (0.8-13ubuntu2) ... 213s Setting up libevent-2.1-7:s390x (2.1.12-stable-9) ... 213s Setting up libtcl8.6:s390x (8.6.13+dfsg-2) ... 213s Setting up libltdl7:s390x (2.4.7-7) ... 213s Setting up libcrack2:s390x (2.9.6-5.1) ... 213s Setting up libcollection4:s390x (0.6.2-2) ... 213s Setting up libodbc2:s390x (2.3.12-1) ... 213s Setting up libipa-hbac0 (2.9.4-1ubuntu1) ... 213s Setting up python3-libipa-hbac (2.9.4-1ubuntu1) ... 213s Setting up libref-array1:s390x (0.6.2-2) ... 213s Setting up libnss-sudo (1.9.15p5-3ubuntu1) ... 213s Setting up libldb2:s390x (2:2.8.0+samba4.19.5+dfsg-1ubuntu1) ... 213s Setting up libsss-nss-idmap0 (2.9.4-1ubuntu1) ... 213s Setting up libnss-sss:s390x (2.9.4-1ubuntu1) ... 213s Setting up slapd (2.6.7+dfsg-1~exp1ubuntu1) ... 213s Creating new user openldap... done. 213s Creating initial configuration... done. 213s Creating LDAP directory... done. 214s Setting up tcl8.6 (8.6.13+dfsg-2) ... 214s Setting up libsss-sudo (2.9.4-1ubuntu1) ... 214s Setting up libsss-nss-idmap-dev (2.9.4-1ubuntu1) ... 214s Setting up libipa-hbac-dev (2.9.4-1ubuntu1) ... 214s Setting up libini-config5:s390x (0.6.2-2) ... 214s Setting up libavahi-common3:s390x (0.8-13ubuntu2) ... 214s Setting up tcl-expect:s390x (5.45.4-2build1) ... 214s Setting up python3-sss (2.9.4-1ubuntu1) ... 214s Setting up libsss-certmap0 (2.9.4-1ubuntu1) ... 214s Setting up libpwquality1:s390x (1.4.5-3) ... 214s Setting up python3-libsss-nss-idmap (2.9.4-1ubuntu1) ... 214s Setting up libavahi-client3:s390x (0.8-13ubuntu2) ... 214s Setting up expect (5.45.4-2build1) ... 214s Setting up libpam-pwquality:s390x (1.4.5-3) ... 214s Setting up samba-libs:s390x (2:4.19.5+dfsg-1ubuntu1) ... 214s Setting up libsss-certmap-dev (2.9.4-1ubuntu1) ... 214s Setting up libsmbclient:s390x (2:4.19.5+dfsg-1ubuntu1) ... 214s Setting up libpam-sss:s390x (2.9.4-1ubuntu1) ... 214s Setting up sssd-common (2.9.4-1ubuntu1) ... 214s Creating SSSD system user & group... 214s warn: The home directory `/var/lib/sss' already exists. Not touching this directory. 214s warn: Warning: The home directory `/var/lib/sss' does not belong to the user you are currently creating. 214s Warning: found usr.sbin.sssd in /etc/apparmor.d/force-complain, forcing complain mode 214s Warning from /etc/apparmor.d/usr.sbin.sssd (/etc/apparmor.d/usr.sbin.sssd line 63): Caching disabled for: 'usr.sbin.sssd' due to force complain 215s Created symlink /etc/systemd/system/sssd.service.wants/sssd-autofs.socket → /usr/lib/systemd/system/sssd-autofs.socket. 215s Created symlink /etc/systemd/system/sssd.service.wants/sssd-nss.socket → /usr/lib/systemd/system/sssd-nss.socket. 215s Created symlink /etc/systemd/system/sssd.service.wants/sssd-pam-priv.socket → /usr/lib/systemd/system/sssd-pam-priv.socket. 216s Created symlink /etc/systemd/system/sssd.service.wants/sssd-pam.socket → /usr/lib/systemd/system/sssd-pam.socket. 216s Created symlink /etc/systemd/system/sssd.service.wants/sssd-ssh.socket → /usr/lib/systemd/system/sssd-ssh.socket. 216s Created symlink /etc/systemd/system/sssd.service.wants/sssd-sudo.socket → /usr/lib/systemd/system/sssd-sudo.socket. 217s Created symlink /etc/systemd/system/multi-user.target.wants/sssd.service → /usr/lib/systemd/system/sssd.service. 217s sssd-autofs.service is a disabled or a static unit, not starting it. 217s sssd-nss.service is a disabled or a static unit, not starting it. 217s sssd-pam.service is a disabled or a static unit, not starting it. 217s sssd-ssh.service is a disabled or a static unit, not starting it. 217s sssd-sudo.service is a disabled or a static unit, not starting it. 217s Could not execute systemctl: at /usr/bin/deb-systemd-invoke line 148. 217s Setting up sssd-proxy (2.9.4-1ubuntu1) ... 217s Setting up sssd-kcm (2.9.4-1ubuntu1) ... 217s Created symlink /etc/systemd/system/sockets.target.wants/sssd-kcm.socket → /usr/lib/systemd/system/sssd-kcm.socket. 218s sssd-kcm.service is a disabled or a static unit, not starting it. 218s Setting up sssd-dbus (2.9.4-1ubuntu1) ... 218s sssd-ifp.service is a disabled or a static unit, not starting it. 218s Setting up sssd-ad-common (2.9.4-1ubuntu1) ... 218s Created symlink /etc/systemd/system/sssd.service.wants/sssd-pac.socket → /usr/lib/systemd/system/sssd-pac.socket. 218s sssd-pac.service is a disabled or a static unit, not starting it. 218s Could not execute systemctl: at /usr/bin/deb-systemd-invoke line 148. 218s Setting up sssd-krb5-common (2.9.4-1ubuntu1) ... 218s Setting up sssd-krb5 (2.9.4-1ubuntu1) ... 219s Setting up sssd-ldap (2.9.4-1ubuntu1) ... 219s Setting up sssd-ad (2.9.4-1ubuntu1) ... 219s Setting up sssd-tools (2.9.4-1ubuntu1) ... 219s Setting up sssd-ipa (2.9.4-1ubuntu1) ... 219s Setting up sssd (2.9.4-1ubuntu1) ... 219s Setting up libverto-libevent1:s390x (0.3.1-1ubuntu5) ... 219s Setting up libverto1:s390x (0.3.1-1ubuntu5) ... 219s Setting up libkrad0:s390x (1.20.1-5build1) ... 219s Setting up sssd-passkey (2.9.4-1ubuntu1) ... 219s Setting up sssd-idp (2.9.4-1ubuntu1) ... 219s Setting up autopkgtest-satdep (0) ... 219s Processing triggers for libc-bin (2.39-0ubuntu2) ... 219s Processing triggers for ufw (0.36.2-5) ... 219s Processing triggers for man-db (2.12.0-3) ... 219s Processing triggers for dbus (1.14.10-4ubuntu1) ... 229s (Reading database ... 53037 files and directories currently installed.) 229s Removing autopkgtest-satdep (0) ... 230s autopkgtest [01:18:04]: test ldap-user-group-ldap-auth: [----------------------- 230s + . debian/tests/util 230s + . debian/tests/common-tests 230s + mydomain=example.com 230s + myhostname=ldap.example.com 230s + mysuffix=dc=example,dc=com 230s + admin_dn=cn=admin,dc=example,dc=com 230s + admin_pw=secret 230s + ldap_user=testuser1 230s + ldap_user_pw=testuser1secret 230s + ldap_group=ldapusers 230s + adjust_hostname ldap.example.com 230s + local myhostname=ldap.example.com 230s + echo ldap.example.com 230s + hostname ldap.example.com 230s + grep -qE ldap.example.com /etc/hosts 230s + echo 127.0.1.10 ldap.example.com 230s + reconfigure_slapd 230s + debconf-set-selections 230s + rm -rf /var/backups/*slapd* /var/backups/unknown*ldapdb 230s + dpkg-reconfigure -fnoninteractive -pcritical slapd 231s Backing up /etc/ldap/slapd.d in /var/backups/slapd-2.6.7+dfsg-1~exp1ubuntu1... done. 231s Moving old database directory to /var/backups: 231s - directory unknown... done. 231s Creating initial configuration... done. 231s Creating LDAP directory... done. 231s + generate_certs ldap.example.com 231s + local cn=ldap.example.com 231s + local cert=/etc/ldap/server.pem 231s + local key=/etc/ldap/server.key 231s + local cnf=/etc/ldap/openssl.cnf 231s + cat 231s + openssl req -new -x509 -nodes -out /etc/ldap/server.pem -keyout /etc/ldap/server.key -config /etc/ldap/openssl.cnf 231s ......................................++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ 231s .............................++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ 231s ----- 231s + chmod 0640 /etc/ldap/server.key 231s + chgrp openldap /etc/ldap/server.key 231s + [ ! -f /etc/ldap/server.pem ] 231s + [ ! -f /etc/ldap/server.key ] 231s + enable_ldap_ssl 231s + cat 231s + + cat 231s ldapmodify -H ldapi:/// -Y EXTERNAL -Q 231s modifying entry "cn=config" 231s 231s adding new entry "ou=People,dc=example,dc=com" 231s 231s adding new entry "ou=Group,dc=example,dc=com" 231s 231s adding new entry "uid=testuser1,ou=People,dc=example,dc=com" 231s 231s adding new entry "cn=testuser1,ou=Group,dc=example,dc=com" 231s 231s adding new entry "cn=ldapusers,ou=Group,dc=example,dc=com" 231s 231s + populate_ldap_rfc2307 231s + cat 231s + ldapadd -x -D cn=admin,dc=example,dc=com -w secret 231s + configure_sssd_ldap_rfc2307 231s + cat 231s + chmod 0600 /etc/sssd/sssd.conf 231s + systemctl restart sssd 231s + enable_pam_mkhomedir 231s + grep -qE ^session.*pam_mkhomedir\.so /etc/pam.d/common-session 232s + echo session optional pam_mkhomedir.so 232s + run_common_tests 232s + Assert local user databases do not have our LDAP test data 232s echo Assert local user databases do not have our LDAP test data 232s + check_local_user testuser1 232s + local local_user=testuser1 232s + grep -q ^testuser1 /etc/passwd 232s + check_local_group testuser1 232s + local local_group=testuser1 232s + grep -q ^testuser1 /etc/group 232s + check_local_group ldapusers 232s + local local_group=ldapusers 232s + grep -q ^ldapusers /etc/group 232s The LDAP user is known to the system via getent 232s + echo The LDAP user is known to the system via getent 232s + check_getent_user testuser1 232s + local getent_user=testuser1 232s + local output 232s + getent passwd testuser1 232s The LDAP user's private group is known to the system via getent 232s + output=testuser1:*:10001:10001:testuser1:/home/testuser1:/bin/bash 232s + [ -z testuser1:*:10001:10001:testuser1:/home/testuser1:/bin/bash ] 232s + echo The LDAP user's private group is known to the system via getent 232s + check_getent_group testuser1 232s + local getent_group=testuser1 232s + local output 232s + getent group testuser1 232s The LDAP group ldapusers is known to the system via getent 232s + output=testuser1:*:10001:testuser1 232s + [ -z testuser1:*:10001:testuser1 ] 232s + echo The LDAP group ldapusers is known to the system via getent 232s + check_getent_group ldapusers 232s + local getent_group=ldapusers 232s + local output 232s + getent group ldapusers 232s + output=ldapusers:*:10100:testuser1 232s + [ -zThe id(1) command can resolve the group membership of the LDAP user 232s ldapusers:*:10100:testuser1 ] 232s + echo The id(1) command can resolve the group membership of the LDAP user 232s + id -Gn testuser1 232s + output=testuser1 ldapusers 232s + [ testuser1 ldapusers != testuser1 ldapusers ]The LDAP user can login on a terminal 232s spawn login 232s 232s + echo The LDAP user can login on a terminal 232s + /usr/bin/expect -f debian/tests/login.exp testuser1 testuser1secret 232s ldap.example.com login: testuser1 232s Password: 232s Welcome to Ubuntu Noble Numbat (development branch) (GNU/Linux 6.8.0-11-generic s390x) 232s 232s * Documentation: https://help.ubuntu.com 232s * Management: https://landscape.canonical.com 232s * Support: https://ubuntu.com/pro 232s 232s 232s The programs included with the Ubuntu system are free software; 232s the exact distribution terms for each program are described in the 232s individual files in /usr/share/doc/*/copyright. 232s 232s Ubuntu comes with ABSOLUTELY NO WARRANTY, to the extent permitted by 232s applicable law. 232s 232s 232s The programs included with the Ubuntu system are free software; 232s the exact distribution terms for each program are described in the 232s individual files in /usr/share/doc/*/copyright. 232s 232s Ubuntu comes with ABSOLUTELY NO WARRANTY, to the extent permitted by 232s applicable law. 232s 232s Creating directory '/home/testuser1'. 232s [?2004htestuser1@ldap:~$ id -un 232s [?2004l testuser1 232s [?2004htestuser1@ldap:~$ autopkgtest [01:18:06]: test ldap-user-group-ldap-auth: -----------------------] 233s autopkgtest [01:18:07]: test ldap-user-group-ldap-auth: - - - - - - - - - - results - - - - - - - - - - 233s ldap-user-group-ldap-auth PASS 233s autopkgtest [01:18:07]: test ldap-user-group-krb5-auth: preparing testbed 238s Reading package lists... 238s Building dependency tree... 238s Reading state information... 238s Correcting dependencies...Starting pkgProblemResolver with broken count: 0 238s Starting 2 pkgProblemResolver with broken count: 0 238s Done 239s Done 239s Starting pkgProblemResolver with broken count: 0 239s Starting 2 pkgProblemResolver with broken count: 0 239s Done 239s The following additional packages will be installed: 239s krb5-admin-server krb5-config krb5-kdc krb5-user libgssrpc4 239s libkadm5clnt-mit12 libkadm5srv-mit12 libkdb5-10 239s Suggested packages: 239s krb5-kdc-ldap krb5-kpropd krb5-k5tls krb5-doc 239s The following NEW packages will be installed: 239s krb5-admin-server krb5-config krb5-kdc krb5-user libgssrpc4 239s libkadm5clnt-mit12 libkadm5srv-mit12 libkdb5-10 239s 0 upgraded, 8 newly installed, 0 to remove and 0 not upgraded. 239s 1 not fully installed or removed. 239s Need to get 612 kB of archives. 239s After this operation, 2067 kB of additional disk space will be used. 239s Get:1 http://ftpmaster.internal/ubuntu noble/main s390x libgssrpc4 s390x 1.20.1-5build1 [58.9 kB] 240s Get:2 http://ftpmaster.internal/ubuntu noble/main s390x libkadm5clnt-mit12 s390x 1.20.1-5build1 [40.5 kB] 240s Get:3 http://ftpmaster.internal/ubuntu noble/main s390x libkdb5-10 s390x 1.20.1-5build1 [41.4 kB] 240s Get:4 http://ftpmaster.internal/ubuntu noble/main s390x libkadm5srv-mit12 s390x 1.20.1-5build1 [55.2 kB] 240s Get:5 http://ftpmaster.internal/ubuntu noble/universe s390x krb5-user s390x 1.20.1-5build1 [110 kB] 240s Get:6 http://ftpmaster.internal/ubuntu noble/main s390x krb5-config all 2.7 [22.0 kB] 240s Get:7 http://ftpmaster.internal/ubuntu noble/universe s390x krb5-kdc s390x 1.20.1-5build1 [188 kB] 240s Get:8 http://ftpmaster.internal/ubuntu noble/universe s390x krb5-admin-server s390x 1.20.1-5build1 [95.9 kB] 240s Preconfiguring packages ... 240s Fetched 612 kB in 1s (1076 kB/s) 241s Selecting previously unselected package libgssrpc4:s390x. 241s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 53037 files and directories currently installed.) 241s Preparing to unpack .../0-libgssrpc4_1.20.1-5build1_s390x.deb ... 241s Unpacking libgssrpc4:s390x (1.20.1-5build1) ... 241s Selecting previously unselected package libkadm5clnt-mit12:s390x. 241s Preparing to unpack .../1-libkadm5clnt-mit12_1.20.1-5build1_s390x.deb ... 241s Unpacking libkadm5clnt-mit12:s390x (1.20.1-5build1) ... 241s Selecting previously unselected package libkdb5-10:s390x. 241s Preparing to unpack .../2-libkdb5-10_1.20.1-5build1_s390x.deb ... 241s Unpacking libkdb5-10:s390x (1.20.1-5build1) ... 241s Selecting previously unselected package libkadm5srv-mit12:s390x. 241s Preparing to unpack .../3-libkadm5srv-mit12_1.20.1-5build1_s390x.deb ... 241s Unpacking libkadm5srv-mit12:s390x (1.20.1-5build1) ... 241s Selecting previously unselected package krb5-user. 241s Preparing to unpack .../4-krb5-user_1.20.1-5build1_s390x.deb ... 241s Unpacking krb5-user (1.20.1-5build1) ... 241s Selecting previously unselected package krb5-config. 241s Preparing to unpack .../5-krb5-config_2.7_all.deb ... 241s Unpacking krb5-config (2.7) ... 241s Selecting previously unselected package krb5-kdc. 241s Preparing to unpack .../6-krb5-kdc_1.20.1-5build1_s390x.deb ... 241s Unpacking krb5-kdc (1.20.1-5build1) ... 241s Selecting previously unselected package krb5-admin-server. 241s Preparing to unpack .../7-krb5-admin-server_1.20.1-5build1_s390x.deb ... 241s Unpacking krb5-admin-server (1.20.1-5build1) ... 241s Setting up libgssrpc4:s390x (1.20.1-5build1) ... 241s Setting up krb5-config (2.7) ... 241s Setting up libkadm5clnt-mit12:s390x (1.20.1-5build1) ... 241s Setting up libkdb5-10:s390x (1.20.1-5build1) ... 241s Setting up libkadm5srv-mit12:s390x (1.20.1-5build1) ... 241s Setting up krb5-user (1.20.1-5build1) ... 241s update-alternatives: using /usr/bin/kinit.mit to provide /usr/bin/kinit (kinit) in auto mode 241s update-alternatives: using /usr/bin/klist.mit to provide /usr/bin/klist (klist) in auto mode 241s update-alternatives: using /usr/bin/kswitch.mit to provide /usr/bin/kswitch (kswitch) in auto mode 241s update-alternatives: using /usr/bin/ksu.mit to provide /usr/bin/ksu (ksu) in auto mode 241s update-alternatives: using /usr/bin/kpasswd.mit to provide /usr/bin/kpasswd (kpasswd) in auto mode 241s update-alternatives: using /usr/bin/kdestroy.mit to provide /usr/bin/kdestroy (kdestroy) in auto mode 241s update-alternatives: using /usr/bin/kadmin.mit to provide /usr/bin/kadmin (kadmin) in auto mode 241s update-alternatives: using /usr/bin/ktutil.mit to provide /usr/bin/ktutil (ktutil) in auto mode 241s Setting up krb5-kdc (1.20.1-5build1) ... 241s Created symlink /etc/systemd/system/multi-user.target.wants/krb5-kdc.service → /usr/lib/systemd/system/krb5-kdc.service. 242s Could not execute systemctl: at /usr/bin/deb-systemd-invoke line 148. 242s Setting up krb5-admin-server (1.20.1-5build1) ... 242s Created symlink /etc/systemd/system/multi-user.target.wants/krb5-admin-server.service → /usr/lib/systemd/system/krb5-admin-server.service. 243s Setting up autopkgtest-satdep (0) ... 243s Processing triggers for man-db (2.12.0-3) ... 243s Processing triggers for libc-bin (2.39-0ubuntu2) ... 252s (Reading database ... 53130 files and directories currently installed.) 252s Removing autopkgtest-satdep (0) ... 253s autopkgtest [01:18:27]: test ldap-user-group-krb5-auth: [----------------------- 253s + . debian/tests/util 253s + . debian/tests/common-tests 253s + mydomain=example.com 253s + myhostname=ldap.example.com 253s + mysuffix=dc=example,dc=com 253s + myrealm=EXAMPLE.COM 253s + admin_dn=cn=admin,dc=example,dc=com 253s + admin_pw=secret 253s + ldap_user=testuser1 253s + ldap_user_pw=testuser1secret 253s + kerberos_principal_pw=testuser1kerberos 253s + ldap_group=ldapusers 253s + adjust_hostname ldap.example.com 253s + local myhostname=ldap.example.com 253s + echo ldap.example.com 253s + hostname ldap.example.com 253s + grep -qE ldap.example.com /etc/hosts 253s + reconfigure_slapd 253s + debconf-set-selections 253s + rm -rf /var/backups/slapd-2.6.7+dfsg-1~exp1ubuntu1 /var/backups/unknown-2.6.7+dfsg-1~exp1ubuntu1-20240305-011805.ldapdb 253s + dpkg-reconfigure -fnoninteractive -pcritical slapd 253s Backing up /etc/ldap/slapd.d in /var/backups/slapd-2.6.7+dfsg-1~exp1ubuntu1... done. 253s Moving old database directory to /var/backups: 253s - directory unknown... done. 253s Creating initial configuration... done. 253s Creating LDAP directory... done. 254s + generate_certs ldap.example.com 254s + local cn=ldap.example.com 254s + local cert=/etc/ldap/server.pem 254s + local key=/etc/ldap/server.key 254s + local cnf=/etc/ldap/openssl.cnf 254s + cat 254s + openssl req -new -x509 -nodes -out /etc/ldap/server.pem -keyout /etc/ldap/server.key -config /etc/ldap/openssl.cnf 254s ............++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ 254s .....................+++++++++++++++++++++++++++++++++++++++++++++++++++++++modifying entry "cn=config" 254s 254s +++++++++ 254s ----- 254s + chmod 0640 /etc/ldap/server.key 254s + chgrp openldap /etc/ldap/server.key 254s + [ ! -f /etc/ldap/server.pem ] 254s + [ ! -f /etc/ldap/server.key ] 254s + enable_ldap_ssl 254s + cat 254s + + ldapmodify -H ldapi:/// -Y EXTERNAL -Q 254s cat 254s + populate_ldap_rfc2307 254s + + catldapadd 254s -x -D cn=admin,dc=example,dc=com -w secret 254s adding new entry "ou=People,dc=example,dc=com" 254s 254s adding new entry "ou=Group,dc=example,dc=com" 254s 254s adding new entry "uid=testuser1,ou=People,dc=example,dc=com" 254s 254s adding new entry "cn=testuser1,ou=Group,dc=example,dc=com" 254s 254s adding new entry "cn=ldapusers,ou=Group,dc=example,dc=com" 254s 254s + create_realm EXAMPLE.COM ldap.example.com 254s + local realm_name=EXAMPLE.COM 254s + local kerberos_server=ldap.example.com 254s + rm -rf /var/lib/krb5kdc/* 254s + rm -rf /etc/krb5kdc/kdc.conf 254s + rm -f /etc/krb5.keytab 254s + cat 254s + Initializing database '/var/lib/krb5kdc/principal' for realm 'EXAMPLE.COM', 254s master key name 'K/M@EXAMPLE.COM' 254s cat 254s + echo # */admin * 254s + kdb5_util create -s -P secretpassword 254s + systemctl restart krb5-kdc.service krb5-admin-server.service 254s + create_krb_principal testuser1 testuser1kerberos 254s + local principal=testuser1 254s + local password=testuser1kerberos 254s + kadmin.local -q addprinc -pw testuser1kerberos testuser1 254s No policy specified for testuser1@EXAMPLE.COM; defaulting to no policy 254s Authenticating as principal root/admin@EXAMPLE.COM with password. 254s Principal "testuser1@EXAMPLE.COM" created. 254s + configure_sssd_ldap_rfc2307_krb5_auth 254s + cat 254s + chmod 0600 /etc/sssd/sssd.conf 254s + systemctl restart sssd 254s + enable_pam_mkhomedir 254s + grep -qE ^session.*pam_mkhomedir\.so /etc/pam.d/common-session 254s Assert local user databases do not have our LDAP test data 254s + run_common_tests 254s + echo Assert local user databases do not have our LDAP test data 254s + check_local_user testuser1 254s + local local_user=testuser1 254s + grep -q ^testuser1 /etc/passwd 254s + check_local_group testuser1 254s + local local_group=testuser1 254s + grep -q ^testuser1 /etc/group 254s + check_local_group ldapusers 254s + local local_group=ldapusers 254s + grep -q ^ldapusers /etc/group 254s + echo The LDAP user is known to the system via getent 254s + check_getent_user testuser1 254s + local getent_user=testuser1 254s + local output 254s The LDAP user is known to the system via getent 254s + getent passwd testuser1 254s The LDAP user's private group is known to the system via getent 254s + output=testuser1:*:10001:10001:testuser1:/home/testuser1:/bin/bash 254s + [ -z testuser1:*:10001:10001:testuser1:/home/testuser1:/bin/bash ] 254s + echo The LDAP user's private group is known to the system via getent 254s + check_getent_group testuser1 254s + local getent_group=testuser1 254s + local output 254s + getent group testuser1 254s + output=testuser1:*:10001:testuser1 254s + [ -z testuser1:*:10001:testuser1 ] 254s + echo The LDAP group ldapusers is known to the system via getent 254s + check_getent_group ldapusers 254s The LDAP group ldapusers is known to the system via getent 254s + local getent_group=ldapusers 254s + local output 254s + getent group ldapusers 254s The id(1) command can resolve the group membership of the LDAP user 254s + output=ldapusers:*:10100:testuser1 254s + [ -z ldapusers:*:10100:testuser1 ] 254s + echo The id(1) command can resolve the group membership of the LDAP user 254s + id -Gn testuser1 254s + output=testuser1 ldapusers 254s + [ testuser1 ldapusers != testuser1 ldapusers ] 254s + echo The Kerberos principal can login on a terminal 254s The Kerberos principal can login on a terminal 254s + kdestroy 254s + /usr/bin/expect -f debian/tests/login.exp testuser1 testuser1kerberos testuser1@EXAMPLE.COM 254s spawn login 254s ldap.example.com login: testuser1 254s Password: 254s Welcome to Ubuntu Noble Numbat (development branch) (GNU/Linux 6.8.0-11-generic s390x) 254s 254s * Documentation: https://help.ubuntu.com 254s * Management: https://landscape.canonical.com 254s * Support: https://ubuntu.com/pro 254s 254s 254s The programs included with the Ubuntu system are free software; 254s the exact distribution terms for each program are described in the 254s individual files in /usr/share/doc/*/copyright. 254s 254s Ubuntu comes with ABSOLUTELY NO WARRANTY, to the extent permitted by 254s applicable law. 254s 254s Last login: Tue Mar 5 01:18:06 UTC 2024 on pts/0 254s [?2004htestuser1@ldap:~$ id -un 254s [?2004l testuser1 254s [?2004htestuser1@ldap:~$ klist 254s [?2004l Ticket cache: FILE:/tmp/krb5cc_10001_OfDen7 254s Default principal: testuser1@EXAMPLE.COM 255s autopkgtest [01:18:29]: test ldap-user-group-krb5-auth: -----------------------] 255s autopkgtest [01:18:29]: test ldap-user-group-krb5-auth: - - - - - - - - - - results - - - - - - - - - - 255s ldap-user-group-krb5-auth PASS 256s autopkgtest [01:18:30]: test sssd-softhism2-certificates-tests.sh: preparing testbed 375s autopkgtest [01:20:29]: @@@@@@@@@@@@@@@@@@@@ test bed setup 376s Get:1 http://ftpmaster.internal/ubuntu noble-proposed InRelease [117 kB] 376s Get:2 http://ftpmaster.internal/ubuntu noble-proposed/universe Sources [1756 kB] 376s Get:3 http://ftpmaster.internal/ubuntu noble-proposed/main Sources [313 kB] 376s Get:4 http://ftpmaster.internal/ubuntu noble-proposed/restricted Sources [3976 B] 376s Get:5 http://ftpmaster.internal/ubuntu noble-proposed/multiverse Sources [23.8 kB] 376s Get:6 http://ftpmaster.internal/ubuntu noble-proposed/main s390x Packages [412 kB] 376s Get:7 http://ftpmaster.internal/ubuntu noble-proposed/main s390x c-n-f Metadata [3032 B] 376s Get:8 http://ftpmaster.internal/ubuntu noble-proposed/restricted s390x Packages [1372 B] 376s Get:9 http://ftpmaster.internal/ubuntu noble-proposed/restricted s390x c-n-f Metadata [116 B] 376s Get:10 http://ftpmaster.internal/ubuntu noble-proposed/universe s390x Packages [1936 kB] 377s Get:11 http://ftpmaster.internal/ubuntu noble-proposed/universe s390x c-n-f Metadata [7292 B] 377s Get:12 http://ftpmaster.internal/ubuntu noble-proposed/multiverse s390x Packages [12.5 kB] 377s Get:13 http://ftpmaster.internal/ubuntu noble-proposed/multiverse s390x c-n-f Metadata [116 B] 378s Fetched 4586 kB in 2s (2750 kB/s) 378s Reading package lists... 383s Reading package lists... 383s Building dependency tree... 383s Reading state information... 383s Calculating upgrade... 383s The following packages will be REMOVED: 383s libssl3 383s The following NEW packages will be installed: 383s libssl3t64 383s The following packages will be upgraded: 383s dbus dbus-bin dbus-daemon dbus-session-bus-common dbus-system-bus-common 383s dbus-user-session gcc-13-base libdbus-1-3 libksba8 openssl 383s 10 upgraded, 1 newly installed, 1 to remove and 0 not upgraded. 383s Need to get 3395 kB of archives. 383s After this operation, 12.3 kB of additional disk space will be used. 383s Get:1 http://ftpmaster.internal/ubuntu noble-proposed/main s390x openssl s390x 3.0.10-1ubuntu5 [1005 kB] 384s Get:2 http://ftpmaster.internal/ubuntu noble-proposed/main s390x libssl3t64 s390x 3.0.10-1ubuntu5 [1648 kB] 384s Get:3 http://ftpmaster.internal/ubuntu noble/main s390x gcc-13-base s390x 13.2.0-17ubuntu2 [47.4 kB] 384s Get:4 http://ftpmaster.internal/ubuntu noble/main s390x dbus-system-bus-common all 1.14.10-4ubuntu1 [81.4 kB] 384s Get:5 http://ftpmaster.internal/ubuntu noble/main s390x dbus-session-bus-common all 1.14.10-4ubuntu1 [80.2 kB] 384s Get:6 http://ftpmaster.internal/ubuntu noble/main s390x dbus-user-session s390x 1.14.10-4ubuntu1 [9956 B] 384s Get:7 http://ftpmaster.internal/ubuntu noble/main s390x dbus-daemon s390x 1.14.10-4ubuntu1 [118 kB] 384s Get:8 http://ftpmaster.internal/ubuntu noble/main s390x dbus-bin s390x 1.14.10-4ubuntu1 [41.4 kB] 384s Get:9 http://ftpmaster.internal/ubuntu noble/main s390x dbus s390x 1.14.10-4ubuntu1 [24.3 kB] 384s Get:10 http://ftpmaster.internal/ubuntu noble/main s390x libdbus-1-3 s390x 1.14.10-4ubuntu1 [213 kB] 384s Get:11 http://ftpmaster.internal/ubuntu noble/main s390x libksba8 s390x 1.6.6-1 [126 kB] 384s Fetched 3395 kB in 1s (4721 kB/s) 384s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 52194 files and directories currently installed.) 384s Preparing to unpack .../openssl_3.0.10-1ubuntu5_s390x.deb ... 384s Unpacking openssl (3.0.10-1ubuntu5) over (3.0.10-1ubuntu4) ... 384s dpkg: libssl3:s390x: dependency problems, but removing anyway as you requested: 384s wget depends on libssl3 (>= 3.0.0). 384s tnftp depends on libssl3 (>= 3.0.0). 384s tcpdump depends on libssl3 (>= 3.0.0). 384s systemd-resolved depends on libssl3 (>= 3.0.0). 384s systemd depends on libssl3 (>= 3.0.0). 384s sudo depends on libssl3 (>= 3.0.0). 384s s390-tools depends on libssl3 (>= 3.0.0). 384s rsync depends on libssl3 (>= 3.0.0). 384s python3-cryptography depends on libssl3 (>= 3.0.0). 384s openssh-server depends on libssl3 (>= 3.0.10). 384s openssh-client depends on libssl3 (>= 3.0.10). 384s linux-headers-6.8.0-11-generic depends on libssl3 (>= 3.0.0). 384s libsystemd-shared:s390x depends on libssl3 (>= 3.0.0). 384s libssh-4:s390x depends on libssl3 (>= 3.0.0). 384s libsasl2-modules:s390x depends on libssl3 (>= 3.0.0). 384s libsasl2-2:s390x depends on libssl3 (>= 3.0.0). 384s libpython3.12-minimal:s390x depends on libssl3 (>= 3.0.0). 384s libpython3.11-minimal:s390x depends on libssl3 (>= 3.0.0). 384s libnvme1 depends on libssl3 (>= 3.0.0). 384s libkrb5-3:s390x depends on libssl3 (>= 3.0.0). 384s libkmod2:s390x depends on libssl3 (>= 3.0.0). 384s libfido2-1:s390x depends on libssl3 (>= 3.0.0). 384s libcurl4:s390x depends on libssl3 (>= 3.0.0). 384s libcryptsetup12:s390x depends on libssl3 (>= 3.0.0). 384s kmod depends on libssl3 (>= 3.0.0). 384s dhcpcd-base depends on libssl3 (>= 3.0.0). 384s bind9-libs:s390x depends on libssl3 (>= 3.0.0). 384s 384s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 52194 files and directories currently installed.) 384s Removing libssl3:s390x (3.0.10-1ubuntu4) ... 384s Selecting previously unselected package libssl3t64:s390x. 384s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 52183 files and directories currently installed.) 384s Preparing to unpack .../0-libssl3t64_3.0.10-1ubuntu5_s390x.deb ... 384s Unpacking libssl3t64:s390x (3.0.10-1ubuntu5) ... 385s Preparing to unpack .../1-gcc-13-base_13.2.0-17ubuntu2_s390x.deb ... 385s Unpacking gcc-13-base:s390x (13.2.0-17ubuntu2) over (13.2.0-16ubuntu1) ... 385s Preparing to unpack .../2-dbus-system-bus-common_1.14.10-4ubuntu1_all.deb ... 385s Unpacking dbus-system-bus-common (1.14.10-4ubuntu1) over (1.14.10-3ubuntu1) ... 385s Preparing to unpack .../3-dbus-session-bus-common_1.14.10-4ubuntu1_all.deb ... 385s Unpacking dbus-session-bus-common (1.14.10-4ubuntu1) over (1.14.10-3ubuntu1) ... 385s Preparing to unpack .../4-dbus-user-session_1.14.10-4ubuntu1_s390x.deb ... 385s Unpacking dbus-user-session (1.14.10-4ubuntu1) over (1.14.10-3ubuntu1) ... 385s Preparing to unpack .../5-dbus-daemon_1.14.10-4ubuntu1_s390x.deb ... 385s Unpacking dbus-daemon (1.14.10-4ubuntu1) over (1.14.10-3ubuntu1) ... 385s Preparing to unpack .../6-dbus-bin_1.14.10-4ubuntu1_s390x.deb ... 385s Unpacking dbus-bin (1.14.10-4ubuntu1) over (1.14.10-3ubuntu1) ... 385s Preparing to unpack .../7-dbus_1.14.10-4ubuntu1_s390x.deb ... 385s Unpacking dbus (1.14.10-4ubuntu1) over (1.14.10-3ubuntu1) ... 385s Preparing to unpack .../8-libdbus-1-3_1.14.10-4ubuntu1_s390x.deb ... 385s Unpacking libdbus-1-3:s390x (1.14.10-4ubuntu1) over (1.14.10-3ubuntu1) ... 385s Preparing to unpack .../9-libksba8_1.6.6-1_s390x.deb ... 385s Unpacking libksba8:s390x (1.6.6-1) over (1.6.5-2) ... 385s Setting up libksba8:s390x (1.6.6-1) ... 385s Setting up libssl3t64:s390x (3.0.10-1ubuntu5) ... 385s Setting up gcc-13-base:s390x (13.2.0-17ubuntu2) ... 385s Setting up libdbus-1-3:s390x (1.14.10-4ubuntu1) ... 385s Setting up dbus-session-bus-common (1.14.10-4ubuntu1) ... 385s Setting up dbus-system-bus-common (1.14.10-4ubuntu1) ... 385s Setting up openssl (3.0.10-1ubuntu5) ... 385s Setting up dbus-bin (1.14.10-4ubuntu1) ... 385s Setting up dbus-daemon (1.14.10-4ubuntu1) ... 385s Setting up dbus-user-session (1.14.10-4ubuntu1) ... 385s Setting up dbus (1.14.10-4ubuntu1) ... 385s A reboot is required to replace the running dbus-daemon. 385s Please reboot the system when convenient. 385s Processing triggers for man-db (2.12.0-3) ... 385s Processing triggers for libc-bin (2.39-0ubuntu2) ... 386s W: Target Packages (main/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 386s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 386s W: Target CNF (main/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 386s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 386s W: Target Packages (universe/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 386s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 386s W: Target CNF (universe/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 386s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 386s W: Target Packages (restricted/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 386s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 386s W: Target CNF (restricted/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 386s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 386s W: Target Packages (multiverse/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 386s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 386s W: Target CNF (multiverse/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 386s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 386s W: Target Packages (main/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 386s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 386s W: Target CNF (main/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 386s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 386s W: Target Packages (universe/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 386s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 386s W: Target CNF (universe/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 386s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 386s W: Target Packages (restricted/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 386s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 386s W: Target CNF (restricted/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 386s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 386s W: Target Packages (multiverse/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 386s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 386s W: Target CNF (multiverse/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 386s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 386s W: Target Packages (main/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 386s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 386s W: Target CNF (main/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 386s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 386s W: Target Packages (universe/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 386s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 386s W: Target CNF (universe/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 386s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 386s W: Target Packages (restricted/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 386s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 386s W: Target CNF (restricted/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 386s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 386s W: Target Packages (multiverse/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 386s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 386s W: Target CNF (multiverse/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 386s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 386s Reading package lists... 386s Building dependency tree... 386s Reading state information... 386s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 387s Unknown architecture, assuming PC-style ttyS0 387s sh: Attempting to set up Debian/Ubuntu apt sources automatically 387s sh: Distribution appears to be Ubuntu 390s Reading package lists... 390s Building dependency tree... 390s Reading state information... 390s eatmydata is already the newest version (131-1). 390s dbus is already the newest version (1.14.10-4ubuntu1). 390s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 390s W: Target Packages (main/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 390s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 390s W: Target CNF (main/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 390s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 390s W: Target Packages (universe/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 390s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 390s W: Target CNF (universe/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 390s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 390s W: Target Packages (restricted/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 390s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 390s W: Target CNF (restricted/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 390s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 390s W: Target Packages (multiverse/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 390s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 390s W: Target CNF (multiverse/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 390s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 390s W: Target Packages (main/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 390s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 390s W: Target CNF (main/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 390s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 390s W: Target Packages (universe/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 390s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 390s W: Target CNF (universe/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 390s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 390s W: Target Packages (restricted/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 390s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 390s W: Target CNF (restricted/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 390s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 390s W: Target Packages (multiverse/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 390s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 390s W: Target CNF (multiverse/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 390s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 390s W: Target Packages (main/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 390s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 390s W: Target CNF (main/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 390s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 390s W: Target Packages (universe/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 390s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 390s W: Target CNF (universe/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 390s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 390s W: Target Packages (restricted/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 390s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 390s W: Target CNF (restricted/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 390s WReading package lists...: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 390s W: Target Packages (multiverse/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 390s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 390s W: Target CNF (multiverse/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 390s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 390s 390s Building dependency tree... 390s Reading state information... 391s rng-tools-debian is already the newest version (2.4). 391s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 391s Reading package lists... 391s Building dependency tree... 391s Reading state information... 391s haveged is already the newest version (1.9.14-1ubuntu1). 391s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 391s Reading package lists... 391s Building dependency tree... 391s Reading state information... 392s The following packages will be REMOVED: 392s cloud-init* python3-configobj* python3-debconf* 392s 0 upgraded, 0 newly installed, 3 to remove and 0 not upgraded. 392s After this operation, 3248 kB disk space will be freed. 392s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 52196 files and directories currently installed.) 392s Removing cloud-init (24.1-0ubuntu1) ... 392s Removing python3-configobj (5.0.8-3) ... 392s Removing python3-debconf (1.5.86) ... 392s Processing triggers for man-db (2.12.0-3) ... 393s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 51807 files and directories currently installed.) 393s Purging configuration files for cloud-init (24.1-0ubuntu1) ... 393s dpkg: warning: while removing cloud-init, directory '/etc/cloud/cloud.cfg.d' not empty so not removed 393s Processing triggers for rsyslog (8.2312.0-3ubuntu3) ... 394s Reading package lists... 394s Building dependency tree... 394s Reading state information... 394s linux-generic is already the newest version (6.8.0-11.11+1). 394s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 395s Hit:1 http://ftpmaster.internal/ubuntu noble InRelease 395s Hit:2 http://ftpmaster.internal/ubuntu noble-updates InRelease 395s Hit:3 http://ftpmaster.internal/ubuntu noble-security InRelease 395s Hit:4 http://ftpmaster.internal/ubuntu noble-proposed InRelease 395s Hit:5 http://ftpmaster.internal/ubuntu noble-backports InRelease 398s Reading package lists... 398s W: Target Packages (main/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 398s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 398s W: Target CNF (main/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 398s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 398s W: Target Packages (universe/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 398s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 398s W: Target CNF (universe/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 398s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 398s W: Target Packages (restricted/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 398s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 398s W: Target CNF (restricted/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 398s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 398s W: Target Packages (multiverse/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 398s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 398s W: Target CNF (multiverse/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 398s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 398s W: Target Packages (main/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 398s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 398s W: Target CNF (main/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 398s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 398s W: Target Packages (universe/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 398s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 398s W: Target CNF (universe/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 398s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 398s W: Target Packages (restricted/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 398s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 398s W: Target CNF (restricted/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 398s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 398s W: Target Packages (multiverse/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 398s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 398s W: Target CNF (multiverse/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 398s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 398s W: Target Packages (main/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 398s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 398s W: Target CNF (main/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 398s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 398s W: Target Packages (universe/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 398s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 398s W: Target CNF (universe/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 398s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 398s W: Target Packages (restricted/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 398s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 398s W: Target CNF (restricted/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 398s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 398s W: Target Packages (multiverse/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 398s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 398s W: Target CNF (multiverse/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 398s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 398s W: Target Packages (main/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 398s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 398s W: Target CNF (main/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 398s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 398s W: Target Packages (universe/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 398s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 398s W: Target CNF (universe/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 398s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 398s W: Target Packages (restricted/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 398s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 398s W: Target CNF (restricted/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 398s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 398s W: Target Packages (multiverse/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 398s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 398s W: Target CNF (multiverse/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 398s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 398s W: Target Packages (main/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 398s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 398s W: Target CNF (main/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 398s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 398s W: Target Packages (universe/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 398s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 398s W: Target CNF (universe/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 398s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 398s W: Target Packages (restricted/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 398s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 398s W: Target CNF (restricted/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 398s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 398s W: Target Packages (multiverse/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 398s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 398s W: Target CNF (multiverse/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 398s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 398s W: Target Packages (main/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 398s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 398s W: Target CNF (main/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 398s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 398s W: Target Packages (universe/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 398s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 398s W: Target CNF (universe/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 398s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 398s W: Target Packages (restricted/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 398s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 398s W: Target CNF (restricted/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 398s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 398s W: Target Packages (multiverse/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 398s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 398s W: Target CNF (multiverse/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 398s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 398s Reading package lists... 398s Building dependency tree... 398s Reading state information... 399s Calculating upgrade... 399s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 399s Reading package lists... 399s Building dependency tree... 399s Reading state information... 399s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 399s autopkgtest [01:20:53]: rebooting testbed after setup commands that affected boot 413s autopkgtest [01:21:07]: testbed dpkg architecture: s390x 419s Reading package lists... 419s Building dependency tree... 419s Reading state information... 420s Correcting dependencies...Starting pkgProblemResolver with broken count: 0 420s Starting 2 pkgProblemResolver with broken count: 0 420s Done 420s Done 420s Starting pkgProblemResolver with broken count: 0 420s Starting 2 pkgProblemResolver with broken count: 0 420s Done 420s The following additional packages will be installed: 420s gnutls-bin libavahi-client3 libavahi-common-data libavahi-common3 420s libbasicobjects0 libc-ares2 libcollection4 libcrack2 libdhash1 420s libevent-2.1-7 libgnutls-dane0 libini-config5 libipa-hbac0 libldb2 420s libnfsidmap1 libnss-sss libpam-pwquality libpam-sss libpath-utils1 420s libpwquality-common libpwquality1 libref-array1 libsmbclient libsofthsm2 420s libsss-certmap0 libsss-idmap0 libsss-nss-idmap0 libtalloc2 libtdb1 420s libtevent0 libunbound8 libwbclient0 python3-sss samba-libs softhsm2 420s softhsm2-common sssd sssd-ad sssd-ad-common sssd-common sssd-ipa sssd-krb5 420s sssd-krb5-common sssd-ldap sssd-proxy 420s Suggested packages: 420s dns-root-data adcli libsss-sudo sssd-tools libsasl2-modules-ldap 420s Recommended packages: 420s cracklib-runtime libsasl2-modules-gssapi-mit 420s | libsasl2-modules-gssapi-heimdal ldap-utils 420s The following NEW packages will be installed: 420s gnutls-bin libavahi-client3 libavahi-common-data libavahi-common3 420s libbasicobjects0 libc-ares2 libcollection4 libcrack2 libdhash1 420s libevent-2.1-7 libgnutls-dane0 libini-config5 libipa-hbac0 libldb2 420s libnfsidmap1 libnss-sss libpam-pwquality libpam-sss libpath-utils1 420s libpwquality-common libpwquality1 libref-array1 libsmbclient libsofthsm2 420s libsss-certmap0 libsss-idmap0 libsss-nss-idmap0 libtalloc2 libtdb1 420s libtevent0 libunbound8 libwbclient0 python3-sss samba-libs softhsm2 420s softhsm2-common sssd sssd-ad sssd-ad-common sssd-common sssd-ipa sssd-krb5 420s sssd-krb5-common sssd-ldap sssd-proxy 420s 0 upgraded, 45 newly installed, 0 to remove and 0 not upgraded. 420s 1 not fully installed or removed. 420s Need to get 10.4 MB of archives. 420s After this operation, 40.5 MB of additional disk space will be used. 420s Get:1 http://ftpmaster.internal/ubuntu noble/main s390x libevent-2.1-7 s390x 2.1.12-stable-9 [144 kB] 421s Get:2 http://ftpmaster.internal/ubuntu noble/main s390x libunbound8 s390x 1.19.1-1ubuntu1 [453 kB] 421s Get:3 http://ftpmaster.internal/ubuntu noble/main s390x libgnutls-dane0 s390x 3.8.3-1ubuntu1 [23.6 kB] 421s Get:4 http://ftpmaster.internal/ubuntu noble/universe s390x gnutls-bin s390x 3.8.3-1ubuntu1 [284 kB] 421s Get:5 http://ftpmaster.internal/ubuntu noble/universe s390x softhsm2-common s390x 2.6.1-2.2 [5808 B] 421s Get:6 http://ftpmaster.internal/ubuntu noble/universe s390x libsofthsm2 s390x 2.6.1-2.2 [265 kB] 421s Get:7 http://ftpmaster.internal/ubuntu noble/universe s390x softhsm2 s390x 2.6.1-2.2 [174 kB] 421s Get:8 http://ftpmaster.internal/ubuntu noble/main s390x libtalloc2 s390x 2.4.2-1 [28.3 kB] 421s Get:9 http://ftpmaster.internal/ubuntu noble/main s390x libtdb1 s390x 1.4.10-1 [49.9 kB] 421s Get:10 http://ftpmaster.internal/ubuntu noble/main s390x libtevent0 s390x 0.16.1-1 [43.1 kB] 421s Get:11 http://ftpmaster.internal/ubuntu noble/main s390x libldb2 s390x 2:2.8.0+samba4.19.5+dfsg-1ubuntu1 [191 kB] 421s Get:12 http://ftpmaster.internal/ubuntu noble/main s390x python3-sss s390x 2.9.4-1ubuntu1 [46.6 kB] 421s Get:13 http://ftpmaster.internal/ubuntu noble/main s390x libsss-idmap0 s390x 2.9.4-1ubuntu1 [22.1 kB] 421s Get:14 http://ftpmaster.internal/ubuntu noble/main s390x libnss-sss s390x 2.9.4-1ubuntu1 [32.6 kB] 421s Get:15 http://ftpmaster.internal/ubuntu noble/main s390x libcrack2 s390x 2.9.6-5.1 [29.6 kB] 421s Get:16 http://ftpmaster.internal/ubuntu noble/main s390x libpwquality-common all 1.4.5-3 [7658 B] 421s Get:17 http://ftpmaster.internal/ubuntu noble/main s390x libpwquality1 s390x 1.4.5-3 [14.7 kB] 421s Get:18 http://ftpmaster.internal/ubuntu noble/main s390x libpam-pwquality s390x 1.4.5-3 [11.6 kB] 421s Get:19 http://ftpmaster.internal/ubuntu noble/main s390x libpam-sss s390x 2.9.4-1ubuntu1 [51.9 kB] 421s Get:20 http://ftpmaster.internal/ubuntu noble/main s390x libc-ares2 s390x 1.27.0-1 [79.2 kB] 421s Get:21 http://ftpmaster.internal/ubuntu noble/main s390x libdhash1 s390x 0.6.2-2 [8648 B] 421s Get:22 http://ftpmaster.internal/ubuntu noble/main s390x libbasicobjects0 s390x 0.6.2-2 [5476 B] 421s Get:23 http://ftpmaster.internal/ubuntu noble/main s390x libcollection4 s390x 0.6.2-2 [23.2 kB] 421s Get:24 http://ftpmaster.internal/ubuntu noble/main s390x libpath-utils1 s390x 0.6.2-2 [8994 B] 421s Get:25 http://ftpmaster.internal/ubuntu noble/main s390x libref-array1 s390x 0.6.2-2 [6880 B] 421s Get:26 http://ftpmaster.internal/ubuntu noble/main s390x libini-config5 s390x 0.6.2-2 [45.3 kB] 421s Get:27 http://ftpmaster.internal/ubuntu noble/main s390x libnfsidmap1 s390x 1:2.6.3-3ubuntu1 [49.0 kB] 421s Get:28 http://ftpmaster.internal/ubuntu noble/main s390x libsss-certmap0 s390x 2.9.4-1ubuntu1 [46.7 kB] 421s Get:29 http://ftpmaster.internal/ubuntu noble/main s390x libsss-nss-idmap0 s390x 2.9.4-1ubuntu1 [31.4 kB] 421s Get:30 http://ftpmaster.internal/ubuntu noble/main s390x sssd-common s390x 2.9.4-1ubuntu1 [1125 kB] 421s Get:31 http://ftpmaster.internal/ubuntu noble/main s390x libavahi-common-data s390x 0.8-13ubuntu2 [29.5 kB] 421s Get:32 http://ftpmaster.internal/ubuntu noble/main s390x libavahi-common3 s390x 0.8-13ubuntu2 [23.8 kB] 421s Get:33 http://ftpmaster.internal/ubuntu noble/main s390x libavahi-client3 s390x 0.8-13ubuntu2 [26.7 kB] 421s Get:34 http://ftpmaster.internal/ubuntu noble/main s390x libwbclient0 s390x 2:4.19.5+dfsg-1ubuntu1 [70.3 kB] 422s Get:35 http://ftpmaster.internal/ubuntu noble/main s390x samba-libs s390x 2:4.19.5+dfsg-1ubuntu1 [6231 kB] 422s Get:36 http://ftpmaster.internal/ubuntu noble/main s390x sssd-ad-common s390x 2.9.4-1ubuntu1 [74.8 kB] 422s Get:37 http://ftpmaster.internal/ubuntu noble/main s390x sssd-krb5-common s390x 2.9.4-1ubuntu1 [90.3 kB] 422s Get:38 http://ftpmaster.internal/ubuntu noble/main s390x libsmbclient s390x 2:4.19.5+dfsg-1ubuntu1 [65.1 kB] 422s Get:39 http://ftpmaster.internal/ubuntu noble/main s390x sssd-ad s390x 2.9.4-1ubuntu1 [133 kB] 422s Get:40 http://ftpmaster.internal/ubuntu noble/main s390x libipa-hbac0 s390x 2.9.4-1ubuntu1 [16.8 kB] 422s Get:41 http://ftpmaster.internal/ubuntu noble/main s390x sssd-ipa s390x 2.9.4-1ubuntu1 [215 kB] 422s Get:42 http://ftpmaster.internal/ubuntu noble/main s390x sssd-krb5 s390x 2.9.4-1ubuntu1 [14.4 kB] 422s Get:43 http://ftpmaster.internal/ubuntu noble/main s390x sssd-ldap s390x 2.9.4-1ubuntu1 [31.0 kB] 422s Get:44 http://ftpmaster.internal/ubuntu noble/main s390x sssd-proxy s390x 2.9.4-1ubuntu1 [43.9 kB] 422s Get:45 http://ftpmaster.internal/ubuntu noble/main s390x sssd s390x 2.9.4-1ubuntu1 [4120 B] 423s Fetched 10.4 MB in 2s (4887 kB/s) 423s Selecting previously unselected package libevent-2.1-7:s390x. 423s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 51752 files and directories currently installed.) 423s Preparing to unpack .../00-libevent-2.1-7_2.1.12-stable-9_s390x.deb ... 423s Unpacking libevent-2.1-7:s390x (2.1.12-stable-9) ... 423s Selecting previously unselected package libunbound8:s390x. 423s Preparing to unpack .../01-libunbound8_1.19.1-1ubuntu1_s390x.deb ... 423s Unpacking libunbound8:s390x (1.19.1-1ubuntu1) ... 423s Selecting previously unselected package libgnutls-dane0:s390x. 423s Preparing to unpack .../02-libgnutls-dane0_3.8.3-1ubuntu1_s390x.deb ... 423s Unpacking libgnutls-dane0:s390x (3.8.3-1ubuntu1) ... 423s Selecting previously unselected package gnutls-bin. 423s Preparing to unpack .../03-gnutls-bin_3.8.3-1ubuntu1_s390x.deb ... 423s Unpacking gnutls-bin (3.8.3-1ubuntu1) ... 423s Selecting previously unselected package softhsm2-common. 423s Preparing to unpack .../04-softhsm2-common_2.6.1-2.2_s390x.deb ... 423s Unpacking softhsm2-common (2.6.1-2.2) ... 423s Selecting previously unselected package libsofthsm2. 423s Preparing to unpack .../05-libsofthsm2_2.6.1-2.2_s390x.deb ... 423s Unpacking libsofthsm2 (2.6.1-2.2) ... 423s Selecting previously unselected package softhsm2. 423s Preparing to unpack .../06-softhsm2_2.6.1-2.2_s390x.deb ... 423s Unpacking softhsm2 (2.6.1-2.2) ... 423s Selecting previously unselected package libtalloc2:s390x. 423s Preparing to unpack .../07-libtalloc2_2.4.2-1_s390x.deb ... 423s Unpacking libtalloc2:s390x (2.4.2-1) ... 423s Selecting previously unselected package libtdb1:s390x. 423s Preparing to unpack .../08-libtdb1_1.4.10-1_s390x.deb ... 423s Unpacking libtdb1:s390x (1.4.10-1) ... 423s Selecting previously unselected package libtevent0:s390x. 423s Preparing to unpack .../09-libtevent0_0.16.1-1_s390x.deb ... 423s Unpacking libtevent0:s390x (0.16.1-1) ... 423s Selecting previously unselected package libldb2:s390x. 423s Preparing to unpack .../10-libldb2_2%3a2.8.0+samba4.19.5+dfsg-1ubuntu1_s390x.deb ... 423s Unpacking libldb2:s390x (2:2.8.0+samba4.19.5+dfsg-1ubuntu1) ... 423s Selecting previously unselected package python3-sss. 423s Preparing to unpack .../11-python3-sss_2.9.4-1ubuntu1_s390x.deb ... 423s Unpacking python3-sss (2.9.4-1ubuntu1) ... 423s Selecting previously unselected package libsss-idmap0. 423s Preparing to unpack .../12-libsss-idmap0_2.9.4-1ubuntu1_s390x.deb ... 423s Unpacking libsss-idmap0 (2.9.4-1ubuntu1) ... 423s Selecting previously unselected package libnss-sss:s390x. 423s Preparing to unpack .../13-libnss-sss_2.9.4-1ubuntu1_s390x.deb ... 423s Unpacking libnss-sss:s390x (2.9.4-1ubuntu1) ... 423s Selecting previously unselected package libcrack2:s390x. 423s Preparing to unpack .../14-libcrack2_2.9.6-5.1_s390x.deb ... 423s Unpacking libcrack2:s390x (2.9.6-5.1) ... 423s Selecting previously unselected package libpwquality-common. 423s Preparing to unpack .../15-libpwquality-common_1.4.5-3_all.deb ... 423s Unpacking libpwquality-common (1.4.5-3) ... 423s Selecting previously unselected package libpwquality1:s390x. 423s Preparing to unpack .../16-libpwquality1_1.4.5-3_s390x.deb ... 423s Unpacking libpwquality1:s390x (1.4.5-3) ... 423s Selecting previously unselected package libpam-pwquality:s390x. 423s Preparing to unpack .../17-libpam-pwquality_1.4.5-3_s390x.deb ... 423s Unpacking libpam-pwquality:s390x (1.4.5-3) ... 423s Selecting previously unselected package libpam-sss:s390x. 423s Preparing to unpack .../18-libpam-sss_2.9.4-1ubuntu1_s390x.deb ... 423s Unpacking libpam-sss:s390x (2.9.4-1ubuntu1) ... 423s Selecting previously unselected package libc-ares2:s390x. 423s Preparing to unpack .../19-libc-ares2_1.27.0-1_s390x.deb ... 423s Unpacking libc-ares2:s390x (1.27.0-1) ... 423s Selecting previously unselected package libdhash1:s390x. 423s Preparing to unpack .../20-libdhash1_0.6.2-2_s390x.deb ... 423s Unpacking libdhash1:s390x (0.6.2-2) ... 423s Selecting previously unselected package libbasicobjects0:s390x. 423s Preparing to unpack .../21-libbasicobjects0_0.6.2-2_s390x.deb ... 423s Unpacking libbasicobjects0:s390x (0.6.2-2) ... 423s Selecting previously unselected package libcollection4:s390x. 423s Preparing to unpack .../22-libcollection4_0.6.2-2_s390x.deb ... 423s Unpacking libcollection4:s390x (0.6.2-2) ... 423s Selecting previously unselected package libpath-utils1:s390x. 423s Preparing to unpack .../23-libpath-utils1_0.6.2-2_s390x.deb ... 423s Unpacking libpath-utils1:s390x (0.6.2-2) ... 423s Selecting previously unselected package libref-array1:s390x. 423s Preparing to unpack .../24-libref-array1_0.6.2-2_s390x.deb ... 423s Unpacking libref-array1:s390x (0.6.2-2) ... 423s Selecting previously unselected package libini-config5:s390x. 423s Preparing to unpack .../25-libini-config5_0.6.2-2_s390x.deb ... 423s Unpacking libini-config5:s390x (0.6.2-2) ... 423s Selecting previously unselected package libnfsidmap1:s390x. 423s Preparing to unpack .../26-libnfsidmap1_1%3a2.6.3-3ubuntu1_s390x.deb ... 423s Unpacking libnfsidmap1:s390x (1:2.6.3-3ubuntu1) ... 423s Selecting previously unselected package libsss-certmap0. 423s Preparing to unpack .../27-libsss-certmap0_2.9.4-1ubuntu1_s390x.deb ... 423s Unpacking libsss-certmap0 (2.9.4-1ubuntu1) ... 423s Selecting previously unselected package libsss-nss-idmap0. 423s Preparing to unpack .../28-libsss-nss-idmap0_2.9.4-1ubuntu1_s390x.deb ... 423s Unpacking libsss-nss-idmap0 (2.9.4-1ubuntu1) ... 423s Selecting previously unselected package sssd-common. 423s Preparing to unpack .../29-sssd-common_2.9.4-1ubuntu1_s390x.deb ... 423s Unpacking sssd-common (2.9.4-1ubuntu1) ... 423s Selecting previously unselected package libavahi-common-data:s390x. 423s Preparing to unpack .../30-libavahi-common-data_0.8-13ubuntu2_s390x.deb ... 423s Unpacking libavahi-common-data:s390x (0.8-13ubuntu2) ... 423s Selecting previously unselected package libavahi-common3:s390x. 423s Preparing to unpack .../31-libavahi-common3_0.8-13ubuntu2_s390x.deb ... 423s Unpacking libavahi-common3:s390x (0.8-13ubuntu2) ... 423s Selecting previously unselected package libavahi-client3:s390x. 423s Preparing to unpack .../32-libavahi-client3_0.8-13ubuntu2_s390x.deb ... 423s Unpacking libavahi-client3:s390x (0.8-13ubuntu2) ... 423s Selecting previously unselected package libwbclient0:s390x. 423s Preparing to unpack .../33-libwbclient0_2%3a4.19.5+dfsg-1ubuntu1_s390x.deb ... 423s Unpacking libwbclient0:s390x (2:4.19.5+dfsg-1ubuntu1) ... 423s Selecting previously unselected package samba-libs:s390x. 423s Preparing to unpack .../34-samba-libs_2%3a4.19.5+dfsg-1ubuntu1_s390x.deb ... 423s Unpacking samba-libs:s390x (2:4.19.5+dfsg-1ubuntu1) ... 424s Selecting previously unselected package sssd-ad-common. 424s Preparing to unpack .../35-sssd-ad-common_2.9.4-1ubuntu1_s390x.deb ... 424s Unpacking sssd-ad-common (2.9.4-1ubuntu1) ... 424s Selecting previously unselected package sssd-krb5-common. 424s Preparing to unpack .../36-sssd-krb5-common_2.9.4-1ubuntu1_s390x.deb ... 424s Unpacking sssd-krb5-common (2.9.4-1ubuntu1) ... 424s Selecting previously unselected package libsmbclient:s390x. 424s Preparing to unpack .../37-libsmbclient_2%3a4.19.5+dfsg-1ubuntu1_s390x.deb ... 424s Unpacking libsmbclient:s390x (2:4.19.5+dfsg-1ubuntu1) ... 424s Selecting previously unselected package sssd-ad. 424s Preparing to unpack .../38-sssd-ad_2.9.4-1ubuntu1_s390x.deb ... 424s Unpacking sssd-ad (2.9.4-1ubuntu1) ... 424s Selecting previously unselected package libipa-hbac0. 424s Preparing to unpack .../39-libipa-hbac0_2.9.4-1ubuntu1_s390x.deb ... 424s Unpacking libipa-hbac0 (2.9.4-1ubuntu1) ... 424s Selecting previously unselected package sssd-ipa. 424s Preparing to unpack .../40-sssd-ipa_2.9.4-1ubuntu1_s390x.deb ... 424s Unpacking sssd-ipa (2.9.4-1ubuntu1) ... 424s Selecting previously unselected package sssd-krb5. 424s Preparing to unpack .../41-sssd-krb5_2.9.4-1ubuntu1_s390x.deb ... 424s Unpacking sssd-krb5 (2.9.4-1ubuntu1) ... 424s Selecting previously unselected package sssd-ldap. 424s Preparing to unpack .../42-sssd-ldap_2.9.4-1ubuntu1_s390x.deb ... 424s Unpacking sssd-ldap (2.9.4-1ubuntu1) ... 424s Selecting previously unselected package sssd-proxy. 424s Preparing to unpack .../43-sssd-proxy_2.9.4-1ubuntu1_s390x.deb ... 424s Unpacking sssd-proxy (2.9.4-1ubuntu1) ... 424s Selecting previously unselected package sssd. 424s Preparing to unpack .../44-sssd_2.9.4-1ubuntu1_s390x.deb ... 424s Unpacking sssd (2.9.4-1ubuntu1) ... 424s Setting up libpwquality-common (1.4.5-3) ... 424s Setting up libpath-utils1:s390x (0.6.2-2) ... 424s Setting up softhsm2-common (2.6.1-2.2) ... 424s 424s Creating config file /etc/softhsm/softhsm2.conf with new version 424s Setting up libnfsidmap1:s390x (1:2.6.3-3ubuntu1) ... 424s Setting up libsss-idmap0 (2.9.4-1ubuntu1) ... 424s Setting up libbasicobjects0:s390x (0.6.2-2) ... 424s Setting up libtdb1:s390x (1.4.10-1) ... 424s Setting up libc-ares2:s390x (1.27.0-1) ... 424s Setting up libwbclient0:s390x (2:4.19.5+dfsg-1ubuntu1) ... 424s Setting up libtalloc2:s390x (2.4.2-1) ... 424s Setting up libdhash1:s390x (0.6.2-2) ... 424s Setting up libtevent0:s390x (0.16.1-1) ... 424s Setting up libavahi-common-data:s390x (0.8-13ubuntu2) ... 424s Setting up libevent-2.1-7:s390x (2.1.12-stable-9) ... 424s Setting up libcrack2:s390x (2.9.6-5.1) ... 424s Setting up libcollection4:s390x (0.6.2-2) ... 424s Setting up libipa-hbac0 (2.9.4-1ubuntu1) ... 424s Setting up libref-array1:s390x (0.6.2-2) ... 424s Setting up libldb2:s390x (2:2.8.0+samba4.19.5+dfsg-1ubuntu1) ... 424s Setting up libsss-nss-idmap0 (2.9.4-1ubuntu1) ... 424s Setting up libnss-sss:s390x (2.9.4-1ubuntu1) ... 424s Setting up libsofthsm2 (2.6.1-2.2) ... 424s Setting up softhsm2 (2.6.1-2.2) ... 424s Setting up libini-config5:s390x (0.6.2-2) ... 424s Setting up libavahi-common3:s390x (0.8-13ubuntu2) ... 424s Setting up python3-sss (2.9.4-1ubuntu1) ... 424s Setting up libsss-certmap0 (2.9.4-1ubuntu1) ... 424s Setting up libunbound8:s390x (1.19.1-1ubuntu1) ... 424s Setting up libpwquality1:s390x (1.4.5-3) ... 424s Setting up libavahi-client3:s390x (0.8-13ubuntu2) ... 424s Setting up libgnutls-dane0:s390x (3.8.3-1ubuntu1) ... 424s Setting up libpam-pwquality:s390x (1.4.5-3) ... 424s Setting up samba-libs:s390x (2:4.19.5+dfsg-1ubuntu1) ... 424s Setting up libsmbclient:s390x (2:4.19.5+dfsg-1ubuntu1) ... 424s Setting up libpam-sss:s390x (2.9.4-1ubuntu1) ... 424s Setting up gnutls-bin (3.8.3-1ubuntu1) ... 424s Setting up sssd-common (2.9.4-1ubuntu1) ... 424s Creating SSSD system user & group... 424s warn: The home directory `/var/lib/sss' already exists. Not touching this directory. 425s warn: Warning: The home directory `/var/lib/sss' does not belong to the user you are currently creating. 425s Warning: found usr.sbin.sssd in /etc/apparmor.d/force-complain, forcing complain mode 425s Warning from /etc/apparmor.d/usr.sbin.sssd (/etc/apparmor.d/usr.sbin.sssd line 63): Caching disabled for: 'usr.sbin.sssd' due to force complain 425s Created symlink /etc/systemd/system/sssd.service.wants/sssd-autofs.socket → /usr/lib/systemd/system/sssd-autofs.socket. 425s Created symlink /etc/systemd/system/sssd.service.wants/sssd-nss.socket → /usr/lib/systemd/system/sssd-nss.socket. 425s Created symlink /etc/systemd/system/sssd.service.wants/sssd-pam-priv.socket → /usr/lib/systemd/system/sssd-pam-priv.socket. 426s Created symlink /etc/systemd/system/sssd.service.wants/sssd-pam.socket → /usr/lib/systemd/system/sssd-pam.socket. 426s Created symlink /etc/systemd/system/sssd.service.wants/sssd-ssh.socket → /usr/lib/systemd/system/sssd-ssh.socket. 426s Created symlink /etc/systemd/system/sssd.service.wants/sssd-sudo.socket → /usr/lib/systemd/system/sssd-sudo.socket. 426s Created symlink /etc/systemd/system/multi-user.target.wants/sssd.service → /usr/lib/systemd/system/sssd.service. 426s sssd-autofs.service is a disabled or a static unit, not starting it. 426s sssd-nss.service is a disabled or a static unit, not starting it. 427s sssd-pam.service is a disabled or a static unit, not starting it. 427s sssd-ssh.service is a disabled or a static unit, not starting it. 427s sssd-sudo.service is a disabled or a static unit, not starting it. 427s Could not execute systemctl: at /usr/bin/deb-systemd-invoke line 148. 427s Setting up sssd-proxy (2.9.4-1ubuntu1) ... 427s Setting up sssd-ad-common (2.9.4-1ubuntu1) ... 427s Created symlink /etc/systemd/system/sssd.service.wants/sssd-pac.socket → /usr/lib/systemd/system/sssd-pac.socket. 427s sssd-pac.service is a disabled or a static unit, not starting it. 427s Could not execute systemctl: at /usr/bin/deb-systemd-invoke line 148. 427s Setting up sssd-krb5-common (2.9.4-1ubuntu1) ... 427s Setting up sssd-krb5 (2.9.4-1ubuntu1) ... 427s Setting up sssd-ldap (2.9.4-1ubuntu1) ... 427s Setting up sssd-ad (2.9.4-1ubuntu1) ... 427s Setting up sssd-ipa (2.9.4-1ubuntu1) ... 427s Setting up sssd (2.9.4-1ubuntu1) ... 427s Setting up autopkgtest-satdep (0) ... 427s Processing triggers for man-db (2.12.0-3) ... 428s Processing triggers for libc-bin (2.39-0ubuntu2) ... 431s (Reading database ... 52340 files and directories currently installed.) 431s Removing autopkgtest-satdep (0) ... 437s autopkgtest [01:21:31]: test sssd-softhism2-certificates-tests.sh: [----------------------- 438s + '[' -z ubuntu ']' 438s + required_tools=(p11tool openssl softhsm2-util) 438s + for cmd in "${required_tools[@]}" 438s + command -v p11tool 438s + for cmd in "${required_tools[@]}" 438s + command -v openssl 438s + for cmd in "${required_tools[@]}" 438s + command -v softhsm2-util 438s + PIN=053350 438s +++ find /usr/lib/softhsm/libsofthsm2.so 438s +++ head -n 1 438s ++ realpath /usr/lib/softhsm/libsofthsm2.so 438s + SOFTHSM2_MODULE=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so 438s + SSSD_P11_CHILD=/usr/libexec/sssd/p11_child 438s + TOKEN_ID=00112233445566778899FFAABBCCDDEEFF012345 438s + '[' '!' -v NO_SSSD_TESTS ']' 438s + '[' '!' -x /usr/libexec/sssd/p11_child ']' 438s + ca_db_arg=ca_db 438s ++ /usr/libexec/sssd/p11_child --help 438s + p11_child_help='Usage: p11_child [OPTION...] 438s -d, --debug-level=INT Debug level 438s --debug-timestamps=INT Add debug timestamps 438s --debug-microseconds=INT Show timestamps with microseconds 438s --dumpable=INT Allow core dumps 438s --debug-fd=INT An open file descriptor for the debug 438s logs 438s --logger=stderr|files|journald Set logger 438s --auth Run in auth mode 438s --pre Run in pre-auth mode 438s --wait_for_card Wait until card is available 438s --verification Run in verification mode 438s --pin Expect PIN on stdin 438s --keypad Expect PIN on keypad 438s --verify=STRING Tune validation 438s --ca_db=STRING CA DB to use 438s --module_name=STRING Module name for authentication 438s --token_name=STRING Token name for authentication 438s --key_id=STRING Key ID for authentication 438s --label=STRING Label for authentication 438s --certificate=STRING certificate to verify, base64 encoded 438s --uri=STRING PKCS#11 URI to restrict selection 438s --chain-id=LONG Tevent chain ID used for logging 438s purposes 438s 438s Help options: 438s -?, --help Show this help message 438s --usage Display brief usage message' 438s + echo 'Usage: p11_child [OPTION...] 438s -d, --debug-level=INT Debug level 438s --debug-timestamps=INT Add debug timestamps 438s --debug-microseconds=INT Show timestamps with microseconds 438s --dumpable=INT Allow core dumps 438s --debug-fd=INT An open file descriptor for the debug 438s logs 438s --logger=stderr|files|journald Set logger 438s --auth Run in auth mode 438s --pre Run in pre-auth mode 438s --wait_for_card Wait until card is available 438s --verification Run in verification mode 438s --pin Expect PIN on stdin 438s --keypad Expect PIN on keypad 438s --verify=STRING Tune validation 438s --ca_db=STRING CA DB to use 438s --module_name=STRING Module name for authentication 438s --token_name=STRING Token name for authentication 438s --key_id=STRING Key ID for authentication 438s --label=STRING Label for authentication 438s --certificate=STRING certificate to verify, base64 encoded 438s --uri=STRING PKCS#11 URI to restrict selection 438s --chain-id=LONG Tevent chain ID used for logging 438s purposes 438s 438s Help options: 438s -?, --help Show this help message 438s --usage Display brief usage message' 438s + grep nssdb -qs 438s + echo 'Usage: p11_child [OPTION...] 438s -d, --debug-level=INT Debug level 438s + grep -qs -- --ca_db 438s --debug-timestamps=INT Add debug timestamps 438s --debug-microseconds=INT Show timestamps with microseconds 438s --dumpable=INT Allow core dumps 438s --debug-fd=INT An open file descriptor for the debug 438s logs 438s --logger=stderr|files|journald Set logger 438s --auth Run in auth mode 438s --pre Run in pre-auth mode 438s --wait_for_card Wait until card is available 438s --verification Run in verification mode 438s --pin Expect PIN on stdin 438s --keypad Expect PIN on keypad 438s --verify=STRING Tune validation 438s --ca_db=STRING CA DB to use 438s --module_name=STRING Module name for authentication 438s --token_name=STRING Token name for authentication 438s --key_id=STRING Key ID for authentication 438s --label=STRING Label for authentication 438s --certificate=STRING certificate to verify, base64 encoded 438s --uri=STRING PKCS#11 URI to restrict selection 438s --chain-id=LONG Tevent chain ID used for logging 438s purposes 438s 438s Help options: 438s -?, --help Show this help message 438s --usage Display brief usage message' 438s + '[' '!' -e /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so ']' 438s ++ mktemp -d -t sssd-softhsm2-XXXXXX 438s + tmpdir=/tmp/sssd-softhsm2-OWCJiN 438s + keys_size=1024 438s + [[ ! -v KEEP_TEMPORARY_FILES ]] 438s + trap 'rm -rf "$tmpdir"' EXIT 438s + trap 'set +x; echo -e "\nUnexpected failure!!!"' ERR 438s + echo -n 01 438s + touch /tmp/sssd-softhsm2-OWCJiN/index.txt 438s + mkdir -p /tmp/sssd-softhsm2-OWCJiN/new_certs 438s + cat 438s + root_ca_key_pass=pass:random-root-CA-password-20817 438s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-OWCJiN/test-root-CA-key.pem -passout pass:random-root-CA-password-20817 1024 438s + openssl req -passin pass:random-root-CA-password-20817 -batch -config /tmp/sssd-softhsm2-OWCJiN/test-root-CA.config -x509 -new -nodes -key /tmp/sssd-softhsm2-OWCJiN/test-root-CA-key.pem -sha256 -days 1024 -set_serial 0 -extensions v3_ca -out /tmp/sssd-softhsm2-OWCJiN/test-root-CA.pem 438s + openssl x509 -noout -in /tmp/sssd-softhsm2-OWCJiN/test-root-CA.pem 438s + cat 438s + intermediate_ca_key_pass=pass:random-intermediate-CA-password-2510 438s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA-key.pem -passout pass:random-intermediate-CA-password-2510 1024 438s + openssl req -batch -new -nodes -passin pass:random-intermediate-CA-password-2510 -config /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA.config -key /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA-key.pem -passout pass:random-root-CA-password-20817 -sha256 -extensions v3_ca -out /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA-certificate-request.pem 438s + openssl req -text -noout -in /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA-certificate-request.pem 438s Certificate Request: 438s Data: 438s Version: 1 (0x0) 438s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 438s Subject Public Key Info: 438s Public Key Algorithm: rsaEncryption 438s Public-Key: (1024 bit) 438s Modulus: 438s 00:d1:01:0d:38:56:b1:e2:cc:28:a6:32:ab:98:9d: 438s 7a:4e:06:76:66:27:95:fd:b0:8e:a3:73:6c:1e:0c: 438s 4b:b7:35:8a:4c:b2:31:f8:6f:6a:33:d0:4f:84:4a: 438s f6:98:5b:3e:cc:5d:d5:db:66:b9:79:b3:eb:9f:60: 438s 63:be:cf:79:11:d6:6a:3a:ab:d8:04:4c:8f:75:71: 438s b6:29:f4:a9:b2:6a:b8:9e:29:84:c8:b2:2e:46:c5: 438s 8a:f7:76:bf:d4:bf:f3:ce:19:5c:55:fc:8a:1c:95: 438s cc:f5:86:be:4b:89:56:58:83:1b:b7:32:8b:42:4c: 438s 1b:9f:f1:bc:9d:3c:8c:55:ef 438s Exponent: 65537 (0x10001) 438s Attributes: 438s (none) 438s Requested Extensions: 438s Signature Algorithm: sha256WithRSAEncryption 438s Signature Value: 438s 9d:18:9c:ae:27:08:a9:91:28:76:da:12:1e:a2:3c:9e:38:f1: 438s 89:cf:00:01:60:6b:98:2b:2c:0d:e1:a6:2a:88:23:3b:b4:68: 438s 66:5d:5d:17:58:fc:3e:fd:61:d2:8b:a5:88:ee:ac:82:8b:60: 438s 3e:07:2b:4f:4d:42:ca:8d:d4:05:df:af:0d:0c:dd:60:c8:79: 438s 64:af:bc:26:5e:f9:f3:6c:2e:5b:46:12:9a:4d:f0:ee:b0:d1: 438s bf:d6:e4:d0:c3:61:16:36:c9:57:9d:44:d0:96:1b:1c:92:ec: 438s e3:c3:60:db:94:8d:19:19:29:a5:92:3f:5b:fb:bb:33:c2:aa: 438s 9f:21 438s + openssl ca -batch -notext -config /tmp/sssd-softhsm2-OWCJiN/test-root-CA.config -passin pass:random-root-CA-password-20817 -keyfile /tmp/sssd-softhsm2-OWCJiN/test-root-CA-key.pem -in /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA-certificate-request.pem -days 365 -extensions v3_intermediate_ca -out /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA.pem 438s Using configuration from /tmp/sssd-softhsm2-OWCJiN/test-root-CA.config 438s Check that the request matches the signature 438s Signature ok 438s Certificate Details: 438s Serial Number: 1 (0x1) 438s Validity 438s Not Before: Mar 5 01:21:30 2024 GMT 438s Not After : Mar 5 01:21:30 2025 GMT 438s Subject: 438s organizationName = Test Organization 438s organizationalUnitName = Test Organization Unit 438s commonName = Test Organization Intermediate CA 438s X509v3 extensions: 438s X509v3 Subject Key Identifier: 438s EA:37:3A:E0:F0:76:0D:2F:32:E6:0A:79:95:CF:5E:52:78:41:2C:54 438s X509v3 Authority Key Identifier: 438s keyid:6F:D4:40:C1:66:BB:57:9F:11:B3:C3:A6:01:B4:91:B3:3B:A9:D2:BA 438s DirName:/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root CA 438s serial:00 438s X509v3 Basic Constraints: 438s CA:TRUE 438s X509v3 Key Usage: critical 438s Digital Signature, Certificate Sign, CRL Sign 438s Certificate is to be certified until Mar 5 01:21:30 2025 GMT (365 days) 438s 438s Write out database with 1 new entries 438s Database updated 438s + openssl x509 -noout -in /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA.pem 438s + openssl verify -CAfile /tmp/sssd-softhsm2-OWCJiN/test-root-CA.pem /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA.pem 438s /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA.pem: OK 438s + cat 438s + sub_intermediate_ca_key_pass=pass:random-sub-intermediate-CA-password-30830 438s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-key.pem -passout pass:random-sub-intermediate-CA-password-30830 1024 438s + openssl req -batch -new -nodes -passin pass:random-sub-intermediate-CA-password-30830 -config /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA.config -key /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-key.pem -passout pass:random-intermediate-CA-password-2510 -sha256 -extensions v3_ca -out /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-certificate-request.pem 438s + openssl req -text -noout -in /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-certificate-request.pem 438s Certificate Request: 438s Data: 438s Version: 1 (0x0) 438s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 438s Subject Public Key Info: 438s Public Key Algorithm: rsaEncryption 438s Public-Key: (1024 bit) 438s Modulus: 438s 00:9c:ff:0f:15:31:c2:1f:0f:0f:66:81:9a:8b:c6: 438s 57:4d:a2:94:e1:a8:04:d7:f5:86:6b:8b:0b:9b:21: 438s d7:e9:60:60:d2:25:83:4c:2e:9f:bc:81:cb:d8:5b: 438s 1f:bd:0f:be:41:db:1e:f8:e2:63:d9:14:38:19:ae: 438s 51:9d:a0:48:52:62:dc:86:37:c4:8f:41:48:4a:40: 438s 29:cf:d4:2a:b0:fd:a5:13:47:61:8d:2b:a7:b5:34: 438s 29:26:d6:af:0d:05:93:0f:9e:3b:ea:98:ad:f8:cb: 438s f2:18:e3:d9:77:90:cb:f6:0d:1d:b4:6b:e9:7e:f0: 438s 38:0c:97:a3:50:56:09:ed:b9 438s Exponent: 65537 (0x10001) 438s Attributes: 438s (none) 438s Requested Extensions: 438s Signature Algorithm: sha256WithRSAEncryption 438s Signature Value: 438s 69:11:3d:47:a2:aa:05:85:82:72:42:42:c6:b2:ab:98:6a:52: 438s aa:4c:96:f7:90:ad:fb:91:f4:60:21:45:74:3c:f8:db:7d:d5: 438s 50:26:6e:c4:75:d2:e3:05:8b:b1:8e:fa:63:a4:d4:68:43:47: 438s 1e:cb:f0:02:2e:ef:a2:1b:3e:fd:b6:1d:26:ab:80:46:76:80: 438s 3c:6f:e9:9e:ef:89:e5:8a:47:b5:f1:d7:8e:ab:df:e8:8d:93: 438s 8b:64:d2:f7:63:f6:55:5d:5e:71:c4:19:82:bf:51:c2:6e:65: 438s 85:77:fc:22:95:8a:d8:30:ce:cd:dc:d3:fd:d1:de:41:c8:92: 438s 36:af 438s + openssl ca -batch -notext -config /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA.config -passin pass:random-intermediate-CA-password-2510 -keyfile /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA-key.pem -in /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-certificate-request.pem -days 365 -extensions v3_intermediate_ca -out /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA.pem 438s Using configuration from /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA.config 438s Check that the request matches the signature 438s Signature ok 438s Certificate Details: 438s Serial Number: 2 (0x2) 438s Validity 438s Not Before: Mar 5 01:21:30 2024 GMT 438s Not After : Mar 5 01:21:30 2025 GMT 438s Subject: 438s organizationName = Test Organization 438s organizationalUnitName = Test Organization Unit 438s commonName = Test Organization Sub Intermediate CA 438s X509v3 extensions: 438s X509v3 Subject Key Identifier: 438s 24:65:91:9F:43:6E:22:30:51:E6:67:04:5E:F6:FF:D8:17:A4:0F:B6 438s X509v3 Authority Key Identifier: 438s keyid:EA:37:3A:E0:F0:76:0D:2F:32:E6:0A:79:95:CF:5E:52:78:41:2C:54 438s DirName:/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root CA 438s serial:01 438s X509v3 Basic Constraints: 438s CA:TRUE 438s X509v3 Key Usage: critical 438s Digital Signature, Certificate Sign, CRL Sign 438s Certificate is to be certified until Mar 5 01:21:30 2025 GMT (365 days) 438s 438s Write out database with 1 new entries 438s Database updated 438s + openssl x509 -noout -in /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA.pem 438s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA.pem /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA.pem 438s /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA.pem: OK 438s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-OWCJiN/test-root-CA.pem /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA.pem 438s + local cmd=openssl 438s + shift 438s + openssl verify -CAfile /tmp/sssd-softhsm2-OWCJiN/test-root-CA.pem /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA.pem 438s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 438s error 20 at 0 depth lookup: unable to get local issuer certificate 438s error /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA.pem: verification failed 438s + cat 438s + root_ca_trusted_cert_0001_key_pass=pass:random-root-ca-trusted-cert-0001-4161 438s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-OWCJiN/test-root-CA-trusted-certificate-0001-key.pem -passout pass:random-root-ca-trusted-cert-0001-4161 1024 438s + openssl req -new -nodes -reqexts req_exts -passin pass:random-root-ca-trusted-cert-0001-4161 -key /tmp/sssd-softhsm2-OWCJiN/test-root-CA-trusted-certificate-0001-key.pem -config /tmp/sssd-softhsm2-OWCJiN/test-root-CA-trusted-certificate-0001.config -out /tmp/sssd-softhsm2-OWCJiN/test-root-CA-trusted-certificate-0001-request.pem 438s + openssl req -text -noout -in /tmp/sssd-softhsm2-OWCJiN/test-root-CA-trusted-certificate-0001-request.pem 438s Certificate Request: 438s Data: 438s Version: 1 (0x0) 438s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 438s Subject Public Key Info: 438s Public Key Algorithm: rsaEncryption 438s Public-Key: (1024 bit) 438s Modulus: 438s 00:d2:bb:53:d9:98:09:43:4a:c3:28:c1:a0:fd:61: 438s 74:38:6d:c4:1f:e8:62:a4:8d:e2:0c:65:51:2d:9f: 438s 32:6f:cb:d7:b7:8e:90:90:ef:a5:41:da:72:88:8d: 438s 7b:8f:8a:9b:53:06:83:e9:ad:45:ae:1f:c6:97:85: 438s 65:31:22:33:f9:84:11:32:d9:a1:57:4b:36:f5:0d: 438s 89:d0:71:a3:be:8c:cf:46:c6:ee:c4:ec:69:16:90: 438s d5:4f:d8:b8:b9:ce:64:4c:17:4d:43:52:cc:05:bb: 438s ed:b6:7a:99:3e:00:f2:ff:3b:f5:e5:80:30:c1:e1: 438s 79:b6:a9:6f:85:da:03:b0:b9 438s Exponent: 65537 (0x10001) 438s Attributes: 438s Requested Extensions: 438s X509v3 Basic Constraints: 438s CA:FALSE 438s Netscape Cert Type: 438s SSL Client, S/MIME 438s Netscape Comment: 438s Test Organization Root CA trusted Certificate 438s X509v3 Subject Key Identifier: 438s 32:B2:4D:1A:2B:71:C8:1E:72:A1:7A:C0:47:DA:8C:4F:7E:B6:E3:87 438s X509v3 Key Usage: critical 438s Digital Signature, Non Repudiation, Key Encipherment 438s X509v3 Extended Key Usage: 438s TLS Web Client Authentication, E-mail Protection 438s X509v3 Subject Alternative Name: 438s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 438s Signature Algorithm: sha256WithRSAEncryption 438s Signature Value: 438s 80:4b:64:25:35:3e:30:57:bb:11:1f:9f:8c:e1:0f:9e:71:26: 438s 48:93:d2:48:17:b0:94:ca:a6:98:b4:3c:b9:37:e5:7f:e4:e3: 438s d4:2a:ac:91:83:d8:dc:53:b9:9d:6f:18:76:a4:4d:43:4f:63: 438s b7:45:b4:42:e6:f0:ab:b9:14:e6:ca:7d:28:e6:bd:e1:78:bb: 438s 3f:75:e0:da:aa:31:06:96:0d:cc:30:31:cd:69:5d:72:13:56: 438s 8c:e0:41:2e:2b:0a:75:aa:a2:8a:4c:06:c7:08:7e:77:41:a8: 438s 47:0a:19:7a:d7:b8:ae:76:88:5c:b8:4f:be:3f:07:82:8a:62: 438s dd:6d 438s + openssl ca -batch -notext -config /tmp/sssd-softhsm2-OWCJiN/test-root-CA.config -passin pass:random-root-CA-password-20817 -keyfile /tmp/sssd-softhsm2-OWCJiN/test-root-CA-key.pem -in /tmp/sssd-softhsm2-OWCJiN/test-root-CA-trusted-certificate-0001-request.pem -days 365 -extensions usr_cert -out /tmp/sssd-softhsm2-OWCJiN/test-root-CA-trusted-certificate-0001.pem 438s Using configuration from /tmp/sssd-softhsm2-OWCJiN/test-root-CA.config 438s Check that the request matches the signature 438s Signature ok 438s Certificate Details: 438s Serial Number: 3 (0x3) 438s Validity 438s Not Before: Mar 5 01:21:30 2024 GMT 438s Not After : Mar 5 01:21:30 2025 GMT 438s Subject: 438s organizationName = Test Organization 438s organizationalUnitName = Test Organization Unit 438s commonName = Test Organization Root Trusted Certificate 0001 438s X509v3 extensions: 438s X509v3 Authority Key Identifier: 438s 6F:D4:40:C1:66:BB:57:9F:11:B3:C3:A6:01:B4:91:B3:3B:A9:D2:BA 438s X509v3 Basic Constraints: 438s CA:FALSE 438s Netscape Cert Type: 438s SSL Client, S/MIME 438s Netscape Comment: 438s Test Organization Root CA trusted Certificate 438s X509v3 Subject Key Identifier: 438s 32:B2:4D:1A:2B:71:C8:1E:72:A1:7A:C0:47:DA:8C:4F:7E:B6:E3:87 438s X509v3 Key Usage: critical 438s Digital Signature, Non Repudiation, Key Encipherment 438s X509v3 Extended Key Usage: 438s TLS Web Client Authentication, E-mail Protection 438s X509v3 Subject Alternative Name: 438s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 438s Certificate is to be certified until Mar 5 01:21:30 2025 GMT (365 days) 438s 438s Write out database with 1 new entries 438s Database updated 438s + openssl x509 -noout -in /tmp/sssd-softhsm2-OWCJiN/test-root-CA-trusted-certificate-0001.pem 438s + openssl verify -CAfile /tmp/sssd-softhsm2-OWCJiN/test-root-CA.pem /tmp/sssd-softhsm2-OWCJiN/test-root-CA-trusted-certificate-0001.pem 438s /tmp/sssd-softhsm2-OWCJiN/test-root-CA-trusted-certificate-0001.pem: OK 438s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA.pem /tmp/sssd-softhsm2-OWCJiN/test-root-CA-trusted-certificate-0001.pem 438s + local cmd=openssl 438s + shift 438s + openssl verify -CAfile /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA.pem /tmp/sssd-softhsm2-OWCJiN/test-root-CA-trusted-certificate-0001.pem 438s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 438s error 20 at 0 depth lookup: unable to get local issuer certificate 438s error /tmp/sssd-softhsm2-OWCJiN/test-root-CA-trusted-certificate-0001.pem: verification failed 438s + cat 438s + intermediate_ca_trusted_cert_0001_key_pass=pass:random-intermediate-ca-trusted-cert-0001-13010 438s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA-trusted-certificate-0001-key.pem -passout pass:random-intermediate-ca-trusted-cert-0001-13010 1024 438s + openssl req -new -nodes -reqexts req_exts -passin pass:random-intermediate-ca-trusted-cert-0001-13010 -key /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA-trusted-certificate-0001-key.pem -config /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA-trusted-certificate-0001.config -out /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA-trusted-certificate-0001-request.pem 438s + openssl req -text -noout -in /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA-trusted-certificate-0001-request.pem 438s Certificate Request: 438s Data: 438s Version: 1 (0x0) 438s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 438s Subject Public Key Info: 438s Public Key Algorithm: rsaEncryption 438s Public-Key: (1024 bit) 438s Modulus: 438s 00:b3:31:0b:60:44:6d:b3:67:8f:b1:9c:d0:75:e6: 438s 4f:67:4b:0b:e8:37:28:8b:b0:73:7e:ee:16:a4:aa: 438s 4e:77:ea:67:60:34:c8:61:66:7a:17:1d:68:3a:41: 438s ac:3c:85:e6:49:ec:d9:8b:4e:b3:51:4c:8b:2d:15: 438s 84:5b:dc:ae:c5:9e:7b:95:76:bd:41:14:9f:02:cc: 438s 4c:61:bc:8e:31:79:b0:b8:7e:0c:0e:a7:0b:ff:74: 438s 6f:a5:62:53:57:9f:b6:22:ea:b7:0c:7f:1c:94:3d: 438s 65:06:3e:02:23:09:26:d3:80:11:5f:fc:db:fe:41: 438s aa:8f:1e:43:67:94:70:aa:f1 438s Exponent: 65537 (0x10001) 438s Attributes: 438s Requested Extensions: 438s X509v3 Basic Constraints: 438s CA:FALSE 438s Netscape Cert Type: 438s SSL Client, S/MIME 438s Netscape Comment: 438s Test Organization Intermediate CA trusted Certificate 438s X509v3 Subject Key Identifier: 438s 37:1D:92:78:52:83:05:40:E9:2E:27:59:88:21:B0:68:E2:BF:FA:7C 438s X509v3 Key Usage: critical 438s Digital Signature, Non Repudiation, Key Encipherment 438s X509v3 Extended Key Usage: 438s TLS Web Client Authentication, E-mail Protection 438s X509v3 Subject Alternative Name: 438s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 438s Signature Algorithm: sha256WithRSAEncryption 438s Signature Value: 438s 7a:11:b2:e4:18:79:e1:89:1b:ac:33:18:88:9f:4f:24:8a:4a: 438s eb:4b:78:6a:fc:94:c0:16:26:1c:ba:0f:71:0c:af:cc:18:a6: 438s 78:cd:59:10:8e:25:10:51:31:6c:40:dd:32:81:54:0b:21:44: 438s f1:30:38:c7:fd:c2:81:1a:41:77:33:b8:71:73:d9:ae:00:85: 438s ef:de:cb:cc:31:d3:ea:b6:79:a1:db:f2:c0:4c:ef:1e:be:84: 438s 3c:77:50:ff:fb:61:d0:29:4e:1f:61:61:79:4d:91:6d:6f:d4: 438s 4b:cf:19:57:5a:8b:8e:10:93:5c:03:99:41:1f:0d:80:28:e4: 438s 70:c5 438s + openssl ca -passin pass:random-intermediate-CA-password-2510 -config /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA.config -batch -notext -keyfile /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA-key.pem -in /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA-trusted-certificate-0001-request.pem -days 365 -extensions usr_cert -out /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA-trusted-certificate-0001.pem 438s Using configuration from /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA.config 438s Check that the request matches the signature 438s Signature ok 438s Certificate Details: 438s Serial Number: 4 (0x4) 438s Validity 438s Not Before: Mar 5 01:21:31 2024 GMT 438s Not After : Mar 5 01:21:31 2025 GMT 438s Subject: 438s organizationName = Test Organization 438s organizationalUnitName = Test Organization Unit 438s commonName = Test Organization Intermediate Trusted Certificate 0001 438s X509v3 extensions: 438s X509v3 Authority Key Identifier: 438s EA:37:3A:E0:F0:76:0D:2F:32:E6:0A:79:95:CF:5E:52:78:41:2C:54 438s X509v3 Basic Constraints: 438s CA:FALSE 438s Netscape Cert Type: 438s SSL Client, S/MIME 438s Netscape Comment: 438s Test Organization Intermediate CA trusted Certificate 438s X509v3 Subject Key Identifier: 438s 37:1D:92:78:52:83:05:40:E9:2E:27:59:88:21:B0:68:E2:BF:FA:7C 438s X509v3 Key Usage: critical 438s Digital Signature, Non Repudiation, Key Encipherment 438s X509v3 Extended Key Usage: 438s TLS Web Client Authentication, E-mail Protection 438s X509v3 Subject Alternative Name: 438s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 438s Certificate is to be certified until Mar 5 01:21:31 2025 GMT (365 days) 438s 438s Write out database with 1 new entries 438s Database updated 438s + openssl x509 -noout -in /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA-trusted-certificate-0001.pem 438s This certificate should not be trusted fully 438s + echo 'This certificate should not be trusted fully' 438s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA.pem /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA-trusted-certificate-0001.pem 438s + local cmd=openssl 438s + shift 438s + openssl verify -CAfile /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA.pem /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA-trusted-certificate-0001.pem 438s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 438s error 2 at 1 depth lookup: unable to get issuer certificate 438s error /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA-trusted-certificate-0001.pem: verification failed 438s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA.pem /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA-trusted-certificate-0001.pem 438s /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA-trusted-certificate-0001.pem: OK 438s + cat 438s + sub_intermediate_ca_trusted_cert_0001_key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-29354 438s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-trusted-certificate-0001-key.pem -passout pass:random-sub-intermediate-ca-trusted-cert-0001-29354 1024 438s + openssl req -new -nodes -reqexts req_exts -passin pass:random-sub-intermediate-ca-trusted-cert-0001-29354 -key /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-trusted-certificate-0001-key.pem -config /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-trusted-certificate-0001.config -out /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-trusted-certificate-0001-request.pem 438s + openssl req -text -noout -in /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-trusted-certificate-0001-request.pem 438s Certificate Request: 438s Data: 438s Version: 1 (0x0) 438s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 438s Subject Public Key Info: 438s Public Key Algorithm: rsaEncryption 438s Public-Key: (1024 bit) 438s Modulus: 438s 00:b4:42:89:31:99:84:9f:5c:0a:d6:ac:f6:c8:f4: 438s c7:b1:fa:bd:a2:75:58:0f:75:0c:bc:9c:47:dc:21: 438s 3d:9f:2b:0c:6c:33:1d:60:f5:a5:85:e7:14:02:de: 438s 5e:bc:65:9a:49:0e:8a:14:28:bb:af:e3:14:41:af: 438s 42:84:d2:fd:eb:24:e3:36:7e:40:f1:98:1a:66:51: 438s 93:a7:81:3d:6c:bd:2f:75:c6:53:ad:0b:84:b6:21: 438s b3:c8:22:96:d9:e0:e4:02:6b:34:73:38:dd:42:39: 438s dd:0d:9c:6f:48:7b:88:ec:08:9c:bb:39:b2:85:4f: 438s a2:af:2b:6c:ad:7b:d5:1c:1b 438s Exponent: 65537 (0x10001) 438s Attributes: 438s Requested Extensions: 438s X509v3 Basic Constraints: 438s CA:FALSE 438s Netscape Cert Type: 438s SSL Client, S/MIME 438s Netscape Comment: 438s Test Organization Sub Intermediate CA trusted Certificate 438s X509v3 Subject Key Identifier: 438s EA:42:17:46:C0:9A:5C:5C:56:A4:59:5D:3F:87:5F:5D:22:F3:D0:CD 438s X509v3 Key Usage: critical 438s Digital Signature, Non Repudiation, Key Encipherment 438s X509v3 Extended Key Usage: 438s TLS Web Client Authentication, E-mail Protection 438s X509v3 Subject Alternative Name: 438s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 438s Signature Algorithm: sha256WithRSAEncryption 438s Signature Value: 438s 19:03:34:23:ee:3b:4f:1b:b9:9d:07:f5:61:01:d4:cb:90:6c: 438s f2:ea:23:bc:73:32:0a:a8:fd:d2:ae:63:02:21:22:9c:8e:b5: 438s 89:21:c5:c3:c3:72:bb:1f:13:c9:4e:22:f6:2e:85:87:e7:1f: 438s 21:ad:f7:44:0a:68:89:52:d7:af:76:68:b0:cf:ad:8f:13:ed: 438s 6f:90:ec:89:09:9a:75:78:1e:5f:fd:ca:aa:27:b2:eb:6b:e9: 438s b8:22:0f:e5:4f:97:4f:77:7d:d7:84:01:21:3d:e2:83:e4:cd: 438s 40:b6:39:b0:b4:c1:5f:dd:f3:2f:b3:7e:ed:92:3b:46:b1:b5: 438s 76:29 438s + openssl ca -passin pass:random-sub-intermediate-CA-password-30830 -config /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA.config -batch -notext -keyfile /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-key.pem -in /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-trusted-certificate-0001-request.pem -days 365 -extensions usr_cert -out /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-trusted-certificate-0001.pem 438s Using configuration from /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA.config 438s Check that the request matches the signature 438s Signature ok 438s Certificate Details: 438s Serial Number: 5 (0x5) 438s Validity 438s Not Before: Mar 5 01:21:31 2024 GMT 438s Not After : Mar 5 01:21:31 2025 GMT 438s Subject: 438s organizationName = Test Organization 438s organizationalUnitName = Test Organization Unit 438s commonName = Test Organization Sub Intermediate Trusted Certificate 0001 438s X509v3 extensions: 438s X509v3 Authority Key Identifier: 438s 24:65:91:9F:43:6E:22:30:51:E6:67:04:5E:F6:FF:D8:17:A4:0F:B6 438s X509v3 Basic Constraints: 438s CA:FALSE 438s Netscape Cert Type: 438s SSL Client, S/MIME 438s Netscape Comment: 438s Test Organization Sub Intermediate CA trusted Certificate 438s X509v3 Subject Key Identifier: 438s EA:42:17:46:C0:9A:5C:5C:56:A4:59:5D:3F:87:5F:5D:22:F3:D0:CD 438s X509v3 Key Usage: critical 438s Digital Signature, Non Repudiation, Key Encipherment 438s X509v3 Extended Key Usage: 438s TLS Web Client Authentication, E-mail Protection 438s X509v3 Subject Alternative Name: 438s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 438s Certificate is to be certified until Mar 5 01:21:31 2025 GMT (365 days) 438s 438s Write out database with 1 new entries 438s Database updated 438s + openssl x509 -noout -in /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-trusted-certificate-0001.pem 438s This certificate should not be trusted fully 438s + echo 'This certificate should not be trusted fully' 438s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA.pem /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-trusted-certificate-0001.pem 438s + local cmd=openssl 438s + shift 438s + openssl verify -CAfile /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA.pem /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-trusted-certificate-0001.pem 438s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 438s error 2 at 1 depth lookup: unable to get issuer certificate 438s error /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-trusted-certificate-0001.pem: verification failed 438s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA.pem /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-trusted-certificate-0001.pem 438s + local cmd=openssl 438s + shift 438s + openssl verify -CAfile /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA.pem /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-trusted-certificate-0001.pem 438s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 438s error 20 at 0 depth lookup: unable to get local issuer certificate 438s error /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-trusted-certificate-0001.pem: verification failed 438s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA.pem /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-trusted-certificate-0001.pem 438s /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-trusted-certificate-0001.pem: OK 438s + expect_fail openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA.pem /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-trusted-certificate-0001.pem 438s + local cmd=openssl 438s + shift 438s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA.pem /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-trusted-certificate-0001.pem 438s Building a the full-chain CA file... 438s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 438s error 20 at 0 depth lookup: unable to get local issuer certificate 438s error /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-trusted-certificate-0001.pem: verification failed 438s + echo 'Building a the full-chain CA file...' 438s + cat /tmp/sssd-softhsm2-OWCJiN/test-root-CA.pem /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA.pem /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA.pem 438s + cat /tmp/sssd-softhsm2-OWCJiN/test-root-CA.pem /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA.pem 438s + cat /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA.pem /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA.pem 438s + openssl crl2pkcs7 -nocrl -certfile /tmp/sssd-softhsm2-OWCJiN/test-full-chain-CA.pem 438s subject=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 438s issuer=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 438s 438s subject=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 438s issuer=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 438s 438s subject=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 438s issuer=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 438s 438s + openssl pkcs7 -print_certs -noout 438s + openssl verify -CAfile /tmp/sssd-softhsm2-OWCJiN/test-full-chain-CA.pem /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA.pem 438s /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA.pem: OK 438s + openssl verify -CAfile /tmp/sssd-softhsm2-OWCJiN/test-full-chain-CA.pem /tmp/sssd-softhsm2-OWCJiN/test-root-CA-trusted-certificate-0001.pem 438s /tmp/sssd-softhsm2-OWCJiN/test-root-CA-trusted-certificate-0001.pem: OK 438s + openssl verify -CAfile /tmp/sssd-softhsm2-OWCJiN/test-full-chain-CA.pem /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA-trusted-certificate-0001.pem 438s /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA-trusted-certificate-0001.pem: OK 438s + openssl verify -CAfile /tmp/sssd-softhsm2-OWCJiN/test-full-chain-CA.pem /tmp/sssd-softhsm2-OWCJiN/test-root-intermediate-chain-CA.pem 438s /tmp/sssd-softhsm2-OWCJiN/test-root-intermediate-chain-CA.pem: OK 438s + openssl verify -CAfile /tmp/sssd-softhsm2-OWCJiN/test-full-chain-CA.pem /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-trusted-certificate-0001.pem 438s /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-trusted-certificate-0001.pem: OK 438s + echo 'Certificates generation completed!' 438s Certificates generation completed! 438s + [[ -v NO_SSSD_TESTS ]] 438s + invalid_certificate /tmp/sssd-softhsm2-OWCJiN/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-4161 /dev/null 438s + check_certificate /tmp/sssd-softhsm2-OWCJiN/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-4161 /dev/null 438s + local certificate=/tmp/sssd-softhsm2-OWCJiN/test-root-CA-trusted-certificate-0001.pem 438s + local key_pass=pass:random-root-ca-trusted-cert-0001-4161 438s + local key_ring=/dev/null 438s + local verify_option= 438s + prepare_softhsm2_card /tmp/sssd-softhsm2-OWCJiN/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-4161 438s + local certificate=/tmp/sssd-softhsm2-OWCJiN/test-root-CA-trusted-certificate-0001.pem 438s + local key_pass=pass:random-root-ca-trusted-cert-0001-4161 438s + local key_cn 438s + local key_name 438s + local tokens_dir 438s + local output_cert_file 438s + token_name= 438s ++ basename /tmp/sssd-softhsm2-OWCJiN/test-root-CA-trusted-certificate-0001.pem .pem 438s + key_name=test-root-CA-trusted-certificate-0001 438s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-OWCJiN/test-root-CA-trusted-certificate-0001.pem 438s ++ sed -n 's/ *commonName *= //p' 438s + key_cn='Test Organization Root Trusted Certificate 0001' 438s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 438s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-OWCJiN/softhsm2-test-root-CA-trusted-certificate-0001.conf 438s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-OWCJiN/softhsm2-test-root-CA-trusted-certificate-0001.conf 438s ++ basename /tmp/sssd-softhsm2-OWCJiN/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 438s + tokens_dir=/tmp/sssd-softhsm2-OWCJiN/softhsm2-test-root-CA-trusted-certificate-0001 438s + token_name='Test Organization Root Tr Token' 438s + '[' '!' -e /tmp/sssd-softhsm2-OWCJiN/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 438s + local key_file 438s + local decrypted_key 438s + mkdir -p /tmp/sssd-softhsm2-OWCJiN/softhsm2-test-root-CA-trusted-certificate-0001 438s + key_file=/tmp/sssd-softhsm2-OWCJiN/test-root-CA-trusted-certificate-0001-key.pem 438s + decrypted_key=/tmp/sssd-softhsm2-OWCJiN/test-root-CA-trusted-certificate-0001-key-decrypted.pem 438s + cat 438s + softhsm2-util --init-token --label 'Test Organization Root Tr Token' --pin 053350 --so-pin 053350 --free 438s Slot 0 has a free/uninitialized token. 438s The token has been initialized and is reassigned to slot 599304384 438s + softhsm2-util --show-slots 438s Available slots: 438s Slot 599304384 438s Slot info: 438s Description: SoftHSM slot ID 0x23b8a8c0 438s Manufacturer ID: SoftHSM project 438s Hardware version: 2.6 438s Firmware version: 2.6 438s Token present: yes 438s Token info: 438s Manufacturer ID: SoftHSM project 438s Model: SoftHSM v2 438s Hardware version: 2.6 438s Firmware version: 2.6 438s Serial number: 433cc54623b8a8c0 438s Initialized: yes 438s User PIN init.: yes 438s Label: Test Organization Root Tr Token 438s Slot 1 438s Slot info: 438s Description: SoftHSM slot ID 0x1 438s Manufacturer ID: SoftHSM project 438s Hardware version: 2.6 438s Firmware version: 2.6 438s Token present: yes 438s Token info: 438s Manufacturer ID: SoftHSM project 438s Model: SoftHSM v2 438s Hardware version: 2.6 438s Firmware version: 2.6 438s Serial number: 438s Initialized: no 438s User PIN init.: no 438s Label: 438s + p11tool --provider=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --write --no-mark-private --load-certificate=/tmp/sssd-softhsm2-OWCJiN/test-root-CA-trusted-certificate-0001.pem --login --set-pin=053350 --label 'Test Organization Root Trusted Certificate 0001' --id 00112233445566778899FFAABBCCDDEEFF012345 438s + openssl rsa -passin pass:random-root-ca-trusted-cert-0001-4161 -in /tmp/sssd-softhsm2-OWCJiN/test-root-CA-trusted-certificate-0001-key.pem -out /tmp/sssd-softhsm2-OWCJiN/test-root-CA-trusted-certificate-0001-key-decrypted.pem 438s writing RSA key 438s + p11tool --provider=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --write --load-privkey=/tmp/sssd-softhsm2-OWCJiN/test-root-CA-trusted-certificate-0001-key-decrypted.pem --login --set-pin=053350 --label 'Test Organization Root Trusted Certificate 0001 Key' --id 00112233445566778899FFAABBCCDDEEFF012345 438s + rm /tmp/sssd-softhsm2-OWCJiN/test-root-CA-trusted-certificate-0001-key-decrypted.pem 438s + p11tool --provider=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --list-all 438s Object 0: 438s URL: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=433cc54623b8a8c0;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert 438s Type: X.509 Certificate (RSA-1024) 438s Expires: Wed Mar 5 01:21:30 2025 438s Label: Test Organization Root Trusted Certificate 0001 438s ID: 00:11:22:33:44:55:66:77:88:99:ff:aa:bb:cc:dd:ee:ff:01:23:45 438s 438s Test Organization Root Tr Token 438s + echo 'Test Organization Root Tr Token' 438s + '[' -n '' ']' 438s + local output_base_name=SSSD-child-31826 438s + local output_file=/tmp/sssd-softhsm2-OWCJiN/SSSD-child-31826.output 438s + output_cert_file=/tmp/sssd-softhsm2-OWCJiN/SSSD-child-31826.pem 438s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/dev/null 438s [p11_child[1929]] [main] (0x0400): p11_child started. 438s [p11_child[1929]] [main] (0x2000): Running in [pre-auth] mode. 438s [p11_child[1929]] [main] (0x2000): Running with effective IDs: [0][0]. 438s [p11_child[1929]] [main] (0x2000): Running with real IDs [0][0]. 438s [p11_child[1929]] [init_verification] (0x0040): X509_LOOKUP_load_file [/dev/null] failed [92274824][error:05800088:x509 certificate routines::no certificate or crl found]. 438s [p11_child[1929]] [do_work] (0x0040): init_verification failed. 438s [p11_child[1929]] [main] (0x0020): p11_child failed (5) 438s + return 2 438s + valid_certificate /tmp/sssd-softhsm2-OWCJiN/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-4161 /dev/null no_verification 438s + check_certificate /tmp/sssd-softhsm2-OWCJiN/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-4161 /dev/null no_verification 438s + local certificate=/tmp/sssd-softhsm2-OWCJiN/test-root-CA-trusted-certificate-0001.pem 438s + local key_pass=pass:random-root-ca-trusted-cert-0001-4161 438s + local key_ring=/dev/null 438s + local verify_option=no_verification 438s + prepare_softhsm2_card /tmp/sssd-softhsm2-OWCJiN/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-4161 438s + local certificate=/tmp/sssd-softhsm2-OWCJiN/test-root-CA-trusted-certificate-0001.pem 438s + local key_pass=pass:random-root-ca-trusted-cert-0001-4161 438s + local key_cn 438s + local key_name 438s + local tokens_dir 438s + local output_cert_file 438s + token_name= 438s ++ basename /tmp/sssd-softhsm2-OWCJiN/test-root-CA-trusted-certificate-0001.pem .pem 438s + key_name=test-root-CA-trusted-certificate-0001 438s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-OWCJiN/test-root-CA-trusted-certificate-0001.pem 438s ++ sed -n 's/ *commonName *= //p' 438s + key_cn='Test Organization Root Trusted Certificate 0001' 438s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 438s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-OWCJiN/softhsm2-test-root-CA-trusted-certificate-0001.conf 438s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-OWCJiN/softhsm2-test-root-CA-trusted-certificate-0001.conf 438s Test Organization Root Tr Token 438s ++ basename /tmp/sssd-softhsm2-OWCJiN/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 438s + tokens_dir=/tmp/sssd-softhsm2-OWCJiN/softhsm2-test-root-CA-trusted-certificate-0001 438s + token_name='Test Organization Root Tr Token' 438s + '[' '!' -e /tmp/sssd-softhsm2-OWCJiN/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 438s + '[' '!' -d /tmp/sssd-softhsm2-OWCJiN/softhsm2-test-root-CA-trusted-certificate-0001 ']' 438s + echo 'Test Organization Root Tr Token' 438s + '[' -n no_verification ']' 438s + local verify_arg=--verify=no_verification 438s + local output_base_name=SSSD-child-31876 438s + local output_file=/tmp/sssd-softhsm2-OWCJiN/SSSD-child-31876.output 438s + output_cert_file=/tmp/sssd-softhsm2-OWCJiN/SSSD-child-31876.pem 438s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --verify=no_verification --ca_db=/dev/null 438s [p11_child[1935]] [main] (0x0400): p11_child started. 438s [p11_child[1935]] [main] (0x2000): Running in [pre-auth] mode. 438s [p11_child[1935]] [main] (0x2000): Running with effective IDs: [0][0]. 438s [p11_child[1935]] [main] (0x2000): Running with real IDs [0][0]. 438s [p11_child[1935]] [parse_cert_verify_opts] (0x0020): Found 'no_verification' option, disabling verification completely. This should not be used in production. 438s [p11_child[1935]] [do_card] (0x4000): Module List: 438s [p11_child[1935]] [do_card] (0x4000): common name: [softhsm2]. 438s [p11_child[1935]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 438s [p11_child[1935]] [do_card] (0x4000): Description [SoftHSM slot ID 0x23b8a8c0] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 438s [p11_child[1935]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 438s [p11_child[1935]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x23b8a8c0][599304384] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 438s [p11_child[1935]] [do_card] (0x4000): Login NOT required. 438s [p11_child[1935]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 438s [p11_child[1935]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Root Tr Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 438s [p11_child[1935]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x23b8a8c0;slot-manufacturer=SoftHSM%20project;slot-id=599304384;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=433cc54623b8a8c0;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 438s [p11_child[1935]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 438s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-OWCJiN/SSSD-child-31876.output 438s + echo '-----BEGIN CERTIFICATE-----' 438s + tail -n1 /tmp/sssd-softhsm2-OWCJiN/SSSD-child-31876.output 438s + echo '-----END CERTIFICATE-----' 438s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-OWCJiN/SSSD-child-31876.pem 438s Certificate: 438s Data: 438s Version: 3 (0x2) 438s Serial Number: 3 (0x3) 438s Signature Algorithm: sha256WithRSAEncryption 438s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 438s Validity 438s Not Before: Mar 5 01:21:30 2024 GMT 438s Not After : Mar 5 01:21:30 2025 GMT 438s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 438s Subject Public Key Info: 438s Public Key Algorithm: rsaEncryption 438s Public-Key: (1024 bit) 438s Modulus: 438s 00:d2:bb:53:d9:98:09:43:4a:c3:28:c1:a0:fd:61: 438s 74:38:6d:c4:1f:e8:62:a4:8d:e2:0c:65:51:2d:9f: 438s 32:6f:cb:d7:b7:8e:90:90:ef:a5:41:da:72:88:8d: 438s 7b:8f:8a:9b:53:06:83:e9:ad:45:ae:1f:c6:97:85: 438s 65:31:22:33:f9:84:11:32:d9:a1:57:4b:36:f5:0d: 438s 89:d0:71:a3:be:8c:cf:46:c6:ee:c4:ec:69:16:90: 438s d5:4f:d8:b8:b9:ce:64:4c:17:4d:43:52:cc:05:bb: 438s ed:b6:7a:99:3e:00:f2:ff:3b:f5:e5:80:30:c1:e1: 438s 79:b6:a9:6f:85:da:03:b0:b9 438s Exponent: 65537 (0x10001) 438s X509v3 extensions: 438s X509v3 Authority Key Identifier: 438s 6F:D4:40:C1:66:BB:57:9F:11:B3:C3:A6:01:B4:91:B3:3B:A9:D2:BA 438s X509v3 Basic Constraints: 438s CA:FALSE 438s Netscape Cert Type: 438s SSL Client, S/MIME 438s Netscape Comment: 438s Test Organization Root CA trusted Certificate 438s X509v3 Subject Key Identifier: 438s 32:B2:4D:1A:2B:71:C8:1E:72:A1:7A:C0:47:DA:8C:4F:7E:B6:E3:87 438s X509v3 Key Usage: critical 438s Digital Signature, Non Repudiation, Key Encipherment 438s X509v3 Extended Key Usage: 438s TLS Web Client Authentication, E-mail Protection 438s X509v3 Subject Alternative Name: 438s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 438s Signature Algorithm: sha256WithRSAEncryption 438s Signature Value: 438s 64:d4:53:df:f8:68:69:ab:7e:8c:c4:d8:cd:74:26:e6:f2:7a: 438s a6:b9:86:d8:77:c3:a9:92:4a:0f:f9:65:e4:3d:f5:6e:3b:dc: 438s a2:66:f5:61:5a:ce:66:ee:4d:ff:c7:4b:9c:2c:b5:f8:11:a7: 438s d0:1d:b6:19:9d:a4:0c:40:2f:6d:ba:f1:f7:0d:9b:cf:9b:c8: 438s 21:d8:4b:9f:ae:26:2c:ac:b6:66:8d:25:08:eb:9c:1d:e8:f6: 438s 32:85:7c:43:73:43:ea:79:08:bb:c6:2e:ab:2c:db:f7:37:2c: 438s c9:49:24:73:aa:38:c9:33:d9:10:c4:d2:59:89:d0:92:7d:d2: 438s dc:bd 438s + local found_md5 expected_md5 438s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-OWCJiN/test-root-CA-trusted-certificate-0001.pem 438s + expected_md5=Modulus=D2BB53D99809434AC328C1A0FD6174386DC41FE862A48DE20C65512D9F326FCBD7B78E9090EFA541DA72888D7B8F8A9B530683E9AD45AE1FC6978565312233F9841132D9A1574B36F50D89D071A3BE8CCF46C6EEC4EC691690D54FD8B8B9CE644C174D4352CC05BBEDB67A993E00F2FF3BF5E58030C1E179B6A96F85DA03B0B9 438s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-OWCJiN/SSSD-child-31876.pem 439s + found_md5=Modulus=D2BB53D99809434AC328C1A0FD6174386DC41FE862A48DE20C65512D9F326FCBD7B78E9090EFA541DA72888D7B8F8A9B530683E9AD45AE1FC6978565312233F9841132D9A1574B36F50D89D071A3BE8CCF46C6EEC4EC691690D54FD8B8B9CE644C174D4352CC05BBEDB67A993E00F2FF3BF5E58030C1E179B6A96F85DA03B0B9 439s + '[' Modulus=D2BB53D99809434AC328C1A0FD6174386DC41FE862A48DE20C65512D9F326FCBD7B78E9090EFA541DA72888D7B8F8A9B530683E9AD45AE1FC6978565312233F9841132D9A1574B36F50D89D071A3BE8CCF46C6EEC4EC691690D54FD8B8B9CE644C174D4352CC05BBEDB67A993E00F2FF3BF5E58030C1E179B6A96F85DA03B0B9 '!=' Modulus=D2BB53D99809434AC328C1A0FD6174386DC41FE862A48DE20C65512D9F326FCBD7B78E9090EFA541DA72888D7B8F8A9B530683E9AD45AE1FC6978565312233F9841132D9A1574B36F50D89D071A3BE8CCF46C6EEC4EC691690D54FD8B8B9CE644C174D4352CC05BBEDB67A993E00F2FF3BF5E58030C1E179B6A96F85DA03B0B9 ']' 439s + output_file=/tmp/sssd-softhsm2-OWCJiN/SSSD-child-31876-auth.output 439s ++ basename /tmp/sssd-softhsm2-OWCJiN/SSSD-child-31876-auth.output .output 439s + output_cert_file=/tmp/sssd-softhsm2-OWCJiN/SSSD-child-31876-auth.pem 439s + echo -n 053350 439s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/dev/null --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=no_verification --token_name 'Test Organization Root Tr Token' --module_name /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so 439s [p11_child[1943]] [main] (0x0400): p11_child started. 439s [p11_child[1943]] [main] (0x2000): Running in [auth] mode. 439s [p11_child[1943]] [main] (0x2000): Running with effective IDs: [0][0]. 439s [p11_child[1943]] [main] (0x2000): Running with real IDs [0][0]. 439s [p11_child[1943]] [parse_cert_verify_opts] (0x0020): Found 'no_verification' option, disabling verification completely. This should not be used in production. 439s [p11_child[1943]] [do_card] (0x4000): Module List: 439s [p11_child[1943]] [do_card] (0x4000): common name: [softhsm2]. 439s [p11_child[1943]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 439s [p11_child[1943]] [do_card] (0x4000): Description [SoftHSM slot ID 0x23b8a8c0] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 439s [p11_child[1943]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 439s [p11_child[1943]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x23b8a8c0][599304384] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 439s [p11_child[1943]] [do_card] (0x4000): Login required. 439s [p11_child[1943]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 439s [p11_child[1943]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so Test Organization Root Tr Token Test Organization Root Tr Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 439s [p11_child[1943]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x23b8a8c0;slot-manufacturer=SoftHSM%20project;slot-id=599304384;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=433cc54623b8a8c0;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 439s [p11_child[1943]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 439s [p11_child[1943]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 439s [p11_child[1943]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 439s [p11_child[1943]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 439s [p11_child[1943]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 439s [p11_child[1943]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 439s [p11_child[1943]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 439s [p11_child[1943]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 439s [p11_child[1943]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 439s [p11_child[1943]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 439s [p11_child[1943]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 439s [p11_child[1943]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 439s [p11_child[1943]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 439s [p11_child[1943]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 439s [p11_child[1943]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 439s [p11_child[1943]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 439s [p11_child[1943]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 439s [p11_child[1943]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 439s [p11_child[1943]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 439s [p11_child[1943]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 439s [p11_child[1943]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 439s [p11_child[1943]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 439s [p11_child[1943]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 439s [p11_child[1943]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 439s [p11_child[1943]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 439s [p11_child[1943]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 439s [p11_child[1943]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 439s [p11_child[1943]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 439s [p11_child[1943]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 439s [p11_child[1943]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 439s [p11_child[1943]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 439s [p11_child[1943]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 439s [p11_child[1943]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 439s [p11_child[1943]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 439s [p11_child[1943]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 439s [p11_child[1943]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 439s [p11_child[1943]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 439s [p11_child[1943]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 439s [p11_child[1943]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 439s [p11_child[1943]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 439s [p11_child[1943]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 439s [p11_child[1943]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 439s [p11_child[1943]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 439s [p11_child[1943]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 439s [p11_child[1943]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 439s [p11_child[1943]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 439s [p11_child[1943]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 439s [p11_child[1943]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 439s [p11_child[1943]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 439s [p11_child[1943]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 439s [p11_child[1943]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 439s [p11_child[1943]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 439s [p11_child[1943]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 439s [p11_child[1943]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 439s [p11_child[1943]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 439s [p11_child[1943]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 439s [p11_child[1943]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 439s [p11_child[1943]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 439s [p11_child[1943]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 439s [p11_child[1943]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 439s [p11_child[1943]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 439s [p11_child[1943]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 439s [p11_child[1943]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 439s [p11_child[1943]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 439s [p11_child[1943]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 439s [p11_child[1943]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 439s [p11_child[1943]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 439s [p11_child[1943]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 439s [p11_child[1943]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 439s [p11_child[1943]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 439s [p11_child[1943]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 439s [p11_child[1943]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 439s [p11_child[1943]] [do_card] (0x4000): Certificate verified and validated. 439s [p11_child[1943]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 439s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-OWCJiN/SSSD-child-31876-auth.output 439s + echo '-----BEGIN CERTIFICATE-----' 439s + tail -n1 /tmp/sssd-softhsm2-OWCJiN/SSSD-child-31876-auth.output 439s + echo '-----END CERTIFICATE-----' 439s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-OWCJiN/SSSD-child-31876-auth.pem 439s Certificate: 439s Data: 439s Version: 3 (0x2) 439s Serial Number: 3 (0x3) 439s Signature Algorithm: sha256WithRSAEncryption 439s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 439s Validity 439s Not Before: Mar 5 01:21:30 2024 GMT 439s Not After : Mar 5 01:21:30 2025 GMT 439s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 439s Subject Public Key Info: 439s Public Key Algorithm: rsaEncryption 439s Public-Key: (1024 bit) 439s Modulus: 439s 00:d2:bb:53:d9:98:09:43:4a:c3:28:c1:a0:fd:61: 439s 74:38:6d:c4:1f:e8:62:a4:8d:e2:0c:65:51:2d:9f: 439s 32:6f:cb:d7:b7:8e:90:90:ef:a5:41:da:72:88:8d: 439s 7b:8f:8a:9b:53:06:83:e9:ad:45:ae:1f:c6:97:85: 439s 65:31:22:33:f9:84:11:32:d9:a1:57:4b:36:f5:0d: 439s 89:d0:71:a3:be:8c:cf:46:c6:ee:c4:ec:69:16:90: 439s d5:4f:d8:b8:b9:ce:64:4c:17:4d:43:52:cc:05:bb: 439s ed:b6:7a:99:3e:00:f2:ff:3b:f5:e5:80:30:c1:e1: 439s 79:b6:a9:6f:85:da:03:b0:b9 439s Exponent: 65537 (0x10001) 439s X509v3 extensions: 439s X509v3 Authority Key Identifier: 439s 6F:D4:40:C1:66:BB:57:9F:11:B3:C3:A6:01:B4:91:B3:3B:A9:D2:BA 439s X509v3 Basic Constraints: 439s CA:FALSE 439s Netscape Cert Type: 439s SSL Client, S/MIME 439s Netscape Comment: 439s Test Organization Root CA trusted Certificate 439s X509v3 Subject Key Identifier: 439s 32:B2:4D:1A:2B:71:C8:1E:72:A1:7A:C0:47:DA:8C:4F:7E:B6:E3:87 439s X509v3 Key Usage: critical 439s Digital Signature, Non Repudiation, Key Encipherment 439s X509v3 Extended Key Usage: 439s TLS Web Client Authentication, E-mail Protection 439s X509v3 Subject Alternative Name: 439s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 439s Signature Algorithm: sha256WithRSAEncryption 439s Signature Value: 439s 64:d4:53:df:f8:68:69:ab:7e:8c:c4:d8:cd:74:26:e6:f2:7a: 439s a6:b9:86:d8:77:c3:a9:92:4a:0f:f9:65:e4:3d:f5:6e:3b:dc: 439s a2:66:f5:61:5a:ce:66:ee:4d:ff:c7:4b:9c:2c:b5:f8:11:a7: 439s d0:1d:b6:19:9d:a4:0c:40:2f:6d:ba:f1:f7:0d:9b:cf:9b:c8: 439s 21:d8:4b:9f:ae:26:2c:ac:b6:66:8d:25:08:eb:9c:1d:e8:f6: 439s 32:85:7c:43:73:43:ea:79:08:bb:c6:2e:ab:2c:db:f7:37:2c: 439s c9:49:24:73:aa:38:c9:33:d9:10:c4:d2:59:89:d0:92:7d:d2: 439s dc:bd 439s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-OWCJiN/SSSD-child-31876-auth.pem 439s + found_md5=Modulus=D2BB53D99809434AC328C1A0FD6174386DC41FE862A48DE20C65512D9F326FCBD7B78E9090EFA541DA72888D7B8F8A9B530683E9AD45AE1FC6978565312233F9841132D9A1574B36F50D89D071A3BE8CCF46C6EEC4EC691690D54FD8B8B9CE644C174D4352CC05BBEDB67A993E00F2FF3BF5E58030C1E179B6A96F85DA03B0B9 439s + '[' Modulus=D2BB53D99809434AC328C1A0FD6174386DC41FE862A48DE20C65512D9F326FCBD7B78E9090EFA541DA72888D7B8F8A9B530683E9AD45AE1FC6978565312233F9841132D9A1574B36F50D89D071A3BE8CCF46C6EEC4EC691690D54FD8B8B9CE644C174D4352CC05BBEDB67A993E00F2FF3BF5E58030C1E179B6A96F85DA03B0B9 '!=' Modulus=D2BB53D99809434AC328C1A0FD6174386DC41FE862A48DE20C65512D9F326FCBD7B78E9090EFA541DA72888D7B8F8A9B530683E9AD45AE1FC6978565312233F9841132D9A1574B36F50D89D071A3BE8CCF46C6EEC4EC691690D54FD8B8B9CE644C174D4352CC05BBEDB67A993E00F2FF3BF5E58030C1E179B6A96F85DA03B0B9 ']' 439s + valid_certificate /tmp/sssd-softhsm2-OWCJiN/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-4161 /tmp/sssd-softhsm2-OWCJiN/test-root-CA.pem 439s + check_certificate /tmp/sssd-softhsm2-OWCJiN/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-4161 /tmp/sssd-softhsm2-OWCJiN/test-root-CA.pem 439s + local certificate=/tmp/sssd-softhsm2-OWCJiN/test-root-CA-trusted-certificate-0001.pem 439s + local key_pass=pass:random-root-ca-trusted-cert-0001-4161 439s + local key_ring=/tmp/sssd-softhsm2-OWCJiN/test-root-CA.pem 439s + local verify_option= 439s + prepare_softhsm2_card /tmp/sssd-softhsm2-OWCJiN/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-4161 439s + local certificate=/tmp/sssd-softhsm2-OWCJiN/test-root-CA-trusted-certificate-0001.pem 439s + local key_pass=pass:random-root-ca-trusted-cert-0001-4161 439s + local key_cn 439s + local key_name 439s + local tokens_dir 439s + local output_cert_file 439s + token_name= 439s ++ basename /tmp/sssd-softhsm2-OWCJiN/test-root-CA-trusted-certificate-0001.pem .pem 439s + key_name=test-root-CA-trusted-certificate-0001 439s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-OWCJiN/test-root-CA-trusted-certificate-0001.pem 439s ++ sed -n 's/ *commonName *= //p' 439s + key_cn='Test Organization Root Trusted Certificate 0001' 439s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 439s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-OWCJiN/softhsm2-test-root-CA-trusted-certificate-0001.conf 439s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-OWCJiN/softhsm2-test-root-CA-trusted-certificate-0001.conf 439s ++ basename /tmp/sssd-softhsm2-OWCJiN/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 439s + tokens_dir=/tmp/sssd-softhsm2-OWCJiN/softhsm2-test-root-CA-trusted-certificate-0001 439s + token_name='Test Organization Root Tr Token' 439s + '[' '!' -e /tmp/sssd-softhsm2-OWCJiN/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 439s + '[' '!' -d /tmp/sssd-softhsm2-OWCJiN/softhsm2-test-root-CA-trusted-certificate-0001 ']' 439s + echo 'Test Organization Root Tr Token' 439s + '[' -n '' ']' 439s + local output_base_name=SSSD-child-20396 439s + local output_file=/tmp/sssd-softhsm2-OWCJiN/SSSD-child-20396.output 439s + output_cert_file=/tmp/sssd-softhsm2-OWCJiN/SSSD-child-20396.pem 439s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-OWCJiN/test-root-CA.pem 439s Test Organization Root Tr Token 439s [p11_child[1953]] [main] (0x0400): p11_child started. 439s [p11_child[1953]] [main] (0x2000): Running in [pre-auth] mode. 439s [p11_child[1953]] [main] (0x2000): Running with effective IDs: [0][0]. 439s [p11_child[1953]] [main] (0x2000): Running with real IDs [0][0]. 439s [p11_child[1953]] [do_card] (0x4000): Module List: 439s [p11_child[1953]] [do_card] (0x4000): common name: [softhsm2]. 439s [p11_child[1953]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 439s [p11_child[1953]] [do_card] (0x4000): Description [SoftHSM slot ID 0x23b8a8c0] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 439s [p11_child[1953]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 439s [p11_child[1953]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x23b8a8c0][599304384] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 439s [p11_child[1953]] [do_card] (0x4000): Login NOT required. 439s [p11_child[1953]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 439s [p11_child[1953]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 439s [p11_child[1953]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Root Tr Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 439s [p11_child[1953]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x23b8a8c0;slot-manufacturer=SoftHSM%20project;slot-id=599304384;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=433cc54623b8a8c0;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 439s [p11_child[1953]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 439s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-OWCJiN/SSSD-child-20396.output 439s + echo '-----BEGIN CERTIFICATE-----' 439s + tail -n1 /tmp/sssd-softhsm2-OWCJiN/SSSD-child-20396.output 439s + echo '-----END CERTIFICATE-----' 439s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-OWCJiN/SSSD-child-20396.pem 439s Certificate: 439s Data: 439s Version: 3 (0x2) 439s Serial Number: 3 (0x3) 439s Signature Algorithm: sha256WithRSAEncryption 439s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 439s Validity 439s Not Before: Mar 5 01:21:30 2024 GMT 439s Not After : Mar 5 01:21:30 2025 GMT 439s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 439s Subject Public Key Info: 439s Public Key Algorithm: rsaEncryption 439s Public-Key: (1024 bit) 439s Modulus: 439s 00:d2:bb:53:d9:98:09:43:4a:c3:28:c1:a0:fd:61: 439s 74:38:6d:c4:1f:e8:62:a4:8d:e2:0c:65:51:2d:9f: 439s 32:6f:cb:d7:b7:8e:90:90:ef:a5:41:da:72:88:8d: 439s 7b:8f:8a:9b:53:06:83:e9:ad:45:ae:1f:c6:97:85: 439s 65:31:22:33:f9:84:11:32:d9:a1:57:4b:36:f5:0d: 439s 89:d0:71:a3:be:8c:cf:46:c6:ee:c4:ec:69:16:90: 439s d5:4f:d8:b8:b9:ce:64:4c:17:4d:43:52:cc:05:bb: 439s ed:b6:7a:99:3e:00:f2:ff:3b:f5:e5:80:30:c1:e1: 439s 79:b6:a9:6f:85:da:03:b0:b9 439s Exponent: 65537 (0x10001) 439s X509v3 extensions: 439s X509v3 Authority Key Identifier: 439s 6F:D4:40:C1:66:BB:57:9F:11:B3:C3:A6:01:B4:91:B3:3B:A9:D2:BA 439s X509v3 Basic Constraints: 439s CA:FALSE 439s Netscape Cert Type: 439s SSL Client, S/MIME 439s Netscape Comment: 439s Test Organization Root CA trusted Certificate 439s X509v3 Subject Key Identifier: 439s 32:B2:4D:1A:2B:71:C8:1E:72:A1:7A:C0:47:DA:8C:4F:7E:B6:E3:87 439s X509v3 Key Usage: critical 439s Digital Signature, Non Repudiation, Key Encipherment 439s X509v3 Extended Key Usage: 439s TLS Web Client Authentication, E-mail Protection 439s X509v3 Subject Alternative Name: 439s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 439s Signature Algorithm: sha256WithRSAEncryption 439s Signature Value: 439s 64:d4:53:df:f8:68:69:ab:7e:8c:c4:d8:cd:74:26:e6:f2:7a: 439s a6:b9:86:d8:77:c3:a9:92:4a:0f:f9:65:e4:3d:f5:6e:3b:dc: 439s a2:66:f5:61:5a:ce:66:ee:4d:ff:c7:4b:9c:2c:b5:f8:11:a7: 439s d0:1d:b6:19:9d:a4:0c:40:2f:6d:ba:f1:f7:0d:9b:cf:9b:c8: 439s 21:d8:4b:9f:ae:26:2c:ac:b6:66:8d:25:08:eb:9c:1d:e8:f6: 439s 32:85:7c:43:73:43:ea:79:08:bb:c6:2e:ab:2c:db:f7:37:2c: 439s c9:49:24:73:aa:38:c9:33:d9:10:c4:d2:59:89:d0:92:7d:d2: 439s dc:bd 439s + local found_md5 expected_md5 439s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-OWCJiN/test-root-CA-trusted-certificate-0001.pem 439s + expected_md5=Modulus=D2BB53D99809434AC328C1A0FD6174386DC41FE862A48DE20C65512D9F326FCBD7B78E9090EFA541DA72888D7B8F8A9B530683E9AD45AE1FC6978565312233F9841132D9A1574B36F50D89D071A3BE8CCF46C6EEC4EC691690D54FD8B8B9CE644C174D4352CC05BBEDB67A993E00F2FF3BF5E58030C1E179B6A96F85DA03B0B9 439s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-OWCJiN/SSSD-child-20396.pem 439s + found_md5=Modulus=D2BB53D99809434AC328C1A0FD6174386DC41FE862A48DE20C65512D9F326FCBD7B78E9090EFA541DA72888D7B8F8A9B530683E9AD45AE1FC6978565312233F9841132D9A1574B36F50D89D071A3BE8CCF46C6EEC4EC691690D54FD8B8B9CE644C174D4352CC05BBEDB67A993E00F2FF3BF5E58030C1E179B6A96F85DA03B0B9 439s + '[' Modulus=D2BB53D99809434AC328C1A0FD6174386DC41FE862A48DE20C65512D9F326FCBD7B78E9090EFA541DA72888D7B8F8A9B530683E9AD45AE1FC6978565312233F9841132D9A1574B36F50D89D071A3BE8CCF46C6EEC4EC691690D54FD8B8B9CE644C174D4352CC05BBEDB67A993E00F2FF3BF5E58030C1E179B6A96F85DA03B0B9 '!=' Modulus=D2BB53D99809434AC328C1A0FD6174386DC41FE862A48DE20C65512D9F326FCBD7B78E9090EFA541DA72888D7B8F8A9B530683E9AD45AE1FC6978565312233F9841132D9A1574B36F50D89D071A3BE8CCF46C6EEC4EC691690D54FD8B8B9CE644C174D4352CC05BBEDB67A993E00F2FF3BF5E58030C1E179B6A96F85DA03B0B9 ']' 439s + output_file=/tmp/sssd-softhsm2-OWCJiN/SSSD-child-20396-auth.output 439s ++ basename /tmp/sssd-softhsm2-OWCJiN/SSSD-child-20396-auth.output .output 439s + output_cert_file=/tmp/sssd-softhsm2-OWCJiN/SSSD-child-20396-auth.pem 439s + echo -n 053350 439s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-OWCJiN/test-root-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 '' --token_name 'Test Organization Root Tr Token' --module_name /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so 439s [p11_child[1961]] [main] (0x0400): p11_child started. 439s [p11_child[1961]] [main] (0x2000): Running in [auth] mode. 439s [p11_child[1961]] [main] (0x2000): Running with effective IDs: [0][0]. 439s [p11_child[1961]] [main] (0x2000): Running with real IDs [0][0]. 439s [p11_child[1961]] [do_card] (0x4000): Module List: 439s [p11_child[1961]] [do_card] (0x4000): common name: [softhsm2]. 439s [p11_child[1961]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 439s [p11_child[1961]] [do_card] (0x4000): Description [SoftHSM slot ID 0x23b8a8c0] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 439s [p11_child[1961]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 439s [p11_child[1961]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x23b8a8c0][599304384] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 439s [p11_child[1961]] [do_card] (0x4000): Login required. 439s [p11_child[1961]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 439s [p11_child[1961]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 439s [p11_child[1961]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so Test Organization Root Tr Token Test Organization Root Tr Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 439s [p11_child[1961]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x23b8a8c0;slot-manufacturer=SoftHSM%20project;slot-id=599304384;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=433cc54623b8a8c0;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 439s [p11_child[1961]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 439s [p11_child[1961]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 439s [p11_child[1961]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 439s [p11_child[1961]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 439s [p11_child[1961]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 439s [p11_child[1961]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 439s [p11_child[1961]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 439s [p11_child[1961]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 439s [p11_child[1961]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 439s [p11_child[1961]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 439s [p11_child[1961]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 439s [p11_child[1961]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 439s [p11_child[1961]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 439s [p11_child[1961]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 439s [p11_child[1961]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 439s [p11_child[1961]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 439s [p11_child[1961]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 439s [p11_child[1961]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 439s [p11_child[1961]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 439s [p11_child[1961]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 439s [p11_child[1961]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 439s [p11_child[1961]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 439s [p11_child[1961]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 439s [p11_child[1961]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 439s [p11_child[1961]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 439s [p11_child[1961]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 439s [p11_child[1961]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 439s [p11_child[1961]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 439s [p11_child[1961]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 439s [p11_child[1961]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 439s [p11_child[1961]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 439s [p11_child[1961]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 439s [p11_child[1961]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 439s [p11_child[1961]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 439s [p11_child[1961]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 439s [p11_child[1961]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 439s [p11_child[1961]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 439s [p11_child[1961]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 439s [p11_child[1961]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 439s [p11_child[1961]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 439s [p11_child[1961]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 439s [p11_child[1961]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 439s [p11_child[1961]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 439s [p11_child[1961]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 439s [p11_child[1961]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 439s [p11_child[1961]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 439s [p11_child[1961]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 439s [p11_child[1961]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 439s [p11_child[1961]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 439s [p11_child[1961]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 439s [p11_child[1961]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 439s [p11_child[1961]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 439s [p11_child[1961]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 439s [p11_child[1961]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 439s [p11_child[1961]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 439s [p11_child[1961]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 439s [p11_child[1961]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 439s [p11_child[1961]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 439s [p11_child[1961]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 439s [p11_child[1961]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 439s [p11_child[1961]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 439s [p11_child[1961]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 439s [p11_child[1961]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 439s [p11_child[1961]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 439s [p11_child[1961]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 439s [p11_child[1961]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 439s [p11_child[1961]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 439s [p11_child[1961]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 439s [p11_child[1961]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 439s [p11_child[1961]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 439s [p11_child[1961]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 439s [p11_child[1961]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 439s [p11_child[1961]] [do_card] (0x4000): Certificate verified and validated. 439s [p11_child[1961]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 439s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-OWCJiN/SSSD-child-20396-auth.output 439s + echo '-----BEGIN CERTIFICATE-----' 439s + tail -n1 /tmp/sssd-softhsm2-OWCJiN/SSSD-child-20396-auth.output 439s + echo '-----END CERTIFICATE-----' 439s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-OWCJiN/SSSD-child-20396-auth.pem 439s Certificate: 439s Data: 439s Version: 3 (0x2) 439s Serial Number: 3 (0x3) 439s Signature Algorithm: sha256WithRSAEncryption 439s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 439s Validity 439s Not Before: Mar 5 01:21:30 2024 GMT 439s Not After : Mar 5 01:21:30 2025 GMT 439s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 439s Subject Public Key Info: 439s Public Key Algorithm: rsaEncryption 439s Public-Key: (1024 bit) 439s Modulus: 439s 00:d2:bb:53:d9:98:09:43:4a:c3:28:c1:a0:fd:61: 439s 74:38:6d:c4:1f:e8:62:a4:8d:e2:0c:65:51:2d:9f: 439s 32:6f:cb:d7:b7:8e:90:90:ef:a5:41:da:72:88:8d: 439s 7b:8f:8a:9b:53:06:83:e9:ad:45:ae:1f:c6:97:85: 439s 65:31:22:33:f9:84:11:32:d9:a1:57:4b:36:f5:0d: 439s 89:d0:71:a3:be:8c:cf:46:c6:ee:c4:ec:69:16:90: 439s d5:4f:d8:b8:b9:ce:64:4c:17:4d:43:52:cc:05:bb: 439s ed:b6:7a:99:3e:00:f2:ff:3b:f5:e5:80:30:c1:e1: 439s 79:b6:a9:6f:85:da:03:b0:b9 439s Exponent: 65537 (0x10001) 439s X509v3 extensions: 439s X509v3 Authority Key Identifier: 439s 6F:D4:40:C1:66:BB:57:9F:11:B3:C3:A6:01:B4:91:B3:3B:A9:D2:BA 439s X509v3 Basic Constraints: 439s CA:FALSE 439s Netscape Cert Type: 439s SSL Client, S/MIME 439s Netscape Comment: 439s Test Organization Root CA trusted Certificate 439s X509v3 Subject Key Identifier: 439s 32:B2:4D:1A:2B:71:C8:1E:72:A1:7A:C0:47:DA:8C:4F:7E:B6:E3:87 439s X509v3 Key Usage: critical 439s Digital Signature, Non Repudiation, Key Encipherment 439s X509v3 Extended Key Usage: 439s TLS Web Client Authentication, E-mail Protection 439s X509v3 Subject Alternative Name: 439s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 439s Signature Algorithm: sha256WithRSAEncryption 439s Signature Value: 439s 64:d4:53:df:f8:68:69:ab:7e:8c:c4:d8:cd:74:26:e6:f2:7a: 439s a6:b9:86:d8:77:c3:a9:92:4a:0f:f9:65:e4:3d:f5:6e:3b:dc: 439s a2:66:f5:61:5a:ce:66:ee:4d:ff:c7:4b:9c:2c:b5:f8:11:a7: 439s d0:1d:b6:19:9d:a4:0c:40:2f:6d:ba:f1:f7:0d:9b:cf:9b:c8: 439s 21:d8:4b:9f:ae:26:2c:ac:b6:66:8d:25:08:eb:9c:1d:e8:f6: 439s 32:85:7c:43:73:43:ea:79:08:bb:c6:2e:ab:2c:db:f7:37:2c: 439s c9:49:24:73:aa:38:c9:33:d9:10:c4:d2:59:89:d0:92:7d:d2: 439s dc:bd 439s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-OWCJiN/SSSD-child-20396-auth.pem 439s + found_md5=Modulus=D2BB53D99809434AC328C1A0FD6174386DC41FE862A48DE20C65512D9F326FCBD7B78E9090EFA541DA72888D7B8F8A9B530683E9AD45AE1FC6978565312233F9841132D9A1574B36F50D89D071A3BE8CCF46C6EEC4EC691690D54FD8B8B9CE644C174D4352CC05BBEDB67A993E00F2FF3BF5E58030C1E179B6A96F85DA03B0B9 439s + '[' Modulus=D2BB53D99809434AC328C1A0FD6174386DC41FE862A48DE20C65512D9F326FCBD7B78E9090EFA541DA72888D7B8F8A9B530683E9AD45AE1FC6978565312233F9841132D9A1574B36F50D89D071A3BE8CCF46C6EEC4EC691690D54FD8B8B9CE644C174D4352CC05BBEDB67A993E00F2FF3BF5E58030C1E179B6A96F85DA03B0B9 '!=' Modulus=D2BB53D99809434AC328C1A0FD6174386DC41FE862A48DE20C65512D9F326FCBD7B78E9090EFA541DA72888D7B8F8A9B530683E9AD45AE1FC6978565312233F9841132D9A1574B36F50D89D071A3BE8CCF46C6EEC4EC691690D54FD8B8B9CE644C174D4352CC05BBEDB67A993E00F2FF3BF5E58030C1E179B6A96F85DA03B0B9 ']' 439s + valid_certificate /tmp/sssd-softhsm2-OWCJiN/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-4161 /tmp/sssd-softhsm2-OWCJiN/test-root-CA.pem partial_chain 439s + check_certificate /tmp/sssd-softhsm2-OWCJiN/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-4161 /tmp/sssd-softhsm2-OWCJiN/test-root-CA.pem partial_chain 439s + local certificate=/tmp/sssd-softhsm2-OWCJiN/test-root-CA-trusted-certificate-0001.pem 439s + local key_pass=pass:random-root-ca-trusted-cert-0001-4161 439s + local key_ring=/tmp/sssd-softhsm2-OWCJiN/test-root-CA.pem 439s + local verify_option=partial_chain 439s + prepare_softhsm2_card /tmp/sssd-softhsm2-OWCJiN/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-4161 439s + local certificate=/tmp/sssd-softhsm2-OWCJiN/test-root-CA-trusted-certificate-0001.pem 439s + local key_pass=pass:random-root-ca-trusted-cert-0001-4161 439s + local key_cn 439s + local key_name 439s + local tokens_dir 439s + local output_cert_file 439s + token_name= 439s ++ basename /tmp/sssd-softhsm2-OWCJiN/test-root-CA-trusted-certificate-0001.pem .pem 439s + key_name=test-root-CA-trusted-certificate-0001 439s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-OWCJiN/test-root-CA-trusted-certificate-0001.pem 439s ++ sed -n 's/ *commonName *= //p' 439s + key_cn='Test Organization Root Trusted Certificate 0001' 439s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 439s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-OWCJiN/softhsm2-test-root-CA-trusted-certificate-0001.conf 439s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-OWCJiN/softhsm2-test-root-CA-trusted-certificate-0001.conf 439s ++ basename /tmp/sssd-softhsm2-OWCJiN/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 439s Test Organization Root Tr Token 439s + tokens_dir=/tmp/sssd-softhsm2-OWCJiN/softhsm2-test-root-CA-trusted-certificate-0001 439s + token_name='Test Organization Root Tr Token' 439s + '[' '!' -e /tmp/sssd-softhsm2-OWCJiN/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 439s + '[' '!' -d /tmp/sssd-softhsm2-OWCJiN/softhsm2-test-root-CA-trusted-certificate-0001 ']' 439s + echo 'Test Organization Root Tr Token' 439s + '[' -n partial_chain ']' 439s + local verify_arg=--verify=partial_chain 439s + local output_base_name=SSSD-child-23154 439s + local output_file=/tmp/sssd-softhsm2-OWCJiN/SSSD-child-23154.output 439s + output_cert_file=/tmp/sssd-softhsm2-OWCJiN/SSSD-child-23154.pem 439s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-OWCJiN/test-root-CA.pem 439s [p11_child[1971]] [main] (0x0400): p11_child started. 439s [p11_child[1971]] [main] (0x2000): Running in [pre-auth] mode. 439s [p11_child[1971]] [main] (0x2000): Running with effective IDs: [0][0]. 439s [p11_child[1971]] [main] (0x2000): Running with real IDs [0][0]. 439s [p11_child[1971]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 439s [p11_child[1971]] [do_card] (0x4000): Module List: 439s [p11_child[1971]] [do_card] (0x4000): common name: [softhsm2]. 439s [p11_child[1971]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 439s [p11_child[1971]] [do_card] (0x4000): Description [SoftHSM slot ID 0x23b8a8c0] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 439s [p11_child[1971]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 439s [p11_child[1971]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x23b8a8c0][599304384] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 439s [p11_child[1971]] [do_card] (0x4000): Login NOT required. 439s [p11_child[1971]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 439s [p11_child[1971]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 439s [p11_child[1971]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Root Tr Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 439s [p11_child[1971]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x23b8a8c0;slot-manufacturer=SoftHSM%20project;slot-id=599304384;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=433cc54623b8a8c0;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 439s [p11_child[1971]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 439s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-OWCJiN/SSSD-child-23154.output 439s + echo '-----BEGIN CERTIFICATE-----' 439s + tail -n1 /tmp/sssd-softhsm2-OWCJiN/SSSD-child-23154.output 439s + echo '-----END CERTIFICATE-----' 439s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-OWCJiN/SSSD-child-23154.pem 439s Certificate: 439s Data: 439s Version: 3 (0x2) 439s Serial Number: 3 (0x3) 439s Signature Algorithm: sha256WithRSAEncryption 439s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 439s Validity 439s Not Before: Mar 5 01:21:30 2024 GMT 439s Not After : Mar 5 01:21:30 2025 GMT 439s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 439s Subject Public Key Info: 439s Public Key Algorithm: rsaEncryption 439s Public-Key: (1024 bit) 439s Modulus: 439s 00:d2:bb:53:d9:98:09:43:4a:c3:28:c1:a0:fd:61: 439s 74:38:6d:c4:1f:e8:62:a4:8d:e2:0c:65:51:2d:9f: 439s 32:6f:cb:d7:b7:8e:90:90:ef:a5:41:da:72:88:8d: 439s 7b:8f:8a:9b:53:06:83:e9:ad:45:ae:1f:c6:97:85: 439s 65:31:22:33:f9:84:11:32:d9:a1:57:4b:36:f5:0d: 439s 89:d0:71:a3:be:8c:cf:46:c6:ee:c4:ec:69:16:90: 439s d5:4f:d8:b8:b9:ce:64:4c:17:4d:43:52:cc:05:bb: 439s ed:b6:7a:99:3e:00:f2:ff:3b:f5:e5:80:30:c1:e1: 439s 79:b6:a9:6f:85:da:03:b0:b9 439s Exponent: 65537 (0x10001) 439s X509v3 extensions: 439s X509v3 Authority Key Identifier: 439s 6F:D4:40:C1:66:BB:57:9F:11:B3:C3:A6:01:B4:91:B3:3B:A9:D2:BA 439s X509v3 Basic Constraints: 439s CA:FALSE 439s Netscape Cert Type: 439s SSL Client, S/MIME 439s Netscape Comment: 439s Test Organization Root CA trusted Certificate 439s X509v3 Subject Key Identifier: 439s 32:B2:4D:1A:2B:71:C8:1E:72:A1:7A:C0:47:DA:8C:4F:7E:B6:E3:87 439s X509v3 Key Usage: critical 439s Digital Signature, Non Repudiation, Key Encipherment 439s X509v3 Extended Key Usage: 439s TLS Web Client Authentication, E-mail Protection 439s X509v3 Subject Alternative Name: 439s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 439s Signature Algorithm: sha256WithRSAEncryption 439s Signature Value: 439s 64:d4:53:df:f8:68:69:ab:7e:8c:c4:d8:cd:74:26:e6:f2:7a: 439s a6:b9:86:d8:77:c3:a9:92:4a:0f:f9:65:e4:3d:f5:6e:3b:dc: 439s a2:66:f5:61:5a:ce:66:ee:4d:ff:c7:4b:9c:2c:b5:f8:11:a7: 439s d0:1d:b6:19:9d:a4:0c:40:2f:6d:ba:f1:f7:0d:9b:cf:9b:c8: 439s 21:d8:4b:9f:ae:26:2c:ac:b6:66:8d:25:08:eb:9c:1d:e8:f6: 439s 32:85:7c:43:73:43:ea:79:08:bb:c6:2e:ab:2c:db:f7:37:2c: 439s c9:49:24:73:aa:38:c9:33:d9:10:c4:d2:59:89:d0:92:7d:d2: 439s dc:bd 439s + local found_md5 expected_md5 439s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-OWCJiN/test-root-CA-trusted-certificate-0001.pem 439s + expected_md5=Modulus=D2BB53D99809434AC328C1A0FD6174386DC41FE862A48DE20C65512D9F326FCBD7B78E9090EFA541DA72888D7B8F8A9B530683E9AD45AE1FC6978565312233F9841132D9A1574B36F50D89D071A3BE8CCF46C6EEC4EC691690D54FD8B8B9CE644C174D4352CC05BBEDB67A993E00F2FF3BF5E58030C1E179B6A96F85DA03B0B9 439s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-OWCJiN/SSSD-child-23154.pem 439s + found_md5=Modulus=D2BB53D99809434AC328C1A0FD6174386DC41FE862A48DE20C65512D9F326FCBD7B78E9090EFA541DA72888D7B8F8A9B530683E9AD45AE1FC6978565312233F9841132D9A1574B36F50D89D071A3BE8CCF46C6EEC4EC691690D54FD8B8B9CE644C174D4352CC05BBEDB67A993E00F2FF3BF5E58030C1E179B6A96F85DA03B0B9 439s + '[' Modulus=D2BB53D99809434AC328C1A0FD6174386DC41FE862A48DE20C65512D9F326FCBD7B78E9090EFA541DA72888D7B8F8A9B530683E9AD45AE1FC6978565312233F9841132D9A1574B36F50D89D071A3BE8CCF46C6EEC4EC691690D54FD8B8B9CE644C174D4352CC05BBEDB67A993E00F2FF3BF5E58030C1E179B6A96F85DA03B0B9 '!=' Modulus=D2BB53D99809434AC328C1A0FD6174386DC41FE862A48DE20C65512D9F326FCBD7B78E9090EFA541DA72888D7B8F8A9B530683E9AD45AE1FC6978565312233F9841132D9A1574B36F50D89D071A3BE8CCF46C6EEC4EC691690D54FD8B8B9CE644C174D4352CC05BBEDB67A993E00F2FF3BF5E58030C1E179B6A96F85DA03B0B9 ']' 439s + output_file=/tmp/sssd-softhsm2-OWCJiN/SSSD-child-23154-auth.output 439s ++ basename /tmp/sssd-softhsm2-OWCJiN/SSSD-child-23154-auth.output .output 439s + output_cert_file=/tmp/sssd-softhsm2-OWCJiN/SSSD-child-23154-auth.pem 439s + echo -n 053350 439s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-OWCJiN/test-root-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Root Tr Token' --module_name /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so 439s [p11_child[1979]] [main] (0x0400): p11_child started. 439s [p11_child[1979]] [main] (0x2000): Running in [auth] mode. 439s [p11_child[1979]] [main] (0x2000): Running with effective IDs: [0][0]. 439s [p11_child[1979]] [main] (0x2000): Running with real IDs [0][0]. 439s [p11_child[1979]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 439s [p11_child[1979]] [do_card] (0x4000): Module List: 439s [p11_child[1979]] [do_card] (0x4000): common name: [softhsm2]. 439s [p11_child[1979]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 439s [p11_child[1979]] [do_card] (0x4000): Description [SoftHSM slot ID 0x23b8a8c0] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 439s [p11_child[1979]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 439s [p11_child[1979]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x23b8a8c0][599304384] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 439s [p11_child[1979]] [do_card] (0x4000): Login required. 439s [p11_child[1979]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 439s [p11_child[1979]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 439s [p11_child[1979]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so Test Organization Root Tr Token Test Organization Root Tr Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 439s [p11_child[1979]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x23b8a8c0;slot-manufacturer=SoftHSM%20project;slot-id=599304384;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=433cc54623b8a8c0;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 439s [p11_child[1979]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 439s [p11_child[1979]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 439s [p11_child[1979]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 439s [p11_child[1979]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 439s [p11_child[1979]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 439s [p11_child[1979]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 439s [p11_child[1979]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 439s [p11_child[1979]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 439s [p11_child[1979]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 439s [p11_child[1979]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 439s [p11_child[1979]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 439s [p11_child[1979]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 439s [p11_child[1979]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 439s [p11_child[1979]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 439s [p11_child[1979]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 439s [p11_child[1979]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 439s [p11_child[1979]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 439s [p11_child[1979]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 439s [p11_child[1979]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 439s [p11_child[1979]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 439s [p11_child[1979]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 439s [p11_child[1979]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 439s [p11_child[1979]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 439s [p11_child[1979]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 439s [p11_child[1979]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 439s [p11_child[1979]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 439s [p11_child[1979]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 439s [p11_child[1979]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 439s [p11_child[1979]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 439s [p11_child[1979]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 439s [p11_child[1979]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 439s [p11_child[1979]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 439s [p11_child[1979]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 439s [p11_child[1979]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 439s [p11_child[1979]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 439s [p11_child[1979]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 439s [p11_child[1979]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 439s [p11_child[1979]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 439s [p11_child[1979]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 439s [p11_child[1979]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 439s [p11_child[1979]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 439s [p11_child[1979]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 439s [p11_child[1979]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 439s [p11_child[1979]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 439s [p11_child[1979]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 439s [p11_child[1979]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 439s [p11_child[1979]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 439s [p11_child[1979]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 439s [p11_child[1979]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 439s [p11_child[1979]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 439s [p11_child[1979]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 439s [p11_child[1979]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 439s [p11_child[1979]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 439s [p11_child[1979]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 439s [p11_child[1979]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 439s [p11_child[1979]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 439s [p11_child[1979]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 439s [p11_child[1979]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 439s [p11_child[1979]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 439s [p11_child[1979]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 439s [p11_child[1979]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 439s [p11_child[1979]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 439s [p11_child[1979]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 439s [p11_child[1979]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 439s [p11_child[1979]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 439s [p11_child[1979]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 439s [p11_child[1979]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 439s [p11_child[1979]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 439s [p11_child[1979]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 439s [p11_child[1979]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 439s [p11_child[1979]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 439s [p11_child[1979]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 439s [p11_child[1979]] [do_card] (0x4000): Certificate verified and validated. 439s [p11_child[1979]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 439s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-OWCJiN/SSSD-child-23154-auth.output 439s + echo '-----BEGIN CERTIFICATE-----' 439s + tail -n1 /tmp/sssd-softhsm2-OWCJiN/SSSD-child-23154-auth.output 439s + echo '-----END CERTIFICATE-----' 439s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-OWCJiN/SSSD-child-23154-auth.pem 439s Certificate: 439s Data: 439s Version: 3 (0x2) 439s Serial Number: 3 (0x3) 439s Signature Algorithm: sha256WithRSAEncryption 439s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 439s Validity 439s Not Before: Mar 5 01:21:30 2024 GMT 439s Not After : Mar 5 01:21:30 2025 GMT 439s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 439s Subject Public Key Info: 439s Public Key Algorithm: rsaEncryption 439s Public-Key: (1024 bit) 439s Modulus: 439s 00:d2:bb:53:d9:98:09:43:4a:c3:28:c1:a0:fd:61: 439s 74:38:6d:c4:1f:e8:62:a4:8d:e2:0c:65:51:2d:9f: 439s 32:6f:cb:d7:b7:8e:90:90:ef:a5:41:da:72:88:8d: 439s 7b:8f:8a:9b:53:06:83:e9:ad:45:ae:1f:c6:97:85: 439s 65:31:22:33:f9:84:11:32:d9:a1:57:4b:36:f5:0d: 439s 89:d0:71:a3:be:8c:cf:46:c6:ee:c4:ec:69:16:90: 439s d5:4f:d8:b8:b9:ce:64:4c:17:4d:43:52:cc:05:bb: 439s ed:b6:7a:99:3e:00:f2:ff:3b:f5:e5:80:30:c1:e1: 439s 79:b6:a9:6f:85:da:03:b0:b9 439s Exponent: 65537 (0x10001) 439s X509v3 extensions: 439s X509v3 Authority Key Identifier: 439s 6F:D4:40:C1:66:BB:57:9F:11:B3:C3:A6:01:B4:91:B3:3B:A9:D2:BA 439s X509v3 Basic Constraints: 439s CA:FALSE 439s Netscape Cert Type: 439s SSL Client, S/MIME 439s Netscape Comment: 439s Test Organization Root CA trusted Certificate 439s X509v3 Subject Key Identifier: 439s 32:B2:4D:1A:2B:71:C8:1E:72:A1:7A:C0:47:DA:8C:4F:7E:B6:E3:87 439s X509v3 Key Usage: critical 439s Digital Signature, Non Repudiation, Key Encipherment 439s X509v3 Extended Key Usage: 439s TLS Web Client Authentication, E-mail Protection 439s X509v3 Subject Alternative Name: 439s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 439s Signature Algorithm: sha256WithRSAEncryption 439s Signature Value: 439s 64:d4:53:df:f8:68:69:ab:7e:8c:c4:d8:cd:74:26:e6:f2:7a: 439s a6:b9:86:d8:77:c3:a9:92:4a:0f:f9:65:e4:3d:f5:6e:3b:dc: 439s a2:66:f5:61:5a:ce:66:ee:4d:ff:c7:4b:9c:2c:b5:f8:11:a7: 439s d0:1d:b6:19:9d:a4:0c:40:2f:6d:ba:f1:f7:0d:9b:cf:9b:c8: 439s 21:d8:4b:9f:ae:26:2c:ac:b6:66:8d:25:08:eb:9c:1d:e8:f6: 439s 32:85:7c:43:73:43:ea:79:08:bb:c6:2e:ab:2c:db:f7:37:2c: 439s c9:49:24:73:aa:38:c9:33:d9:10:c4:d2:59:89:d0:92:7d:d2: 439s dc:bd 439s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-OWCJiN/SSSD-child-23154-auth.pem 439s + found_md5=Modulus=D2BB53D99809434AC328C1A0FD6174386DC41FE862A48DE20C65512D9F326FCBD7B78E9090EFA541DA72888D7B8F8A9B530683E9AD45AE1FC6978565312233F9841132D9A1574B36F50D89D071A3BE8CCF46C6EEC4EC691690D54FD8B8B9CE644C174D4352CC05BBEDB67A993E00F2FF3BF5E58030C1E179B6A96F85DA03B0B9 439s + '[' Modulus=D2BB53D99809434AC328C1A0FD6174386DC41FE862A48DE20C65512D9F326FCBD7B78E9090EFA541DA72888D7B8F8A9B530683E9AD45AE1FC6978565312233F9841132D9A1574B36F50D89D071A3BE8CCF46C6EEC4EC691690D54FD8B8B9CE644C174D4352CC05BBEDB67A993E00F2FF3BF5E58030C1E179B6A96F85DA03B0B9 '!=' Modulus=D2BB53D99809434AC328C1A0FD6174386DC41FE862A48DE20C65512D9F326FCBD7B78E9090EFA541DA72888D7B8F8A9B530683E9AD45AE1FC6978565312233F9841132D9A1574B36F50D89D071A3BE8CCF46C6EEC4EC691690D54FD8B8B9CE644C174D4352CC05BBEDB67A993E00F2FF3BF5E58030C1E179B6A96F85DA03B0B9 ']' 439s + valid_certificate /tmp/sssd-softhsm2-OWCJiN/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-4161 /tmp/sssd-softhsm2-OWCJiN/test-full-chain-CA.pem 439s + check_certificate /tmp/sssd-softhsm2-OWCJiN/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-4161 /tmp/sssd-softhsm2-OWCJiN/test-full-chain-CA.pem 439s + local certificate=/tmp/sssd-softhsm2-OWCJiN/test-root-CA-trusted-certificate-0001.pem 439s + local key_pass=pass:random-root-ca-trusted-cert-0001-4161 439s + local key_ring=/tmp/sssd-softhsm2-OWCJiN/test-full-chain-CA.pem 439s + local verify_option= 439s + prepare_softhsm2_card /tmp/sssd-softhsm2-OWCJiN/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-4161 439s + local certificate=/tmp/sssd-softhsm2-OWCJiN/test-root-CA-trusted-certificate-0001.pem 439s + local key_pass=pass:random-root-ca-trusted-cert-0001-4161 439s + local key_cn 439s + local key_name 439s + local tokens_dir 439s + local output_cert_file 439s + token_name= 439s ++ basename /tmp/sssd-softhsm2-OWCJiN/test-root-CA-trusted-certificate-0001.pem .pem 439s + key_name=test-root-CA-trusted-certificate-0001 439s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-OWCJiN/test-root-CA-trusted-certificate-0001.pem 439s ++ sed -n 's/ *commonName *= //p' 439s + key_cn='Test Organization Root Trusted Certificate 0001' 439s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 439s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-OWCJiN/softhsm2-test-root-CA-trusted-certificate-0001.conf 439s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-OWCJiN/softhsm2-test-root-CA-trusted-certificate-0001.conf 439s ++ basename /tmp/sssd-softhsm2-OWCJiN/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 439s + tokens_dir=/tmp/sssd-softhsm2-OWCJiN/softhsm2-test-root-CA-trusted-certificate-0001 439s + token_name='Test Organization Root Tr Token' 439s + '[' '!' -e /tmp/sssd-softhsm2-OWCJiN/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 439s + '[' '!' -d /tmp/sssd-softhsm2-OWCJiN/softhsm2-test-root-CA-trusted-certificate-0001 ']' 439s + echo 'Test Organization Root Tr Token' 439s + '[' -n '' ']' 439s + local output_base_name=SSSD-child-29055 439s + local output_file=/tmp/sssd-softhsm2-OWCJiN/SSSD-child-29055.output 439s + output_cert_file=/tmp/sssd-softhsm2-OWCJiN/SSSD-child-29055.pem 439s Test Organization Root Tr Token 439s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-OWCJiN/test-full-chain-CA.pem 439s [p11_child[1989]] [main] (0x0400): p11_child started. 439s [p11_child[1989]] [main] (0x2000): Running in [pre-auth] mode. 439s [p11_child[1989]] [main] (0x2000): Running with effective IDs: [0][0]. 439s [p11_child[1989]] [main] (0x2000): Running with real IDs [0][0]. 439s [p11_child[1989]] [do_card] (0x4000): Module List: 439s [p11_child[1989]] [do_card] (0x4000): common name: [softhsm2]. 439s [p11_child[1989]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 439s [p11_child[1989]] [do_card] (0x4000): Description [SoftHSM slot ID 0x23b8a8c0] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 439s [p11_child[1989]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 439s [p11_child[1989]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x23b8a8c0][599304384] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 439s [p11_child[1989]] [do_card] (0x4000): Login NOT required. 439s [p11_child[1989]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 439s [p11_child[1989]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 439s [p11_child[1989]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Root Tr Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 439s [p11_child[1989]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x23b8a8c0;slot-manufacturer=SoftHSM%20project;slot-id=599304384;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=433cc54623b8a8c0;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 439s [p11_child[1989]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 439s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-OWCJiN/SSSD-child-29055.output 439s + echo '-----BEGIN CERTIFICATE-----' 439s + tail -n1 /tmp/sssd-softhsm2-OWCJiN/SSSD-child-29055.output 439s + echo '-----END CERTIFICATE-----' 439s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-OWCJiN/SSSD-child-29055.pem 439s Certificate: 439s Data: 439s Version: 3 (0x2) 439s Serial Number: 3 (0x3) 439s Signature Algorithm: sha256WithRSAEncryption 439s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 439s Validity 439s Not Before: Mar 5 01:21:30 2024 GMT 439s Not After : Mar 5 01:21:30 2025 GMT 439s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 439s Subject Public Key Info: 439s Public Key Algorithm: rsaEncryption 439s Public-Key: (1024 bit) 439s Modulus: 439s 00:d2:bb:53:d9:98:09:43:4a:c3:28:c1:a0:fd:61: 439s 74:38:6d:c4:1f:e8:62:a4:8d:e2:0c:65:51:2d:9f: 439s 32:6f:cb:d7:b7:8e:90:90:ef:a5:41:da:72:88:8d: 439s 7b:8f:8a:9b:53:06:83:e9:ad:45:ae:1f:c6:97:85: 439s 65:31:22:33:f9:84:11:32:d9:a1:57:4b:36:f5:0d: 439s 89:d0:71:a3:be:8c:cf:46:c6:ee:c4:ec:69:16:90: 439s d5:4f:d8:b8:b9:ce:64:4c:17:4d:43:52:cc:05:bb: 439s ed:b6:7a:99:3e:00:f2:ff:3b:f5:e5:80:30:c1:e1: 439s 79:b6:a9:6f:85:da:03:b0:b9 439s Exponent: 65537 (0x10001) 439s X509v3 extensions: 439s X509v3 Authority Key Identifier: 439s 6F:D4:40:C1:66:BB:57:9F:11:B3:C3:A6:01:B4:91:B3:3B:A9:D2:BA 439s X509v3 Basic Constraints: 439s CA:FALSE 439s Netscape Cert Type: 439s SSL Client, S/MIME 439s Netscape Comment: 439s Test Organization Root CA trusted Certificate 439s X509v3 Subject Key Identifier: 439s 32:B2:4D:1A:2B:71:C8:1E:72:A1:7A:C0:47:DA:8C:4F:7E:B6:E3:87 439s X509v3 Key Usage: critical 439s Digital Signature, Non Repudiation, Key Encipherment 439s X509v3 Extended Key Usage: 439s TLS Web Client Authentication, E-mail Protection 439s X509v3 Subject Alternative Name: 439s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 439s Signature Algorithm: sha256WithRSAEncryption 439s Signature Value: 439s 64:d4:53:df:f8:68:69:ab:7e:8c:c4:d8:cd:74:26:e6:f2:7a: 439s a6:b9:86:d8:77:c3:a9:92:4a:0f:f9:65:e4:3d:f5:6e:3b:dc: 439s a2:66:f5:61:5a:ce:66:ee:4d:ff:c7:4b:9c:2c:b5:f8:11:a7: 439s d0:1d:b6:19:9d:a4:0c:40:2f:6d:ba:f1:f7:0d:9b:cf:9b:c8: 439s 21:d8:4b:9f:ae:26:2c:ac:b6:66:8d:25:08:eb:9c:1d:e8:f6: 439s 32:85:7c:43:73:43:ea:79:08:bb:c6:2e:ab:2c:db:f7:37:2c: 439s c9:49:24:73:aa:38:c9:33:d9:10:c4:d2:59:89:d0:92:7d:d2: 439s dc:bd 439s + local found_md5 expected_md5 439s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-OWCJiN/test-root-CA-trusted-certificate-0001.pem 439s + expected_md5=Modulus=D2BB53D99809434AC328C1A0FD6174386DC41FE862A48DE20C65512D9F326FCBD7B78E9090EFA541DA72888D7B8F8A9B530683E9AD45AE1FC6978565312233F9841132D9A1574B36F50D89D071A3BE8CCF46C6EEC4EC691690D54FD8B8B9CE644C174D4352CC05BBEDB67A993E00F2FF3BF5E58030C1E179B6A96F85DA03B0B9 439s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-OWCJiN/SSSD-child-29055.pem 439s + found_md5=Modulus=D2BB53D99809434AC328C1A0FD6174386DC41FE862A48DE20C65512D9F326FCBD7B78E9090EFA541DA72888D7B8F8A9B530683E9AD45AE1FC6978565312233F9841132D9A1574B36F50D89D071A3BE8CCF46C6EEC4EC691690D54FD8B8B9CE644C174D4352CC05BBEDB67A993E00F2FF3BF5E58030C1E179B6A96F85DA03B0B9 439s + '[' Modulus=D2BB53D99809434AC328C1A0FD6174386DC41FE862A48DE20C65512D9F326FCBD7B78E9090EFA541DA72888D7B8F8A9B530683E9AD45AE1FC6978565312233F9841132D9A1574B36F50D89D071A3BE8CCF46C6EEC4EC691690D54FD8B8B9CE644C174D4352CC05BBEDB67A993E00F2FF3BF5E58030C1E179B6A96F85DA03B0B9 '!=' Modulus=D2BB53D99809434AC328C1A0FD6174386DC41FE862A48DE20C65512D9F326FCBD7B78E9090EFA541DA72888D7B8F8A9B530683E9AD45AE1FC6978565312233F9841132D9A1574B36F50D89D071A3BE8CCF46C6EEC4EC691690D54FD8B8B9CE644C174D4352CC05BBEDB67A993E00F2FF3BF5E58030C1E179B6A96F85DA03B0B9 ']' 439s + output_file=/tmp/sssd-softhsm2-OWCJiN/SSSD-child-29055-auth.output 439s ++ basename /tmp/sssd-softhsm2-OWCJiN/SSSD-child-29055-auth.output .output 439s + output_cert_file=/tmp/sssd-softhsm2-OWCJiN/SSSD-child-29055-auth.pem 439s + echo -n 053350 439s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-OWCJiN/test-full-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 '' --token_name 'Test Organization Root Tr Token' --module_name /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so 439s [p11_child[1997]] [main] (0x0400): p11_child started. 439s [p11_child[1997]] [main] (0x2000): Running in [auth] mode. 439s [p11_child[1997]] [main] (0x2000): Running with effective IDs: [0][0]. 439s [p11_child[1997]] [main] (0x2000): Running with real IDs [0][0]. 439s [p11_child[1997]] [do_card] (0x4000): Module List: 439s [p11_child[1997]] [do_card] (0x4000): common name: [softhsm2]. 439s [p11_child[1997]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 439s [p11_child[1997]] [do_card] (0x4000): Description [SoftHSM slot ID 0x23b8a8c0] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 439s [p11_child[1997]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 439s [p11_child[1997]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x23b8a8c0][599304384] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 439s [p11_child[1997]] [do_card] (0x4000): Login required. 439s [p11_child[1997]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 439s [p11_child[1997]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 439s [p11_child[1997]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so Test Organization Root Tr Token Test Organization Root Tr Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 439s [p11_child[1997]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x23b8a8c0;slot-manufacturer=SoftHSM%20project;slot-id=599304384;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=433cc54623b8a8c0;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 439s [p11_child[1997]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 439s [p11_child[1997]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 439s [p11_child[1997]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 439s [p11_child[1997]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 439s [p11_child[1997]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 439s [p11_child[1997]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 439s [p11_child[1997]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 439s [p11_child[1997]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 439s [p11_child[1997]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 439s [p11_child[1997]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 439s [p11_child[1997]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 439s [p11_child[1997]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 439s [p11_child[1997]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 439s [p11_child[1997]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 439s [p11_child[1997]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 439s [p11_child[1997]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 439s [p11_child[1997]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 439s [p11_child[1997]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 439s [p11_child[1997]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 439s [p11_child[1997]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 439s [p11_child[1997]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 439s [p11_child[1997]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 439s [p11_child[1997]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 439s [p11_child[1997]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 439s [p11_child[1997]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 439s [p11_child[1997]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 439s [p11_child[1997]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 439s [p11_child[1997]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 439s [p11_child[1997]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 439s [p11_child[1997]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 439s [p11_child[1997]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 439s [p11_child[1997]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 439s [p11_child[1997]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 439s [p11_child[1997]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 439s [p11_child[1997]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 439s [p11_child[1997]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 439s [p11_child[1997]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 439s [p11_child[1997]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 439s [p11_child[1997]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 439s [p11_child[1997]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 439s [p11_child[1997]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 439s [p11_child[1997]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 439s [p11_child[1997]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 439s [p11_child[1997]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 439s [p11_child[1997]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 439s [p11_child[1997]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 439s [p11_child[1997]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 439s [p11_child[1997]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 439s [p11_child[1997]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 439s [p11_child[1997]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 439s [p11_child[1997]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 439s [p11_child[1997]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 439s [p11_child[1997]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 439s [p11_child[1997]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 439s [p11_child[1997]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 439s [p11_child[1997]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 439s [p11_child[1997]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 439s [p11_child[1997]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 439s [p11_child[1997]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 439s [p11_child[1997]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 439s [p11_child[1997]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 439s [p11_child[1997]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 439s [p11_child[1997]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 439s [p11_child[1997]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 439s [p11_child[1997]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 439s [p11_child[1997]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 439s [p11_child[1997]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 439s [p11_child[1997]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 439s [p11_child[1997]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 439s [p11_child[1997]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 439s [p11_child[1997]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 439s [p11_child[1997]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 439s [p11_child[1997]] [do_card] (0x4000): Certificate verified and validated. 439s [p11_child[1997]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 439s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-OWCJiN/SSSD-child-29055-auth.output 439s + echo '-----BEGIN CERTIFICATE-----' 439s + tail -n1 /tmp/sssd-softhsm2-OWCJiN/SSSD-child-29055-auth.output 439s + echo '-----END CERTIFICATE-----' 439s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-OWCJiN/SSSD-child-29055-auth.pem 439s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-OWCJiN/SSSD-child-29055-auth.pem 439s Certificate: 439s Data: 439s Version: 3 (0x2) 439s Serial Number: 3 (0x3) 439s Signature Algorithm: sha256WithRSAEncryption 439s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 439s Validity 439s Not Before: Mar 5 01:21:30 2024 GMT 439s Not After : Mar 5 01:21:30 2025 GMT 439s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 439s Subject Public Key Info: 439s Public Key Algorithm: rsaEncryption 439s Public-Key: (1024 bit) 439s Modulus: 439s 00:d2:bb:53:d9:98:09:43:4a:c3:28:c1:a0:fd:61: 439s 74:38:6d:c4:1f:e8:62:a4:8d:e2:0c:65:51:2d:9f: 439s 32:6f:cb:d7:b7:8e:90:90:ef:a5:41:da:72:88:8d: 439s 7b:8f:8a:9b:53:06:83:e9:ad:45:ae:1f:c6:97:85: 439s 65:31:22:33:f9:84:11:32:d9:a1:57:4b:36:f5:0d: 439s 89:d0:71:a3:be:8c:cf:46:c6:ee:c4:ec:69:16:90: 439s d5:4f:d8:b8:b9:ce:64:4c:17:4d:43:52:cc:05:bb: 439s ed:b6:7a:99:3e:00:f2:ff:3b:f5:e5:80:30:c1:e1: 439s 79:b6:a9:6f:85:da:03:b0:b9 439s Exponent: 65537 (0x10001) 439s X509v3 extensions: 439s X509v3 Authority Key Identifier: 439s 6F:D4:40:C1:66:BB:57:9F:11:B3:C3:A6:01:B4:91:B3:3B:A9:D2:BA 439s X509v3 Basic Constraints: 439s CA:FALSE 439s Netscape Cert Type: 439s SSL Client, S/MIME 439s Netscape Comment: 439s Test Organization Root CA trusted Certificate 439s X509v3 Subject Key Identifier: 439s 32:B2:4D:1A:2B:71:C8:1E:72:A1:7A:C0:47:DA:8C:4F:7E:B6:E3:87 439s X509v3 Key Usage: critical 439s Digital Signature, Non Repudiation, Key Encipherment 439s X509v3 Extended Key Usage: 439s TLS Web Client Authentication, E-mail Protection 439s X509v3 Subject Alternative Name: 439s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 439s Signature Algorithm: sha256WithRSAEncryption 439s Signature Value: 439s 64:d4:53:df:f8:68:69:ab:7e:8c:c4:d8:cd:74:26:e6:f2:7a: 439s a6:b9:86:d8:77:c3:a9:92:4a:0f:f9:65:e4:3d:f5:6e:3b:dc: 439s a2:66:f5:61:5a:ce:66:ee:4d:ff:c7:4b:9c:2c:b5:f8:11:a7: 439s d0:1d:b6:19:9d:a4:0c:40:2f:6d:ba:f1:f7:0d:9b:cf:9b:c8: 439s 21:d8:4b:9f:ae:26:2c:ac:b6:66:8d:25:08:eb:9c:1d:e8:f6: 439s 32:85:7c:43:73:43:ea:79:08:bb:c6:2e:ab:2c:db:f7:37:2c: 439s c9:49:24:73:aa:38:c9:33:d9:10:c4:d2:59:89:d0:92:7d:d2: 439s dc:bd 439s + found_md5=Modulus=D2BB53D99809434AC328C1A0FD6174386DC41FE862A48DE20C65512D9F326FCBD7B78E9090EFA541DA72888D7B8F8A9B530683E9AD45AE1FC6978565312233F9841132D9A1574B36F50D89D071A3BE8CCF46C6EEC4EC691690D54FD8B8B9CE644C174D4352CC05BBEDB67A993E00F2FF3BF5E58030C1E179B6A96F85DA03B0B9 439s + '[' Modulus=D2BB53D99809434AC328C1A0FD6174386DC41FE862A48DE20C65512D9F326FCBD7B78E9090EFA541DA72888D7B8F8A9B530683E9AD45AE1FC6978565312233F9841132D9A1574B36F50D89D071A3BE8CCF46C6EEC4EC691690D54FD8B8B9CE644C174D4352CC05BBEDB67A993E00F2FF3BF5E58030C1E179B6A96F85DA03B0B9 '!=' Modulus=D2BB53D99809434AC328C1A0FD6174386DC41FE862A48DE20C65512D9F326FCBD7B78E9090EFA541DA72888D7B8F8A9B530683E9AD45AE1FC6978565312233F9841132D9A1574B36F50D89D071A3BE8CCF46C6EEC4EC691690D54FD8B8B9CE644C174D4352CC05BBEDB67A993E00F2FF3BF5E58030C1E179B6A96F85DA03B0B9 ']' 439s + valid_certificate /tmp/sssd-softhsm2-OWCJiN/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-4161 /tmp/sssd-softhsm2-OWCJiN/test-full-chain-CA.pem partial_chain 439s + check_certificate /tmp/sssd-softhsm2-OWCJiN/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-4161 /tmp/sssd-softhsm2-OWCJiN/test-full-chain-CA.pem partial_chain 439s + local certificate=/tmp/sssd-softhsm2-OWCJiN/test-root-CA-trusted-certificate-0001.pem 439s + local key_pass=pass:random-root-ca-trusted-cert-0001-4161 439s + local key_ring=/tmp/sssd-softhsm2-OWCJiN/test-full-chain-CA.pem 439s + local verify_option=partial_chain 439s + prepare_softhsm2_card /tmp/sssd-softhsm2-OWCJiN/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-4161 439s + local certificate=/tmp/sssd-softhsm2-OWCJiN/test-root-CA-trusted-certificate-0001.pem 439s + local key_pass=pass:random-root-ca-trusted-cert-0001-4161 439s + local key_cn 439s + local key_name 439s + local tokens_dir 439s + local output_cert_file 439s + token_name= 439s ++ basename /tmp/sssd-softhsm2-OWCJiN/test-root-CA-trusted-certificate-0001.pem .pem 439s + key_name=test-root-CA-trusted-certificate-0001 439s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-OWCJiN/test-root-CA-trusted-certificate-0001.pem 439s ++ sed -n 's/ *commonName *= //p' 439s Test Organization Root Tr Token 439s + key_cn='Test Organization Root Trusted Certificate 0001' 439s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 439s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-OWCJiN/softhsm2-test-root-CA-trusted-certificate-0001.conf 439s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-OWCJiN/softhsm2-test-root-CA-trusted-certificate-0001.conf 439s ++ basename /tmp/sssd-softhsm2-OWCJiN/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 439s + tokens_dir=/tmp/sssd-softhsm2-OWCJiN/softhsm2-test-root-CA-trusted-certificate-0001 439s + token_name='Test Organization Root Tr Token' 439s + '[' '!' -e /tmp/sssd-softhsm2-OWCJiN/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 439s + '[' '!' -d /tmp/sssd-softhsm2-OWCJiN/softhsm2-test-root-CA-trusted-certificate-0001 ']' 439s + echo 'Test Organization Root Tr Token' 439s + '[' -n partial_chain ']' 439s + local verify_arg=--verify=partial_chain 439s + local output_base_name=SSSD-child-15523 439s + local output_file=/tmp/sssd-softhsm2-OWCJiN/SSSD-child-15523.output 439s + output_cert_file=/tmp/sssd-softhsm2-OWCJiN/SSSD-child-15523.pem 439s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-OWCJiN/test-full-chain-CA.pem 439s [p11_child[2007]] [main] (0x0400): p11_child started. 439s [p11_child[2007]] [main] (0x2000): Running in [pre-auth] mode. 439s [p11_child[2007]] [main] (0x2000): Running with effective IDs: [0][0]. 439s [p11_child[2007]] [main] (0x2000): Running with real IDs [0][0]. 439s [p11_child[2007]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 439s [p11_child[2007]] [do_card] (0x4000): Module List: 439s [p11_child[2007]] [do_card] (0x4000): common name: [softhsm2]. 439s [p11_child[2007]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 439s [p11_child[2007]] [do_card] (0x4000): Description [SoftHSM slot ID 0x23b8a8c0] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 439s [p11_child[2007]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 439s [p11_child[2007]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x23b8a8c0][599304384] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 439s [p11_child[2007]] [do_card] (0x4000): Login NOT required. 439s [p11_child[2007]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 439s [p11_child[2007]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 439s [p11_child[2007]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Root Tr Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 439s [p11_child[2007]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x23b8a8c0;slot-manufacturer=SoftHSM%20project;slot-id=599304384;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=433cc54623b8a8c0;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 439s [p11_child[2007]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 439s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-OWCJiN/SSSD-child-15523.output 439s + echo '-----BEGIN CERTIFICATE-----' 439s + tail -n1 /tmp/sssd-softhsm2-OWCJiN/SSSD-child-15523.output 439s + echo '-----END CERTIFICATE-----' 439s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-OWCJiN/SSSD-child-15523.pem 439s Certificate: 439s Data: 439s Version: 3 (0x2) 439s Serial Number: 3 (0x3) 439s Signature Algorithm: sha256WithRSAEncryption 439s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 439s Validity 439s Not Before: Mar 5 01:21:30 2024 GMT 439s Not After : Mar 5 01:21:30 2025 GMT 439s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 439s Subject Public Key Info: 439s Public Key Algorithm: rsaEncryption 439s Public-Key: (1024 bit) 439s Modulus: 439s 00:d2:bb:53:d9:98:09:43:4a:c3:28:c1:a0:fd:61: 439s 74:38:6d:c4:1f:e8:62:a4:8d:e2:0c:65:51:2d:9f: 439s 32:6f:cb:d7:b7:8e:90:90:ef:a5:41:da:72:88:8d: 439s 7b:8f:8a:9b:53:06:83:e9:ad:45:ae:1f:c6:97:85: 439s 65:31:22:33:f9:84:11:32:d9:a1:57:4b:36:f5:0d: 439s 89:d0:71:a3:be:8c:cf:46:c6:ee:c4:ec:69:16:90: 439s d5:4f:d8:b8:b9:ce:64:4c:17:4d:43:52:cc:05:bb: 439s ed:b6:7a:99:3e:00:f2:ff:3b:f5:e5:80:30:c1:e1: 439s 79:b6:a9:6f:85:da:03:b0:b9 439s Exponent: 65537 (0x10001) 439s X509v3 extensions: 439s X509v3 Authority Key Identifier: 439s 6F:D4:40:C1:66:BB:57:9F:11:B3:C3:A6:01:B4:91:B3:3B:A9:D2:BA 439s X509v3 Basic Constraints: 439s CA:FALSE 439s Netscape Cert Type: 439s SSL Client, S/MIME 439s Netscape Comment: 439s Test Organization Root CA trusted Certificate 439s X509v3 Subject Key Identifier: 439s 32:B2:4D:1A:2B:71:C8:1E:72:A1:7A:C0:47:DA:8C:4F:7E:B6:E3:87 439s X509v3 Key Usage: critical 439s Digital Signature, Non Repudiation, Key Encipherment 439s X509v3 Extended Key Usage: 439s TLS Web Client Authentication, E-mail Protection 439s X509v3 Subject Alternative Name: 439s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 439s Signature Algorithm: sha256WithRSAEncryption 439s Signature Value: 439s 64:d4:53:df:f8:68:69:ab:7e:8c:c4:d8:cd:74:26:e6:f2:7a: 439s a6:b9:86:d8:77:c3:a9:92:4a:0f:f9:65:e4:3d:f5:6e:3b:dc: 439s a2:66:f5:61:5a:ce:66:ee:4d:ff:c7:4b:9c:2c:b5:f8:11:a7: 439s d0:1d:b6:19:9d:a4:0c:40:2f:6d:ba:f1:f7:0d:9b:cf:9b:c8: 439s 21:d8:4b:9f:ae:26:2c:ac:b6:66:8d:25:08:eb:9c:1d:e8:f6: 439s 32:85:7c:43:73:43:ea:79:08:bb:c6:2e:ab:2c:db:f7:37:2c: 439s c9:49:24:73:aa:38:c9:33:d9:10:c4:d2:59:89:d0:92:7d:d2: 439s dc:bd 439s + local found_md5 expected_md5 439s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-OWCJiN/test-root-CA-trusted-certificate-0001.pem 439s + expected_md5=Modulus=D2BB53D99809434AC328C1A0FD6174386DC41FE862A48DE20C65512D9F326FCBD7B78E9090EFA541DA72888D7B8F8A9B530683E9AD45AE1FC6978565312233F9841132D9A1574B36F50D89D071A3BE8CCF46C6EEC4EC691690D54FD8B8B9CE644C174D4352CC05BBEDB67A993E00F2FF3BF5E58030C1E179B6A96F85DA03B0B9 439s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-OWCJiN/SSSD-child-15523.pem 439s + found_md5=Modulus=D2BB53D99809434AC328C1A0FD6174386DC41FE862A48DE20C65512D9F326FCBD7B78E9090EFA541DA72888D7B8F8A9B530683E9AD45AE1FC6978565312233F9841132D9A1574B36F50D89D071A3BE8CCF46C6EEC4EC691690D54FD8B8B9CE644C174D4352CC05BBEDB67A993E00F2FF3BF5E58030C1E179B6A96F85DA03B0B9 439s + '[' Modulus=D2BB53D99809434AC328C1A0FD6174386DC41FE862A48DE20C65512D9F326FCBD7B78E9090EFA541DA72888D7B8F8A9B530683E9AD45AE1FC6978565312233F9841132D9A1574B36F50D89D071A3BE8CCF46C6EEC4EC691690D54FD8B8B9CE644C174D4352CC05BBEDB67A993E00F2FF3BF5E58030C1E179B6A96F85DA03B0B9 '!=' Modulus=D2BB53D99809434AC328C1A0FD6174386DC41FE862A48DE20C65512D9F326FCBD7B78E9090EFA541DA72888D7B8F8A9B530683E9AD45AE1FC6978565312233F9841132D9A1574B36F50D89D071A3BE8CCF46C6EEC4EC691690D54FD8B8B9CE644C174D4352CC05BBEDB67A993E00F2FF3BF5E58030C1E179B6A96F85DA03B0B9 ']' 439s + output_file=/tmp/sssd-softhsm2-OWCJiN/SSSD-child-15523-auth.output 439s ++ basename /tmp/sssd-softhsm2-OWCJiN/SSSD-child-15523-auth.output .output 439s + output_cert_file=/tmp/sssd-softhsm2-OWCJiN/SSSD-child-15523-auth.pem 439s + echo -n 053350 439s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-OWCJiN/test-full-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Root Tr Token' --module_name /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so 440s [p11_child[2015]] [main] (0x0400): p11_child started. 440s [p11_child[2015]] [main] (0x2000): Running in [auth] mode. 440s [p11_child[2015]] [main] (0x2000): Running with effective IDs: [0][0]. 440s [p11_child[2015]] [main] (0x2000): Running with real IDs [0][0]. 440s [p11_child[2015]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 440s [p11_child[2015]] [do_card] (0x4000): Module List: 440s [p11_child[2015]] [do_card] (0x4000): common name: [softhsm2]. 440s [p11_child[2015]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 440s [p11_child[2015]] [do_card] (0x4000): Description [SoftHSM slot ID 0x23b8a8c0] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 440s [p11_child[2015]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 440s [p11_child[2015]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x23b8a8c0][599304384] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 440s [p11_child[2015]] [do_card] (0x4000): Login required. 440s [p11_child[2015]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 440s [p11_child[2015]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 440s [p11_child[2015]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so Test Organization Root Tr Token Test Organization Root Tr Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 440s [p11_child[2015]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x23b8a8c0;slot-manufacturer=SoftHSM%20project;slot-id=599304384;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=433cc54623b8a8c0;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 440s [p11_child[2015]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 440s [p11_child[2015]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 440s [p11_child[2015]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 440s [p11_child[2015]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 440s [p11_child[2015]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 440s [p11_child[2015]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 440s [p11_child[2015]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 440s [p11_child[2015]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 440s [p11_child[2015]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 440s [p11_child[2015]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 440s [p11_child[2015]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 440s [p11_child[2015]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 440s [p11_child[2015]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 440s [p11_child[2015]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 440s [p11_child[2015]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 440s [p11_child[2015]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 440s [p11_child[2015]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 440s [p11_child[2015]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 440s [p11_child[2015]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 440s [p11_child[2015]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 440s [p11_child[2015]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 440s [p11_child[2015]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 440s [p11_child[2015]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 440s [p11_child[2015]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 440s [p11_child[2015]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 440s [p11_child[2015]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 440s [p11_child[2015]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 440s [p11_child[2015]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 440s [p11_child[2015]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 440s [p11_child[2015]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 440s [p11_child[2015]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 440s [p11_child[2015]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 440s [p11_child[2015]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 440s [p11_child[2015]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 440s [p11_child[2015]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 440s [p11_child[2015]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 440s [p11_child[2015]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 440s [p11_child[2015]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 440s [p11_child[2015]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 440s [p11_child[2015]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 440s [p11_child[2015]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 440s [p11_child[2015]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 440s [p11_child[2015]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 440s [p11_child[2015]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 440s [p11_child[2015]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 440s [p11_child[2015]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 440s [p11_child[2015]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 440s [p11_child[2015]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 440s [p11_child[2015]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 440s [p11_child[2015]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 440s [p11_child[2015]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 440s [p11_child[2015]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 440s [p11_child[2015]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 440s [p11_child[2015]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 440s [p11_child[2015]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 440s [p11_child[2015]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 440s [p11_child[2015]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 440s [p11_child[2015]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 440s [p11_child[2015]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 440s [p11_child[2015]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 440s [p11_child[2015]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 440s [p11_child[2015]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 440s [p11_child[2015]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 440s [p11_child[2015]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 440s [p11_child[2015]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 440s [p11_child[2015]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 440s [p11_child[2015]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 440s [p11_child[2015]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 440s [p11_child[2015]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 440s [p11_child[2015]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 440s [p11_child[2015]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 440s [p11_child[2015]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 440s [p11_child[2015]] [do_card] (0x4000): Certificate verified and validated. 440s [p11_child[2015]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 440s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-OWCJiN/SSSD-child-15523-auth.output 440s + echo '-----BEGIN CERTIFICATE-----' 440s + tail -n1 /tmp/sssd-softhsm2-OWCJiN/SSSD-child-15523-auth.output 440s + echo '-----END CERTIFICATE-----' 440s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-OWCJiN/SSSD-child-15523-auth.pem 440s Certificate: 440s Data: 440s Version: 3 (0x2) 440s Serial Number: 3 (0x3) 440s Signature Algorithm: sha256WithRSAEncryption 440s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 440s Validity 440s Not Before: Mar 5 01:21:30 2024 GMT 440s Not After : Mar 5 01:21:30 2025 GMT 440s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 440s Subject Public Key Info: 440s Public Key Algorithm: rsaEncryption 440s Public-Key: (1024 bit) 440s Modulus: 440s 00:d2:bb:53:d9:98:09:43:4a:c3:28:c1:a0:fd:61: 440s 74:38:6d:c4:1f:e8:62:a4:8d:e2:0c:65:51:2d:9f: 440s 32:6f:cb:d7:b7:8e:90:90:ef:a5:41:da:72:88:8d: 440s 7b:8f:8a:9b:53:06:83:e9:ad:45:ae:1f:c6:97:85: 440s 65:31:22:33:f9:84:11:32:d9:a1:57:4b:36:f5:0d: 440s 89:d0:71:a3:be:8c:cf:46:c6:ee:c4:ec:69:16:90: 440s d5:4f:d8:b8:b9:ce:64:4c:17:4d:43:52:cc:05:bb: 440s ed:b6:7a:99:3e:00:f2:ff:3b:f5:e5:80:30:c1:e1: 440s 79:b6:a9:6f:85:da:03:b0:b9 440s Exponent: 65537 (0x10001) 440s X509v3 extensions: 440s X509v3 Authority Key Identifier: 440s 6F:D4:40:C1:66:BB:57:9F:11:B3:C3:A6:01:B4:91:B3:3B:A9:D2:BA 440s X509v3 Basic Constraints: 440s CA:FALSE 440s Netscape Cert Type: 440s SSL Client, S/MIME 440s Netscape Comment: 440s Test Organization Root CA trusted Certificate 440s X509v3 Subject Key Identifier: 440s 32:B2:4D:1A:2B:71:C8:1E:72:A1:7A:C0:47:DA:8C:4F:7E:B6:E3:87 440s X509v3 Key Usage: critical 440s Digital Signature, Non Repudiation, Key Encipherment 440s X509v3 Extended Key Usage: 440s TLS Web Client Authentication, E-mail Protection 440s X509v3 Subject Alternative Name: 440s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 440s Signature Algorithm: sha256WithRSAEncryption 440s Signature Value: 440s 64:d4:53:df:f8:68:69:ab:7e:8c:c4:d8:cd:74:26:e6:f2:7a: 440s a6:b9:86:d8:77:c3:a9:92:4a:0f:f9:65:e4:3d:f5:6e:3b:dc: 440s a2:66:f5:61:5a:ce:66:ee:4d:ff:c7:4b:9c:2c:b5:f8:11:a7: 440s d0:1d:b6:19:9d:a4:0c:40:2f:6d:ba:f1:f7:0d:9b:cf:9b:c8: 440s 21:d8:4b:9f:ae:26:2c:ac:b6:66:8d:25:08:eb:9c:1d:e8:f6: 440s 32:85:7c:43:73:43:ea:79:08:bb:c6:2e:ab:2c:db:f7:37:2c: 440s c9:49:24:73:aa:38:c9:33:d9:10:c4:d2:59:89:d0:92:7d:d2: 440s dc:bd 440s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-OWCJiN/SSSD-child-15523-auth.pem 440s + found_md5=Modulus=D2BB53D99809434AC328C1A0FD6174386DC41FE862A48DE20C65512D9F326FCBD7B78E9090EFA541DA72888D7B8F8A9B530683E9AD45AE1FC6978565312233F9841132D9A1574B36F50D89D071A3BE8CCF46C6EEC4EC691690D54FD8B8B9CE644C174D4352CC05BBEDB67A993E00F2FF3BF5E58030C1E179B6A96F85DA03B0B9 440s + '[' Modulus=D2BB53D99809434AC328C1A0FD6174386DC41FE862A48DE20C65512D9F326FCBD7B78E9090EFA541DA72888D7B8F8A9B530683E9AD45AE1FC6978565312233F9841132D9A1574B36F50D89D071A3BE8CCF46C6EEC4EC691690D54FD8B8B9CE644C174D4352CC05BBEDB67A993E00F2FF3BF5E58030C1E179B6A96F85DA03B0B9 '!=' Modulus=D2BB53D99809434AC328C1A0FD6174386DC41FE862A48DE20C65512D9F326FCBD7B78E9090EFA541DA72888D7B8F8A9B530683E9AD45AE1FC6978565312233F9841132D9A1574B36F50D89D071A3BE8CCF46C6EEC4EC691690D54FD8B8B9CE644C174D4352CC05BBEDB67A993E00F2FF3BF5E58030C1E179B6A96F85DA03B0B9 ']' 440s + invalid_certificate /tmp/sssd-softhsm2-OWCJiN/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-4161 /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA.pem 440s + check_certificate /tmp/sssd-softhsm2-OWCJiN/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-4161 /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA.pem 440s + local certificate=/tmp/sssd-softhsm2-OWCJiN/test-root-CA-trusted-certificate-0001.pem 440s + local key_pass=pass:random-root-ca-trusted-cert-0001-4161 440s + local key_ring=/tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA.pem 440s + local verify_option= 440s + prepare_softhsm2_card /tmp/sssd-softhsm2-OWCJiN/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-4161 440s + local certificate=/tmp/sssd-softhsm2-OWCJiN/test-root-CA-trusted-certificate-0001.pem 440s + local key_pass=pass:random-root-ca-trusted-cert-0001-4161 440s + local key_cn 440s + local key_name 440s + local tokens_dir 440s + local output_cert_file 440s + token_name= 440s ++ basename /tmp/sssd-softhsm2-OWCJiN/test-root-CA-trusted-certificate-0001.pem .pem 440s + key_name=test-root-CA-trusted-certificate-0001 440s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-OWCJiN/test-root-CA-trusted-certificate-0001.pem 440s ++ sed -n 's/ *commonName *= //p' 440s + key_cn='Test Organization Root Trusted Certificate 0001' 440s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 440s Test Organization Root Tr Token 440s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-OWCJiN/softhsm2-test-root-CA-trusted-certificate-0001.conf 440s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-OWCJiN/softhsm2-test-root-CA-trusted-certificate-0001.conf 440s ++ basename /tmp/sssd-softhsm2-OWCJiN/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 440s + tokens_dir=/tmp/sssd-softhsm2-OWCJiN/softhsm2-test-root-CA-trusted-certificate-0001 440s + token_name='Test Organization Root Tr Token' 440s + '[' '!' -e /tmp/sssd-softhsm2-OWCJiN/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 440s + '[' '!' -d /tmp/sssd-softhsm2-OWCJiN/softhsm2-test-root-CA-trusted-certificate-0001 ']' 440s + echo 'Test Organization Root Tr Token' 440s + '[' -n '' ']' 440s + local output_base_name=SSSD-child-20764 440s + local output_file=/tmp/sssd-softhsm2-OWCJiN/SSSD-child-20764.output 440s + output_cert_file=/tmp/sssd-softhsm2-OWCJiN/SSSD-child-20764.pem 440s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA.pem 440s [p11_child[2025]] [main] (0x0400): p11_child started. 440s [p11_child[2025]] [main] (0x2000): Running in [pre-auth] mode. 440s [p11_child[2025]] [main] (0x2000): Running with effective IDs: [0][0]. 440s [p11_child[2025]] [main] (0x2000): Running with real IDs [0][0]. 440s [p11_child[2025]] [do_card] (0x4000): Module List: 440s [p11_child[2025]] [do_card] (0x4000): common name: [softhsm2]. 440s [p11_child[2025]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 440s [p11_child[2025]] [do_card] (0x4000): Description [SoftHSM slot ID 0x23b8a8c0] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 440s [p11_child[2025]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 440s [p11_child[2025]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x23b8a8c0][599304384] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 440s [p11_child[2025]] [do_card] (0x4000): Login NOT required. 440s [p11_child[2025]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 440s [p11_child[2025]] [do_verification] (0x0040): X509_verify_cert failed [0]. 440s [p11_child[2025]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 440s [p11_child[2025]] [read_certs] (0x0040): Certificate [Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] not valid, skipping. 440s [p11_child[2025]] [do_card] (0x4000): No certificate found. 440s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-OWCJiN/SSSD-child-20764.output 440s + return 2 440s + invalid_certificate /tmp/sssd-softhsm2-OWCJiN/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-4161 /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA.pem partial_chain 440s + check_certificate /tmp/sssd-softhsm2-OWCJiN/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-4161 /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA.pem partial_chain 440s + local certificate=/tmp/sssd-softhsm2-OWCJiN/test-root-CA-trusted-certificate-0001.pem 440s + local key_pass=pass:random-root-ca-trusted-cert-0001-4161 440s + local key_ring=/tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA.pem 440s + local verify_option=partial_chain 440s + prepare_softhsm2_card /tmp/sssd-softhsm2-OWCJiN/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-4161 440s + local certificate=/tmp/sssd-softhsm2-OWCJiN/test-root-CA-trusted-certificate-0001.pem 440s + local key_pass=pass:random-root-ca-trusted-cert-0001-4161 440s + local key_cn 440s + local key_name 440s + local tokens_dir 440s + local output_cert_file 440s + token_name= 440s ++ basename /tmp/sssd-softhsm2-OWCJiN/test-root-CA-trusted-certificate-0001.pem .pem 440s + key_name=test-root-CA-trusted-certificate-0001 440s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-OWCJiN/test-root-CA-trusted-certificate-0001.pem 440s ++ sed -n 's/ *commonName *= //p' 440s + key_cn='Test Organization Root Trusted Certificate 0001' 440s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 440s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-OWCJiN/softhsm2-test-root-CA-trusted-certificate-0001.conf 440s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-OWCJiN/softhsm2-test-root-CA-trusted-certificate-0001.conf 440s ++ basename /tmp/sssd-softhsm2-OWCJiN/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 440s + tokens_dir=/tmp/sssd-softhsm2-OWCJiN/softhsm2-test-root-CA-trusted-certificate-0001 440s Test Organization Root Tr Token 440s + token_name='Test Organization Root Tr Token' 440s + '[' '!' -e /tmp/sssd-softhsm2-OWCJiN/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 440s + '[' '!' -d /tmp/sssd-softhsm2-OWCJiN/softhsm2-test-root-CA-trusted-certificate-0001 ']' 440s + echo 'Test Organization Root Tr Token' 440s + '[' -n partial_chain ']' 440s + local verify_arg=--verify=partial_chain 440s + local output_base_name=SSSD-child-368 440s + local output_file=/tmp/sssd-softhsm2-OWCJiN/SSSD-child-368.output 440s + output_cert_file=/tmp/sssd-softhsm2-OWCJiN/SSSD-child-368.pem 440s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA.pem 440s [p11_child[2032]] [main] (0x0400): p11_child started. 440s [p11_child[2032]] [main] (0x2000): Running in [pre-auth] mode. 440s [p11_child[2032]] [main] (0x2000): Running with effective IDs: [0][0]. 440s [p11_child[2032]] [main] (0x2000): Running with real IDs [0][0]. 440s [p11_child[2032]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 440s [p11_child[2032]] [do_card] (0x4000): Module List: 440s [p11_child[2032]] [do_card] (0x4000): common name: [softhsm2]. 440s [p11_child[2032]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 440s [p11_child[2032]] [do_card] (0x4000): Description [SoftHSM slot ID 0x23b8a8c0] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 440s [p11_child[2032]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 440s [p11_child[2032]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x23b8a8c0][599304384] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 440s [p11_child[2032]] [do_card] (0x4000): Login NOT required. 440s [p11_child[2032]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 440s [p11_child[2032]] [do_verification] (0x0040): X509_verify_cert failed [0]. 440s [p11_child[2032]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 440s [p11_child[2032]] [read_certs] (0x0040): Certificate [Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] not valid, skipping. 440s [p11_child[2032]] [do_card] (0x4000): No certificate found. 440s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-OWCJiN/SSSD-child-368.output 440s + return 2 440s + invalid_certificate /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-13010 /dev/null 440s + check_certificate /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-13010 /dev/null 440s + local certificate=/tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA-trusted-certificate-0001.pem 440s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-13010 440s + local key_ring=/dev/null 440s + local verify_option= 440s + prepare_softhsm2_card /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-13010 440s + local certificate=/tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA-trusted-certificate-0001.pem 440s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-13010 440s + local key_cn 440s + local key_name 440s + local tokens_dir 440s + local output_cert_file 440s + token_name= 440s ++ basename /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA-trusted-certificate-0001.pem .pem 440s + key_name=test-intermediate-CA-trusted-certificate-0001 440s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA-trusted-certificate-0001.pem 440s ++ sed -n 's/ *commonName *= //p' 440s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 440s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 440s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-OWCJiN/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 440s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-OWCJiN/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 440s ++ basename /tmp/sssd-softhsm2-OWCJiN/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 440s + tokens_dir=/tmp/sssd-softhsm2-OWCJiN/softhsm2-test-intermediate-CA-trusted-certificate-0001 440s + token_name='Test Organization Interme Token' 440s + '[' '!' -e /tmp/sssd-softhsm2-OWCJiN/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 440s + local key_file 440s + local decrypted_key 440s + mkdir -p /tmp/sssd-softhsm2-OWCJiN/softhsm2-test-intermediate-CA-trusted-certificate-0001 440s + key_file=/tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA-trusted-certificate-0001-key.pem 440s + decrypted_key=/tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 440s + cat 440s + softhsm2-util --init-token --label 'Test Organization Interme Token' --pin 053350 --so-pin 053350 --free 440s + softhsm2-util --show-slots 440s Slot 0 has a free/uninitialized token. 440s The token has been initialized and is reassigned to slot 1812798953 440s Available slots: 440s Slot 1812798953 440s Slot info: 440s Description: SoftHSM slot ID 0x6c0d1de9 440s Manufacturer ID: SoftHSM project 440s Hardware version: 2.6 440s Firmware version: 2.6 440s Token present: yes 440s Token info: 440s Manufacturer ID: SoftHSM project 440s Model: SoftHSM v2 440s Hardware version: 2.6 440s Firmware version: 2.6 440s Serial number: f2f314426c0d1de9 440s Initialized: yes 440s User PIN init.: yes 440s Label: Test Organization Interme Token 440s Slot 1 440s Slot info: 440s Description: SoftHSM slot ID 0x1 440s Manufacturer ID: SoftHSM project 440s Hardware version: 2.6 440s Firmware version: 2.6 440s Token present: yes 440s Token info: 440s Manufacturer ID: SoftHSM project 440s Model: SoftHSM v2 440s Hardware version: 2.6 440s Firmware version: 2.6 440s Serial number: 440s Initialized: no 440s User PIN init.: no 440s Label: 440s + p11tool --provider=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --write --no-mark-private --load-certificate=/tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA-trusted-certificate-0001.pem --login --set-pin=053350 --label 'Test Organization Intermediate Trusted Certificate 0001' --id 00112233445566778899FFAABBCCDDEEFF012345 440s + openssl rsa -passin pass:random-intermediate-ca-trusted-cert-0001-13010 -in /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA-trusted-certificate-0001-key.pem -out /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 440s writing RSA key 440s + p11tool --provider=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --write --load-privkey=/tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem --login --set-pin=053350 --label 'Test Organization Intermediate Trusted Certificate 0001 Key' --id 00112233445566778899FFAABBCCDDEEFF012345 440s + rm /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 440s + p11tool --provider=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --list-all 440s Object 0: 440s URL: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=f2f314426c0d1de9;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert 440s Type: X.509 Certificate (RSA-1024) 440s Expires: Wed Mar 5 01:21:31 2025 440s Label: Test Organization Intermediate Trusted Certificate 0001 440s ID: 00:11:22:33:44:55:66:77:88:99:ff:aa:bb:cc:dd:ee:ff:01:23:45 440s 440s + echo 'Test Organization Interme Token' 440s Test Organization Interme Token 440s + '[' -n '' ']' 440s + local output_base_name=SSSD-child-16515 440s + local output_file=/tmp/sssd-softhsm2-OWCJiN/SSSD-child-16515.output 440s + output_cert_file=/tmp/sssd-softhsm2-OWCJiN/SSSD-child-16515.pem 440s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/dev/null 440s [p11_child[2048]] [main] (0x0400): p11_child started. 440s [p11_child[2048]] [main] (0x2000): Running in [pre-auth] mode. 440s [p11_child[2048]] [main] (0x2000): Running with effective IDs: [0][0]. 440s [p11_child[2048]] [main] (0x2000): Running with real IDs [0][0]. 440s [p11_child[2048]] [init_verification] (0x0040): X509_LOOKUP_load_file [/dev/null] failed [92274824][error:05800088:x509 certificate routines::no certificate or crl found]. 440s [p11_child[2048]] [do_work] (0x0040): init_verification failed. 440s [p11_child[2048]] [main] (0x0020): p11_child failed (5) 440s + return 2 440s + valid_certificate /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-13010 /dev/null no_verification 440s + check_certificate /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-13010 /dev/null no_verification 440s + local certificate=/tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA-trusted-certificate-0001.pem 440s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-13010 440s + local key_ring=/dev/null 440s + local verify_option=no_verification 440s + prepare_softhsm2_card /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-13010 440s + local certificate=/tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA-trusted-certificate-0001.pem 440s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-13010 440s + local key_cn 440s + local key_name 440s + local tokens_dir 440s + local output_cert_file 440s + token_name= 440s ++ basename /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA-trusted-certificate-0001.pem .pem 440s + key_name=test-intermediate-CA-trusted-certificate-0001 440s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA-trusted-certificate-0001.pem 440s ++ sed -n 's/ *commonName *= //p' 440s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 440s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 440s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-OWCJiN/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 440s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-OWCJiN/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 440s ++ basename /tmp/sssd-softhsm2-OWCJiN/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 440s + tokens_dir=/tmp/sssd-softhsm2-OWCJiN/softhsm2-test-intermediate-CA-trusted-certificate-0001 440s + token_name='Test Organization Interme Token' 440s + '[' '!' -e /tmp/sssd-softhsm2-OWCJiN/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 440s + '[' '!' -d /tmp/sssd-softhsm2-OWCJiN/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 440s + echo 'Test Organization Interme Token' 440s + '[' -n no_verification ']' 440s + local verify_arg=--verify=no_verification 440s + local output_base_name=SSSD-child-21967 440s + local output_file=/tmp/sssd-softhsm2-OWCJiN/SSSD-child-21967.output 440s Test Organization Interme Token 440s + output_cert_file=/tmp/sssd-softhsm2-OWCJiN/SSSD-child-21967.pem 440s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --verify=no_verification --ca_db=/dev/null 440s [p11_child[2054]] [main] (0x0400): p11_child started. 440s [p11_child[2054]] [main] (0x2000): Running in [pre-auth] mode. 440s [p11_child[2054]] [main] (0x2000): Running with effective IDs: [0][0]. 440s [p11_child[2054]] [main] (0x2000): Running with real IDs [0][0]. 440s [p11_child[2054]] [parse_cert_verify_opts] (0x0020): Found 'no_verification' option, disabling verification completely. This should not be used in production. 440s [p11_child[2054]] [do_card] (0x4000): Module List: 440s [p11_child[2054]] [do_card] (0x4000): common name: [softhsm2]. 440s [p11_child[2054]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 440s [p11_child[2054]] [do_card] (0x4000): Description [SoftHSM slot ID 0x6c0d1de9] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 440s [p11_child[2054]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 440s [p11_child[2054]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x6c0d1de9][1812798953] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 440s [p11_child[2054]] [do_card] (0x4000): Login NOT required. 440s [p11_child[2054]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 440s [p11_child[2054]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Interme Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 440s [p11_child[2054]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x6c0d1de9;slot-manufacturer=SoftHSM%20project;slot-id=1812798953;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=f2f314426c0d1de9;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 440s [p11_child[2054]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 440s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-OWCJiN/SSSD-child-21967.output 440s + echo '-----BEGIN CERTIFICATE-----' 440s + tail -n1 /tmp/sssd-softhsm2-OWCJiN/SSSD-child-21967.output 440s + echo '-----END CERTIFICATE-----' 440s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-OWCJiN/SSSD-child-21967.pem 440s Certificate: 440s Data: 440s Version: 3 (0x2) 440s Serial Number: 4 (0x4) 440s Signature Algorithm: sha256WithRSAEncryption 440s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 440s Validity 440s Not Before: Mar 5 01:21:31 2024 GMT 440s Not After : Mar 5 01:21:31 2025 GMT 440s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 440s Subject Public Key Info: 440s Public Key Algorithm: rsaEncryption 440s Public-Key: (1024 bit) 440s Modulus: 440s 00:b3:31:0b:60:44:6d:b3:67:8f:b1:9c:d0:75:e6: 440s 4f:67:4b:0b:e8:37:28:8b:b0:73:7e:ee:16:a4:aa: 440s 4e:77:ea:67:60:34:c8:61:66:7a:17:1d:68:3a:41: 440s ac:3c:85:e6:49:ec:d9:8b:4e:b3:51:4c:8b:2d:15: 440s 84:5b:dc:ae:c5:9e:7b:95:76:bd:41:14:9f:02:cc: 440s 4c:61:bc:8e:31:79:b0:b8:7e:0c:0e:a7:0b:ff:74: 440s 6f:a5:62:53:57:9f:b6:22:ea:b7:0c:7f:1c:94:3d: 440s 65:06:3e:02:23:09:26:d3:80:11:5f:fc:db:fe:41: 440s aa:8f:1e:43:67:94:70:aa:f1 440s Exponent: 65537 (0x10001) 440s X509v3 extensions: 440s X509v3 Authority Key Identifier: 440s EA:37:3A:E0:F0:76:0D:2F:32:E6:0A:79:95:CF:5E:52:78:41:2C:54 440s X509v3 Basic Constraints: 440s CA:FALSE 440s Netscape Cert Type: 440s SSL Client, S/MIME 440s Netscape Comment: 440s Test Organization Intermediate CA trusted Certificate 440s X509v3 Subject Key Identifier: 440s 37:1D:92:78:52:83:05:40:E9:2E:27:59:88:21:B0:68:E2:BF:FA:7C 440s X509v3 Key Usage: critical 440s Digital Signature, Non Repudiation, Key Encipherment 440s X509v3 Extended Key Usage: 440s TLS Web Client Authentication, E-mail Protection 440s X509v3 Subject Alternative Name: 440s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 440s Signature Algorithm: sha256WithRSAEncryption 440s Signature Value: 440s 19:8e:a3:c9:b0:ec:41:b3:f6:29:0c:e9:18:1b:ac:f6:26:8d: 440s d5:ee:44:10:d4:98:44:80:21:47:32:e9:7b:6a:c0:9d:69:ff: 440s b1:fb:95:3b:62:b0:a0:b8:93:a8:94:be:20:f0:9a:64:c5:b5: 440s c5:62:4f:be:a2:e9:fe:19:68:8b:bc:c5:94:68:49:66:9a:b1: 440s 81:5b:54:e0:e5:5a:14:e3:6f:f0:0a:0e:c2:f4:cb:92:d5:33: 440s 69:61:49:8e:f9:45:03:a9:11:cd:85:9a:69:e5:ab:f8:f2:f5: 440s 8c:3b:d3:4a:e4:0e:1b:62:98:95:a3:a6:2d:5d:27:40:b2:9e: 440s 03:67 440s + local found_md5 expected_md5 440s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA-trusted-certificate-0001.pem 440s + expected_md5=Modulus=B3310B60446DB3678FB19CD075E64F674B0BE837288BB0737EEE16A4AA4E77EA676034C861667A171D683A41AC3C85E649ECD98B4EB3514C8B2D15845BDCAEC59E7B9576BD41149F02CC4C61BC8E3179B0B87E0C0EA70BFF746FA56253579FB622EAB70C7F1C943D65063E02230926D380115FFCDBFE41AA8F1E43679470AAF1 440s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-OWCJiN/SSSD-child-21967.pem 440s + found_md5=Modulus=B3310B60446DB3678FB19CD075E64F674B0BE837288BB0737EEE16A4AA4E77EA676034C861667A171D683A41AC3C85E649ECD98B4EB3514C8B2D15845BDCAEC59E7B9576BD41149F02CC4C61BC8E3179B0B87E0C0EA70BFF746FA56253579FB622EAB70C7F1C943D65063E02230926D380115FFCDBFE41AA8F1E43679470AAF1 440s + '[' Modulus=B3310B60446DB3678FB19CD075E64F674B0BE837288BB0737EEE16A4AA4E77EA676034C861667A171D683A41AC3C85E649ECD98B4EB3514C8B2D15845BDCAEC59E7B9576BD41149F02CC4C61BC8E3179B0B87E0C0EA70BFF746FA56253579FB622EAB70C7F1C943D65063E02230926D380115FFCDBFE41AA8F1E43679470AAF1 '!=' Modulus=B3310B60446DB3678FB19CD075E64F674B0BE837288BB0737EEE16A4AA4E77EA676034C861667A171D683A41AC3C85E649ECD98B4EB3514C8B2D15845BDCAEC59E7B9576BD41149F02CC4C61BC8E3179B0B87E0C0EA70BFF746FA56253579FB622EAB70C7F1C943D65063E02230926D380115FFCDBFE41AA8F1E43679470AAF1 ']' 440s + output_file=/tmp/sssd-softhsm2-OWCJiN/SSSD-child-21967-auth.output 440s ++ basename /tmp/sssd-softhsm2-OWCJiN/SSSD-child-21967-auth.output .output 440s + output_cert_file=/tmp/sssd-softhsm2-OWCJiN/SSSD-child-21967-auth.pem 440s + echo -n 053350 440s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/dev/null --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=no_verification --token_name 'Test Organization Interme Token' --module_name /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so 440s [p11_child[2062]] [main] (0x0400): p11_child started. 440s [p11_child[2062]] [main] (0x2000): Running in [auth] mode. 440s [p11_child[2062]] [main] (0x2000): Running with effective IDs: [0][0]. 440s [p11_child[2062]] [main] (0x2000): Running with real IDs [0][0]. 440s [p11_child[2062]] [parse_cert_verify_opts] (0x0020): Found 'no_verification' option, disabling verification completely. This should not be used in production. 440s [p11_child[2062]] [do_card] (0x4000): Module List: 440s [p11_child[2062]] [do_card] (0x4000): common name: [softhsm2]. 440s [p11_child[2062]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 440s [p11_child[2062]] [do_card] (0x4000): Description [SoftHSM slot ID 0x6c0d1de9] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 440s [p11_child[2062]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 440s [p11_child[2062]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x6c0d1de9][1812798953] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 440s [p11_child[2062]] [do_card] (0x4000): Login required. 440s [p11_child[2062]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 440s [p11_child[2062]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so Test Organization Interme Token Test Organization Interme Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 440s [p11_child[2062]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x6c0d1de9;slot-manufacturer=SoftHSM%20project;slot-id=1812798953;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=f2f314426c0d1de9;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 440s [p11_child[2062]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 440s [p11_child[2062]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 440s [p11_child[2062]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 440s [p11_child[2062]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 440s [p11_child[2062]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 440s [p11_child[2062]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 440s [p11_child[2062]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 440s [p11_child[2062]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 440s [p11_child[2062]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 440s [p11_child[2062]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 440s [p11_child[2062]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 440s [p11_child[2062]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 440s [p11_child[2062]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 440s [p11_child[2062]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 440s [p11_child[2062]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 440s [p11_child[2062]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 440s [p11_child[2062]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 440s [p11_child[2062]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 440s [p11_child[2062]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 440s [p11_child[2062]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 440s [p11_child[2062]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 440s [p11_child[2062]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 440s [p11_child[2062]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 440s [p11_child[2062]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 440s [p11_child[2062]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 440s [p11_child[2062]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 440s [p11_child[2062]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 440s [p11_child[2062]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 440s [p11_child[2062]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 440s [p11_child[2062]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 440s [p11_child[2062]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 440s [p11_child[2062]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 440s [p11_child[2062]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 440s [p11_child[2062]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 440s [p11_child[2062]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 440s [p11_child[2062]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 440s [p11_child[2062]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 440s [p11_child[2062]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 440s [p11_child[2062]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 440s [p11_child[2062]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 440s [p11_child[2062]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 440s [p11_child[2062]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 440s [p11_child[2062]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 440s [p11_child[2062]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 440s [p11_child[2062]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 440s [p11_child[2062]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 440s [p11_child[2062]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 440s [p11_child[2062]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 440s [p11_child[2062]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 440s [p11_child[2062]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 440s [p11_child[2062]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 440s [p11_child[2062]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 440s [p11_child[2062]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 440s [p11_child[2062]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 440s [p11_child[2062]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 440s [p11_child[2062]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 440s [p11_child[2062]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 440s [p11_child[2062]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 440s [p11_child[2062]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 440s [p11_child[2062]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 440s [p11_child[2062]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 440s [p11_child[2062]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 440s [p11_child[2062]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 440s [p11_child[2062]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 440s [p11_child[2062]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 440s [p11_child[2062]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 440s [p11_child[2062]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 440s [p11_child[2062]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 440s [p11_child[2062]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 440s [p11_child[2062]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 440s [p11_child[2062]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 440s [p11_child[2062]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 440s [p11_child[2062]] [do_card] (0x4000): Certificate verified and validated. 440s [p11_child[2062]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 440s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-OWCJiN/SSSD-child-21967-auth.output 440s + echo '-----BEGIN CERTIFICATE-----' 440s + tail -n1 /tmp/sssd-softhsm2-OWCJiN/SSSD-child-21967-auth.output 440s + echo '-----END CERTIFICATE-----' 440s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-OWCJiN/SSSD-child-21967-auth.pem 440s Certificate: 440s Data: 440s Version: 3 (0x2) 440s Serial Number: 4 (0x4) 440s Signature Algorithm: sha256WithRSAEncryption 440s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 440s Validity 440s Not Before: Mar 5 01:21:31 2024 GMT 440s Not After : Mar 5 01:21:31 2025 GMT 440s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 440s Subject Public Key Info: 440s Public Key Algorithm: rsaEncryption 440s Public-Key: (1024 bit) 440s Modulus: 440s 00:b3:31:0b:60:44:6d:b3:67:8f:b1:9c:d0:75:e6: 440s 4f:67:4b:0b:e8:37:28:8b:b0:73:7e:ee:16:a4:aa: 440s 4e:77:ea:67:60:34:c8:61:66:7a:17:1d:68:3a:41: 440s ac:3c:85:e6:49:ec:d9:8b:4e:b3:51:4c:8b:2d:15: 440s 84:5b:dc:ae:c5:9e:7b:95:76:bd:41:14:9f:02:cc: 440s 4c:61:bc:8e:31:79:b0:b8:7e:0c:0e:a7:0b:ff:74: 440s 6f:a5:62:53:57:9f:b6:22:ea:b7:0c:7f:1c:94:3d: 440s 65:06:3e:02:23:09:26:d3:80:11:5f:fc:db:fe:41: 440s aa:8f:1e:43:67:94:70:aa:f1 440s Exponent: 65537 (0x10001) 440s X509v3 extensions: 440s X509v3 Authority Key Identifier: 440s EA:37:3A:E0:F0:76:0D:2F:32:E6:0A:79:95:CF:5E:52:78:41:2C:54 440s X509v3 Basic Constraints: 440s CA:FALSE 440s Netscape Cert Type: 440s SSL Client, S/MIME 440s Netscape Comment: 440s Test Organization Intermediate CA trusted Certificate 440s X509v3 Subject Key Identifier: 440s 37:1D:92:78:52:83:05:40:E9:2E:27:59:88:21:B0:68:E2:BF:FA:7C 440s X509v3 Key Usage: critical 440s Digital Signature, Non Repudiation, Key Encipherment 440s X509v3 Extended Key Usage: 440s TLS Web Client Authentication, E-mail Protection 440s X509v3 Subject Alternative Name: 440s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 440s Signature Algorithm: sha256WithRSAEncryption 440s Signature Value: 440s 19:8e:a3:c9:b0:ec:41:b3:f6:29:0c:e9:18:1b:ac:f6:26:8d: 440s d5:ee:44:10:d4:98:44:80:21:47:32:e9:7b:6a:c0:9d:69:ff: 440s b1:fb:95:3b:62:b0:a0:b8:93:a8:94:be:20:f0:9a:64:c5:b5: 440s c5:62:4f:be:a2:e9:fe:19:68:8b:bc:c5:94:68:49:66:9a:b1: 440s 81:5b:54:e0:e5:5a:14:e3:6f:f0:0a:0e:c2:f4:cb:92:d5:33: 440s 69:61:49:8e:f9:45:03:a9:11:cd:85:9a:69:e5:ab:f8:f2:f5: 440s 8c:3b:d3:4a:e4:0e:1b:62:98:95:a3:a6:2d:5d:27:40:b2:9e: 440s 03:67 440s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-OWCJiN/SSSD-child-21967-auth.pem 440s + found_md5=Modulus=B3310B60446DB3678FB19CD075E64F674B0BE837288BB0737EEE16A4AA4E77EA676034C861667A171D683A41AC3C85E649ECD98B4EB3514C8B2D15845BDCAEC59E7B9576BD41149F02CC4C61BC8E3179B0B87E0C0EA70BFF746FA56253579FB622EAB70C7F1C943D65063E02230926D380115FFCDBFE41AA8F1E43679470AAF1 440s + '[' Modulus=B3310B60446DB3678FB19CD075E64F674B0BE837288BB0737EEE16A4AA4E77EA676034C861667A171D683A41AC3C85E649ECD98B4EB3514C8B2D15845BDCAEC59E7B9576BD41149F02CC4C61BC8E3179B0B87E0C0EA70BFF746FA56253579FB622EAB70C7F1C943D65063E02230926D380115FFCDBFE41AA8F1E43679470AAF1 '!=' Modulus=B3310B60446DB3678FB19CD075E64F674B0BE837288BB0737EEE16A4AA4E77EA676034C861667A171D683A41AC3C85E649ECD98B4EB3514C8B2D15845BDCAEC59E7B9576BD41149F02CC4C61BC8E3179B0B87E0C0EA70BFF746FA56253579FB622EAB70C7F1C943D65063E02230926D380115FFCDBFE41AA8F1E43679470AAF1 ']' 440s + invalid_certificate /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-13010 /tmp/sssd-softhsm2-OWCJiN/test-root-CA.pem 440s + check_certificate /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-13010 /tmp/sssd-softhsm2-OWCJiN/test-root-CA.pem 440s + local certificate=/tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA-trusted-certificate-0001.pem 440s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-13010 440s + local key_ring=/tmp/sssd-softhsm2-OWCJiN/test-root-CA.pem 440s + local verify_option= 440s + prepare_softhsm2_card /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-13010 440s + local certificate=/tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA-trusted-certificate-0001.pem 440s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-13010 440s + local key_cn 440s + local key_name 440s + local tokens_dir 440s + local output_cert_file 440s + token_name= 440s ++ basename /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA-trusted-certificate-0001.pem .pem 440s + key_name=test-intermediate-CA-trusted-certificate-0001 440s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA-trusted-certificate-0001.pem 440s ++ sed -n 's/ *commonName *= //p' 440s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 440s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 440s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-OWCJiN/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 440s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-OWCJiN/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 440s ++ basename /tmp/sssd-softhsm2-OWCJiN/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 440s Test Organization Interme Token 440s + tokens_dir=/tmp/sssd-softhsm2-OWCJiN/softhsm2-test-intermediate-CA-trusted-certificate-0001 440s + token_name='Test Organization Interme Token' 440s + '[' '!' -e /tmp/sssd-softhsm2-OWCJiN/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 440s + '[' '!' -d /tmp/sssd-softhsm2-OWCJiN/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 440s + echo 'Test Organization Interme Token' 440s + '[' -n '' ']' 440s + local output_base_name=SSSD-child-2104 440s + local output_file=/tmp/sssd-softhsm2-OWCJiN/SSSD-child-2104.output 440s + output_cert_file=/tmp/sssd-softhsm2-OWCJiN/SSSD-child-2104.pem 440s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-OWCJiN/test-root-CA.pem 440s [p11_child[2072]] [main] (0x0400): p11_child started. 440s [p11_child[2072]] [main] (0x2000): Running in [pre-auth] mode. 440s [p11_child[2072]] [main] (0x2000): Running with effective IDs: [0][0]. 440s [p11_child[2072]] [main] (0x2000): Running with real IDs [0][0]. 440s [p11_child[2072]] [do_card] (0x4000): Module List: 440s [p11_child[2072]] [do_card] (0x4000): common name: [softhsm2]. 440s [p11_child[2072]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 440s [p11_child[2072]] [do_card] (0x4000): Description [SoftHSM slot ID 0x6c0d1de9] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 440s [p11_child[2072]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 440s [p11_child[2072]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x6c0d1de9][1812798953] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 440s [p11_child[2072]] [do_card] (0x4000): Login NOT required. 440s [p11_child[2072]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 440s [p11_child[2072]] [do_verification] (0x0040): X509_verify_cert failed [0]. 440s [p11_child[2072]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 440s [p11_child[2072]] [read_certs] (0x0040): Certificate [Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] not valid, skipping. 440s [p11_child[2072]] [do_card] (0x4000): No certificate found. 440s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-OWCJiN/SSSD-child-2104.output 440s + return 2 440s + invalid_certificate /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-13010 /tmp/sssd-softhsm2-OWCJiN/test-root-CA.pem partial_chain 440s + check_certificate /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-13010 /tmp/sssd-softhsm2-OWCJiN/test-root-CA.pem partial_chain 440s + local certificate=/tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA-trusted-certificate-0001.pem 440s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-13010 440s + local key_ring=/tmp/sssd-softhsm2-OWCJiN/test-root-CA.pem 440s + local verify_option=partial_chain 440s + prepare_softhsm2_card /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-13010 440s + local certificate=/tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA-trusted-certificate-0001.pem 440s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-13010 440s + local key_cn 440s + local key_name 440s + local tokens_dir 440s + local output_cert_file 440s + token_name= 440s ++ basename /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA-trusted-certificate-0001.pem .pem 440s + key_name=test-intermediate-CA-trusted-certificate-0001 440s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA-trusted-certificate-0001.pem 440s ++ sed -n 's/ *commonName *= //p' 440s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 440s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 440s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-OWCJiN/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 440s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-OWCJiN/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 440s ++ basename /tmp/sssd-softhsm2-OWCJiN/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 440s + tokens_dir=/tmp/sssd-softhsm2-OWCJiN/softhsm2-test-intermediate-CA-trusted-certificate-0001 440s + token_name='Test Organization Interme Token' 440s + '[' '!' -e /tmp/sssd-softhsm2-OWCJiN/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 440s + '[' '!' -d /tmp/sssd-softhsm2-OWCJiN/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 440s + echo 'Test Organization Interme Token' 440s + '[' -n partial_chain ']' 440s + local verify_arg=--verify=partial_chain 440s Test Organization Interme Token 440s + local output_base_name=SSSD-child-2192 440s + local output_file=/tmp/sssd-softhsm2-OWCJiN/SSSD-child-2192.output 440s + output_cert_file=/tmp/sssd-softhsm2-OWCJiN/SSSD-child-2192.pem 440s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-OWCJiN/test-root-CA.pem 440s [p11_child[2079]] [main] (0x0400): p11_child started. 440s [p11_child[2079]] [main] (0x2000): Running in [pre-auth] mode. 440s [p11_child[2079]] [main] (0x2000): Running with effective IDs: [0][0]. 440s [p11_child[2079]] [main] (0x2000): Running with real IDs [0][0]. 440s [p11_child[2079]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 440s [p11_child[2079]] [do_card] (0x4000): Module List: 440s [p11_child[2079]] [do_card] (0x4000): common name: [softhsm2]. 440s [p11_child[2079]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 440s [p11_child[2079]] [do_card] (0x4000): Description [SoftHSM slot ID 0x6c0d1de9] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 440s [p11_child[2079]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 440s [p11_child[2079]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x6c0d1de9][1812798953] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 440s [p11_child[2079]] [do_card] (0x4000): Login NOT required. 440s [p11_child[2079]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 440s [p11_child[2079]] [do_verification] (0x0040): X509_verify_cert failed [0]. 440s [p11_child[2079]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 440s [p11_child[2079]] [read_certs] (0x0040): Certificate [Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] not valid, skipping. 440s [p11_child[2079]] [do_card] (0x4000): No certificate found. 440s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-OWCJiN/SSSD-child-2192.output 440s + return 2 440s + valid_certificate /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-13010 /tmp/sssd-softhsm2-OWCJiN/test-full-chain-CA.pem 440s + check_certificate /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-13010 /tmp/sssd-softhsm2-OWCJiN/test-full-chain-CA.pem 440s + local certificate=/tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA-trusted-certificate-0001.pem 440s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-13010 440s + local key_ring=/tmp/sssd-softhsm2-OWCJiN/test-full-chain-CA.pem 440s + local verify_option= 440s + prepare_softhsm2_card /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-13010 440s + local certificate=/tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA-trusted-certificate-0001.pem 440s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-13010 440s + local key_cn 440s + local key_name 440s + local tokens_dir 440s + local output_cert_file 440s + token_name= 440s ++ basename /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA-trusted-certificate-0001.pem .pem 440s + key_name=test-intermediate-CA-trusted-certificate-0001 440s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA-trusted-certificate-0001.pem 440s ++ sed -n 's/ *commonName *= //p' 440s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 440s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 440s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-OWCJiN/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 440s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-OWCJiN/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 440s ++ basename /tmp/sssd-softhsm2-OWCJiN/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 440s + tokens_dir=/tmp/sssd-softhsm2-OWCJiN/softhsm2-test-intermediate-CA-trusted-certificate-0001 440s + token_name='Test Organization Interme Token' 440s + '[' '!' -e /tmp/sssd-softhsm2-OWCJiN/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 440s + '[' '!' -d /tmp/sssd-softhsm2-OWCJiN/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 440s + echo 'Test Organization Interme Token' 440s + '[' -n '' ']' 440s + local output_base_name=SSSD-child-21453 440s Test Organization Interme Token 440s + local output_file=/tmp/sssd-softhsm2-OWCJiN/SSSD-child-21453.output 440s + output_cert_file=/tmp/sssd-softhsm2-OWCJiN/SSSD-child-21453.pem 440s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-OWCJiN/test-full-chain-CA.pem 440s [p11_child[2086]] [main] (0x0400): p11_child started. 440s [p11_child[2086]] [main] (0x2000): Running in [pre-auth] mode. 440s [p11_child[2086]] [main] (0x2000): Running with effective IDs: [0][0]. 440s [p11_child[2086]] [main] (0x2000): Running with real IDs [0][0]. 440s [p11_child[2086]] [do_card] (0x4000): Module List: 440s [p11_child[2086]] [do_card] (0x4000): common name: [softhsm2]. 440s [p11_child[2086]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 440s [p11_child[2086]] [do_card] (0x4000): Description [SoftHSM slot ID 0x6c0d1de9] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 440s [p11_child[2086]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 440s [p11_child[2086]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x6c0d1de9][1812798953] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 440s [p11_child[2086]] [do_card] (0x4000): Login NOT required. 440s [p11_child[2086]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 440s [p11_child[2086]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 440s [p11_child[2086]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Interme Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 440s [p11_child[2086]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x6c0d1de9;slot-manufacturer=SoftHSM%20project;slot-id=1812798953;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=f2f314426c0d1de9;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 440s [p11_child[2086]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 440s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-OWCJiN/SSSD-child-21453.output 440s + echo '-----BEGIN CERTIFICATE-----' 440s + tail -n1 /tmp/sssd-softhsm2-OWCJiN/SSSD-child-21453.output 440s + echo '-----END CERTIFICATE-----' 440s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-OWCJiN/SSSD-child-21453.pem 440s + local found_md5 expected_md5 440s Certificate: 440s Data: 440s Version: 3 (0x2) 440s Serial Number: 4 (0x4) 440s Signature Algorithm: sha256WithRSAEncryption 440s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 440s Validity 440s Not Before: Mar 5 01:21:31 2024 GMT 440s Not After : Mar 5 01:21:31 2025 GMT 440s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 440s Subject Public Key Info: 440s Public Key Algorithm: rsaEncryption 440s Public-Key: (1024 bit) 440s Modulus: 440s 00:b3:31:0b:60:44:6d:b3:67:8f:b1:9c:d0:75:e6: 440s 4f:67:4b:0b:e8:37:28:8b:b0:73:7e:ee:16:a4:aa: 440s 4e:77:ea:67:60:34:c8:61:66:7a:17:1d:68:3a:41: 440s ac:3c:85:e6:49:ec:d9:8b:4e:b3:51:4c:8b:2d:15: 440s 84:5b:dc:ae:c5:9e:7b:95:76:bd:41:14:9f:02:cc: 440s 4c:61:bc:8e:31:79:b0:b8:7e:0c:0e:a7:0b:ff:74: 440s 6f:a5:62:53:57:9f:b6:22:ea:b7:0c:7f:1c:94:3d: 440s 65:06:3e:02:23:09:26:d3:80:11:5f:fc:db:fe:41: 440s aa:8f:1e:43:67:94:70:aa:f1 440s Exponent: 65537 (0x10001) 440s X509v3 extensions: 440s X509v3 Authority Key Identifier: 440s EA:37:3A:E0:F0:76:0D:2F:32:E6:0A:79:95:CF:5E:52:78:41:2C:54 440s X509v3 Basic Constraints: 440s CA:FALSE 440s Netscape Cert Type: 440s SSL Client, S/MIME 440s Netscape Comment: 440s Test Organization Intermediate CA trusted Certificate 440s X509v3 Subject Key Identifier: 440s 37:1D:92:78:52:83:05:40:E9:2E:27:59:88:21:B0:68:E2:BF:FA:7C 440s X509v3 Key Usage: critical 440s Digital Signature, Non Repudiation, Key Encipherment 440s X509v3 Extended Key Usage: 440s TLS Web Client Authentication, E-mail Protection 440s X509v3 Subject Alternative Name: 440s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 440s Signature Algorithm: sha256WithRSAEncryption 440s Signature Value: 440s 19:8e:a3:c9:b0:ec:41:b3:f6:29:0c:e9:18:1b:ac:f6:26:8d: 440s d5:ee:44:10:d4:98:44:80:21:47:32:e9:7b:6a:c0:9d:69:ff: 440s b1:fb:95:3b:62:b0:a0:b8:93:a8:94:be:20:f0:9a:64:c5:b5: 440s c5:62:4f:be:a2:e9:fe:19:68:8b:bc:c5:94:68:49:66:9a:b1: 440s 81:5b:54:e0:e5:5a:14:e3:6f:f0:0a:0e:c2:f4:cb:92:d5:33: 440s 69:61:49:8e:f9:45:03:a9:11:cd:85:9a:69:e5:ab:f8:f2:f5: 440s 8c:3b:d3:4a:e4:0e:1b:62:98:95:a3:a6:2d:5d:27:40:b2:9e: 440s 03:67 440s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA-trusted-certificate-0001.pem 440s + expected_md5=Modulus=B3310B60446DB3678FB19CD075E64F674B0BE837288BB0737EEE16A4AA4E77EA676034C861667A171D683A41AC3C85E649ECD98B4EB3514C8B2D15845BDCAEC59E7B9576BD41149F02CC4C61BC8E3179B0B87E0C0EA70BFF746FA56253579FB622EAB70C7F1C943D65063E02230926D380115FFCDBFE41AA8F1E43679470AAF1 440s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-OWCJiN/SSSD-child-21453.pem 440s + found_md5=Modulus=B3310B60446DB3678FB19CD075E64F674B0BE837288BB0737EEE16A4AA4E77EA676034C861667A171D683A41AC3C85E649ECD98B4EB3514C8B2D15845BDCAEC59E7B9576BD41149F02CC4C61BC8E3179B0B87E0C0EA70BFF746FA56253579FB622EAB70C7F1C943D65063E02230926D380115FFCDBFE41AA8F1E43679470AAF1 440s + '[' Modulus=B3310B60446DB3678FB19CD075E64F674B0BE837288BB0737EEE16A4AA4E77EA676034C861667A171D683A41AC3C85E649ECD98B4EB3514C8B2D15845BDCAEC59E7B9576BD41149F02CC4C61BC8E3179B0B87E0C0EA70BFF746FA56253579FB622EAB70C7F1C943D65063E02230926D380115FFCDBFE41AA8F1E43679470AAF1 '!=' Modulus=B3310B60446DB3678FB19CD075E64F674B0BE837288BB0737EEE16A4AA4E77EA676034C861667A171D683A41AC3C85E649ECD98B4EB3514C8B2D15845BDCAEC59E7B9576BD41149F02CC4C61BC8E3179B0B87E0C0EA70BFF746FA56253579FB622EAB70C7F1C943D65063E02230926D380115FFCDBFE41AA8F1E43679470AAF1 ']' 440s + output_file=/tmp/sssd-softhsm2-OWCJiN/SSSD-child-21453-auth.output 440s ++ basename /tmp/sssd-softhsm2-OWCJiN/SSSD-child-21453-auth.output .output 440s + output_cert_file=/tmp/sssd-softhsm2-OWCJiN/SSSD-child-21453-auth.pem 440s + echo -n 053350 440s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-OWCJiN/test-full-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 '' --token_name 'Test Organization Interme Token' --module_name /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so 440s [p11_child[2094]] [main] (0x0400): p11_child started. 440s [p11_child[2094]] [main] (0x2000): Running in [auth] mode. 440s [p11_child[2094]] [main] (0x2000): Running with effective IDs: [0][0]. 440s [p11_child[2094]] [main] (0x2000): Running with real IDs [0][0]. 440s [p11_child[2094]] [do_card] (0x4000): Module List: 440s [p11_child[2094]] [do_card] (0x4000): common name: [softhsm2]. 440s [p11_child[2094]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 440s [p11_child[2094]] [do_card] (0x4000): Description [SoftHSM slot ID 0x6c0d1de9] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 440s [p11_child[2094]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 440s [p11_child[2094]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x6c0d1de9][1812798953] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 440s [p11_child[2094]] [do_card] (0x4000): Login required. 440s [p11_child[2094]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 440s [p11_child[2094]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 440s [p11_child[2094]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so Test Organization Interme Token Test Organization Interme Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 440s [p11_child[2094]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x6c0d1de9;slot-manufacturer=SoftHSM%20project;slot-id=1812798953;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=f2f314426c0d1de9;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 440s [p11_child[2094]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 440s [p11_child[2094]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 440s [p11_child[2094]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 440s [p11_child[2094]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 440s [p11_child[2094]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 440s [p11_child[2094]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 440s [p11_child[2094]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 440s [p11_child[2094]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 440s [p11_child[2094]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 440s [p11_child[2094]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 440s [p11_child[2094]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 440s [p11_child[2094]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 440s [p11_child[2094]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 440s [p11_child[2094]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 440s [p11_child[2094]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 440s [p11_child[2094]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 440s [p11_child[2094]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 440s [p11_child[2094]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 440s [p11_child[2094]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 440s [p11_child[2094]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 440s [p11_child[2094]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 440s [p11_child[2094]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 440s [p11_child[2094]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 440s [p11_child[2094]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 440s [p11_child[2094]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 440s [p11_child[2094]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 440s [p11_child[2094]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 440s [p11_child[2094]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 440s [p11_child[2094]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 440s [p11_child[2094]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 440s [p11_child[2094]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 440s [p11_child[2094]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 440s [p11_child[2094]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 440s [p11_child[2094]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 440s [p11_child[2094]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 440s [p11_child[2094]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 440s [p11_child[2094]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 440s [p11_child[2094]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 440s [p11_child[2094]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 440s [p11_child[2094]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 440s [p11_child[2094]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 440s [p11_child[2094]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 440s [p11_child[2094]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 440s [p11_child[2094]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 440s [p11_child[2094]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 440s [p11_child[2094]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 440s [p11_child[2094]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 440s [p11_child[2094]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 440s [p11_child[2094]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 440s [p11_child[2094]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 440s [p11_child[2094]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 440s [p11_child[2094]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 440s [p11_child[2094]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 440s [p11_child[2094]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 440s [p11_child[2094]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 440s [p11_child[2094]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 440s [p11_child[2094]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 440s [p11_child[2094]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 440s [p11_child[2094]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 440s [p11_child[2094]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 440s [p11_child[2094]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 440s [p11_child[2094]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 440s [p11_child[2094]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 440s [p11_child[2094]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 440s [p11_child[2094]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 440s [p11_child[2094]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 440s [p11_child[2094]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 440s [p11_child[2094]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 440s [p11_child[2094]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 440s [p11_child[2094]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 440s [p11_child[2094]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 440s [p11_child[2094]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 440s [p11_child[2094]] [do_card] (0x4000): Certificate verified and validated. 440s [p11_child[2094]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 440s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-OWCJiN/SSSD-child-21453-auth.output 440s + echo '-----BEGIN CERTIFICATE-----' 440s + tail -n1 /tmp/sssd-softhsm2-OWCJiN/SSSD-child-21453-auth.output 440s + echo '-----END CERTIFICATE-----' 440s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-OWCJiN/SSSD-child-21453-auth.pem 440s Certificate: 440s Data: 440s Version: 3 (0x2) 440s Serial Number: 4 (0x4) 440s Signature Algorithm: sha256WithRSAEncryption 440s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 440s Validity 440s Not Before: Mar 5 01:21:31 2024 GMT 440s Not After : Mar 5 01:21:31 2025 GMT 440s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 440s Subject Public Key Info: 440s Public Key Algorithm: rsaEncryption 440s Public-Key: (1024 bit) 440s Modulus: 440s 00:b3:31:0b:60:44:6d:b3:67:8f:b1:9c:d0:75:e6: 440s 4f:67:4b:0b:e8:37:28:8b:b0:73:7e:ee:16:a4:aa: 440s 4e:77:ea:67:60:34:c8:61:66:7a:17:1d:68:3a:41: 440s ac:3c:85:e6:49:ec:d9:8b:4e:b3:51:4c:8b:2d:15: 440s 84:5b:dc:ae:c5:9e:7b:95:76:bd:41:14:9f:02:cc: 440s 4c:61:bc:8e:31:79:b0:b8:7e:0c:0e:a7:0b:ff:74: 440s 6f:a5:62:53:57:9f:b6:22:ea:b7:0c:7f:1c:94:3d: 440s 65:06:3e:02:23:09:26:d3:80:11:5f:fc:db:fe:41: 440s aa:8f:1e:43:67:94:70:aa:f1 440s Exponent: 65537 (0x10001) 440s X509v3 extensions: 440s X509v3 Authority Key Identifier: 440s EA:37:3A:E0:F0:76:0D:2F:32:E6:0A:79:95:CF:5E:52:78:41:2C:54 440s X509v3 Basic Constraints: 440s CA:FALSE 440s Netscape Cert Type: 440s SSL Client, S/MIME 440s Netscape Comment: 440s Test Organization Intermediate CA trusted Certificate 440s X509v3 Subject Key Identifier: 440s 37:1D:92:78:52:83:05:40:E9:2E:27:59:88:21:B0:68:E2:BF:FA:7C 440s X509v3 Key Usage: critical 440s Digital Signature, Non Repudiation, Key Encipherment 440s X509v3 Extended Key Usage: 440s TLS Web Client Authentication, E-mail Protection 440s X509v3 Subject Alternative Name: 440s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 440s Signature Algorithm: sha256WithRSAEncryption 440s Signature Value: 440s 19:8e:a3:c9:b0:ec:41:b3:f6:29:0c:e9:18:1b:ac:f6:26:8d: 440s d5:ee:44:10:d4:98:44:80:21:47:32:e9:7b:6a:c0:9d:69:ff: 440s b1:fb:95:3b:62:b0:a0:b8:93:a8:94:be:20:f0:9a:64:c5:b5: 440s c5:62:4f:be:a2:e9:fe:19:68:8b:bc:c5:94:68:49:66:9a:b1: 440s 81:5b:54:e0:e5:5a:14:e3:6f:f0:0a:0e:c2:f4:cb:92:d5:33: 440s 69:61:49:8e:f9:45:03:a9:11:cd:85:9a:69:e5:ab:f8:f2:f5: 440s 8c:3b:d3:4a:e4:0e:1b:62:98:95:a3:a6:2d:5d:27:40:b2:9e: 440s 03:67 440s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-OWCJiN/SSSD-child-21453-auth.pem 440s + found_md5=Modulus=B3310B60446DB3678FB19CD075E64F674B0BE837288BB0737EEE16A4AA4E77EA676034C861667A171D683A41AC3C85E649ECD98B4EB3514C8B2D15845BDCAEC59E7B9576BD41149F02CC4C61BC8E3179B0B87E0C0EA70BFF746FA56253579FB622EAB70C7F1C943D65063E02230926D380115FFCDBFE41AA8F1E43679470AAF1 440s + '[' Modulus=B3310B60446DB3678FB19CD075E64F674B0BE837288BB0737EEE16A4AA4E77EA676034C861667A171D683A41AC3C85E649ECD98B4EB3514C8B2D15845BDCAEC59E7B9576BD41149F02CC4C61BC8E3179B0B87E0C0EA70BFF746FA56253579FB622EAB70C7F1C943D65063E02230926D380115FFCDBFE41AA8F1E43679470AAF1 '!=' Modulus=B3310B60446DB3678FB19CD075E64F674B0BE837288BB0737EEE16A4AA4E77EA676034C861667A171D683A41AC3C85E649ECD98B4EB3514C8B2D15845BDCAEC59E7B9576BD41149F02CC4C61BC8E3179B0B87E0C0EA70BFF746FA56253579FB622EAB70C7F1C943D65063E02230926D380115FFCDBFE41AA8F1E43679470AAF1 ']' 440s + valid_certificate /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-13010 /tmp/sssd-softhsm2-OWCJiN/test-full-chain-CA.pem partial_chain 440s + check_certificate /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-13010 /tmp/sssd-softhsm2-OWCJiN/test-full-chain-CA.pem partial_chain 440s + local certificate=/tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA-trusted-certificate-0001.pem 440s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-13010 440s + local key_ring=/tmp/sssd-softhsm2-OWCJiN/test-full-chain-CA.pem 440s + local verify_option=partial_chain 440s + prepare_softhsm2_card /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-13010 440s + local certificate=/tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA-trusted-certificate-0001.pem 440s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-13010 440s + local key_cn 440s + local key_name 440s + local tokens_dir 440s + local output_cert_file 440s + token_name= 440s ++ basename /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA-trusted-certificate-0001.pem .pem 440s + key_name=test-intermediate-CA-trusted-certificate-0001 440s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA-trusted-certificate-0001.pem 440s ++ sed -n 's/ *commonName *= //p' 440s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 440s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 440s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-OWCJiN/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 440s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-OWCJiN/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 440s ++ basename /tmp/sssd-softhsm2-OWCJiN/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 440s + tokens_dir=/tmp/sssd-softhsm2-OWCJiN/softhsm2-test-intermediate-CA-trusted-certificate-0001 440s Test Organization Interme Token 440s + token_name='Test Organization Interme Token' 440s + '[' '!' -e /tmp/sssd-softhsm2-OWCJiN/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 440s + '[' '!' -d /tmp/sssd-softhsm2-OWCJiN/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 440s + echo 'Test Organization Interme Token' 440s + '[' -n partial_chain ']' 440s + local verify_arg=--verify=partial_chain 440s + local output_base_name=SSSD-child-29406 440s + local output_file=/tmp/sssd-softhsm2-OWCJiN/SSSD-child-29406.output 440s + output_cert_file=/tmp/sssd-softhsm2-OWCJiN/SSSD-child-29406.pem 440s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-OWCJiN/test-full-chain-CA.pem 440s [p11_child[2104]] [main] (0x0400): p11_child started. 440s [p11_child[2104]] [main] (0x2000): Running in [pre-auth] mode. 440s [p11_child[2104]] [main] (0x2000): Running with effective IDs: [0][0]. 440s [p11_child[2104]] [main] (0x2000): Running with real IDs [0][0]. 440s [p11_child[2104]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 440s [p11_child[2104]] [do_card] (0x4000): Module List: 440s [p11_child[2104]] [do_card] (0x4000): common name: [softhsm2]. 440s [p11_child[2104]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 440s [p11_child[2104]] [do_card] (0x4000): Description [SoftHSM slot ID 0x6c0d1de9] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 440s [p11_child[2104]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 440s [p11_child[2104]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x6c0d1de9][1812798953] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 440s [p11_child[2104]] [do_card] (0x4000): Login NOT required. 440s [p11_child[2104]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 440s [p11_child[2104]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 440s [p11_child[2104]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Interme Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 440s [p11_child[2104]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x6c0d1de9;slot-manufacturer=SoftHSM%20project;slot-id=1812798953;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=f2f314426c0d1de9;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 440s [p11_child[2104]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 440s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-OWCJiN/SSSD-child-29406.output 440s + echo '-----BEGIN CERTIFICATE-----' 440s + tail -n1 /tmp/sssd-softhsm2-OWCJiN/SSSD-child-29406.output 440s + echo '-----END CERTIFICATE-----' 440s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-OWCJiN/SSSD-child-29406.pem 440s Certificate: 440s Data: 440s Version: 3 (0x2) 440s Serial Number: 4 (0x4) 440s Signature Algorithm: sha256WithRSAEncryption 440s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 440s Validity 440s Not Before: Mar 5 01:21:31 2024 GMT 440s Not After : Mar 5 01:21:31 2025 GMT 440s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 440s Subject Public Key Info: 440s Public Key Algorithm: rsaEncryption 440s Public-Key: (1024 bit) 440s Modulus: 440s 00:b3:31:0b:60:44:6d:b3:67:8f:b1:9c:d0:75:e6: 440s 4f:67:4b:0b:e8:37:28:8b:b0:73:7e:ee:16:a4:aa: 440s 4e:77:ea:67:60:34:c8:61:66:7a:17:1d:68:3a:41: 440s ac:3c:85:e6:49:ec:d9:8b:4e:b3:51:4c:8b:2d:15: 440s 84:5b:dc:ae:c5:9e:7b:95:76:bd:41:14:9f:02:cc: 440s 4c:61:bc:8e:31:79:b0:b8:7e:0c:0e:a7:0b:ff:74: 440s 6f:a5:62:53:57:9f:b6:22:ea:b7:0c:7f:1c:94:3d: 440s 65:06:3e:02:23:09:26:d3:80:11:5f:fc:db:fe:41: 440s aa:8f:1e:43:67:94:70:aa:f1 440s Exponent: 65537 (0x10001) 440s X509v3 extensions: 440s X509v3 Authority Key Identifier: 440s EA:37:3A:E0:F0:76:0D:2F:32:E6:0A:79:95:CF:5E:52:78:41:2C:54 440s X509v3 Basic Constraints: 440s CA:FALSE 440s Netscape Cert Type: 440s SSL Client, S/MIME 440s Netscape Comment: 440s Test Organization Intermediate CA trusted Certificate 440s X509v3 Subject Key Identifier: 440s 37:1D:92:78:52:83:05:40:E9:2E:27:59:88:21:B0:68:E2:BF:FA:7C 440s X509v3 Key Usage: critical 440s Digital Signature, Non Repudiation, Key Encipherment 440s X509v3 Extended Key Usage: 440s TLS Web Client Authentication, E-mail Protection 440s X509v3 Subject Alternative Name: 440s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 440s Signature Algorithm: sha256WithRSAEncryption 440s Signature Value: 440s 19:8e:a3:c9:b0:ec:41:b3:f6:29:0c:e9:18:1b:ac:f6:26:8d: 440s d5:ee:44:10:d4:98:44:80:21:47:32:e9:7b:6a:c0:9d:69:ff: 440s b1:fb:95:3b:62:b0:a0:b8:93:a8:94:be:20:f0:9a:64:c5:b5: 440s c5:62:4f:be:a2:e9:fe:19:68:8b:bc:c5:94:68:49:66:9a:b1: 440s 81:5b:54:e0:e5:5a:14:e3:6f:f0:0a:0e:c2:f4:cb:92:d5:33: 440s 69:61:49:8e:f9:45:03:a9:11:cd:85:9a:69:e5:ab:f8:f2:f5: 440s 8c:3b:d3:4a:e4:0e:1b:62:98:95:a3:a6:2d:5d:27:40:b2:9e: 440s 03:67 440s + local found_md5 expected_md5 440s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA-trusted-certificate-0001.pem 440s + expected_md5=Modulus=B3310B60446DB3678FB19CD075E64F674B0BE837288BB0737EEE16A4AA4E77EA676034C861667A171D683A41AC3C85E649ECD98B4EB3514C8B2D15845BDCAEC59E7B9576BD41149F02CC4C61BC8E3179B0B87E0C0EA70BFF746FA56253579FB622EAB70C7F1C943D65063E02230926D380115FFCDBFE41AA8F1E43679470AAF1 440s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-OWCJiN/SSSD-child-29406.pem 441s + found_md5=Modulus=B3310B60446DB3678FB19CD075E64F674B0BE837288BB0737EEE16A4AA4E77EA676034C861667A171D683A41AC3C85E649ECD98B4EB3514C8B2D15845BDCAEC59E7B9576BD41149F02CC4C61BC8E3179B0B87E0C0EA70BFF746FA56253579FB622EAB70C7F1C943D65063E02230926D380115FFCDBFE41AA8F1E43679470AAF1 441s + '[' Modulus=B3310B60446DB3678FB19CD075E64F674B0BE837288BB0737EEE16A4AA4E77EA676034C861667A171D683A41AC3C85E649ECD98B4EB3514C8B2D15845BDCAEC59E7B9576BD41149F02CC4C61BC8E3179B0B87E0C0EA70BFF746FA56253579FB622EAB70C7F1C943D65063E02230926D380115FFCDBFE41AA8F1E43679470AAF1 '!=' Modulus=B3310B60446DB3678FB19CD075E64F674B0BE837288BB0737EEE16A4AA4E77EA676034C861667A171D683A41AC3C85E649ECD98B4EB3514C8B2D15845BDCAEC59E7B9576BD41149F02CC4C61BC8E3179B0B87E0C0EA70BFF746FA56253579FB622EAB70C7F1C943D65063E02230926D380115FFCDBFE41AA8F1E43679470AAF1 ']' 441s + output_file=/tmp/sssd-softhsm2-OWCJiN/SSSD-child-29406-auth.output 441s ++ basename /tmp/sssd-softhsm2-OWCJiN/SSSD-child-29406-auth.output .output 441s + output_cert_file=/tmp/sssd-softhsm2-OWCJiN/SSSD-child-29406-auth.pem 441s + echo -n 053350 441s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-OWCJiN/test-full-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Interme Token' --module_name /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so 441s [p11_child[2112]] [main] (0x0400): p11_child started. 441s [p11_child[2112]] [main] (0x2000): Running in [auth] mode. 441s [p11_child[2112]] [main] (0x2000): Running with effective IDs: [0][0]. 441s [p11_child[2112]] [main] (0x2000): Running with real IDs [0][0]. 441s [p11_child[2112]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 441s [p11_child[2112]] [do_card] (0x4000): Module List: 441s [p11_child[2112]] [do_card] (0x4000): common name: [softhsm2]. 441s [p11_child[2112]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 441s [p11_child[2112]] [do_card] (0x4000): Description [SoftHSM slot ID 0x6c0d1de9] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 441s [p11_child[2112]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 441s [p11_child[2112]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x6c0d1de9][1812798953] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 441s [p11_child[2112]] [do_card] (0x4000): Login required. 441s [p11_child[2112]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 441s [p11_child[2112]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 441s [p11_child[2112]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so Test Organization Interme Token Test Organization Interme Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 441s [p11_child[2112]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x6c0d1de9;slot-manufacturer=SoftHSM%20project;slot-id=1812798953;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=f2f314426c0d1de9;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 441s [p11_child[2112]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 441s [p11_child[2112]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 441s [p11_child[2112]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 441s [p11_child[2112]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 441s [p11_child[2112]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 441s [p11_child[2112]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 441s [p11_child[2112]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 441s [p11_child[2112]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 441s [p11_child[2112]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 441s [p11_child[2112]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 441s [p11_child[2112]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 441s [p11_child[2112]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 441s [p11_child[2112]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 441s [p11_child[2112]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 441s [p11_child[2112]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 441s [p11_child[2112]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 441s [p11_child[2112]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 441s [p11_child[2112]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 441s [p11_child[2112]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 441s [p11_child[2112]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 441s [p11_child[2112]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 441s [p11_child[2112]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 441s [p11_child[2112]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 441s [p11_child[2112]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 441s [p11_child[2112]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 441s [p11_child[2112]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 441s [p11_child[2112]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 441s [p11_child[2112]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 441s [p11_child[2112]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 441s [p11_child[2112]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 441s [p11_child[2112]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 441s [p11_child[2112]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 441s [p11_child[2112]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 441s [p11_child[2112]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 441s [p11_child[2112]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 441s [p11_child[2112]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 441s [p11_child[2112]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 441s [p11_child[2112]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 441s [p11_child[2112]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 441s [p11_child[2112]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 441s [p11_child[2112]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 441s [p11_child[2112]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 441s [p11_child[2112]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 441s [p11_child[2112]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 441s [p11_child[2112]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 441s [p11_child[2112]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 441s [p11_child[2112]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 441s [p11_child[2112]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 441s [p11_child[2112]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 441s [p11_child[2112]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 441s [p11_child[2112]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 441s [p11_child[2112]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 441s [p11_child[2112]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 441s [p11_child[2112]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 441s [p11_child[2112]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 441s [p11_child[2112]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 441s [p11_child[2112]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 441s [p11_child[2112]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 441s [p11_child[2112]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 441s [p11_child[2112]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 441s [p11_child[2112]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 441s [p11_child[2112]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 441s [p11_child[2112]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 441s [p11_child[2112]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 441s [p11_child[2112]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 441s [p11_child[2112]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 441s [p11_child[2112]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 441s [p11_child[2112]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 441s [p11_child[2112]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 441s [p11_child[2112]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 441s [p11_child[2112]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 441s [p11_child[2112]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 441s [p11_child[2112]] [do_card] (0x4000): Certificate verified and validated. 441s [p11_child[2112]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 441s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-OWCJiN/SSSD-child-29406-auth.output 441s + echo '-----BEGIN CERTIFICATE-----' 441s + tail -n1 /tmp/sssd-softhsm2-OWCJiN/SSSD-child-29406-auth.output 441s + echo '-----END CERTIFICATE-----' 441s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-OWCJiN/SSSD-child-29406-auth.pem 441s Certificate: 441s Data: 441s Version: 3 (0x2) 441s Serial Number: 4 (0x4) 441s Signature Algorithm: sha256WithRSAEncryption 441s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 441s Validity 441s Not Before: Mar 5 01:21:31 2024 GMT 441s Not After : Mar 5 01:21:31 2025 GMT 441s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 441s Subject Public Key Info: 441s Public Key Algorithm: rsaEncryption 441s Public-Key: (1024 bit) 441s Modulus: 441s 00:b3:31:0b:60:44:6d:b3:67:8f:b1:9c:d0:75:e6: 441s 4f:67:4b:0b:e8:37:28:8b:b0:73:7e:ee:16:a4:aa: 441s 4e:77:ea:67:60:34:c8:61:66:7a:17:1d:68:3a:41: 441s ac:3c:85:e6:49:ec:d9:8b:4e:b3:51:4c:8b:2d:15: 441s 84:5b:dc:ae:c5:9e:7b:95:76:bd:41:14:9f:02:cc: 441s 4c:61:bc:8e:31:79:b0:b8:7e:0c:0e:a7:0b:ff:74: 441s 6f:a5:62:53:57:9f:b6:22:ea:b7:0c:7f:1c:94:3d: 441s 65:06:3e:02:23:09:26:d3:80:11:5f:fc:db:fe:41: 441s aa:8f:1e:43:67:94:70:aa:f1 441s Exponent: 65537 (0x10001) 441s X509v3 extensions: 441s X509v3 Authority Key Identifier: 441s EA:37:3A:E0:F0:76:0D:2F:32:E6:0A:79:95:CF:5E:52:78:41:2C:54 441s X509v3 Basic Constraints: 441s CA:FALSE 441s Netscape Cert Type: 441s SSL Client, S/MIME 441s Netscape Comment: 441s Test Organization Intermediate CA trusted Certificate 441s X509v3 Subject Key Identifier: 441s 37:1D:92:78:52:83:05:40:E9:2E:27:59:88:21:B0:68:E2:BF:FA:7C 441s X509v3 Key Usage: critical 441s Digital Signature, Non Repudiation, Key Encipherment 441s X509v3 Extended Key Usage: 441s TLS Web Client Authentication, E-mail Protection 441s X509v3 Subject Alternative Name: 441s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 441s Signature Algorithm: sha256WithRSAEncryption 441s Signature Value: 441s 19:8e:a3:c9:b0:ec:41:b3:f6:29:0c:e9:18:1b:ac:f6:26:8d: 441s d5:ee:44:10:d4:98:44:80:21:47:32:e9:7b:6a:c0:9d:69:ff: 441s b1:fb:95:3b:62:b0:a0:b8:93:a8:94:be:20:f0:9a:64:c5:b5: 441s c5:62:4f:be:a2:e9:fe:19:68:8b:bc:c5:94:68:49:66:9a:b1: 441s 81:5b:54:e0:e5:5a:14:e3:6f:f0:0a:0e:c2:f4:cb:92:d5:33: 441s 69:61:49:8e:f9:45:03:a9:11:cd:85:9a:69:e5:ab:f8:f2:f5: 441s 8c:3b:d3:4a:e4:0e:1b:62:98:95:a3:a6:2d:5d:27:40:b2:9e: 441s 03:67 441s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-OWCJiN/SSSD-child-29406-auth.pem 441s + found_md5=Modulus=B3310B60446DB3678FB19CD075E64F674B0BE837288BB0737EEE16A4AA4E77EA676034C861667A171D683A41AC3C85E649ECD98B4EB3514C8B2D15845BDCAEC59E7B9576BD41149F02CC4C61BC8E3179B0B87E0C0EA70BFF746FA56253579FB622EAB70C7F1C943D65063E02230926D380115FFCDBFE41AA8F1E43679470AAF1 441s + '[' Modulus=B3310B60446DB3678FB19CD075E64F674B0BE837288BB0737EEE16A4AA4E77EA676034C861667A171D683A41AC3C85E649ECD98B4EB3514C8B2D15845BDCAEC59E7B9576BD41149F02CC4C61BC8E3179B0B87E0C0EA70BFF746FA56253579FB622EAB70C7F1C943D65063E02230926D380115FFCDBFE41AA8F1E43679470AAF1 '!=' Modulus=B3310B60446DB3678FB19CD075E64F674B0BE837288BB0737EEE16A4AA4E77EA676034C861667A171D683A41AC3C85E649ECD98B4EB3514C8B2D15845BDCAEC59E7B9576BD41149F02CC4C61BC8E3179B0B87E0C0EA70BFF746FA56253579FB622EAB70C7F1C943D65063E02230926D380115FFCDBFE41AA8F1E43679470AAF1 ']' 441s + invalid_certificate /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-13010 /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA.pem 441s + check_certificate /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-13010 /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA.pem 441s + local certificate=/tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA-trusted-certificate-0001.pem 441s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-13010 441s + local key_ring=/tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA.pem 441s + local verify_option= 441s + prepare_softhsm2_card /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-13010 441s + local certificate=/tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA-trusted-certificate-0001.pem 441s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-13010 441s + local key_cn 441s + local key_name 441s + local tokens_dir 441s + local output_cert_file 441s + token_name= 441s ++ basename /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA-trusted-certificate-0001.pem .pem 441s + key_name=test-intermediate-CA-trusted-certificate-0001 441s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA-trusted-certificate-0001.pem 441s ++ sed -n 's/ *commonName *= //p' 441s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 441s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 441s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-OWCJiN/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 441s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-OWCJiN/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 441s ++ basename /tmp/sssd-softhsm2-OWCJiN/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 441s + tokens_dir=/tmp/sssd-softhsm2-OWCJiN/softhsm2-test-intermediate-CA-trusted-certificate-0001 441s + token_name='Test Organization Interme Token' 441s + '[' '!' -e /tmp/sssd-softhsm2-OWCJiN/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 441s + '[' '!' -d /tmp/sssd-softhsm2-OWCJiN/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 441s + echo 'Test Organization Interme Token' 441s + '[' -n '' ']' 441s + local output_base_name=SSSD-child-2402 441s Test Organization Interme Token 441s + local output_file=/tmp/sssd-softhsm2-OWCJiN/SSSD-child-2402.output 441s + output_cert_file=/tmp/sssd-softhsm2-OWCJiN/SSSD-child-2402.pem 441s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA.pem 441s [p11_child[2122]] [main] (0x0400): p11_child started. 441s [p11_child[2122]] [main] (0x2000): Running in [pre-auth] mode. 441s [p11_child[2122]] [main] (0x2000): Running with effective IDs: [0][0]. 441s [p11_child[2122]] [main] (0x2000): Running with real IDs [0][0]. 441s [p11_child[2122]] [do_card] (0x4000): Module List: 441s [p11_child[2122]] [do_card] (0x4000): common name: [softhsm2]. 441s [p11_child[2122]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 441s [p11_child[2122]] [do_card] (0x4000): Description [SoftHSM slot ID 0x6c0d1de9] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 441s [p11_child[2122]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 441s [p11_child[2122]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x6c0d1de9][1812798953] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 441s [p11_child[2122]] [do_card] (0x4000): Login NOT required. 441s [p11_child[2122]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 441s [p11_child[2122]] [do_verification] (0x0040): X509_verify_cert failed [0]. 441s [p11_child[2122]] [do_verification] (0x0040): X509_verify_cert failed [2][unable to get issuer certificate]. 441s [p11_child[2122]] [read_certs] (0x0040): Certificate [Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] not valid, skipping. 441s [p11_child[2122]] [do_card] (0x4000): No certificate found. 441s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-OWCJiN/SSSD-child-2402.output 441s + return 2 441s + valid_certificate /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-13010 /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA.pem partial_chain 441s + check_certificate /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-13010 /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA.pem partial_chain 441s + local certificate=/tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA-trusted-certificate-0001.pem 441s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-13010 441s + local key_ring=/tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA.pem 441s + local verify_option=partial_chain 441s + prepare_softhsm2_card /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-13010 441s + local certificate=/tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA-trusted-certificate-0001.pem 441s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-13010 441s + local key_cn 441s + local key_name 441s + local tokens_dir 441s + local output_cert_file 441s + token_name= 441s ++ basename /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA-trusted-certificate-0001.pem .pem 441s + key_name=test-intermediate-CA-trusted-certificate-0001 441s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA-trusted-certificate-0001.pem 441s ++ sed -n 's/ *commonName *= //p' 441s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 441s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 441s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-OWCJiN/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 441s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-OWCJiN/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 441s ++ basename /tmp/sssd-softhsm2-OWCJiN/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 441s + tokens_dir=/tmp/sssd-softhsm2-OWCJiN/softhsm2-test-intermediate-CA-trusted-certificate-0001 441s + token_name='Test Organization Interme Token' 441s + '[' '!' -e /tmp/sssd-softhsm2-OWCJiN/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 441s + '[' '!' -d /tmp/sssd-softhsm2-OWCJiN/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 441s + echo 'Test Organization Interme Token' 441s Test Organization Interme Token 441s + '[' -n partial_chain ']' 441s + local verify_arg=--verify=partial_chain 441s + local output_base_name=SSSD-child-29476 441s + local output_file=/tmp/sssd-softhsm2-OWCJiN/SSSD-child-29476.output 441s + output_cert_file=/tmp/sssd-softhsm2-OWCJiN/SSSD-child-29476.pem 441s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA.pem 441s [p11_child[2129]] [main] (0x0400): p11_child started. 441s [p11_child[2129]] [main] (0x2000): Running in [pre-auth] mode. 441s [p11_child[2129]] [main] (0x2000): Running with effective IDs: [0][0]. 441s [p11_child[2129]] [main] (0x2000): Running with real IDs [0][0]. 441s [p11_child[2129]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 441s [p11_child[2129]] [do_card] (0x4000): Module List: 441s [p11_child[2129]] [do_card] (0x4000): common name: [softhsm2]. 441s [p11_child[2129]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 441s [p11_child[2129]] [do_card] (0x4000): Description [SoftHSM slot ID 0x6c0d1de9] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 441s [p11_child[2129]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 441s [p11_child[2129]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x6c0d1de9][1812798953] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 441s [p11_child[2129]] [do_card] (0x4000): Login NOT required. 441s [p11_child[2129]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 441s [p11_child[2129]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 441s [p11_child[2129]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Interme Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 441s [p11_child[2129]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x6c0d1de9;slot-manufacturer=SoftHSM%20project;slot-id=1812798953;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=f2f314426c0d1de9;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 441s [p11_child[2129]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 441s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-OWCJiN/SSSD-child-29476.output 441s + echo '-----BEGIN CERTIFICATE-----' 441s + tail -n1 /tmp/sssd-softhsm2-OWCJiN/SSSD-child-29476.output 441s + echo '-----END CERTIFICATE-----' 441s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-OWCJiN/SSSD-child-29476.pem 441s + local found_md5 expected_md5 441s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA-trusted-certificate-0001.pem 441s Certificate: 441s Data: 441s Version: 3 (0x2) 441s Serial Number: 4 (0x4) 441s Signature Algorithm: sha256WithRSAEncryption 441s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 441s Validity 441s Not Before: Mar 5 01:21:31 2024 GMT 441s Not After : Mar 5 01:21:31 2025 GMT 441s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 441s Subject Public Key Info: 441s Public Key Algorithm: rsaEncryption 441s Public-Key: (1024 bit) 441s Modulus: 441s 00:b3:31:0b:60:44:6d:b3:67:8f:b1:9c:d0:75:e6: 441s 4f:67:4b:0b:e8:37:28:8b:b0:73:7e:ee:16:a4:aa: 441s 4e:77:ea:67:60:34:c8:61:66:7a:17:1d:68:3a:41: 441s ac:3c:85:e6:49:ec:d9:8b:4e:b3:51:4c:8b:2d:15: 441s 84:5b:dc:ae:c5:9e:7b:95:76:bd:41:14:9f:02:cc: 441s 4c:61:bc:8e:31:79:b0:b8:7e:0c:0e:a7:0b:ff:74: 441s 6f:a5:62:53:57:9f:b6:22:ea:b7:0c:7f:1c:94:3d: 441s 65:06:3e:02:23:09:26:d3:80:11:5f:fc:db:fe:41: 441s aa:8f:1e:43:67:94:70:aa:f1 441s Exponent: 65537 (0x10001) 441s X509v3 extensions: 441s X509v3 Authority Key Identifier: 441s EA:37:3A:E0:F0:76:0D:2F:32:E6:0A:79:95:CF:5E:52:78:41:2C:54 441s X509v3 Basic Constraints: 441s CA:FALSE 441s Netscape Cert Type: 441s SSL Client, S/MIME 441s Netscape Comment: 441s Test Organization Intermediate CA trusted Certificate 441s X509v3 Subject Key Identifier: 441s 37:1D:92:78:52:83:05:40:E9:2E:27:59:88:21:B0:68:E2:BF:FA:7C 441s X509v3 Key Usage: critical 441s Digital Signature, Non Repudiation, Key Encipherment 441s X509v3 Extended Key Usage: 441s TLS Web Client Authentication, E-mail Protection 441s X509v3 Subject Alternative Name: 441s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 441s Signature Algorithm: sha256WithRSAEncryption 441s Signature Value: 441s 19:8e:a3:c9:b0:ec:41:b3:f6:29:0c:e9:18:1b:ac:f6:26:8d: 441s d5:ee:44:10:d4:98:44:80:21:47:32:e9:7b:6a:c0:9d:69:ff: 441s b1:fb:95:3b:62:b0:a0:b8:93:a8:94:be:20:f0:9a:64:c5:b5: 441s c5:62:4f:be:a2:e9:fe:19:68:8b:bc:c5:94:68:49:66:9a:b1: 441s 81:5b:54:e0:e5:5a:14:e3:6f:f0:0a:0e:c2:f4:cb:92:d5:33: 441s 69:61:49:8e:f9:45:03:a9:11:cd:85:9a:69:e5:ab:f8:f2:f5: 441s 8c:3b:d3:4a:e4:0e:1b:62:98:95:a3:a6:2d:5d:27:40:b2:9e: 441s 03:67 441s + expected_md5=Modulus=B3310B60446DB3678FB19CD075E64F674B0BE837288BB0737EEE16A4AA4E77EA676034C861667A171D683A41AC3C85E649ECD98B4EB3514C8B2D15845BDCAEC59E7B9576BD41149F02CC4C61BC8E3179B0B87E0C0EA70BFF746FA56253579FB622EAB70C7F1C943D65063E02230926D380115FFCDBFE41AA8F1E43679470AAF1 441s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-OWCJiN/SSSD-child-29476.pem 441s + found_md5=Modulus=B3310B60446DB3678FB19CD075E64F674B0BE837288BB0737EEE16A4AA4E77EA676034C861667A171D683A41AC3C85E649ECD98B4EB3514C8B2D15845BDCAEC59E7B9576BD41149F02CC4C61BC8E3179B0B87E0C0EA70BFF746FA56253579FB622EAB70C7F1C943D65063E02230926D380115FFCDBFE41AA8F1E43679470AAF1 441s + '[' Modulus=B3310B60446DB3678FB19CD075E64F674B0BE837288BB0737EEE16A4AA4E77EA676034C861667A171D683A41AC3C85E649ECD98B4EB3514C8B2D15845BDCAEC59E7B9576BD41149F02CC4C61BC8E3179B0B87E0C0EA70BFF746FA56253579FB622EAB70C7F1C943D65063E02230926D380115FFCDBFE41AA8F1E43679470AAF1 '!=' Modulus=B3310B60446DB3678FB19CD075E64F674B0BE837288BB0737EEE16A4AA4E77EA676034C861667A171D683A41AC3C85E649ECD98B4EB3514C8B2D15845BDCAEC59E7B9576BD41149F02CC4C61BC8E3179B0B87E0C0EA70BFF746FA56253579FB622EAB70C7F1C943D65063E02230926D380115FFCDBFE41AA8F1E43679470AAF1 ']' 441s + output_file=/tmp/sssd-softhsm2-OWCJiN/SSSD-child-29476-auth.output 441s ++ basename /tmp/sssd-softhsm2-OWCJiN/SSSD-child-29476-auth.output .output 441s + output_cert_file=/tmp/sssd-softhsm2-OWCJiN/SSSD-child-29476-auth.pem 441s + echo -n 053350 441s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-OWCJiN/test-intermediate-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Interme Token' --module_name /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so 441s [p11_child[2137]] [main] (0x0400): p11_child started. 441s [p11_child[2137]] [main] (0x2000): Running in [auth] mode. 441s [p11_child[2137]] [main] (0x2000): Running with effective IDs: [0][0]. 441s [p11_child[2137]] [main] (0x2000): Running with real IDs [0][0]. 441s [p11_child[2137]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 441s [p11_child[2137]] [do_card] (0x4000): Module List: 441s [p11_child[2137]] [do_card] (0x4000): common name: [softhsm2]. 441s [p11_child[2137]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 441s [p11_child[2137]] [do_card] (0x4000): Description [SoftHSM slot ID 0x6c0d1de9] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 441s [p11_child[2137]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 441s [p11_child[2137]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x6c0d1de9][1812798953] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 441s [p11_child[2137]] [do_card] (0x4000): Login required. 441s [p11_child[2137]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 441s [p11_child[2137]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 441s [p11_child[2137]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so Test Organization Interme Token Test Organization Interme Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 441s [p11_child[2137]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x6c0d1de9;slot-manufacturer=SoftHSM%20project;slot-id=1812798953;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=f2f314426c0d1de9;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 441s [p11_child[2137]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 441s [p11_child[2137]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 441s [p11_child[2137]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 441s [p11_child[2137]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 441s [p11_child[2137]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 441s [p11_child[2137]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 441s [p11_child[2137]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 441s [p11_child[2137]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 441s [p11_child[2137]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 441s [p11_child[2137]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 441s [p11_child[2137]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 441s [p11_child[2137]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 441s [p11_child[2137]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 441s [p11_child[2137]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 441s [p11_child[2137]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 441s [p11_child[2137]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 441s [p11_child[2137]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 441s [p11_child[2137]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 441s [p11_child[2137]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 441s [p11_child[2137]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 441s [p11_child[2137]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 441s [p11_child[2137]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 441s [p11_child[2137]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 441s [p11_child[2137]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 441s [p11_child[2137]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 441s [p11_child[2137]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 441s [p11_child[2137]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 441s [p11_child[2137]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 441s [p11_child[2137]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 441s [p11_child[2137]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 441s [p11_child[2137]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 441s [p11_child[2137]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 441s [p11_child[2137]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 441s [p11_child[2137]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 441s [p11_child[2137]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 441s [p11_child[2137]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 441s [p11_child[2137]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 441s [p11_child[2137]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 441s [p11_child[2137]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 441s [p11_child[2137]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 441s [p11_child[2137]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 441s [p11_child[2137]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 441s [p11_child[2137]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 441s [p11_child[2137]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 441s [p11_child[2137]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 441s [p11_child[2137]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 441s [p11_child[2137]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 441s [p11_child[2137]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 441s [p11_child[2137]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 441s [p11_child[2137]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 441s [p11_child[2137]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 441s [p11_child[2137]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 441s [p11_child[2137]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 441s [p11_child[2137]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 441s [p11_child[2137]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 441s [p11_child[2137]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 441s [p11_child[2137]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 441s [p11_child[2137]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 441s [p11_child[2137]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 441s [p11_child[2137]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 441s [p11_child[2137]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 441s [p11_child[2137]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 441s [p11_child[2137]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 441s [p11_child[2137]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 441s [p11_child[2137]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 441s [p11_child[2137]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 441s [p11_child[2137]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 441s [p11_child[2137]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 441s [p11_child[2137]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 441s [p11_child[2137]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 441s [p11_child[2137]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 441s [p11_child[2137]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 441s [p11_child[2137]] [do_card] (0x4000): Certificate verified and validated. 441s [p11_child[2137]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 441s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-OWCJiN/SSSD-child-29476-auth.output 441s + echo '-----BEGIN CERTIFICATE-----' 441s + tail -n1 /tmp/sssd-softhsm2-OWCJiN/SSSD-child-29476-auth.output 441s + echo '-----END CERTIFICATE-----' 441s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-OWCJiN/SSSD-child-29476-auth.pem 441s Certificate: 441s Data: 441s Version: 3 (0x2) 441s Serial Number: 4 (0x4) 441s Signature Algorithm: sha256WithRSAEncryption 441s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 441s Validity 441s Not Before: Mar 5 01:21:31 2024 GMT 441s Not After : Mar 5 01:21:31 2025 GMT 441s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 441s Subject Public Key Info: 441s Public Key Algorithm: rsaEncryption 441s Public-Key: (1024 bit) 441s Modulus: 441s 00:b3:31:0b:60:44:6d:b3:67:8f:b1:9c:d0:75:e6: 441s 4f:67:4b:0b:e8:37:28:8b:b0:73:7e:ee:16:a4:aa: 441s 4e:77:ea:67:60:34:c8:61:66:7a:17:1d:68:3a:41: 441s ac:3c:85:e6:49:ec:d9:8b:4e:b3:51:4c:8b:2d:15: 441s 84:5b:dc:ae:c5:9e:7b:95:76:bd:41:14:9f:02:cc: 441s 4c:61:bc:8e:31:79:b0:b8:7e:0c:0e:a7:0b:ff:74: 441s 6f:a5:62:53:57:9f:b6:22:ea:b7:0c:7f:1c:94:3d: 441s 65:06:3e:02:23:09:26:d3:80:11:5f:fc:db:fe:41: 441s aa:8f:1e:43:67:94:70:aa:f1 441s Exponent: 65537 (0x10001) 441s X509v3 extensions: 441s X509v3 Authority Key Identifier: 441s EA:37:3A:E0:F0:76:0D:2F:32:E6:0A:79:95:CF:5E:52:78:41:2C:54 441s X509v3 Basic Constraints: 441s CA:FALSE 441s Netscape Cert Type: 441s SSL Client, S/MIME 441s Netscape Comment: 441s Test Organization Intermediate CA trusted Certificate 441s X509v3 Subject Key Identifier: 441s 37:1D:92:78:52:83:05:40:E9:2E:27:59:88:21:B0:68:E2:BF:FA:7C 441s X509v3 Key Usage: critical 441s Digital Signature, Non Repudiation, Key Encipherment 441s X509v3 Extended Key Usage: 441s TLS Web Client Authentication, E-mail Protection 441s X509v3 Subject Alternative Name: 441s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 441s Signature Algorithm: sha256WithRSAEncryption 441s Signature Value: 441s 19:8e:a3:c9:b0:ec:41:b3:f6:29:0c:e9:18:1b:ac:f6:26:8d: 441s d5:ee:44:10:d4:98:44:80:21:47:32:e9:7b:6a:c0:9d:69:ff: 441s b1:fb:95:3b:62:b0:a0:b8:93:a8:94:be:20:f0:9a:64:c5:b5: 441s c5:62:4f:be:a2:e9:fe:19:68:8b:bc:c5:94:68:49:66:9a:b1: 441s 81:5b:54:e0:e5:5a:14:e3:6f:f0:0a:0e:c2:f4:cb:92:d5:33: 441s 69:61:49:8e:f9:45:03:a9:11:cd:85:9a:69:e5:ab:f8:f2:f5: 441s 8c:3b:d3:4a:e4:0e:1b:62:98:95:a3:a6:2d:5d:27:40:b2:9e: 441s 03:67 441s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-OWCJiN/SSSD-child-29476-auth.pem 441s + found_md5=Modulus=B3310B60446DB3678FB19CD075E64F674B0BE837288BB0737EEE16A4AA4E77EA676034C861667A171D683A41AC3C85E649ECD98B4EB3514C8B2D15845BDCAEC59E7B9576BD41149F02CC4C61BC8E3179B0B87E0C0EA70BFF746FA56253579FB622EAB70C7F1C943D65063E02230926D380115FFCDBFE41AA8F1E43679470AAF1 441s + '[' Modulus=B3310B60446DB3678FB19CD075E64F674B0BE837288BB0737EEE16A4AA4E77EA676034C861667A171D683A41AC3C85E649ECD98B4EB3514C8B2D15845BDCAEC59E7B9576BD41149F02CC4C61BC8E3179B0B87E0C0EA70BFF746FA56253579FB622EAB70C7F1C943D65063E02230926D380115FFCDBFE41AA8F1E43679470AAF1 '!=' Modulus=B3310B60446DB3678FB19CD075E64F674B0BE837288BB0737EEE16A4AA4E77EA676034C861667A171D683A41AC3C85E649ECD98B4EB3514C8B2D15845BDCAEC59E7B9576BD41149F02CC4C61BC8E3179B0B87E0C0EA70BFF746FA56253579FB622EAB70C7F1C943D65063E02230926D380115FFCDBFE41AA8F1E43679470AAF1 ']' 441s + invalid_certificate /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-29354 /tmp/sssd-softhsm2-OWCJiN/test-root-CA.pem 441s + check_certificate /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-29354 /tmp/sssd-softhsm2-OWCJiN/test-root-CA.pem 441s + local certificate=/tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-trusted-certificate-0001.pem 441s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-29354 441s + local key_ring=/tmp/sssd-softhsm2-OWCJiN/test-root-CA.pem 441s + local verify_option= 441s + prepare_softhsm2_card /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-29354 441s + local certificate=/tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-trusted-certificate-0001.pem 441s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-29354 441s + local key_cn 441s + local key_name 441s + local tokens_dir 441s + local output_cert_file 441s + token_name= 441s ++ basename /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 441s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 441s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-trusted-certificate-0001.pem 441s ++ sed -n 's/ *commonName *= //p' 441s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 441s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 441s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-OWCJiN/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 441s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-OWCJiN/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 441s ++ basename /tmp/sssd-softhsm2-OWCJiN/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 441s + tokens_dir=/tmp/sssd-softhsm2-OWCJiN/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 441s + token_name='Test Organization Sub Int Token' 441s + '[' '!' -e /tmp/sssd-softhsm2-OWCJiN/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 441s + local key_file 441s + local decrypted_key 441s + mkdir -p /tmp/sssd-softhsm2-OWCJiN/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 441s + key_file=/tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-trusted-certificate-0001-key.pem 441s + decrypted_key=/tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 441s + cat 441s + softhsm2-util --init-token --label 'Test Organization Sub Int Token' --pin 053350 --so-pin 053350 --free 441s Slot 0 has a free/uninitialized token. 441s The token has been initialized and is reassigned to slot 880898949 441s + softhsm2-util --show-slots 441s Available slots: 441s Slot 880898949 441s Slot info: 441s Description: SoftHSM slot ID 0x34817385 441s Manufacturer ID: SoftHSM project 441s Hardware version: 2.6 441s Firmware version: 2.6 441s Token present: yes 441s Token info: 441s Manufacturer ID: SoftHSM project 441s Model: SoftHSM v2 441s Hardware version: 2.6 441s Firmware version: 2.6 441s Serial number: 7974916934817385 441s Initialized: yes 441s User PIN init.: yes 441s Label: Test Organization Sub Int Token 441s Slot 1 441s Slot info: 441s Description: SoftHSM slot ID 0x1 441s Manufacturer ID: SoftHSM project 441s Hardware version: 2.6 441s Firmware version: 2.6 441s Token present: yes 441s Token info: 441s Manufacturer ID: SoftHSM project 441s Model: SoftHSM v2 441s Hardware version: 2.6 441s Firmware version: 2.6 441s Serial number: 441s Initialized: no 441s User PIN init.: no 441s Label: 441s + p11tool --provider=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --write --no-mark-private --load-certificate=/tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-trusted-certificate-0001.pem --login --set-pin=053350 --label 'Test Organization Sub Intermediate Trusted Certificate 0001' --id 00112233445566778899FFAABBCCDDEEFF012345 441s + openssl rsa -passin pass:random-sub-intermediate-ca-trusted-cert-0001-29354 -in /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-trusted-certificate-0001-key.pem -out /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 441s writing RSA key 441s + p11tool --provider=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --write --load-privkey=/tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem --login --set-pin=053350 --label 'Test Organization Sub Intermediate Trusted Certificate 0001 Key' --id 00112233445566778899FFAABBCCDDEEFF012345 441s + rm /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 441s + p11tool --provider=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --list-all 441s Object 0: 441s URL: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7974916934817385;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert 441s Type: X.509 Certificate (RSA-1024) 441s Expires: Wed Mar 5 01:21:31 2025 441s Label: Test Organization Sub Intermediate Trusted Certificate 0001 441s ID: 00:11:22:33:44:55:66:77:88:99:ff:aa:bb:cc:dd:ee:ff:01:23:45 441s 441s + echo 'Test Organization Sub Int Token' 441s Test Organization Sub Int Token 441s + '[' -n '' ']' 441s + local output_base_name=SSSD-child-16764 441s + local output_file=/tmp/sssd-softhsm2-OWCJiN/SSSD-child-16764.output 441s + output_cert_file=/tmp/sssd-softhsm2-OWCJiN/SSSD-child-16764.pem 441s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-OWCJiN/test-root-CA.pem 441s [p11_child[2159]] [main] (0x0400): p11_child started. 441s [p11_child[2159]] [main] (0x2000): Running in [pre-auth] mode. 441s [p11_child[2159]] [main] (0x2000): Running with effective IDs: [0][0]. 441s [p11_child[2159]] [main] (0x2000): Running with real IDs [0][0]. 441s [p11_child[2159]] [do_card] (0x4000): Module List: 441s [p11_child[2159]] [do_card] (0x4000): common name: [softhsm2]. 441s [p11_child[2159]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 441s [p11_child[2159]] [do_card] (0x4000): Description [SoftHSM slot ID 0x34817385] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 441s [p11_child[2159]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 441s [p11_child[2159]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x34817385][880898949] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 441s [p11_child[2159]] [do_card] (0x4000): Login NOT required. 441s [p11_child[2159]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 441s [p11_child[2159]] [do_verification] (0x0040): X509_verify_cert failed [0]. 441s [p11_child[2159]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 441s [p11_child[2159]] [read_certs] (0x0040): Certificate [Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] not valid, skipping. 441s [p11_child[2159]] [do_card] (0x4000): No certificate found. 441s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-OWCJiN/SSSD-child-16764.output 441s + return 2 441s + invalid_certificate /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-29354 /tmp/sssd-softhsm2-OWCJiN/test-root-CA.pem partial_chain 441s + check_certificate /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-29354 /tmp/sssd-softhsm2-OWCJiN/test-root-CA.pem partial_chain 441s + local certificate=/tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-trusted-certificate-0001.pem 441s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-29354 441s + local key_ring=/tmp/sssd-softhsm2-OWCJiN/test-root-CA.pem 441s + local verify_option=partial_chain 441s + prepare_softhsm2_card /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-29354 441s + local certificate=/tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-trusted-certificate-0001.pem 441s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-29354 441s + local key_cn 441s + local key_name 441s + local tokens_dir 441s + local output_cert_file 441s + token_name= 441s ++ basename /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 441s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 441s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-trusted-certificate-0001.pem 441s ++ sed -n 's/ *commonName *= //p' 441s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 441s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 441s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-OWCJiN/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 441s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-OWCJiN/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 441s ++ basename /tmp/sssd-softhsm2-OWCJiN/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 441s Test Organization Sub Int Token 441s + tokens_dir=/tmp/sssd-softhsm2-OWCJiN/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 441s + token_name='Test Organization Sub Int Token' 441s + '[' '!' -e /tmp/sssd-softhsm2-OWCJiN/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 441s + '[' '!' -d /tmp/sssd-softhsm2-OWCJiN/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 441s + echo 'Test Organization Sub Int Token' 441s + '[' -n partial_chain ']' 441s + local verify_arg=--verify=partial_chain 441s + local output_base_name=SSSD-child-22385 441s + local output_file=/tmp/sssd-softhsm2-OWCJiN/SSSD-child-22385.output 441s + output_cert_file=/tmp/sssd-softhsm2-OWCJiN/SSSD-child-22385.pem 441s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-OWCJiN/test-root-CA.pem 441s [p11_child[2166]] [main] (0x0400): p11_child started. 441s [p11_child[2166]] [main] (0x2000): Running in [pre-auth] mode. 441s [p11_child[2166]] [main] (0x2000): Running with effective IDs: [0][0]. 441s [p11_child[2166]] [main] (0x2000): Running with real IDs [0][0]. 441s [p11_child[2166]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 441s [p11_child[2166]] [do_card] (0x4000): Module List: 441s [p11_child[2166]] [do_card] (0x4000): common name: [softhsm2]. 441s [p11_child[2166]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 441s [p11_child[2166]] [do_card] (0x4000): Description [SoftHSM slot ID 0x34817385] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 441s [p11_child[2166]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 441s [p11_child[2166]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x34817385][880898949] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 441s [p11_child[2166]] [do_card] (0x4000): Login NOT required. 441s [p11_child[2166]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 441s [p11_child[2166]] [do_verification] (0x0040): X509_verify_cert failed [0]. 441s [p11_child[2166]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 441s [p11_child[2166]] [read_certs] (0x0040): Certificate [Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] not valid, skipping. 441s [p11_child[2166]] [do_card] (0x4000): No certificate found. 441s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-OWCJiN/SSSD-child-22385.output 441s + return 2 441s + valid_certificate /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-29354 /tmp/sssd-softhsm2-OWCJiN/test-full-chain-CA.pem 441s + check_certificate /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-29354 /tmp/sssd-softhsm2-OWCJiN/test-full-chain-CA.pem 441s + local certificate=/tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-trusted-certificate-0001.pem 441s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-29354 441s + local key_ring=/tmp/sssd-softhsm2-OWCJiN/test-full-chain-CA.pem 441s + local verify_option= 441s + prepare_softhsm2_card /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-29354 441s + local certificate=/tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-trusted-certificate-0001.pem 441s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-29354 441s + local key_cn 441s + local key_name 441s + local tokens_dir 441s + local output_cert_file 441s + token_name= 441s ++ basename /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 441s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 441s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-trusted-certificate-0001.pem 441s ++ sed -n 's/ *commonName *= //p' 441s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 441s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 441s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-OWCJiN/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 441s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-OWCJiN/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 441s ++ basename /tmp/sssd-softhsm2-OWCJiN/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 441s Test Organization Sub Int Token 441s + tokens_dir=/tmp/sssd-softhsm2-OWCJiN/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 441s + token_name='Test Organization Sub Int Token' 441s + '[' '!' -e /tmp/sssd-softhsm2-OWCJiN/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 441s + '[' '!' -d /tmp/sssd-softhsm2-OWCJiN/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 441s + echo 'Test Organization Sub Int Token' 441s + '[' -n '' ']' 441s + local output_base_name=SSSD-child-18951 441s + local output_file=/tmp/sssd-softhsm2-OWCJiN/SSSD-child-18951.output 441s + output_cert_file=/tmp/sssd-softhsm2-OWCJiN/SSSD-child-18951.pem 441s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-OWCJiN/test-full-chain-CA.pem 441s [p11_child[2173]] [main] (0x0400): p11_child started. 441s [p11_child[2173]] [main] (0x2000): Running in [pre-auth] mode. 441s [p11_child[2173]] [main] (0x2000): Running with effective IDs: [0][0]. 441s [p11_child[2173]] [main] (0x2000): Running with real IDs [0][0]. 441s [p11_child[2173]] [do_card] (0x4000): Module List: 441s [p11_child[2173]] [do_card] (0x4000): common name: [softhsm2]. 441s [p11_child[2173]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 441s [p11_child[2173]] [do_card] (0x4000): Description [SoftHSM slot ID 0x34817385] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 441s [p11_child[2173]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 441s [p11_child[2173]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x34817385][880898949] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 441s [p11_child[2173]] [do_card] (0x4000): Login NOT required. 441s [p11_child[2173]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 441s [p11_child[2173]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 441s [p11_child[2173]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Sub Int Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 441s [p11_child[2173]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x34817385;slot-manufacturer=SoftHSM%20project;slot-id=880898949;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7974916934817385;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 441s [p11_child[2173]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 441s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-OWCJiN/SSSD-child-18951.output 441s + echo '-----BEGIN CERTIFICATE-----' 441s + tail -n1 /tmp/sssd-softhsm2-OWCJiN/SSSD-child-18951.output 441s + echo '-----END CERTIFICATE-----' 441s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-OWCJiN/SSSD-child-18951.pem 441s Certificate: 441s Data: 441s Version: 3 (0x2) 441s Serial Number: 5 (0x5) 441s Signature Algorithm: sha256WithRSAEncryption 441s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 441s Validity 441s Not Before: Mar 5 01:21:31 2024 GMT 441s Not After : Mar 5 01:21:31 2025 GMT 441s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 441s Subject Public Key Info: 441s Public Key Algorithm: rsaEncryption 441s Public-Key: (1024 bit) 441s Modulus: 441s 00:b4:42:89:31:99:84:9f:5c:0a:d6:ac:f6:c8:f4: 441s c7:b1:fa:bd:a2:75:58:0f:75:0c:bc:9c:47:dc:21: 441s 3d:9f:2b:0c:6c:33:1d:60:f5:a5:85:e7:14:02:de: 441s 5e:bc:65:9a:49:0e:8a:14:28:bb:af:e3:14:41:af: 441s 42:84:d2:fd:eb:24:e3:36:7e:40:f1:98:1a:66:51: 441s 93:a7:81:3d:6c:bd:2f:75:c6:53:ad:0b:84:b6:21: 441s b3:c8:22:96:d9:e0:e4:02:6b:34:73:38:dd:42:39: 441s dd:0d:9c:6f:48:7b:88:ec:08:9c:bb:39:b2:85:4f: 441s a2:af:2b:6c:ad:7b:d5:1c:1b 441s Exponent: 65537 (0x10001) 441s X509v3 extensions: 441s X509v3 Authority Key Identifier: 441s 24:65:91:9F:43:6E:22:30:51:E6:67:04:5E:F6:FF:D8:17:A4:0F:B6 441s X509v3 Basic Constraints: 441s CA:FALSE 441s Netscape Cert Type: 441s SSL Client, S/MIME 441s Netscape Comment: 441s Test Organization Sub Intermediate CA trusted Certificate 441s X509v3 Subject Key Identifier: 441s EA:42:17:46:C0:9A:5C:5C:56:A4:59:5D:3F:87:5F:5D:22:F3:D0:CD 441s X509v3 Key Usage: critical 441s Digital Signature, Non Repudiation, Key Encipherment 441s X509v3 Extended Key Usage: 441s TLS Web Client Authentication, E-mail Protection 441s X509v3 Subject Alternative Name: 441s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 441s Signature Algorithm: sha256WithRSAEncryption 441s Signature Value: 441s 7f:45:60:ad:c3:5e:91:4c:86:ba:96:3d:29:61:13:51:fa:1a: 441s e2:a4:76:bb:7c:65:15:ae:22:3c:4d:84:61:da:b7:37:53:17: 441s ce:57:f9:86:e1:66:65:49:9c:98:f1:56:0a:a6:ab:33:ad:01: 441s 15:a3:29:d4:ba:94:c6:7c:f9:60:2b:c9:4b:1d:ae:42:db:d1: 441s 6d:45:f5:69:ff:62:64:b8:8c:78:41:88:86:1c:ca:49:4a:6c: 441s bc:ae:f7:bb:0a:1b:98:a4:bd:08:7c:a2:69:c1:c3:aa:c0:88: 441s 14:d9:34:1f:3a:c4:dc:5c:b7:02:dc:80:05:4d:02:bb:17:eb: 441s 7e:e4 441s + local found_md5 expected_md5 441s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-trusted-certificate-0001.pem 441s + expected_md5=Modulus=B442893199849F5C0AD6ACF6C8F4C7B1FABDA275580F750CBC9C47DC213D9F2B0C6C331D60F5A585E71402DE5EBC659A490E8A1428BBAFE31441AF4284D2FDEB24E3367E40F1981A665193A7813D6CBD2F75C653AD0B84B621B3C82296D9E0E4026B347338DD4239DD0D9C6F487B88EC089CBB39B2854FA2AF2B6CAD7BD51C1B 441s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-OWCJiN/SSSD-child-18951.pem 441s + found_md5=Modulus=B442893199849F5C0AD6ACF6C8F4C7B1FABDA275580F750CBC9C47DC213D9F2B0C6C331D60F5A585E71402DE5EBC659A490E8A1428BBAFE31441AF4284D2FDEB24E3367E40F1981A665193A7813D6CBD2F75C653AD0B84B621B3C82296D9E0E4026B347338DD4239DD0D9C6F487B88EC089CBB39B2854FA2AF2B6CAD7BD51C1B 441s + '[' Modulus=B442893199849F5C0AD6ACF6C8F4C7B1FABDA275580F750CBC9C47DC213D9F2B0C6C331D60F5A585E71402DE5EBC659A490E8A1428BBAFE31441AF4284D2FDEB24E3367E40F1981A665193A7813D6CBD2F75C653AD0B84B621B3C82296D9E0E4026B347338DD4239DD0D9C6F487B88EC089CBB39B2854FA2AF2B6CAD7BD51C1B '!=' Modulus=B442893199849F5C0AD6ACF6C8F4C7B1FABDA275580F750CBC9C47DC213D9F2B0C6C331D60F5A585E71402DE5EBC659A490E8A1428BBAFE31441AF4284D2FDEB24E3367E40F1981A665193A7813D6CBD2F75C653AD0B84B621B3C82296D9E0E4026B347338DD4239DD0D9C6F487B88EC089CBB39B2854FA2AF2B6CAD7BD51C1B ']' 441s + output_file=/tmp/sssd-softhsm2-OWCJiN/SSSD-child-18951-auth.output 441s ++ basename /tmp/sssd-softhsm2-OWCJiN/SSSD-child-18951-auth.output .output 441s + output_cert_file=/tmp/sssd-softhsm2-OWCJiN/SSSD-child-18951-auth.pem 441s + echo -n 053350 441s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-OWCJiN/test-full-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 '' --token_name 'Test Organization Sub Int Token' --module_name /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so 441s [p11_child[2181]] [main] (0x0400): p11_child started. 441s [p11_child[2181]] [main] (0x2000): Running in [auth] mode. 441s [p11_child[2181]] [main] (0x2000): Running with effective IDs: [0][0]. 441s [p11_child[2181]] [main] (0x2000): Running with real IDs [0][0]. 441s [p11_child[2181]] [do_card] (0x4000): Module List: 441s [p11_child[2181]] [do_card] (0x4000): common name: [softhsm2]. 441s [p11_child[2181]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 441s [p11_child[2181]] [do_card] (0x4000): Description [SoftHSM slot ID 0x34817385] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 441s [p11_child[2181]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 441s [p11_child[2181]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x34817385][880898949] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 441s [p11_child[2181]] [do_card] (0x4000): Login required. 441s [p11_child[2181]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 441s [p11_child[2181]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 441s [p11_child[2181]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so Test Organization Sub Int Token Test Organization Sub Int Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 441s [p11_child[2181]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x34817385;slot-manufacturer=SoftHSM%20project;slot-id=880898949;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7974916934817385;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 441s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 441s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 441s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 441s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 441s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 441s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 441s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 441s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 441s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 441s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 441s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 441s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 441s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 441s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 441s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 441s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 441s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 441s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 441s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 441s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 441s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 441s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 441s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 441s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 441s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 441s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 441s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 441s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 441s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 441s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 441s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 441s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 441s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 441s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 441s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 441s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 441s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 441s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 441s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 441s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 441s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 441s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 441s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 441s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 441s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 441s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 441s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 441s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 441s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 441s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 441s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 441s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 441s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 441s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 441s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 441s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 441s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 441s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 441s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 441s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 441s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 441s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 441s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 441s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 441s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 441s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 441s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 441s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 441s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 441s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 441s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 441s [p11_child[2181]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 441s [p11_child[2181]] [do_card] (0x4000): Certificate verified and validated. 441s [p11_child[2181]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 441s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-OWCJiN/SSSD-child-18951-auth.output 441s + echo '-----BEGIN CERTIFICATE-----' 441s + tail -n1 /tmp/sssd-softhsm2-OWCJiN/SSSD-child-18951-auth.output 441s + echo '-----END CERTIFICATE-----' 441s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-OWCJiN/SSSD-child-18951-auth.pem 441s Certificate: 441s Data: 441s Version: 3 (0x2) 441s Serial Number: 5 (0x5) 441s Signature Algorithm: sha256WithRSAEncryption 441s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 441s Validity 441s Not Before: Mar 5 01:21:31 2024 GMT 441s Not After : Mar 5 01:21:31 2025 GMT 441s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 441s Subject Public Key Info: 441s Public Key Algorithm: rsaEncryption 441s Public-Key: (1024 bit) 441s Modulus: 441s 00:b4:42:89:31:99:84:9f:5c:0a:d6:ac:f6:c8:f4: 441s c7:b1:fa:bd:a2:75:58:0f:75:0c:bc:9c:47:dc:21: 441s 3d:9f:2b:0c:6c:33:1d:60:f5:a5:85:e7:14:02:de: 441s 5e:bc:65:9a:49:0e:8a:14:28:bb:af:e3:14:41:af: 441s 42:84:d2:fd:eb:24:e3:36:7e:40:f1:98:1a:66:51: 441s 93:a7:81:3d:6c:bd:2f:75:c6:53:ad:0b:84:b6:21: 441s b3:c8:22:96:d9:e0:e4:02:6b:34:73:38:dd:42:39: 441s dd:0d:9c:6f:48:7b:88:ec:08:9c:bb:39:b2:85:4f: 441s a2:af:2b:6c:ad:7b:d5:1c:1b 441s Exponent: 65537 (0x10001) 441s X509v3 extensions: 441s X509v3 Authority Key Identifier: 441s 24:65:91:9F:43:6E:22:30:51:E6:67:04:5E:F6:FF:D8:17:A4:0F:B6 441s X509v3 Basic Constraints: 441s CA:FALSE 441s Netscape Cert Type: 441s SSL Client, S/MIME 441s Netscape Comment: 441s Test Organization Sub Intermediate CA trusted Certificate 441s X509v3 Subject Key Identifier: 441s EA:42:17:46:C0:9A:5C:5C:56:A4:59:5D:3F:87:5F:5D:22:F3:D0:CD 441s X509v3 Key Usage: critical 441s Digital Signature, Non Repudiation, Key Encipherment 441s X509v3 Extended Key Usage: 441s TLS Web Client Authentication, E-mail Protection 441s X509v3 Subject Alternative Name: 441s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 441s Signature Algorithm: sha256WithRSAEncryption 441s Signature Value: 441s 7f:45:60:ad:c3:5e:91:4c:86:ba:96:3d:29:61:13:51:fa:1a: 441s e2:a4:76:bb:7c:65:15:ae:22:3c:4d:84:61:da:b7:37:53:17: 441s ce:57:f9:86:e1:66:65:49:9c:98:f1:56:0a:a6:ab:33:ad:01: 441s 15:a3:29:d4:ba:94:c6:7c:f9:60:2b:c9:4b:1d:ae:42:db:d1: 441s 6d:45:f5:69:ff:62:64:b8:8c:78:41:88:86:1c:ca:49:4a:6c: 441s bc:ae:f7:bb:0a:1b:98:a4:bd:08:7c:a2:69:c1:c3:aa:c0:88: 441s 14:d9:34:1f:3a:c4:dc:5c:b7:02:dc:80:05:4d:02:bb:17:eb: 441s 7e:e4 441s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-OWCJiN/SSSD-child-18951-auth.pem 441s + found_md5=Modulus=B442893199849F5C0AD6ACF6C8F4C7B1FABDA275580F750CBC9C47DC213D9F2B0C6C331D60F5A585E71402DE5EBC659A490E8A1428BBAFE31441AF4284D2FDEB24E3367E40F1981A665193A7813D6CBD2F75C653AD0B84B621B3C82296D9E0E4026B347338DD4239DD0D9C6F487B88EC089CBB39B2854FA2AF2B6CAD7BD51C1B 441s + '[' Modulus=B442893199849F5C0AD6ACF6C8F4C7B1FABDA275580F750CBC9C47DC213D9F2B0C6C331D60F5A585E71402DE5EBC659A490E8A1428BBAFE31441AF4284D2FDEB24E3367E40F1981A665193A7813D6CBD2F75C653AD0B84B621B3C82296D9E0E4026B347338DD4239DD0D9C6F487B88EC089CBB39B2854FA2AF2B6CAD7BD51C1B '!=' Modulus=B442893199849F5C0AD6ACF6C8F4C7B1FABDA275580F750CBC9C47DC213D9F2B0C6C331D60F5A585E71402DE5EBC659A490E8A1428BBAFE31441AF4284D2FDEB24E3367E40F1981A665193A7813D6CBD2F75C653AD0B84B621B3C82296D9E0E4026B347338DD4239DD0D9C6F487B88EC089CBB39B2854FA2AF2B6CAD7BD51C1B ']' 441s + valid_certificate /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-29354 /tmp/sssd-softhsm2-OWCJiN/test-full-chain-CA.pem partial_chain 441s + check_certificate /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-29354 /tmp/sssd-softhsm2-OWCJiN/test-full-chain-CA.pem partial_chain 441s + local certificate=/tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-trusted-certificate-0001.pem 441s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-29354 441s + local key_ring=/tmp/sssd-softhsm2-OWCJiN/test-full-chain-CA.pem 441s + local verify_option=partial_chain 441s + prepare_softhsm2_card /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-29354 441s + local certificate=/tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-trusted-certificate-0001.pem 441s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-29354 441s + local key_cn 441s + local key_name 441s + local tokens_dir 441s + local output_cert_file 441s + token_name= 441s ++ basename /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 441s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 441s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-trusted-certificate-0001.pem 441s ++ sed -n 's/ *commonName *= //p' 441s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 441s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 441s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-OWCJiN/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 441s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-OWCJiN/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 441s ++ basename /tmp/sssd-softhsm2-OWCJiN/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 441s + tokens_dir=/tmp/sssd-softhsm2-OWCJiN/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 441s + token_name='Test Organization Sub Int Token' 441s Test Organization Sub Int Token 441s + '[' '!' -e /tmp/sssd-softhsm2-OWCJiN/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 441s + '[' '!' -d /tmp/sssd-softhsm2-OWCJiN/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 441s + echo 'Test Organization Sub Int Token' 441s + '[' -n partial_chain ']' 441s + local verify_arg=--verify=partial_chain 441s + local output_base_name=SSSD-child-31177 441s + local output_file=/tmp/sssd-softhsm2-OWCJiN/SSSD-child-31177.output 441s + output_cert_file=/tmp/sssd-softhsm2-OWCJiN/SSSD-child-31177.pem 441s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-OWCJiN/test-full-chain-CA.pem 441s [p11_child[2191]] [main] (0x0400): p11_child started. 441s [p11_child[2191]] [main] (0x2000): Running in [pre-auth] mode. 441s [p11_child[2191]] [main] (0x2000): Running with effective IDs: [0][0]. 441s [p11_child[2191]] [main] (0x2000): Running with real IDs [0][0]. 441s [p11_child[2191]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 441s [p11_child[2191]] [do_card] (0x4000): Module List: 441s [p11_child[2191]] [do_card] (0x4000): common name: [softhsm2]. 441s [p11_child[2191]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 441s [p11_child[2191]] [do_card] (0x4000): Description [SoftHSM slot ID 0x34817385] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 441s [p11_child[2191]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 441s [p11_child[2191]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x34817385][880898949] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 441s [p11_child[2191]] [do_card] (0x4000): Login NOT required. 441s [p11_child[2191]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 441s [p11_child[2191]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 441s [p11_child[2191]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Sub Int Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 441s [p11_child[2191]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x34817385;slot-manufacturer=SoftHSM%20project;slot-id=880898949;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7974916934817385;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 441s [p11_child[2191]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 441s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-OWCJiN/SSSD-child-31177.output 441s + echo '-----BEGIN CERTIFICATE-----' 441s + tail -n1 /tmp/sssd-softhsm2-OWCJiN/SSSD-child-31177.output 441s + echo '-----END CERTIFICATE-----' 441s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-OWCJiN/SSSD-child-31177.pem 441s Certificate: 441s Data: 441s Version: 3 (0x2) 441s Serial Number: 5 (0x5) 441s Signature Algorithm: sha256WithRSAEncryption 441s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 441s Validity 441s Not Before: Mar 5 01:21:31 2024 GMT 441s Not After : Mar 5 01:21:31 2025 GMT 441s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 441s Subject Public Key Info: 441s Public Key Algorithm: rsaEncryption 441s Public-Key: (1024 bit) 441s Modulus: 441s 00:b4:42:89:31:99:84:9f:5c:0a:d6:ac:f6:c8:f4: 441s c7:b1:fa:bd:a2:75:58:0f:75:0c:bc:9c:47:dc:21: 441s 3d:9f:2b:0c:6c:33:1d:60:f5:a5:85:e7:14:02:de: 441s 5e:bc:65:9a:49:0e:8a:14:28:bb:af:e3:14:41:af: 441s 42:84:d2:fd:eb:24:e3:36:7e:40:f1:98:1a:66:51: 441s 93:a7:81:3d:6c:bd:2f:75:c6:53:ad:0b:84:b6:21: 441s b3:c8:22:96:d9:e0:e4:02:6b:34:73:38:dd:42:39: 441s dd:0d:9c:6f:48:7b:88:ec:08:9c:bb:39:b2:85:4f: 441s a2:af:2b:6c:ad:7b:d5:1c:1b 441s Exponent: 65537 (0x10001) 441s X509v3 extensions: 441s X509v3 Authority Key Identifier: 441s 24:65:91:9F:43:6E:22:30:51:E6:67:04:5E:F6:FF:D8:17:A4:0F:B6 441s X509v3 Basic Constraints: 441s CA:FALSE 441s Netscape Cert Type: 441s SSL Client, S/MIME 441s Netscape Comment: 441s Test Organization Sub Intermediate CA trusted Certificate 441s X509v3 Subject Key Identifier: 441s EA:42:17:46:C0:9A:5C:5C:56:A4:59:5D:3F:87:5F:5D:22:F3:D0:CD 441s X509v3 Key Usage: critical 441s Digital Signature, Non Repudiation, Key Encipherment 441s X509v3 Extended Key Usage: 441s TLS Web Client Authentication, E-mail Protection 441s X509v3 Subject Alternative Name: 441s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 441s Signature Algorithm: sha256WithRSAEncryption 441s Signature Value: 441s 7f:45:60:ad:c3:5e:91:4c:86:ba:96:3d:29:61:13:51:fa:1a: 441s e2:a4:76:bb:7c:65:15:ae:22:3c:4d:84:61:da:b7:37:53:17: 441s ce:57:f9:86:e1:66:65:49:9c:98:f1:56:0a:a6:ab:33:ad:01: 441s 15:a3:29:d4:ba:94:c6:7c:f9:60:2b:c9:4b:1d:ae:42:db:d1: 441s 6d:45:f5:69:ff:62:64:b8:8c:78:41:88:86:1c:ca:49:4a:6c: 441s bc:ae:f7:bb:0a:1b:98:a4:bd:08:7c:a2:69:c1:c3:aa:c0:88: 441s 14:d9:34:1f:3a:c4:dc:5c:b7:02:dc:80:05:4d:02:bb:17:eb: 441s 7e:e4 441s + local found_md5 expected_md5 441s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-trusted-certificate-0001.pem 442s + expected_md5=Modulus=B442893199849F5C0AD6ACF6C8F4C7B1FABDA275580F750CBC9C47DC213D9F2B0C6C331D60F5A585E71402DE5EBC659A490E8A1428BBAFE31441AF4284D2FDEB24E3367E40F1981A665193A7813D6CBD2F75C653AD0B84B621B3C82296D9E0E4026B347338DD4239DD0D9C6F487B88EC089CBB39B2854FA2AF2B6CAD7BD51C1B 442s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-OWCJiN/SSSD-child-31177.pem 442s + found_md5=Modulus=B442893199849F5C0AD6ACF6C8F4C7B1FABDA275580F750CBC9C47DC213D9F2B0C6C331D60F5A585E71402DE5EBC659A490E8A1428BBAFE31441AF4284D2FDEB24E3367E40F1981A665193A7813D6CBD2F75C653AD0B84B621B3C82296D9E0E4026B347338DD4239DD0D9C6F487B88EC089CBB39B2854FA2AF2B6CAD7BD51C1B 442s + '[' Modulus=B442893199849F5C0AD6ACF6C8F4C7B1FABDA275580F750CBC9C47DC213D9F2B0C6C331D60F5A585E71402DE5EBC659A490E8A1428BBAFE31441AF4284D2FDEB24E3367E40F1981A665193A7813D6CBD2F75C653AD0B84B621B3C82296D9E0E4026B347338DD4239DD0D9C6F487B88EC089CBB39B2854FA2AF2B6CAD7BD51C1B '!=' Modulus=B442893199849F5C0AD6ACF6C8F4C7B1FABDA275580F750CBC9C47DC213D9F2B0C6C331D60F5A585E71402DE5EBC659A490E8A1428BBAFE31441AF4284D2FDEB24E3367E40F1981A665193A7813D6CBD2F75C653AD0B84B621B3C82296D9E0E4026B347338DD4239DD0D9C6F487B88EC089CBB39B2854FA2AF2B6CAD7BD51C1B ']' 442s + output_file=/tmp/sssd-softhsm2-OWCJiN/SSSD-child-31177-auth.output 442s ++ basename /tmp/sssd-softhsm2-OWCJiN/SSSD-child-31177-auth.output .output 442s + output_cert_file=/tmp/sssd-softhsm2-OWCJiN/SSSD-child-31177-auth.pem 442s + echo -n 053350 442s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-OWCJiN/test-full-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Sub Int Token' --module_name /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so 442s [p11_child[2199]] [main] (0x0400): p11_child started. 442s [p11_child[2199]] [main] (0x2000): Running in [auth] mode. 442s [p11_child[2199]] [main] (0x2000): Running with effective IDs: [0][0]. 442s [p11_child[2199]] [main] (0x2000): Running with real IDs [0][0]. 442s [p11_child[2199]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 442s [p11_child[2199]] [do_card] (0x4000): Module List: 442s [p11_child[2199]] [do_card] (0x4000): common name: [softhsm2]. 442s [p11_child[2199]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 442s [p11_child[2199]] [do_card] (0x4000): Description [SoftHSM slot ID 0x34817385] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 442s [p11_child[2199]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 442s [p11_child[2199]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x34817385][880898949] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 442s [p11_child[2199]] [do_card] (0x4000): Login required. 442s [p11_child[2199]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 442s [p11_child[2199]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 442s [p11_child[2199]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so Test Organization Sub Int Token Test Organization Sub Int Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 442s [p11_child[2199]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x34817385;slot-manufacturer=SoftHSM%20project;slot-id=880898949;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7974916934817385;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 442s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 442s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 442s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 442s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 442s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 442s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 442s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 442s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 442s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 442s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 442s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 442s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 442s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 442s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 442s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 442s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 442s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 442s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 442s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 442s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 442s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 442s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 442s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 442s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 442s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 442s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 442s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 442s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 442s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 442s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 442s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 442s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 442s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 442s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 442s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 442s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 442s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 442s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 442s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 442s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 442s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 442s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 442s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 442s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 442s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 442s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 442s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 442s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 442s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 442s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 442s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 442s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 442s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 442s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 442s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 442s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 442s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 442s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 442s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 442s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 442s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 442s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 442s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 442s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 442s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 442s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 442s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 442s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 442s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 442s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 442s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 442s [p11_child[2199]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 442s [p11_child[2199]] [do_card] (0x4000): Certificate verified and validated. 442s [p11_child[2199]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 442s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-OWCJiN/SSSD-child-31177-auth.output 442s + echo '-----BEGIN CERTIFICATE-----' 442s + tail -n1 /tmp/sssd-softhsm2-OWCJiN/SSSD-child-31177-auth.output 442s + echo '-----END CERTIFICATE-----' 442s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-OWCJiN/SSSD-child-31177-auth.pem 442s Certificate: 442s Data: 442s Version: 3 (0x2) 442s Serial Number: 5 (0x5) 442s Signature Algorithm: sha256WithRSAEncryption 442s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 442s Validity 442s Not Before: Mar 5 01:21:31 2024 GMT 442s Not After : Mar 5 01:21:31 2025 GMT 442s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 442s Subject Public Key Info: 442s Public Key Algorithm: rsaEncryption 442s Public-Key: (1024 bit) 442s Modulus: 442s 00:b4:42:89:31:99:84:9f:5c:0a:d6:ac:f6:c8:f4: 442s c7:b1:fa:bd:a2:75:58:0f:75:0c:bc:9c:47:dc:21: 442s 3d:9f:2b:0c:6c:33:1d:60:f5:a5:85:e7:14:02:de: 442s 5e:bc:65:9a:49:0e:8a:14:28:bb:af:e3:14:41:af: 442s 42:84:d2:fd:eb:24:e3:36:7e:40:f1:98:1a:66:51: 442s 93:a7:81:3d:6c:bd:2f:75:c6:53:ad:0b:84:b6:21: 442s b3:c8:22:96:d9:e0:e4:02:6b:34:73:38:dd:42:39: 442s dd:0d:9c:6f:48:7b:88:ec:08:9c:bb:39:b2:85:4f: 442s a2:af:2b:6c:ad:7b:d5:1c:1b 442s Exponent: 65537 (0x10001) 442s X509v3 extensions: 442s X509v3 Authority Key Identifier: 442s 24:65:91:9F:43:6E:22:30:51:E6:67:04:5E:F6:FF:D8:17:A4:0F:B6 442s X509v3 Basic Constraints: 442s CA:FALSE 442s Netscape Cert Type: 442s SSL Client, S/MIME 442s Netscape Comment: 442s Test Organization Sub Intermediate CA trusted Certificate 442s X509v3 Subject Key Identifier: 442s EA:42:17:46:C0:9A:5C:5C:56:A4:59:5D:3F:87:5F:5D:22:F3:D0:CD 442s X509v3 Key Usage: critical 442s Digital Signature, Non Repudiation, Key Encipherment 442s X509v3 Extended Key Usage: 442s TLS Web Client Authentication, E-mail Protection 442s X509v3 Subject Alternative Name: 442s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 442s Signature Algorithm: sha256WithRSAEncryption 442s Signature Value: 442s 7f:45:60:ad:c3:5e:91:4c:86:ba:96:3d:29:61:13:51:fa:1a: 442s e2:a4:76:bb:7c:65:15:ae:22:3c:4d:84:61:da:b7:37:53:17: 442s ce:57:f9:86:e1:66:65:49:9c:98:f1:56:0a:a6:ab:33:ad:01: 442s 15:a3:29:d4:ba:94:c6:7c:f9:60:2b:c9:4b:1d:ae:42:db:d1: 442s 6d:45:f5:69:ff:62:64:b8:8c:78:41:88:86:1c:ca:49:4a:6c: 442s bc:ae:f7:bb:0a:1b:98:a4:bd:08:7c:a2:69:c1:c3:aa:c0:88: 442s 14:d9:34:1f:3a:c4:dc:5c:b7:02:dc:80:05:4d:02:bb:17:eb: 442s 7e:e4 442s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-OWCJiN/SSSD-child-31177-auth.pem 442s + found_md5=Modulus=B442893199849F5C0AD6ACF6C8F4C7B1FABDA275580F750CBC9C47DC213D9F2B0C6C331D60F5A585E71402DE5EBC659A490E8A1428BBAFE31441AF4284D2FDEB24E3367E40F1981A665193A7813D6CBD2F75C653AD0B84B621B3C82296D9E0E4026B347338DD4239DD0D9C6F487B88EC089CBB39B2854FA2AF2B6CAD7BD51C1B 442s + '[' Modulus=B442893199849F5C0AD6ACF6C8F4C7B1FABDA275580F750CBC9C47DC213D9F2B0C6C331D60F5A585E71402DE5EBC659A490E8A1428BBAFE31441AF4284D2FDEB24E3367E40F1981A665193A7813D6CBD2F75C653AD0B84B621B3C82296D9E0E4026B347338DD4239DD0D9C6F487B88EC089CBB39B2854FA2AF2B6CAD7BD51C1B '!=' Modulus=B442893199849F5C0AD6ACF6C8F4C7B1FABDA275580F750CBC9C47DC213D9F2B0C6C331D60F5A585E71402DE5EBC659A490E8A1428BBAFE31441AF4284D2FDEB24E3367E40F1981A665193A7813D6CBD2F75C653AD0B84B621B3C82296D9E0E4026B347338DD4239DD0D9C6F487B88EC089CBB39B2854FA2AF2B6CAD7BD51C1B ']' 442s + invalid_certificate /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-29354 /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA.pem 442s + check_certificate /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-29354 /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA.pem 442s + local certificate=/tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-trusted-certificate-0001.pem 442s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-29354 442s + local key_ring=/tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA.pem 442s + local verify_option= 442s + prepare_softhsm2_card /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-29354 442s + local certificate=/tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-trusted-certificate-0001.pem 442s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-29354 442s + local key_cn 442s + local key_name 442s + local tokens_dir 442s + local output_cert_file 442s + token_name= 442s ++ basename /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 442s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 442s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-trusted-certificate-0001.pem 442s ++ sed -n 's/ *commonName *= //p' 442s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 442s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 442s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-OWCJiN/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 442s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-OWCJiN/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 442s ++ basename /tmp/sssd-softhsm2-OWCJiN/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 442s + tokens_dir=/tmp/sssd-softhsm2-OWCJiN/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 442s + token_name='Test Organization Sub Int Token' 442s + '[' '!' -e /tmp/sssd-softhsm2-OWCJiN/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 442s + '[' '!' -d /tmp/sssd-softhsm2-OWCJiN/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 442s + echo 'Test Organization Sub Int Token' 442s + '[' -n '' ']' 442s Test Organization Sub Int Token 442s + local output_base_name=SSSD-child-9578 442s + local output_file=/tmp/sssd-softhsm2-OWCJiN/SSSD-child-9578.output 442s + output_cert_file=/tmp/sssd-softhsm2-OWCJiN/SSSD-child-9578.pem 442s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA.pem 442s [p11_child[2209]] [main] (0x0400): p11_child started. 442s [p11_child[2209]] [main] (0x2000): Running in [pre-auth] mode. 442s [p11_child[2209]] [main] (0x2000): Running with effective IDs: [0][0]. 442s [p11_child[2209]] [main] (0x2000): Running with real IDs [0][0]. 442s [p11_child[2209]] [do_card] (0x4000): Module List: 442s [p11_child[2209]] [do_card] (0x4000): common name: [softhsm2]. 442s [p11_child[2209]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 442s [p11_child[2209]] [do_card] (0x4000): Description [SoftHSM slot ID 0x34817385] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 442s [p11_child[2209]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 442s [p11_child[2209]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x34817385][880898949] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 442s [p11_child[2209]] [do_card] (0x4000): Login NOT required. 442s [p11_child[2209]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 442s [p11_child[2209]] [do_verification] (0x0040): X509_verify_cert failed [0]. 442s [p11_child[2209]] [do_verification] (0x0040): X509_verify_cert failed [2][unable to get issuer certificate]. 442s [p11_child[2209]] [read_certs] (0x0040): Certificate [Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] not valid, skipping. 442s [p11_child[2209]] [do_card] (0x4000): No certificate found. 442s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-OWCJiN/SSSD-child-9578.output 442s + return 2 442s + invalid_certificate /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-29354 /tmp/sssd-softhsm2-OWCJiN/test-root-intermediate-chain-CA.pem partial_chain 442s + check_certificate /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-29354 /tmp/sssd-softhsm2-OWCJiN/test-root-intermediate-chain-CA.pem partial_chain 442s + local certificate=/tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-trusted-certificate-0001.pem 442s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-29354 442s + local key_ring=/tmp/sssd-softhsm2-OWCJiN/test-root-intermediate-chain-CA.pem 442s + local verify_option=partial_chain 442s + prepare_softhsm2_card /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-29354 442s + local certificate=/tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-trusted-certificate-0001.pem 442s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-29354 442s + local key_cn 442s + local key_name 442s + local tokens_dir 442s + local output_cert_file 442s + token_name= 442s ++ basename /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 442s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 442s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-trusted-certificate-0001.pem 442s ++ sed -n 's/ *commonName *= //p' 442s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 442s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 442s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-OWCJiN/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 442s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-OWCJiN/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 442s ++ basename /tmp/sssd-softhsm2-OWCJiN/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 442s + tokens_dir=/tmp/sssd-softhsm2-OWCJiN/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 442s + token_name='Test Organization Sub Int Token' 442s + '[' '!' -e /tmp/sssd-softhsm2-OWCJiN/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 442s + '[' '!' -d /tmp/sssd-softhsm2-OWCJiN/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 442s + echo 'Test Organization Sub Int Token' 442s + '[' -n partial_chain ']' 442s + local verify_arg=--verify=partial_chain 442s + local output_base_name=SSSD-child-26740 442s + local output_file=/tmp/sssd-softhsm2-OWCJiN/SSSD-child-26740.output 442s + output_cert_file=/tmp/sssd-softhsm2-OWCJiN/SSSD-child-26740.pem 442s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-OWCJiN/test-root-intermediate-chain-CA.pem 442s Test Organization Sub Int Token 442s [p11_child[2216]] [main] (0x0400): p11_child started. 442s [p11_child[2216]] [main] (0x2000): Running in [pre-auth] mode. 442s [p11_child[2216]] [main] (0x2000): Running with effective IDs: [0][0]. 442s [p11_child[2216]] [main] (0x2000): Running with real IDs [0][0]. 442s [p11_child[2216]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 442s [p11_child[2216]] [do_card] (0x4000): Module List: 442s [p11_child[2216]] [do_card] (0x4000): common name: [softhsm2]. 442s [p11_child[2216]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 442s [p11_child[2216]] [do_card] (0x4000): Description [SoftHSM slot ID 0x34817385] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 442s [p11_child[2216]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 442s [p11_child[2216]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x34817385][880898949] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 442s [p11_child[2216]] [do_card] (0x4000): Login NOT required. 442s [p11_child[2216]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 442s [p11_child[2216]] [do_verification] (0x0040): X509_verify_cert failed [0]. 442s [p11_child[2216]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 442s [p11_child[2216]] [read_certs] (0x0040): Certificate [Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] not valid, skipping. 442s [p11_child[2216]] [do_card] (0x4000): No certificate found. 442s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-OWCJiN/SSSD-child-26740.output 442s + return 2 442s + valid_certificate /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-29354 /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA.pem partial_chain 442s + check_certificate /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-29354 /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA.pem partial_chain 442s + local certificate=/tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-trusted-certificate-0001.pem 442s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-29354 442s + local key_ring=/tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA.pem 442s + local verify_option=partial_chain 442s + prepare_softhsm2_card /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-29354 442s + local certificate=/tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-trusted-certificate-0001.pem 442s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-29354 442s + local key_cn 442s + local key_name 442s + local tokens_dir 442s + local output_cert_file 442s + token_name= 442s ++ basename /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 442s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 442s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-trusted-certificate-0001.pem 442s ++ sed -n 's/ *commonName *= //p' 442s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 442s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 442s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-OWCJiN/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 442s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-OWCJiN/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 442s ++ basename /tmp/sssd-softhsm2-OWCJiN/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 442s + tokens_dir=/tmp/sssd-softhsm2-OWCJiN/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 442s Test Organization Sub Int Token 442s + token_name='Test Organization Sub Int Token' 442s + '[' '!' -e /tmp/sssd-softhsm2-OWCJiN/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 442s + '[' '!' -d /tmp/sssd-softhsm2-OWCJiN/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 442s + echo 'Test Organization Sub Int Token' 442s + '[' -n partial_chain ']' 442s + local verify_arg=--verify=partial_chain 442s + local output_base_name=SSSD-child-20781 442s + local output_file=/tmp/sssd-softhsm2-OWCJiN/SSSD-child-20781.output 442s + output_cert_file=/tmp/sssd-softhsm2-OWCJiN/SSSD-child-20781.pem 442s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA.pem 442s [p11_child[2223]] [main] (0x0400): p11_child started. 442s [p11_child[2223]] [main] (0x2000): Running in [pre-auth] mode. 442s [p11_child[2223]] [main] (0x2000): Running with effective IDs: [0][0]. 442s [p11_child[2223]] [main] (0x2000): Running with real IDs [0][0]. 442s [p11_child[2223]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 442s [p11_child[2223]] [do_card] (0x4000): Module List: 442s [p11_child[2223]] [do_card] (0x4000): common name: [softhsm2]. 442s [p11_child[2223]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 442s [p11_child[2223]] [do_card] (0x4000): Description [SoftHSM slot ID 0x34817385] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 442s [p11_child[2223]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 442s [p11_child[2223]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x34817385][880898949] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 442s [p11_child[2223]] [do_card] (0x4000): Login NOT required. 442s [p11_child[2223]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 442s [p11_child[2223]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 442s [p11_child[2223]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Sub Int Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 442s [p11_child[2223]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x34817385;slot-manufacturer=SoftHSM%20project;slot-id=880898949;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7974916934817385;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 442s [p11_child[2223]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 442s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-OWCJiN/SSSD-child-20781.output 442s + echo '-----BEGIN CERTIFICATE-----' 442s + tail -n1 /tmp/sssd-softhsm2-OWCJiN/SSSD-child-20781.output 442s + echo '-----END CERTIFICATE-----' 442s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-OWCJiN/SSSD-child-20781.pem 442s Certificate: 442s Data: 442s Version: 3 (0x2) 442s Serial Number: 5 (0x5) 442s Signature Algorithm: sha256WithRSAEncryption 442s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 442s Validity 442s Not Before: Mar 5 01:21:31 2024 GMT 442s Not After : Mar 5 01:21:31 2025 GMT 442s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 442s Subject Public Key Info: 442s Public Key Algorithm: rsaEncryption 442s Public-Key: (1024 bit) 442s Modulus: 442s 00:b4:42:89:31:99:84:9f:5c:0a:d6:ac:f6:c8:f4: 442s c7:b1:fa:bd:a2:75:58:0f:75:0c:bc:9c:47:dc:21: 442s 3d:9f:2b:0c:6c:33:1d:60:f5:a5:85:e7:14:02:de: 442s 5e:bc:65:9a:49:0e:8a:14:28:bb:af:e3:14:41:af: 442s 42:84:d2:fd:eb:24:e3:36:7e:40:f1:98:1a:66:51: 442s 93:a7:81:3d:6c:bd:2f:75:c6:53:ad:0b:84:b6:21: 442s b3:c8:22:96:d9:e0:e4:02:6b:34:73:38:dd:42:39: 442s dd:0d:9c:6f:48:7b:88:ec:08:9c:bb:39:b2:85:4f: 442s a2:af:2b:6c:ad:7b:d5:1c:1b 442s Exponent: 65537 (0x10001) 442s X509v3 extensions: 442s X509v3 Authority Key Identifier: 442s 24:65:91:9F:43:6E:22:30:51:E6:67:04:5E:F6:FF:D8:17:A4:0F:B6 442s X509v3 Basic Constraints: 442s CA:FALSE 442s Netscape Cert Type: 442s SSL Client, S/MIME 442s Netscape Comment: 442s Test Organization Sub Intermediate CA trusted Certificate 442s X509v3 Subject Key Identifier: 442s EA:42:17:46:C0:9A:5C:5C:56:A4:59:5D:3F:87:5F:5D:22:F3:D0:CD 442s X509v3 Key Usage: critical 442s Digital Signature, Non Repudiation, Key Encipherment 442s X509v3 Extended Key Usage: 442s TLS Web Client Authentication, E-mail Protection 442s X509v3 Subject Alternative Name: 442s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 442s Signature Algorithm: sha256WithRSAEncryption 442s Signature Value: 442s 7f:45:60:ad:c3:5e:91:4c:86:ba:96:3d:29:61:13:51:fa:1a: 442s e2:a4:76:bb:7c:65:15:ae:22:3c:4d:84:61:da:b7:37:53:17: 442s ce:57:f9:86:e1:66:65:49:9c:98:f1:56:0a:a6:ab:33:ad:01: 442s 15:a3:29:d4:ba:94:c6:7c:f9:60:2b:c9:4b:1d:ae:42:db:d1: 442s 6d:45:f5:69:ff:62:64:b8:8c:78:41:88:86:1c:ca:49:4a:6c: 442s bc:ae:f7:bb:0a:1b:98:a4:bd:08:7c:a2:69:c1:c3:aa:c0:88: 442s 14:d9:34:1f:3a:c4:dc:5c:b7:02:dc:80:05:4d:02:bb:17:eb: 442s 7e:e4 442s + local found_md5 expected_md5 442s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-trusted-certificate-0001.pem 442s + expected_md5=Modulus=B442893199849F5C0AD6ACF6C8F4C7B1FABDA275580F750CBC9C47DC213D9F2B0C6C331D60F5A585E71402DE5EBC659A490E8A1428BBAFE31441AF4284D2FDEB24E3367E40F1981A665193A7813D6CBD2F75C653AD0B84B621B3C82296D9E0E4026B347338DD4239DD0D9C6F487B88EC089CBB39B2854FA2AF2B6CAD7BD51C1B 442s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-OWCJiN/SSSD-child-20781.pem 442s + found_md5=Modulus=B442893199849F5C0AD6ACF6C8F4C7B1FABDA275580F750CBC9C47DC213D9F2B0C6C331D60F5A585E71402DE5EBC659A490E8A1428BBAFE31441AF4284D2FDEB24E3367E40F1981A665193A7813D6CBD2F75C653AD0B84B621B3C82296D9E0E4026B347338DD4239DD0D9C6F487B88EC089CBB39B2854FA2AF2B6CAD7BD51C1B 442s + '[' Modulus=B442893199849F5C0AD6ACF6C8F4C7B1FABDA275580F750CBC9C47DC213D9F2B0C6C331D60F5A585E71402DE5EBC659A490E8A1428BBAFE31441AF4284D2FDEB24E3367E40F1981A665193A7813D6CBD2F75C653AD0B84B621B3C82296D9E0E4026B347338DD4239DD0D9C6F487B88EC089CBB39B2854FA2AF2B6CAD7BD51C1B '!=' Modulus=B442893199849F5C0AD6ACF6C8F4C7B1FABDA275580F750CBC9C47DC213D9F2B0C6C331D60F5A585E71402DE5EBC659A490E8A1428BBAFE31441AF4284D2FDEB24E3367E40F1981A665193A7813D6CBD2F75C653AD0B84B621B3C82296D9E0E4026B347338DD4239DD0D9C6F487B88EC089CBB39B2854FA2AF2B6CAD7BD51C1B ']' 442s + output_file=/tmp/sssd-softhsm2-OWCJiN/SSSD-child-20781-auth.output 442s ++ basename /tmp/sssd-softhsm2-OWCJiN/SSSD-child-20781-auth.output .output 442s + output_cert_file=/tmp/sssd-softhsm2-OWCJiN/SSSD-child-20781-auth.pem 442s + echo -n 053350 442s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Sub Int Token' --module_name /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so 442s [p11_child[2231]] [main] (0x0400): p11_child started. 442s [p11_child[2231]] [main] (0x2000): Running in [auth] mode. 442s [p11_child[2231]] [main] (0x2000): Running with effective IDs: [0][0]. 442s [p11_child[2231]] [main] (0x2000): Running with real IDs [0][0]. 442s [p11_child[2231]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 442s [p11_child[2231]] [do_card] (0x4000): Module List: 442s [p11_child[2231]] [do_card] (0x4000): common name: [softhsm2]. 442s [p11_child[2231]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 442s [p11_child[2231]] [do_card] (0x4000): Description [SoftHSM slot ID 0x34817385] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 442s [p11_child[2231]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 442s [p11_child[2231]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x34817385][880898949] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 442s [p11_child[2231]] [do_card] (0x4000): Login required. 442s [p11_child[2231]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 442s [p11_child[2231]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 442s [p11_child[2231]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so Test Organization Sub Int Token Test Organization Sub Int Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 442s [p11_child[2231]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x34817385;slot-manufacturer=SoftHSM%20project;slot-id=880898949;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7974916934817385;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 442s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 442s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 442s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 442s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 442s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 442s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 442s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 442s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 442s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 442s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 442s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 442s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 442s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 442s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 442s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 442s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 442s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 442s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 442s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 442s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 442s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 442s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 442s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 442s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 442s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 442s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 442s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 442s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 442s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 442s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 442s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 442s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 442s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 442s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 442s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 442s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 442s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 442s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 442s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 442s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 442s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 442s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 442s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 442s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 442s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 442s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 442s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 442s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 442s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 442s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 442s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 442s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 442s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 442s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 442s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 442s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 442s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 442s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 442s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 442s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 442s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 442s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 442s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 442s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 442s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 442s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 442s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 442s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 442s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 442s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 442s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 442s [p11_child[2231]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 442s [p11_child[2231]] [do_card] (0x4000): Certificate verified and validated. 442s [p11_child[2231]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 442s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-OWCJiN/SSSD-child-20781-auth.output 442s + echo '-----BEGIN CERTIFICATE-----' 442s + tail -n1 /tmp/sssd-softhsm2-OWCJiN/SSSD-child-20781-auth.output 442s + echo '-----END CERTIFICATE-----' 442s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-OWCJiN/SSSD-child-20781-auth.pem 442s Certificate: 442s Data: 442s Version: 3 (0x2) 442s Serial Number: 5 (0x5) 442s Signature Algorithm: sha256WithRSAEncryption 442s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 442s Validity 442s Not Before: Mar 5 01:21:31 2024 GMT 442s Not After : Mar 5 01:21:31 2025 GMT 442s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 442s Subject Public Key Info: 442s Public Key Algorithm: rsaEncryption 442s Public-Key: (1024 bit) 442s Modulus: 442s 00:b4:42:89:31:99:84:9f:5c:0a:d6:ac:f6:c8:f4: 442s c7:b1:fa:bd:a2:75:58:0f:75:0c:bc:9c:47:dc:21: 442s 3d:9f:2b:0c:6c:33:1d:60:f5:a5:85:e7:14:02:de: 442s 5e:bc:65:9a:49:0e:8a:14:28:bb:af:e3:14:41:af: 442s 42:84:d2:fd:eb:24:e3:36:7e:40:f1:98:1a:66:51: 442s 93:a7:81:3d:6c:bd:2f:75:c6:53:ad:0b:84:b6:21: 442s b3:c8:22:96:d9:e0:e4:02:6b:34:73:38:dd:42:39: 442s dd:0d:9c:6f:48:7b:88:ec:08:9c:bb:39:b2:85:4f: 442s a2:af:2b:6c:ad:7b:d5:1c:1b 442s Exponent: 65537 (0x10001) 442s X509v3 extensions: 442s X509v3 Authority Key Identifier: 442s 24:65:91:9F:43:6E:22:30:51:E6:67:04:5E:F6:FF:D8:17:A4:0F:B6 442s X509v3 Basic Constraints: 442s CA:FALSE 442s Netscape Cert Type: 442s SSL Client, S/MIME 442s Netscape Comment: 442s Test Organization Sub Intermediate CA trusted Certificate 442s X509v3 Subject Key Identifier: 442s EA:42:17:46:C0:9A:5C:5C:56:A4:59:5D:3F:87:5F:5D:22:F3:D0:CD 442s X509v3 Key Usage: critical 442s Digital Signature, Non Repudiation, Key Encipherment 442s X509v3 Extended Key Usage: 442s TLS Web Client Authentication, E-mail Protection 442s X509v3 Subject Alternative Name: 442s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 442s Signature Algorithm: sha256WithRSAEncryption 442s Signature Value: 442s 7f:45:60:ad:c3:5e:91:4c:86:ba:96:3d:29:61:13:51:fa:1a: 442s e2:a4:76:bb:7c:65:15:ae:22:3c:4d:84:61:da:b7:37:53:17: 442s ce:57:f9:86:e1:66:65:49:9c:98:f1:56:0a:a6:ab:33:ad:01: 442s 15:a3:29:d4:ba:94:c6:7c:f9:60:2b:c9:4b:1d:ae:42:db:d1: 442s 6d:45:f5:69:ff:62:64:b8:8c:78:41:88:86:1c:ca:49:4a:6c: 442s bc:ae:f7:bb:0a:1b:98:a4:bd:08:7c:a2:69:c1:c3:aa:c0:88: 442s 14:d9:34:1f:3a:c4:dc:5c:b7:02:dc:80:05:4d:02:bb:17:eb: 442s 7e:e4 442s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-OWCJiN/SSSD-child-20781-auth.pem 442s + found_md5=Modulus=B442893199849F5C0AD6ACF6C8F4C7B1FABDA275580F750CBC9C47DC213D9F2B0C6C331D60F5A585E71402DE5EBC659A490E8A1428BBAFE31441AF4284D2FDEB24E3367E40F1981A665193A7813D6CBD2F75C653AD0B84B621B3C82296D9E0E4026B347338DD4239DD0D9C6F487B88EC089CBB39B2854FA2AF2B6CAD7BD51C1B 442s + '[' Modulus=B442893199849F5C0AD6ACF6C8F4C7B1FABDA275580F750CBC9C47DC213D9F2B0C6C331D60F5A585E71402DE5EBC659A490E8A1428BBAFE31441AF4284D2FDEB24E3367E40F1981A665193A7813D6CBD2F75C653AD0B84B621B3C82296D9E0E4026B347338DD4239DD0D9C6F487B88EC089CBB39B2854FA2AF2B6CAD7BD51C1B '!=' Modulus=B442893199849F5C0AD6ACF6C8F4C7B1FABDA275580F750CBC9C47DC213D9F2B0C6C331D60F5A585E71402DE5EBC659A490E8A1428BBAFE31441AF4284D2FDEB24E3367E40F1981A665193A7813D6CBD2F75C653AD0B84B621B3C82296D9E0E4026B347338DD4239DD0D9C6F487B88EC089CBB39B2854FA2AF2B6CAD7BD51C1B ']' 442s + valid_certificate /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-29354 /tmp/sssd-softhsm2-OWCJiN/test-intermediate-sub-chain-CA.pem partial_chain 442s + check_certificate /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-29354 /tmp/sssd-softhsm2-OWCJiN/test-intermediate-sub-chain-CA.pem partial_chain 442s + local certificate=/tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-trusted-certificate-0001.pem 442s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-29354 442s + local key_ring=/tmp/sssd-softhsm2-OWCJiN/test-intermediate-sub-chain-CA.pem 442s + local verify_option=partial_chain 442s + prepare_softhsm2_card /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-29354 442s + local certificate=/tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-trusted-certificate-0001.pem 442s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-29354 442s + local key_cn 442s + local key_name 442s + local tokens_dir 442s + local output_cert_file 442s + token_name= 442s ++ basename /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 442s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 442s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-trusted-certificate-0001.pem 442s ++ sed -n 's/ *commonName *= //p' 442s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 442s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 442s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-OWCJiN/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 442s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-OWCJiN/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 442s ++ basename /tmp/sssd-softhsm2-OWCJiN/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 442s + tokens_dir=/tmp/sssd-softhsm2-OWCJiN/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 442s + token_name='Test Organization Sub Int Token' 442s + '[' '!' -e /tmp/sssd-softhsm2-OWCJiN/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 442s + '[' '!' -d /tmp/sssd-softhsm2-OWCJiN/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 442s + echo 'Test Organization Sub Int Token' 442s + '[' -n partial_chain ']' 442s Test Organization Sub Int Token 442s + local verify_arg=--verify=partial_chain 442s + local output_base_name=SSSD-child-20962 442s + local output_file=/tmp/sssd-softhsm2-OWCJiN/SSSD-child-20962.output 442s + output_cert_file=/tmp/sssd-softhsm2-OWCJiN/SSSD-child-20962.pem 442s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-OWCJiN/test-intermediate-sub-chain-CA.pem 442s [p11_child[2241]] [main] (0x0400): p11_child started. 442s [p11_child[2241]] [main] (0x2000): Running in [pre-auth] mode. 442s [p11_child[2241]] [main] (0x2000): Running with effective IDs: [0][0]. 442s [p11_child[2241]] [main] (0x2000): Running with real IDs [0][0]. 442s [p11_child[2241]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 442s [p11_child[2241]] [do_card] (0x4000): Module List: 442s [p11_child[2241]] [do_card] (0x4000): common name: [softhsm2]. 442s [p11_child[2241]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 442s [p11_child[2241]] [do_card] (0x4000): Description [SoftHSM slot ID 0x34817385] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 442s [p11_child[2241]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 442s [p11_child[2241]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x34817385][880898949] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 442s [p11_child[2241]] [do_card] (0x4000): Login NOT required. 442s [p11_child[2241]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 442s [p11_child[2241]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 442s [p11_child[2241]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Sub Int Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 442s [p11_child[2241]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x34817385;slot-manufacturer=SoftHSM%20project;slot-id=880898949;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7974916934817385;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 442s [p11_child[2241]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 442s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-OWCJiN/SSSD-child-20962.output 442s + echo '-----BEGIN CERTIFICATE-----' 442s + tail -n1 /tmp/sssd-softhsm2-OWCJiN/SSSD-child-20962.output 442s + echo '-----END CERTIFICATE-----' 442s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-OWCJiN/SSSD-child-20962.pem 442s Certificate: 442s Data: 442s Version: 3 (0x2) 442s Serial Number: 5 (0x5) 442s Signature Algorithm: sha256WithRSAEncryption 442s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 442s Validity 442s Not Before: Mar 5 01:21:31 2024 GMT 442s Not After : Mar 5 01:21:31 2025 GMT 442s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 442s Subject Public Key Info: 442s Public Key Algorithm: rsaEncryption 442s Public-Key: (1024 bit) 442s Modulus: 442s 00:b4:42:89:31:99:84:9f:5c:0a:d6:ac:f6:c8:f4: 442s c7:b1:fa:bd:a2:75:58:0f:75:0c:bc:9c:47:dc:21: 442s 3d:9f:2b:0c:6c:33:1d:60:f5:a5:85:e7:14:02:de: 442s 5e:bc:65:9a:49:0e:8a:14:28:bb:af:e3:14:41:af: 442s 42:84:d2:fd:eb:24:e3:36:7e:40:f1:98:1a:66:51: 442s 93:a7:81:3d:6c:bd:2f:75:c6:53:ad:0b:84:b6:21: 442s b3:c8:22:96:d9:e0:e4:02:6b:34:73:38:dd:42:39: 442s dd:0d:9c:6f:48:7b:88:ec:08:9c:bb:39:b2:85:4f: 442s a2:af:2b:6c:ad:7b:d5:1c:1b 442s Exponent: 65537 (0x10001) 442s X509v3 extensions: 442s X509v3 Authority Key Identifier: 442s 24:65:91:9F:43:6E:22:30:51:E6:67:04:5E:F6:FF:D8:17:A4:0F:B6 442s X509v3 Basic Constraints: 442s CA:FALSE 442s Netscape Cert Type: 442s SSL Client, S/MIME 442s Netscape Comment: 442s Test Organization Sub Intermediate CA trusted Certificate 442s X509v3 Subject Key Identifier: 442s EA:42:17:46:C0:9A:5C:5C:56:A4:59:5D:3F:87:5F:5D:22:F3:D0:CD 442s X509v3 Key Usage: critical 442s Digital Signature, Non Repudiation, Key Encipherment 442s X509v3 Extended Key Usage: 442s TLS Web Client Authentication, E-mail Protection 442s X509v3 Subject Alternative Name: 442s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 442s Signature Algorithm: sha256WithRSAEncryption 442s Signature Value: 442s 7f:45:60:ad:c3:5e:91:4c:86:ba:96:3d:29:61:13:51:fa:1a: 442s e2:a4:76:bb:7c:65:15:ae:22:3c:4d:84:61:da:b7:37:53:17: 442s ce:57:f9:86:e1:66:65:49:9c:98:f1:56:0a:a6:ab:33:ad:01: 442s 15:a3:29:d4:ba:94:c6:7c:f9:60:2b:c9:4b:1d:ae:42:db:d1: 442s 6d:45:f5:69:ff:62:64:b8:8c:78:41:88:86:1c:ca:49:4a:6c: 442s bc:ae:f7:bb:0a:1b:98:a4:bd:08:7c:a2:69:c1:c3:aa:c0:88: 442s 14:d9:34:1f:3a:c4:dc:5c:b7:02:dc:80:05:4d:02:bb:17:eb: 442s 7e:e4 442s + local found_md5 expected_md5 442s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-OWCJiN/test-sub-intermediate-CA-trusted-certificate-0001.pem 442s + expected_md5=Modulus=B442893199849F5C0AD6ACF6C8F4C7B1FABDA275580F750CBC9C47DC213D9F2B0C6C331D60F5A585E71402DE5EBC659A490E8A1428BBAFE31441AF4284D2FDEB24E3367E40F1981A665193A7813D6CBD2F75C653AD0B84B621B3C82296D9E0E4026B347338DD4239DD0D9C6F487B88EC089CBB39B2854FA2AF2B6CAD7BD51C1B 442s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-OWCJiN/SSSD-child-20962.pem 442s + found_md5=Modulus=B442893199849F5C0AD6ACF6C8F4C7B1FABDA275580F750CBC9C47DC213D9F2B0C6C331D60F5A585E71402DE5EBC659A490E8A1428BBAFE31441AF4284D2FDEB24E3367E40F1981A665193A7813D6CBD2F75C653AD0B84B621B3C82296D9E0E4026B347338DD4239DD0D9C6F487B88EC089CBB39B2854FA2AF2B6CAD7BD51C1B 442s + '[' Modulus=B442893199849F5C0AD6ACF6C8F4C7B1FABDA275580F750CBC9C47DC213D9F2B0C6C331D60F5A585E71402DE5EBC659A490E8A1428BBAFE31441AF4284D2FDEB24E3367E40F1981A665193A7813D6CBD2F75C653AD0B84B621B3C82296D9E0E4026B347338DD4239DD0D9C6F487B88EC089CBB39B2854FA2AF2B6CAD7BD51C1B '!=' Modulus=B442893199849F5C0AD6ACF6C8F4C7B1FABDA275580F750CBC9C47DC213D9F2B0C6C331D60F5A585E71402DE5EBC659A490E8A1428BBAFE31441AF4284D2FDEB24E3367E40F1981A665193A7813D6CBD2F75C653AD0B84B621B3C82296D9E0E4026B347338DD4239DD0D9C6F487B88EC089CBB39B2854FA2AF2B6CAD7BD51C1B ']' 442s + output_file=/tmp/sssd-softhsm2-OWCJiN/SSSD-child-20962-auth.output 442s ++ basename /tmp/sssd-softhsm2-OWCJiN/SSSD-child-20962-auth.output .output 442s + output_cert_file=/tmp/sssd-softhsm2-OWCJiN/SSSD-child-20962-auth.pem 442s + echo -n 053350 442s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-OWCJiN/test-intermediate-sub-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Sub Int Token' --module_name /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so 442s [p11_child[2249]] [main] (0x0400): p11_child started. 442s [p11_child[2249]] [main] (0x2000): Running in [auth] mode. 442s [p11_child[2249]] [main] (0x2000): Running with effective IDs: [0][0]. 442s [p11_child[2249]] [main] (0x2000): Running with real IDs [0][0]. 442s [p11_child[2249]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 442s [p11_child[2249]] [do_card] (0x4000): Module List: 442s [p11_child[2249]] [do_card] (0x4000): common name: [softhsm2]. 442s [p11_child[2249]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 442s [p11_child[2249]] [do_card] (0x4000): Description [SoftHSM slot ID 0x34817385] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 442s [p11_child[2249]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 442s [p11_child[2249]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x34817385][880898949] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 442s [p11_child[2249]] [do_card] (0x4000): Login required. 442s [p11_child[2249]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 442s [p11_child[2249]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 442s [p11_child[2249]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so Test Organization Sub Int Token Test Organization Sub Int Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 442s [p11_child[2249]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x34817385;slot-manufacturer=SoftHSM%20project;slot-id=880898949;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7974916934817385;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 442s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 442s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 442s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 442s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 442s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 442s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 442s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 442s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 442s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 442s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 442s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 442s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 442s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 442s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 442s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 442s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 442s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 442s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 442s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 442s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 442s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 442s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 442s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 442s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 442s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 442s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 442s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 442s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 442s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 442s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 442s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 442s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 442s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 442s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 442s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 442s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 442s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 442s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 442s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 442s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 442s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 442s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 442s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 442s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 442s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 442s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 442s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 442s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 442s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 442s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 442s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 442s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 442s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 442s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 442s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 442s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 442s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 442s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 442s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 442s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 442s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 442s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 442s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 442s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 442s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 442s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 442s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 442s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 442s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 442s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 442s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 442s [p11_child[2249]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 442s [p11_child[2249]] [do_card] (0x4000): Certificate verified and validated. 442s [p11_child[2249]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 442s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-OWCJiN/SSSD-child-20962-auth.output 442s + echo '-----BEGIN CERTIFICATE-----' 442s + tail -n1 /tmp/sssd-softhsm2-OWCJiN/SSSD-child-20962-auth.output 442s + echo '-----END CERTIFICATE-----' 442s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-OWCJiN/SSSD-child-20962-auth.pem 442s Certificate: 442s Data: 442s Version: 3 (0x2) 442s Serial Number: 5 (0x5) 442s Signature Algorithm: sha256WithRSAEncryption 442s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 442s Validity 442s Not Before: Mar 5 01:21:31 2024 GMT 442s Not After : Mar 5 01:21:31 2025 GMT 442s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 442s Subject Public Key Info: 442s Public Key Algorithm: rsaEncryption 442s Public-Key: (1024 bit) 442s Modulus: 442s 00:b4:42:89:31:99:84:9f:5c:0a:d6:ac:f6:c8:f4: 442s c7:b1:fa:bd:a2:75:58:0f:75:0c:bc:9c:47:dc:21: 442s 3d:9f:2b:0c:6c:33:1d:60:f5:a5:85:e7:14:02:de: 442s 5e:bc:65:9a:49:0e:8a:14:28:bb:af:e3:14:41:af: 442s 42:84:d2:fd:eb:24:e3:36:7e:40:f1:98:1a:66:51: 442s 93:a7:81:3d:6c:bd:2f:75:c6:53:ad:0b:84:b6:21: 442s b3:c8:22:96:d9:e0:e4:02:6b:34:73:38:dd:42:39: 442s dd:0d:9c:6f:48:7b:88:ec:08:9c:bb:39:b2:85:4f: 442s a2:af:2b:6c:ad:7b:d5:1c:1b 442s Exponent: 65537 (0x10001) 442s X509v3 extensions: 442s X509v3 Authority Key Identifier: 442s 24:65:91:9F:43:6E:22:30:51:E6:67:04:5E:F6:FF:D8:17:A4:0F:B6 442s X509v3 Basic Constraints: 442s CA:FALSE 442s Netscape Cert Type: 442s SSL Client, S/MIME 442s Netscape Comment: 442s Test Organization Sub Intermediate CA trusted Certificate 442s X509v3 Subject Key Identifier: 442s EA:42:17:46:C0:9A:5C:5C:56:A4:59:5D:3F:87:5F:5D:22:F3:D0:CD 442s X509v3 Key Usage: critical 442s Digital Signature, Non Repudiation, Key Encipherment 442s X509v3 Extended Key Usage: 442s TLS Web Client Authentication, E-mail Protection 442s X509v3 Subject Alternative Name: 442s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 442s Signature Algorithm: sha256WithRSAEncryption 442s Signature Value: 442s 7f:45:60:ad:c3:5e:91:4c:86:ba:96:3d:29:61:13:51:fa:1a: 442s e2:a4:76:bb:7c:65:15:ae:22:3c:4d:84:61:da:b7:37:53:17: 442s ce:57:f9:86:e1:66:65:49:9c:98:f1:56:0a:a6:ab:33:ad:01: 442s 15:a3:29:d4:ba:94:c6:7c:f9:60:2b:c9:4b:1d:ae:42:db:d1: 442s 6d:45:f5:69:ff:62:64:b8:8c:78:41:88:86:1c:ca:49:4a:6c: 442s bc:ae:f7:bb:0a:1b:98:a4:bd:08:7c:a2:69:c1:c3:aa:c0:88: 442s 14:d9:34:1f:3a:c4:dc:5c:b7:02:dc:80:05:4d:02:bb:17:eb: 442s 7e:e4 442s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-OWCJiN/SSSD-child-20962-auth.pem 442s + found_md5=Modulus=B442893199849F5C0AD6ACF6C8F4C7B1FABDA275580F750CBC9C47DC213D9F2B0C6C331D60F5A585E71402DE5EBC659A490E8A1428BBAFE31441AF4284D2FDEB24E3367E40F1981A665193A7813D6CBD2F75C653AD0B84B621B3C82296D9E0E4026B347338DD4239DD0D9C6F487B88EC089CBB39B2854FA2AF2B6CAD7BD51C1B 442s + '[' Modulus=B442893199849F5C0AD6ACF6C8F4C7B1FABDA275580F750CBC9C47DC213D9F2B0C6C331D60F5A585E71402DE5EBC659A490E8A1428BBAFE31441AF4284D2FDEB24E3367E40F1981A665193A7813D6CBD2F75C653AD0B84B621B3C82296D9E0E4026B347338DD4239DD0D9C6F487B88EC089CBB39B2854FA2AF2B6CAD7BD51C1B '!=' Modulus=B442893199849F5C0AD6ACF6C8F4C7B1FABDA275580F750CBC9C47DC213D9F2B0C6C331D60F5A585E71402DE5EBC659A490E8A1428BBAFE31441AF4284D2FDEB24E3367E40F1981A665193A7813D6CBD2F75C653AD0B84B621B3C82296D9E0E4026B347338DD4239DD0D9C6F487B88EC089CBB39B2854FA2AF2B6CAD7BD51C1B ']' 442s + set +x 442s 442s Test completed, Root CA and intermediate issued certificates verified! 443s autopkgtest [01:21:37]: test sssd-softhism2-certificates-tests.sh: -----------------------] 443s autopkgtest [01:21:37]: test sssd-softhism2-certificates-tests.sh: - - - - - - - - - - results - - - - - - - - - - 443s sssd-softhism2-certificates-tests.sh PASS 444s autopkgtest [01:21:38]: test sssd-smart-card-pam-auth-configs: preparing testbed 446s Reading package lists... 446s Building dependency tree... 446s Reading state information... 446s Correcting dependencies...Starting pkgProblemResolver with broken count: 0 446s Starting 2 pkgProblemResolver with broken count: 0 446s Done 446s Done 446s Starting pkgProblemResolver with broken count: 0 446s Starting 2 pkgProblemResolver with broken count: 0 446s Done 446s The following additional packages will be installed: 446s pamtester 446s The following NEW packages will be installed: 446s pamtester 447s 0 upgraded, 1 newly installed, 0 to remove and 0 not upgraded. 447s 1 not fully installed or removed. 447s Need to get 12.2 kB of archives. 447s After this operation, 36.9 kB of additional disk space will be used. 447s Get:1 http://ftpmaster.internal/ubuntu noble/universe s390x pamtester s390x 0.1.2-4 [12.2 kB] 447s Fetched 12.2 kB in 0s (85.3 kB/s) 447s Selecting previously unselected package pamtester. 447s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 52341 files and directories currently installed.) 447s Preparing to unpack .../pamtester_0.1.2-4_s390x.deb ... 447s Unpacking pamtester (0.1.2-4) ... 447s Setting up pamtester (0.1.2-4) ... 447s Setting up autopkgtest-satdep (0) ... 447s Processing triggers for man-db (2.12.0-3) ... 450s (Reading database ... 52347 files and directories currently installed.) 450s Removing autopkgtest-satdep (0) ... 451s autopkgtest [01:21:45]: test sssd-smart-card-pam-auth-configs: env OFFLINE_MODE=1 bash debian/tests/sssd-smart-card-pam-auth-configs-tester.sh 451s autopkgtest [01:21:45]: test sssd-smart-card-pam-auth-configs: [----------------------- 451s + '[' -z ubuntu ']' 451s + export DEBIAN_FRONTEND=noninteractive 451s + DEBIAN_FRONTEND=noninteractive 451s + required_tools=(pamtester softhsm2-util sssd) 451s + [[ ! -v OFFLINE_MODE ]] 451s + for cmd in "${required_tools[@]}" 451s + command -v pamtester 451s + for cmd in "${required_tools[@]}" 451s + command -v softhsm2-util 451s + for cmd in "${required_tools[@]}" 451s + command -v sssd 451s + PIN=123456 451s ++ mktemp -d -t sssd-softhsm2-certs-XXXXXX 451s + tmpdir=/tmp/sssd-softhsm2-certs-j4jLUd 451s + backupsdir= 451s + alternative_pam_configs=(sss-smart-card-optional sss-smart-card-required) 451s + declare -a restore_paths 451s + declare -a delete_paths 451s + trap handle_exit EXIT 451s ++ dirname debian/tests/sssd-smart-card-pam-auth-configs-tester.sh 451s + tester=debian/tests/sssd-softhism2-certificates-tests.sh 451s + '[' '!' -e debian/tests/sssd-softhism2-certificates-tests.sh ']' 451s + '[' '!' -e debian/tests/sssd-softhism2-certificates-tests.sh ']' 451s + export PIN TEST_TMPDIR=/tmp/sssd-softhsm2-certs-j4jLUd GENERATE_SMART_CARDS=1 KEEP_TEMPORARY_FILES=1 NO_SSSD_TESTS=1 451s + TEST_TMPDIR=/tmp/sssd-softhsm2-certs-j4jLUd 451s + GENERATE_SMART_CARDS=1 451s + KEEP_TEMPORARY_FILES=1 451s + NO_SSSD_TESTS=1 451s + bash debian/tests/sssd-softhism2-certificates-tests.sh 451s + '[' -z ubuntu ']' 451s + required_tools=(p11tool openssl softhsm2-util) 451s + for cmd in "${required_tools[@]}" 451s + command -v p11tool 451s + for cmd in "${required_tools[@]}" 451s + command -v openssl 451s + for cmd in "${required_tools[@]}" 451s + command -v softhsm2-util 451s + PIN=123456 451s +++ find /usr/lib/softhsm/libsofthsm2.so 451s +++ head -n 1 451s ++ realpath /usr/lib/softhsm/libsofthsm2.so 451s + SOFTHSM2_MODULE=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so 451s + SSSD_P11_CHILD=/usr/libexec/sssd/p11_child 451s + TOKEN_ID=00112233445566778899FFAABBCCDDEEFF012345 451s + '[' '!' -v NO_SSSD_TESTS ']' 451s + '[' '!' -e /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so ']' 451s + tmpdir=/tmp/sssd-softhsm2-certs-j4jLUd 451s + keys_size=1024 451s + [[ ! -v KEEP_TEMPORARY_FILES ]] 451s + trap 'set +x; echo -e "\nUnexpected failure!!!"' ERR 451s + echo -n 01 451s + touch /tmp/sssd-softhsm2-certs-j4jLUd/index.txt 451s + mkdir -p /tmp/sssd-softhsm2-certs-j4jLUd/new_certs 451s + cat 451s + root_ca_key_pass=pass:random-root-CA-password-20355 451s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-certs-j4jLUd/test-root-CA-key.pem -passout pass:random-root-CA-password-20355 1024 451s + openssl req -passin pass:random-root-CA-password-20355 -batch -config /tmp/sssd-softhsm2-certs-j4jLUd/test-root-CA.config -x509 -new -nodes -key /tmp/sssd-softhsm2-certs-j4jLUd/test-root-CA-key.pem -sha256 -days 1024 -set_serial 0 -extensions v3_ca -out /tmp/sssd-softhsm2-certs-j4jLUd/test-root-CA.pem 451s + openssl x509 -noout -in /tmp/sssd-softhsm2-certs-j4jLUd/test-root-CA.pem 451s + cat 451s + intermediate_ca_key_pass=pass:random-intermediate-CA-password-27971 451s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-certs-j4jLUd/test-intermediate-CA-key.pem -passout pass:random-intermediate-CA-password-27971 1024 451s + openssl req -batch -new -nodes -passin pass:random-intermediate-CA-password-27971 -config /tmp/sssd-softhsm2-certs-j4jLUd/test-intermediate-CA.config -key /tmp/sssd-softhsm2-certs-j4jLUd/test-intermediate-CA-key.pem -passout pass:random-root-CA-password-20355 -sha256 -extensions v3_ca -out /tmp/sssd-softhsm2-certs-j4jLUd/test-intermediate-CA-certificate-request.pem 451s + openssl req -text -noout -in /tmp/sssd-softhsm2-certs-j4jLUd/test-intermediate-CA-certificate-request.pem 451s Certificate Request: 451s Data: 451s Version: 1 (0x0) 451s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 451s Subject Public Key Info: 451s Public Key Algorithm: rsaEncryption 451s Public-Key: (1024 bit) 451s Modulus: 451s 00:c3:5c:8e:6e:f8:d3:b5:37:9f:e9:ec:66:d2:c9: 451s 0a:dc:e9:9b:f4:7a:5e:45:fd:e7:b4:ea:0d:bf:a5: 451s 08:3e:7e:1a:21:55:86:ab:11:ee:e8:b5:ff:b0:a0: 451s 94:7d:05:9a:d7:ea:42:d2:4a:01:07:bf:4b:6e:b9: 451s 15:a3:58:6d:d3:b7:17:a4:81:4f:44:6a:21:05:e6: 451s f3:63:c6:0e:62:03:16:3f:ea:db:45:26:c2:88:78: 451s 87:73:73:28:68:31:b4:eb:18:d5:8d:07:02:22:32: 451s 26:d3:cf:4e:c4:38:b2:75:d5:0f:f2:8f:d5:c5:1b: 451s 6d:24:ad:8e:12:3c:a3:3b:a1 451s Exponent: 65537 (0x10001) 451s Attributes: 451s (none) 451s Requested Extensions: 451s Signature Algorithm: sha256WithRSAEncryption 451s Signature Value: 451s 99:b4:1d:86:79:39:e7:6a:3d:05:65:60:25:3e:97:43:07:ab: 451s 1d:50:49:d7:60:6f:7f:cb:59:fb:fb:bc:13:38:2b:dd:03:04: 451s d6:6f:23:34:8d:65:aa:7d:c4:17:b1:b2:ef:2b:11:99:d5:c7: 451s 7b:16:50:99:27:a0:7a:25:f8:6b:cf:09:07:26:77:78:8e:22: 451s f2:7a:ad:e5:3f:f4:fb:b0:35:e1:4e:db:d5:71:fe:c5:28:36: 451s b2:03:9f:12:45:d6:f9:70:1d:fb:7d:5c:b4:04:cf:96:81:3c: 451s c3:44:3f:c3:58:ff:4b:b2:a9:9f:ec:b2:10:f7:57:24:f6:a9: 451s 40:17 451s + openssl ca -batch -notext -config /tmp/sssd-softhsm2-certs-j4jLUd/test-root-CA.config -passin pass:random-root-CA-password-20355 -keyfile /tmp/sssd-softhsm2-certs-j4jLUd/test-root-CA-key.pem -in /tmp/sssd-softhsm2-certs-j4jLUd/test-intermediate-CA-certificate-request.pem -days 365 -extensions v3_intermediate_ca -out /tmp/sssd-softhsm2-certs-j4jLUd/test-intermediate-CA.pem 451s Using configuration from /tmp/sssd-softhsm2-certs-j4jLUd/test-root-CA.config 451s Check that the request matches the signature 451s Signature ok 451s Certificate Details: 451s Serial Number: 1 (0x1) 451s Validity 451s Not Before: Mar 5 01:21:45 2024 GMT 451s Not After : Mar 5 01:21:45 2025 GMT 451s Subject: 451s organizationName = Test Organization 451s organizationalUnitName = Test Organization Unit 451s commonName = Test Organization Intermediate CA 451s X509v3 extensions: 451s X509v3 Subject Key Identifier: 451s 0F:9C:A1:BD:71:37:2F:41:1E:76:D2:74:27:39:E9:FB:CC:D1:B6:07 451s X509v3 Authority Key Identifier: 451s keyid:E7:4C:3A:FD:F1:C1:A5:EF:8F:2B:74:35:39:D7:57:1B:75:E1:FE:B5 451s DirName:/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root CA 451s serial:00 451s X509v3 Basic Constraints: 451s CA:TRUE 451s X509v3 Key Usage: critical 451s Digital Signature, Certificate Sign, CRL Sign 451s Certificate is to be certified until Mar 5 01:21:45 2025 GMT (365 days) 451s 451s Write out database with 1 new entries 451s Database updated 451s + openssl x509 -noout -in /tmp/sssd-softhsm2-certs-j4jLUd/test-intermediate-CA.pem 451s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-j4jLUd/test-root-CA.pem /tmp/sssd-softhsm2-certs-j4jLUd/test-intermediate-CA.pem 451s /tmp/sssd-softhsm2-certs-j4jLUd/test-intermediate-CA.pem: OK 451s + cat 451s + sub_intermediate_ca_key_pass=pass:random-sub-intermediate-CA-password-14422 451s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-certs-j4jLUd/test-sub-intermediate-CA-key.pem -passout pass:random-sub-intermediate-CA-password-14422 1024 451s + openssl req -batch -new -nodes -passin pass:random-sub-intermediate-CA-password-14422 -config /tmp/sssd-softhsm2-certs-j4jLUd/test-sub-intermediate-CA.config -key /tmp/sssd-softhsm2-certs-j4jLUd/test-sub-intermediate-CA-key.pem -passout pass:random-intermediate-CA-password-27971 -sha256 -extensions v3_ca -out /tmp/sssd-softhsm2-certs-j4jLUd/test-sub-intermediate-CA-certificate-request.pem 451s + openssl req -text -noout -in /tmp/sssd-softhsm2-certs-j4jLUd/test-sub-intermediate-CA-certificate-request.pem 451s Certificate Request: 451s Data: 451s Version: 1 (0x0) 451s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 451s Subject Public Key Info: 451s Public Key Algorithm: rsaEncryption 451s Public-Key: (1024 bit) 451s Modulus: 451s 00:c7:39:d9:d8:f5:4b:55:d8:dd:cd:64:a2:8d:68: 451s 64:65:d5:3d:38:bc:7c:7a:26:4c:7b:1f:b6:e6:46: 451s b9:42:29:e3:8d:97:e4:9c:30:2e:17:ca:6a:6f:d1: 451s e6:59:a8:7e:e1:df:66:9c:3f:69:e2:fa:b4:37:84: 451s 1f:b7:12:71:2d:88:22:90:24:a1:77:40:ea:e3:40: 451s 4c:28:31:b5:d8:30:8e:08:3c:ff:94:10:e4:61:a1: 451s b1:40:6c:f9:4d:6a:73:cf:90:06:ea:b6:57:a8:e4: 451s 4d:5d:51:bf:f3:f3:b7:54:03:ce:23:81:d7:88:1e: 451s 4a:22:ac:45:ae:d4:c2:da:09 451s Exponent: 65537 (0x10001) 451s Attributes: 451s (none) 451s Requested Extensions: 451s Signature Algorithm: sha256WithRSAEncryption 451s Signature Value: 451s 84:29:c9:aa:be:1f:01:80:c3:71:14:28:d9:ec:c9:c2:e3:f0: 451s 03:c3:87:f1:48:c8:f6:8e:71:eb:7b:51:6f:d2:30:3b:b1:c0: 451s 5c:55:4d:9e:e5:eb:a6:6e:1c:dc:2c:7e:96:86:10:51:50:5f: 451s 60:67:dd:08:4a:cf:c0:08:1a:89:3d:00:bc:a2:1f:5e:ad:a7: 451s 1c:03:e3:01:63:db:4f:c6:fa:39:37:d7:f0:0c:bb:a5:4a:f6: 451s ba:58:73:2a:3e:a0:0d:ab:f6:4d:1f:3f:94:e3:17:0f:3f:53: 451s 42:5f:df:81:ed:6d:a9:ba:47:5b:61:9a:9a:b1:b5:56:03:d1: 451s c2:22 451s + openssl ca -batch -notext -config /tmp/sssd-softhsm2-certs-j4jLUd/test-intermediate-CA.config -passin pass:random-intermediate-CA-password-27971 -keyfile /tmp/sssd-softhsm2-certs-j4jLUd/test-intermediate-CA-key.pem -in /tmp/sssd-softhsm2-certs-j4jLUd/test-sub-intermediate-CA-certificate-request.pem -days 365 -extensions v3_intermediate_ca -out /tmp/sssd-softhsm2-certs-j4jLUd/test-sub-intermediate-CA.pem 451s Using configuration from /tmp/sssd-softhsm2-certs-j4jLUd/test-intermediate-CA.config 451s Check that the request matches the signature 451s Signature ok 451s Certificate Details: 451s Serial Number: 2 (0x2) 451s Validity 451s Not Before: Mar 5 01:21:45 2024 GMT 451s Not After : Mar 5 01:21:45 2025 GMT 451s Subject: 451s organizationName = Test Organization 451s organizationalUnitName = Test Organization Unit 451s commonName = Test Organization Sub Intermediate CA 451s X509v3 extensions: 451s X509v3 Subject Key Identifier: 451s C3:F5:BE:02:B5:6F:0D:8C:86:F0:6D:9B:9D:2B:51:98:45:71:5B:95 451s X509v3 Authority Key Identifier: 451s keyid:0F:9C:A1:BD:71:37:2F:41:1E:76:D2:74:27:39:E9:FB:CC:D1:B6:07 451s DirName:/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root CA 451s serial:01 451s X509v3 Basic Constraints: 451s CA:TRUE 451s X509v3 Key Usage: critical 451s Digital Signature, Certificate Sign, CRL Sign 451s Certificate is to be certified until Mar 5 01:21:45 2025 GMT (365 days) 451s 451s Write out database with 1 new entries 451s Database updated 451s + openssl x509 -noout -in /tmp/sssd-softhsm2-certs-j4jLUd/test-sub-intermediate-CA.pem 451s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-certs-j4jLUd/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-j4jLUd/test-sub-intermediate-CA.pem 451s /tmp/sssd-softhsm2-certs-j4jLUd/test-sub-intermediate-CA.pem: OK 451s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-certs-j4jLUd/test-root-CA.pem /tmp/sssd-softhsm2-certs-j4jLUd/test-sub-intermediate-CA.pem 451s + local cmd=openssl 451s + shift 451s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-j4jLUd/test-root-CA.pem /tmp/sssd-softhsm2-certs-j4jLUd/test-sub-intermediate-CA.pem 451s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 451s error 20 at 0 depth lookup: unable to get local issuer certificate 451s error /tmp/sssd-softhsm2-certs-j4jLUd/test-sub-intermediate-CA.pem: verification failed 451s + cat 451s + root_ca_trusted_cert_0001_key_pass=pass:random-root-ca-trusted-cert-0001-15885 451s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-certs-j4jLUd/test-root-CA-trusted-certificate-0001-key.pem -passout pass:random-root-ca-trusted-cert-0001-15885 1024 451s + openssl req -new -nodes -reqexts req_exts -passin pass:random-root-ca-trusted-cert-0001-15885 -key /tmp/sssd-softhsm2-certs-j4jLUd/test-root-CA-trusted-certificate-0001-key.pem -config /tmp/sssd-softhsm2-certs-j4jLUd/test-root-CA-trusted-certificate-0001.config -out /tmp/sssd-softhsm2-certs-j4jLUd/test-root-CA-trusted-certificate-0001-request.pem 451s + openssl req -text -noout -in /tmp/sssd-softhsm2-certs-j4jLUd/test-root-CA-trusted-certificate-0001-request.pem 451s Certificate Request: 451s Data: 451s Version: 1 (0x0) 451s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 451s Subject Public Key Info: 451s Public Key Algorithm: rsaEncryption 451s Public-Key: (1024 bit) 451s Modulus: 451s 00:d6:96:1c:ba:86:db:7d:a7:54:a5:87:cf:39:64: 451s 02:7f:94:85:c4:ae:35:a6:c3:f5:4e:aa:90:49:68: 451s 38:bb:8a:32:6a:c3:53:0a:5f:fa:66:ca:63:02:7c: 451s 47:5f:a4:c8:72:7c:32:17:14:71:b2:ea:62:90:bc: 451s e3:15:a6:b0:63:f5:1b:f3:0b:17:41:b4:a1:b3:b9: 451s 17:f0:af:dc:38:4f:73:a4:cd:1d:b3:97:56:9a:54: 451s bb:11:b3:d5:24:c4:6b:4f:99:1f:cc:0b:36:cc:cd: 451s 7d:e0:bd:b9:e9:32:05:2c:33:73:91:f5:df:ce:a0: 451s a8:b8:92:1f:55:ef:96:61:53 451s Exponent: 65537 (0x10001) 451s Attributes: 451s Requested Extensions: 451s X509v3 Basic Constraints: 451s CA:FALSE 451s Netscape Cert Type: 451s SSL Client, S/MIME 451s Netscape Comment: 451s Test Organization Root CA trusted Certificate 451s X509v3 Subject Key Identifier: 451s E7:96:51:8A:8A:1C:48:D1:5A:91:E0:12:C4:7B:A7:AF:9D:CE:89:7E 451s X509v3 Key Usage: critical 451s Digital Signature, Non Repudiation, Key Encipherment 451s X509v3 Extended Key Usage: 451s TLS Web Client Authentication, E-mail Protection 451s X509v3 Subject Alternative Name: 451s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 451s Signature Algorithm: sha256WithRSAEncryption 451s Signature Value: 451s 85:f0:36:6f:7d:a9:fc:24:6e:0b:a7:99:72:02:fc:e5:cd:e9: 451s 14:29:ea:61:1d:45:b7:22:f3:f0:75:ed:d6:fa:9d:2f:3f:0a: 451s 1f:fe:35:7b:54:b4:8b:f2:a2:4e:67:52:6a:81:ae:71:f0:fa: 451s f7:bd:b1:14:53:4a:b2:ab:5e:af:57:b5:35:87:c5:61:ea:45: 451s b9:df:f6:84:3a:3d:67:1c:d0:46:bc:49:7c:5d:4b:18:4a:70: 451s c0:7d:7c:53:70:5d:7f:82:2d:7f:07:3e:48:e1:cd:3e:68:9f: 451s e1:fe:57:c7:c4:3b:14:8d:7f:fb:60:88:1f:dc:a2:7a:71:64: 451s 95:f6 451s + openssl ca -batch -notext -config /tmp/sssd-softhsm2-certs-j4jLUd/test-root-CA.config -passin pass:random-root-CA-password-20355 -keyfile /tmp/sssd-softhsm2-certs-j4jLUd/test-root-CA-key.pem -in /tmp/sssd-softhsm2-certs-j4jLUd/test-root-CA-trusted-certificate-0001-request.pem -days 365 -extensions usr_cert -out /tmp/sssd-softhsm2-certs-j4jLUd/test-root-CA-trusted-certificate-0001.pem 451s Using configuration from /tmp/sssd-softhsm2-certs-j4jLUd/test-root-CA.config 451s Check that the request matches the signature 451s Signature ok 451s Certificate Details: 451s Serial Number: 3 (0x3) 451s Validity 451s Not Before: Mar 5 01:21:45 2024 GMT 451s Not After : Mar 5 01:21:45 2025 GMT 451s Subject: 451s organizationName = Test Organization 451s organizationalUnitName = Test Organization Unit 451s commonName = Test Organization Root Trusted Certificate 0001 451s X509v3 extensions: 451s X509v3 Authority Key Identifier: 451s E7:4C:3A:FD:F1:C1:A5:EF:8F:2B:74:35:39:D7:57:1B:75:E1:FE:B5 451s X509v3 Basic Constraints: 451s CA:FALSE 451s Netscape Cert Type: 451s SSL Client, S/MIME 451s Netscape Comment: 451s Test Organization Root CA trusted Certificate 451s X509v3 Subject Key Identifier: 451s E7:96:51:8A:8A:1C:48:D1:5A:91:E0:12:C4:7B:A7:AF:9D:CE:89:7E 451s X509v3 Key Usage: critical 451s Digital Signature, Non Repudiation, Key Encipherment 451s X509v3 Extended Key Usage: 451s TLS Web Client Authentication, E-mail Protection 451s X509v3 Subject Alternative Name: 451s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 451s Certificate is to be certified until Mar 5 01:21:45 2025 GMT (365 days) 451s 451s Write out database with 1 new entries 451s Database updated 451s + openssl x509 -noout -in /tmp/sssd-softhsm2-certs-j4jLUd/test-root-CA-trusted-certificate-0001.pem 451s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-j4jLUd/test-root-CA.pem /tmp/sssd-softhsm2-certs-j4jLUd/test-root-CA-trusted-certificate-0001.pem 451s /tmp/sssd-softhsm2-certs-j4jLUd/test-root-CA-trusted-certificate-0001.pem: OK 451s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-certs-j4jLUd/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-j4jLUd/test-root-CA-trusted-certificate-0001.pem 451s + local cmd=openssl 451s + shift 451s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-j4jLUd/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-j4jLUd/test-root-CA-trusted-certificate-0001.pem 451s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 451s error 20 at 0 depth lookup: unable to get local issuer certificate 451s error /tmp/sssd-softhsm2-certs-j4jLUd/test-root-CA-trusted-certificate-0001.pem: verification failed 451s + cat 451s + intermediate_ca_trusted_cert_0001_key_pass=pass:random-intermediate-ca-trusted-cert-0001-3613 451s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-certs-j4jLUd/test-intermediate-CA-trusted-certificate-0001-key.pem -passout pass:random-intermediate-ca-trusted-cert-0001-3613 1024 451s + openssl req -new -nodes -reqexts req_exts -passin pass:random-intermediate-ca-trusted-cert-0001-3613 -key /tmp/sssd-softhsm2-certs-j4jLUd/test-intermediate-CA-trusted-certificate-0001-key.pem -config /tmp/sssd-softhsm2-certs-j4jLUd/test-intermediate-CA-trusted-certificate-0001.config -out /tmp/sssd-softhsm2-certs-j4jLUd/test-intermediate-CA-trusted-certificate-0001-request.pem 451s + openssl req -text -noout -in /tmp/sssd-softhsm2-certs-j4jLUd/test-intermediate-CA-trusted-certificate-0001-request.pem 451s Certificate Request: 451s Data: 451s Version: 1 (0x0) 451s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 451s Subject Public Key Info: 451s Public Key Algorithm: rsaEncryption 451s Public-Key: (1024 bit) 451s Modulus: 451s 00:cb:2b:31:fd:b4:57:c7:63:bb:ad:f8:69:ac:c0: 451s 71:66:a6:f2:d1:63:01:17:ea:9a:71:d5:37:f8:1e: 451s ee:3f:1f:64:c2:bd:17:e5:8d:e5:ff:c6:62:19:03: 451s a9:9b:52:a7:38:ac:e7:56:33:51:c7:4e:05:f9:d4: 451s ae:1e:2e:50:08:2c:6a:91:1c:11:d0:bf:ce:09:52: 451s 8f:e2:7f:df:2c:13:6d:75:5c:1b:a5:2a:dc:bd:1b: 451s af:b4:9b:6d:96:b2:c8:51:56:89:a4:31:2b:e1:81: 451s 23:a2:0e:9a:83:7b:ac:91:7a:a6:89:53:fe:0f:56: 451s 37:f1:fe:e9:5e:6e:56:9b:0b 451s Exponent: 65537 (0x10001) 451s Attributes: 451s Requested Extensions: 451s X509v3 Basic Constraints: 451s CA:FALSE 451s Netscape Cert Type: 451s SSL Client, S/MIME 451s Netscape Comment: 451s Test Organization Intermediate CA trusted Certificate 451s X509v3 Subject Key Identifier: 451s B1:EB:58:38:8B:A8:D8:6D:3B:CE:81:56:CD:01:09:27:CC:2F:4E:E1 451s X509v3 Key Usage: critical 451s Digital Signature, Non Repudiation, Key Encipherment 451s X509v3 Extended Key Usage: 451s TLS Web Client Authentication, E-mail Protection 451s X509v3 Subject Alternative Name: 451s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 451s Signature Algorithm: sha256WithRSAEncryption 451s Signature Value: 451s 57:3f:b8:e5:7b:08:28:82:1a:6c:f5:82:b3:d5:5a:ab:4f:27: 451s 58:dd:4a:96:33:20:8a:e4:4b:69:92:58:e3:2c:97:25:ad:83: 451s 24:87:91:dc:a5:af:5f:f0:20:fc:20:4b:fb:96:78:92:1d:85: 451s 25:6f:84:87:2b:9d:77:ec:b0:ce:d4:3d:59:22:c0:1f:bd:c7: 451s 27:ae:1e:ec:6b:4b:13:59:6e:0a:08:3d:55:97:6f:0b:40:5c: 451s bd:c7:6e:a0:6e:1c:a2:2a:f3:fd:17:84:b9:c2:1c:47:d0:70: 451s d4:94:ee:7d:d2:93:90:07:30:e6:9d:05:86:0f:a8:5a:d5:f2: 451s 12:28 451s + openssl ca -passin pass:random-intermediate-CA-password-27971 -config /tmp/sssd-softhsm2-certs-j4jLUd/test-intermediate-CA.config -batch -notext -keyfile /tmp/sssd-softhsm2-certs-j4jLUd/test-intermediate-CA-key.pem -in /tmp/sssd-softhsm2-certs-j4jLUd/test-intermediate-CA-trusted-certificate-0001-request.pem -days 365 -extensions usr_cert -out /tmp/sssd-softhsm2-certs-j4jLUd/test-intermediate-CA-trusted-certificate-0001.pem 451s Using configuration from /tmp/sssd-softhsm2-certs-j4jLUd/test-intermediate-CA.config 451s Check that the request matches the signature 451s Signature ok 451s Certificate Details: 451s Serial Number: 4 (0x4) 451s Validity 451s Not Before: Mar 5 01:21:45 2024 GMT 451s Not After : Mar 5 01:21:45 2025 GMT 451s Subject: 451s organizationName = Test Organization 451s organizationalUnitName = Test Organization Unit 451s commonName = Test Organization Intermediate Trusted Certificate 0001 451s X509v3 extensions: 451s X509v3 Authority Key Identifier: 451s 0F:9C:A1:BD:71:37:2F:41:1E:76:D2:74:27:39:E9:FB:CC:D1:B6:07 451s X509v3 Basic Constraints: 451s CA:FALSE 451s Netscape Cert Type: 451s SSL Client, S/MIME 451s Netscape Comment: 451s Test Organization Intermediate CA trusted Certificate 451s X509v3 Subject Key Identifier: 451s B1:EB:58:38:8B:A8:D8:6D:3B:CE:81:56:CD:01:09:27:CC:2F:4E:E1 451s X509v3 Key Usage: critical 451s Digital Signature, Non Repudiation, Key Encipherment 451s X509v3 Extended Key Usage: 451s TLS Web Client Authentication, E-mail Protection 451s X509v3 Subject Alternative Name: 451s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 451s Certificate is to be certified until Mar 5 01:21:45 2025 GMT (365 days) 451s 451s Write out database with 1 new entries 451s Database updated 451s + openssl x509 -noout -in /tmp/sssd-softhsm2-certs-j4jLUd/test-intermediate-CA-trusted-certificate-0001.pem 451s This certificate should not be trusted fully 451s + echo 'This certificate should not be trusted fully' 451s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-certs-j4jLUd/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-j4jLUd/test-intermediate-CA-trusted-certificate-0001.pem 451s + local cmd=openssl 451s + shift 451s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-j4jLUd/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-j4jLUd/test-intermediate-CA-trusted-certificate-0001.pem 451s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 451s error 2 at 1 depth lookup: unable to get issuer certificate 451s error /tmp/sssd-softhsm2-certs-j4jLUd/test-intermediate-CA-trusted-certificate-0001.pem: verification failed 451s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-certs-j4jLUd/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-j4jLUd/test-intermediate-CA-trusted-certificate-0001.pem 451s /tmp/sssd-softhsm2-certs-j4jLUd/test-intermediate-CA-trusted-certificate-0001.pem: OK 451s + cat 451s + sub_intermediate_ca_trusted_cert_0001_key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-29701 451s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-certs-j4jLUd/test-sub-intermediate-CA-trusted-certificate-0001-key.pem -passout pass:random-sub-intermediate-ca-trusted-cert-0001-29701 1024 451s + openssl req -new -nodes -reqexts req_exts -passin pass:random-sub-intermediate-ca-trusted-cert-0001-29701 -key /tmp/sssd-softhsm2-certs-j4jLUd/test-sub-intermediate-CA-trusted-certificate-0001-key.pem -config /tmp/sssd-softhsm2-certs-j4jLUd/test-sub-intermediate-CA-trusted-certificate-0001.config -out /tmp/sssd-softhsm2-certs-j4jLUd/test-sub-intermediate-CA-trusted-certificate-0001-request.pem 451s + openssl req -text -noout -in /tmp/sssd-softhsm2-certs-j4jLUd/test-sub-intermediate-CA-trusted-certificate-0001-request.pem 451s Certificate Request: 451s Data: 451s Version: 1 (0x0) 451s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 451s Subject Public Key Info: 451s Public Key Algorithm: rsaEncryption 451s Public-Key: (1024 bit) 451s Modulus: 451s 00:df:d9:26:ac:ff:8d:d4:42:dc:cd:80:53:42:71: 451s 3e:2d:70:78:5f:54:b6:f1:d8:ed:b9:9d:bc:c7:83: 451s d2:07:46:6b:b6:19:57:26:94:c6:1e:8c:a8:dc:2a: 451s c1:fc:51:bf:48:e0:c7:d5:32:d3:03:10:fd:80:dd: 451s cb:3d:cf:f6:c8:1a:08:9a:a1:48:29:8b:53:a8:0c: 451s 78:43:86:15:eb:35:5b:07:fd:0d:4b:9f:5c:0a:cc: 451s 9a:eb:4c:5f:97:89:bb:9a:e9:0b:b4:a4:6a:f3:cd: 451s 7f:d3:5c:91:70:26:0a:75:6a:cc:0b:ea:05:62:ee: 451s 43:92:ac:89:89:1c:1b:4b:99 451s Exponent: 65537 (0x10001) 451s Attributes: 451s Requested Extensions: 451s X509v3 Basic Constraints: 451s CA:FALSE 451s Netscape Cert Type: 451s SSL Client, S/MIME 451s Netscape Comment: 451s Test Organization Sub Intermediate CA trusted Certificate 451s X509v3 Subject Key Identifier: 451s 07:0D:62:A3:AC:B2:C3:18:98:0D:C8:B7:6B:4B:6A:3B:47:2C:0E:51 451s X509v3 Key Usage: critical 451s Digital Signature, Non Repudiation, Key Encipherment 451s X509v3 Extended Key Usage: 451s TLS Web Client Authentication, E-mail Protection 451s X509v3 Subject Alternative Name: 451s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 451s Signature Algorithm: sha256WithRSAEncryption 451s Signature Value: 451s b9:eb:da:9b:31:13:6c:70:3a:04:86:87:ec:65:39:39:b7:64: 451s cf:99:93:be:ca:ec:35:48:bb:3a:d7:a9:98:cd:94:f8:42:74: 451s 2c:98:f3:fb:2f:47:3b:ea:65:21:fb:cd:8f:02:e9:39:4c:4a: 451s d7:1a:16:64:56:4e:dc:92:c4:51:66:a3:2d:45:6f:87:3b:21: 451s 93:9d:c0:0d:68:1f:91:f1:98:7e:6c:68:86:3a:41:d4:9b:29: 451s 79:78:8d:6a:44:7f:e9:d7:53:62:cf:0f:bb:46:0c:b9:97:70: 451s 48:a0:e4:cd:23:fa:7e:6a:f3:39:12:bc:8e:97:83:4f:d6:b4: 451s 63:e9 451s + openssl ca -passin pass:random-sub-intermediate-CA-password-14422 -config /tmp/sssd-softhsm2-certs-j4jLUd/test-sub-intermediate-CA.config -batch -notext -keyfile /tmp/sssd-softhsm2-certs-j4jLUd/test-sub-intermediate-CA-key.pem -in /tmp/sssd-softhsm2-certs-j4jLUd/test-sub-intermediate-CA-trusted-certificate-0001-request.pem -days 365 -extensions usr_cert -out /tmp/sssd-softhsm2-certs-j4jLUd/test-sub-intermediate-CA-trusted-certificate-0001.pem 451s Using configuration from /tmp/sssd-softhsm2-certs-j4jLUd/test-sub-intermediate-CA.config 451s Check that the request matches the signature 451s Signature ok 451s Certificate Details: 451s Serial Number: 5 (0x5) 451s Validity 451s Not Before: Mar 5 01:21:45 2024 GMT 451s Not After : Mar 5 01:21:45 2025 GMT 451s Subject: 451s organizationName = Test Organization 451s organizationalUnitName = Test Organization Unit 451s commonName = Test Organization Sub Intermediate Trusted Certificate 0001 451s X509v3 extensions: 451s X509v3 Authority Key Identifier: 451s C3:F5:BE:02:B5:6F:0D:8C:86:F0:6D:9B:9D:2B:51:98:45:71:5B:95 451s X509v3 Basic Constraints: 451s CA:FALSE 451s Netscape Cert Type: 451s SSL Client, S/MIME 451s Netscape Comment: 451s Test Organization Sub Intermediate CA trusted Certificate 451s X509v3 Subject Key Identifier: 451s 07:0D:62:A3:AC:B2:C3:18:98:0D:C8:B7:6B:4B:6A:3B:47:2C:0E:51 451s X509v3 Key Usage: critical 451s Digital Signature, Non Repudiation, Key Encipherment 451s X509v3 Extended Key Usage: 451s TLS Web Client Authentication, E-mail Protection 451s X509v3 Subject Alternative Name: 451s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 451s Certificate is to be certified until Mar 5 01:21:45 2025 GMT (365 days) 451s 451s Write out database with 1 new entries 451s Database updated 451s + openssl x509 -noout -in /tmp/sssd-softhsm2-certs-j4jLUd/test-sub-intermediate-CA-trusted-certificate-0001.pem 451s This certificate should not be trusted fully 451s + echo 'This certificate should not be trusted fully' 451s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-certs-j4jLUd/test-sub-intermediate-CA.pem /tmp/sssd-softhsm2-certs-j4jLUd/test-sub-intermediate-CA-trusted-certificate-0001.pem 451s + local cmd=openssl 451s + shift 451s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-j4jLUd/test-sub-intermediate-CA.pem /tmp/sssd-softhsm2-certs-j4jLUd/test-sub-intermediate-CA-trusted-certificate-0001.pem 451s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 451s error 2 at 1 depth lookup: unable to get issuer certificate 451s error /tmp/sssd-softhsm2-certs-j4jLUd/test-sub-intermediate-CA-trusted-certificate-0001.pem: verification failed 451s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-certs-j4jLUd/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-j4jLUd/test-sub-intermediate-CA-trusted-certificate-0001.pem 451s + local cmd=openssl 451s + shift 451s /tmp/sssd-softhsm2-certs-j4jLUd/test-sub-intermediate-CA-trusted-certificate-0001.pem: OK 451s Building a the full-chain CA file... 451s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-j4jLUd/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-j4jLUd/test-sub-intermediate-CA-trusted-certificate-0001.pem 451s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 451s error 20 at 0 depth lookup: unable to get local issuer certificate 451s error /tmp/sssd-softhsm2-certs-j4jLUd/test-sub-intermediate-CA-trusted-certificate-0001.pem: verification failed 451s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-certs-j4jLUd/test-sub-intermediate-CA.pem /tmp/sssd-softhsm2-certs-j4jLUd/test-sub-intermediate-CA-trusted-certificate-0001.pem 451s + expect_fail openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-certs-j4jLUd/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-j4jLUd/test-sub-intermediate-CA-trusted-certificate-0001.pem 451s + local cmd=openssl 451s + shift 451s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-certs-j4jLUd/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-j4jLUd/test-sub-intermediate-CA-trusted-certificate-0001.pem 451s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 451s error 20 at 0 depth lookup: unable to get local issuer certificate 451s error /tmp/sssd-softhsm2-certs-j4jLUd/test-sub-intermediate-CA-trusted-certificate-0001.pem: verification failed 451s + echo 'Building a the full-chain CA file...' 451s + cat /tmp/sssd-softhsm2-certs-j4jLUd/test-root-CA.pem /tmp/sssd-softhsm2-certs-j4jLUd/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-j4jLUd/test-sub-intermediate-CA.pem 451s + cat /tmp/sssd-softhsm2-certs-j4jLUd/test-root-CA.pem /tmp/sssd-softhsm2-certs-j4jLUd/test-intermediate-CA.pem 451s + cat /tmp/sssd-softhsm2-certs-j4jLUd/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-j4jLUd/test-sub-intermediate-CA.pem 451s subject=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 451s issuer=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 451s 451s subject=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 451s issuer=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 451s 451s subject=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 451s issuer=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 451s 451s + openssl crl2pkcs7 -nocrl -certfile /tmp/sssd-softhsm2-certs-j4jLUd/test-full-chain-CA.pem 451s + openssl pkcs7 -print_certs -noout 451s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-j4jLUd/test-full-chain-CA.pem /tmp/sssd-softhsm2-certs-j4jLUd/test-intermediate-CA.pem 451s /tmp/sssd-softhsm2-certs-j4jLUd/test-intermediate-CA.pem: OK 451s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-j4jLUd/test-full-chain-CA.pem /tmp/sssd-softhsm2-certs-j4jLUd/test-root-CA-trusted-certificate-0001.pem 451s /tmp/sssd-softhsm2-certs-j4jLUd/test-root-CA-trusted-certificate-0001.pem: OK 451s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-j4jLUd/test-full-chain-CA.pem /tmp/sssd-softhsm2-certs-j4jLUd/test-intermediate-CA-trusted-certificate-0001.pem 451s /tmp/sssd-softhsm2-certs-j4jLUd/test-intermediate-CA-trusted-certificate-0001.pem: OK 451s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-j4jLUd/test-full-chain-CA.pem /tmp/sssd-softhsm2-certs-j4jLUd/test-root-intermediate-chain-CA.pem 451s /tmp/sssd-softhsm2-certs-j4jLUd/test-root-intermediate-chain-CA.pem: OK 451s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-j4jLUd/test-full-chain-CA.pem /tmp/sssd-softhsm2-certs-j4jLUd/test-sub-intermediate-CA-trusted-certificate-0001.pem 451s /tmp/sssd-softhsm2-certs-j4jLUd/test-sub-intermediate-CA-trusted-certificate-0001.pem: OK 451s Certificates generation completed! 451s + echo 'Certificates generation completed!' 451s + [[ -v NO_SSSD_TESTS ]] 451s + [[ -v GENERATE_SMART_CARDS ]] 451s + prepare_softhsm2_card /tmp/sssd-softhsm2-certs-j4jLUd/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-15885 451s + local certificate=/tmp/sssd-softhsm2-certs-j4jLUd/test-root-CA-trusted-certificate-0001.pem 451s + local key_pass=pass:random-root-ca-trusted-cert-0001-15885 451s + local key_cn 451s + local key_name 451s + local tokens_dir 451s + local output_cert_file 451s + token_name= 451s ++ basename /tmp/sssd-softhsm2-certs-j4jLUd/test-root-CA-trusted-certificate-0001.pem .pem 451s + key_name=test-root-CA-trusted-certificate-0001 451s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-certs-j4jLUd/test-root-CA-trusted-certificate-0001.pem 451s ++ sed -n 's/ *commonName *= //p' 452s + key_cn='Test Organization Root Trusted Certificate 0001' 452s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 452s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-certs-j4jLUd/softhsm2-test-root-CA-trusted-certificate-0001.conf 452s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-certs-j4jLUd/softhsm2-test-root-CA-trusted-certificate-0001.conf 452s ++ basename /tmp/sssd-softhsm2-certs-j4jLUd/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 452s + tokens_dir=/tmp/sssd-softhsm2-certs-j4jLUd/softhsm2-test-root-CA-trusted-certificate-0001 452s + token_name='Test Organization Root Tr Token' 452s + '[' '!' -e /tmp/sssd-softhsm2-certs-j4jLUd/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 452s + local key_file 452s + local decrypted_key 452s + mkdir -p /tmp/sssd-softhsm2-certs-j4jLUd/softhsm2-test-root-CA-trusted-certificate-0001 452s + key_file=/tmp/sssd-softhsm2-certs-j4jLUd/test-root-CA-trusted-certificate-0001-key.pem 452s + decrypted_key=/tmp/sssd-softhsm2-certs-j4jLUd/test-root-CA-trusted-certificate-0001-key-decrypted.pem 452s + cat 452s + softhsm2-util --init-token --label 'Test Organization Root Tr Token' --pin 123456 --so-pin 123456 --free 452s Slot 0 has a free/uninitialized token. 452s The token has been initialized and is reassigned to slot 486596710 452s + softhsm2-util --show-slots 452s Available slots: 452s Slot 486596710 452s Slot info: 452s Description: SoftHSM slot ID 0x1d00e066 452s Manufacturer ID: SoftHSM project 452s Hardware version: 2.6 452s Firmware version: 2.6 452s Token present: yes 452s Token info: 452s Manufacturer ID: SoftHSM project 452s Model: SoftHSM v2 452s Hardware version: 2.6 452s Firmware version: 2.6 452s Serial number: 627563511d00e066 452s Initialized: yes 452s User PIN init.: yes 452s Label: Test Organization Root Tr Token 452s Slot 1 452s Slot info: 452s Description: SoftHSM slot ID 0x1 452s Manufacturer ID: SoftHSM project 452s Hardware version: 2.6 452s Firmware version: 2.6 452s Token present: yes 452s Token info: 452s Manufacturer ID: SoftHSM project 452s Model: SoftHSM v2 452s Hardware version: 2.6 452s Firmware version: 2.6 452s Serial number: 452s Initialized: no 452s User PIN init.: no 452s Label: 452s + p11tool --provider=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --write --no-mark-private --load-certificate=/tmp/sssd-softhsm2-certs-j4jLUd/test-root-CA-trusted-certificate-0001.pem --login --set-pin=123456 --label 'Test Organization Root Trusted Certificate 0001' --id 00112233445566778899FFAABBCCDDEEFF012345 452s + openssl rsa -passin pass:random-root-ca-trusted-cert-0001-15885 -in /tmp/sssd-softhsm2-certs-j4jLUd/test-root-CA-trusted-certificate-0001-key.pem -out /tmp/sssd-softhsm2-certs-j4jLUd/test-root-CA-trusted-certificate-0001-key-decrypted.pem 452s writing RSA key 452s + p11tool --provider=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --write --load-privkey=/tmp/sssd-softhsm2-certs-j4jLUd/test-root-CA-trusted-certificate-0001-key-decrypted.pem --login --set-pin=123456 --label 'Test Organization Root Trusted Certificate 0001 Key' --id 00112233445566778899FFAABBCCDDEEFF012345 452s + rm /tmp/sssd-softhsm2-certs-j4jLUd/test-root-CA-trusted-certificate-0001-key-decrypted.pem 452s + p11tool --provider=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --list-all 452s Object 0: 452s URL: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=627563511d00e066;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert 452s Type: X.509 Certificate (RSA-1024) 452s Expires: Wed Mar 5 01:21:45 2025 452s Label: Test Organization Root Trusted Certificate 0001 452s ID: 00:11:22:33:44:55:66:77:88:99:ff:aa:bb:cc:dd:ee:ff:01:23:45 452s 452s Test Organization Root Tr Token 452s + echo 'Test Organization Root Tr Token' 452s + prepare_softhsm2_card /tmp/sssd-softhsm2-certs-j4jLUd/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-3613 452s + local certificate=/tmp/sssd-softhsm2-certs-j4jLUd/test-intermediate-CA-trusted-certificate-0001.pem 452s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-3613 452s + local key_cn 452s + local key_name 452s + local tokens_dir 452s + local output_cert_file 452s + token_name= 452s ++ basename /tmp/sssd-softhsm2-certs-j4jLUd/test-intermediate-CA-trusted-certificate-0001.pem .pem 452s + key_name=test-intermediate-CA-trusted-certificate-0001 452s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-certs-j4jLUd/test-intermediate-CA-trusted-certificate-0001.pem 452s ++ sed -n 's/ *commonName *= //p' 452s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 452s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 452s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-certs-j4jLUd/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 452s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-certs-j4jLUd/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 452s ++ basename /tmp/sssd-softhsm2-certs-j4jLUd/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 452s + tokens_dir=/tmp/sssd-softhsm2-certs-j4jLUd/softhsm2-test-intermediate-CA-trusted-certificate-0001 452s + token_name='Test Organization Interme Token' 452s + '[' '!' -e /tmp/sssd-softhsm2-certs-j4jLUd/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 452s + local key_file 452s + local decrypted_key 452s + mkdir -p /tmp/sssd-softhsm2-certs-j4jLUd/softhsm2-test-intermediate-CA-trusted-certificate-0001 452s + key_file=/tmp/sssd-softhsm2-certs-j4jLUd/test-intermediate-CA-trusted-certificate-0001-key.pem 452s + decrypted_key=/tmp/sssd-softhsm2-certs-j4jLUd/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 452s + cat 452s + softhsm2-util --init-token --label 'Test Organization Interme Token' --pin 123456 --so-pin 123456 --free 452s Slot 0 has a free/uninitialized token. 452s The token has been initialized and is reassigned to slot 903394930 452s + softhsm2-util --show-slots 452s Available slots: 452s Slot 903394930 452s Slot info: 452s Description: SoftHSM slot ID 0x35d8b672 452s Manufacturer ID: SoftHSM project 452s Hardware version: 2.6 452s Firmware version: 2.6 452s Token present: yes 452s Token info: 452s Manufacturer ID: SoftHSM project 452s Model: SoftHSM v2 452s Hardware version: 2.6 452s Firmware version: 2.6 452s Serial number: bf279b29b5d8b672 452s Initialized: yes 452s User PIN init.: yes 452s Label: Test Organization Interme Token 452s Slot 1 452s Slot info: 452s Description: SoftHSM slot ID 0x1 452s Manufacturer ID: SoftHSM project 452s Hardware version: 2.6 452s Firmware version: 2.6 452s Token present: yes 452s Token info: 452s Manufacturer ID: SoftHSM project 452s Model: SoftHSM v2 452s Hardware version: 2.6 452s Firmware version: 2.6 452s Serial number: 452s Initialized: no 452s User PIN init.: no 452s Label: 452s + p11tool --provider=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --write --no-mark-private --load-certificate=/tmp/sssd-softhsm2-certs-j4jLUd/test-intermediate-CA-trusted-certificate-0001.pem --login --set-pin=123456 --label 'Test Organization Intermediate Trusted Certificate 0001' --id 00112233445566778899FFAABBCCDDEEFF012345 452s + openssl rsa -passin pass:random-intermediate-ca-trusted-cert-0001-3613 -in /tmp/sssd-softhsm2-certs-j4jLUd/test-intermediate-CA-trusted-certificate-0001-key.pem -out /tmp/sssd-softhsm2-certs-j4jLUd/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 452s writing RSA key 452s + p11tool --provider=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --write --load-privkey=/tmp/sssd-softhsm2-certs-j4jLUd/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem --login --set-pin=123456 --label 'Test Organization Intermediate Trusted Certificate 0001 Key' --id 00112233445566778899FFAABBCCDDEEFF012345 452s + rm /tmp/sssd-softhsm2-certs-j4jLUd/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 452s + p11tool --provider=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --list-all 452s Object 0: 452s URL: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=bf279b29b5d8b672;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert 452s Type: X.509 Certificate (RSA-1024) 452s Expires: Wed Mar 5 01:21:45 2025 452s Label: Test Organization Intermediate Trusted Certificate 0001 452s ID: 00:11:22:33:44:55:66:77:88:99:ff:aa:bb:cc:dd:ee:ff:01:23:45 452s 452s Test Organization Interme Token 452s + echo 'Test Organization Interme Token' 452s + prepare_softhsm2_card /tmp/sssd-softhsm2-certs-j4jLUd/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-29701 452s + local certificate=/tmp/sssd-softhsm2-certs-j4jLUd/test-sub-intermediate-CA-trusted-certificate-0001.pem 452s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-29701 452s + local key_cn 452s + local key_name 452s + local tokens_dir 452s + local output_cert_file 452s + token_name= 452s ++ basename /tmp/sssd-softhsm2-certs-j4jLUd/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 452s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 452s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-certs-j4jLUd/test-sub-intermediate-CA-trusted-certificate-0001.pem 452s ++ sed -n 's/ *commonName *= //p' 452s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 452s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 452s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-certs-j4jLUd/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 452s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-certs-j4jLUd/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 452s ++ basename /tmp/sssd-softhsm2-certs-j4jLUd/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 452s + tokens_dir=/tmp/sssd-softhsm2-certs-j4jLUd/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 452s + token_name='Test Organization Sub Int Token' 452s + '[' '!' -e /tmp/sssd-softhsm2-certs-j4jLUd/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 452s + local key_file 452s + local decrypted_key 452s + mkdir -p /tmp/sssd-softhsm2-certs-j4jLUd/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 452s + key_file=/tmp/sssd-softhsm2-certs-j4jLUd/test-sub-intermediate-CA-trusted-certificate-0001-key.pem 452s + decrypted_key=/tmp/sssd-softhsm2-certs-j4jLUd/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 452s + cat 452s + softhsm2-util --init-token --label 'Test Organization Sub Int Token' --pin 123456 --so-pin 123456 --free 452s Slot 0 has a free/uninitialized token. 452s The token has been initialized and is reassigned to slot 1658206282 452s + softhsm2-util --show-slots 452s Available slots: 452s Slot 1658206282 452s Slot info: 452s Description: SoftHSM slot ID 0x62d6384a 452s Manufacturer ID: SoftHSM project 452s Hardware version: 2.6 452s Firmware version: 2.6 452s Token present: yes 452s Token info: 452s Manufacturer ID: SoftHSM project 452s Model: SoftHSM v2 452s Hardware version: 2.6 452s Firmware version: 2.6 452s Serial number: d51e27f5e2d6384a 452s Initialized: yes 452s User PIN init.: yes 452s Label: Test Organization Sub Int Token 452s Slot 1 452s Slot info: 452s Description: SoftHSM slot ID 0x1 452s Manufacturer ID: SoftHSM project 452s Hardware version: 2.6 452s Firmware version: 2.6 452s Token present: yes 452s Token info: 452s Manufacturer ID: SoftHSM project 452s Model: SoftHSM v2 452s Hardware version: 2.6 452s Firmware version: 2.6 452s Serial number: 452s Initialized: no 452s User PIN init.: no 452s Label: 452s + p11tool --provider=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --write --no-mark-private --load-certificate=/tmp/sssd-softhsm2-certs-j4jLUd/test-sub-intermediate-CA-trusted-certificate-0001.pem --login --set-pin=123456 --label 'Test Organization Sub Intermediate Trusted Certificate 0001' --id 00112233445566778899FFAABBCCDDEEFF012345 452s + openssl rsa -passin pass:random-sub-intermediate-ca-trusted-cert-0001-29701 -in /tmp/sssd-softhsm2-certs-j4jLUd/test-sub-intermediate-CA-trusted-certificate-0001-key.pem -out /tmp/sssd-softhsm2-certs-j4jLUd/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 452s writing RSA key 452s + p11tool --provider=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --write --load-privkey=/tmp/sssd-softhsm2-certs-j4jLUd/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem --login --set-pin=123456 --label 'Test Organization Sub Intermediate Trusted Certificate 0001 Key' --id 00112233445566778899FFAABBCCDDEEFF012345 452s + rm /tmp/sssd-softhsm2-certs-j4jLUd/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 452s + p11tool --provider=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --list-all 452s Object 0: 452s URL: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=d51e27f5e2d6384a;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert 452s Type: X.509 Certificate (RSA-1024) 452s Expires: Wed Mar 5 01:21:45 2025 452s Label: Test Organization Sub Intermediate Trusted Certificate 0001 452s ID: 00:11:22:33:44:55:66:77:88:99:ff:aa:bb:cc:dd:ee:ff:01:23:45 452s 452s + echo 'Test Organization Sub Int Token' 452s Test Organization Sub Int Token 452s Certificates generation completed! 452s + echo 'Certificates generation completed!' 452s + exit 0 452s + find /tmp/sssd-softhsm2-certs-j4jLUd -type d -exec chmod 777 '{}' ';' 452s + find /tmp/sssd-softhsm2-certs-j4jLUd -type f -exec chmod 666 '{}' ';' 452s + backup_file /etc/sssd/sssd.conf 452s + '[' -z '' ']' 452s ++ mktemp -d -t sssd-softhsm2-backups-XXXXXX 452s + backupsdir=/tmp/sssd-softhsm2-backups-psUgGO 452s + '[' -e /etc/sssd/sssd.conf ']' 452s + delete_paths+=("$1") 452s + rm -f /etc/sssd/sssd.conf 452s ++ runuser -u ubuntu -- sh -c 'echo ~' 452s + user_home=/home/ubuntu 452s + mkdir -p /home/ubuntu 452s + chown ubuntu:ubuntu /home/ubuntu 452s ++ runuser -u ubuntu -- sh -c 'echo ${XDG_CONFIG_HOME:-~/.config}' 452s + user_config=/home/ubuntu/.config 452s + system_config=/etc 452s + softhsm2_conf_paths=("${AUTOPKGTEST_NORMAL_USER}:$user_config/softhsm2/softhsm2.conf" "root:$system_config/softhsm/softhsm2.conf") 452s + for path_pair in "${softhsm2_conf_paths[@]}" 452s + IFS=: 452s + read -r -a path 452s + path=/home/ubuntu/.config/softhsm2/softhsm2.conf 452s + backup_file /home/ubuntu/.config/softhsm2/softhsm2.conf 452s + '[' -z /tmp/sssd-softhsm2-backups-psUgGO ']' 452s + '[' -e /home/ubuntu/.config/softhsm2/softhsm2.conf ']' 452s + delete_paths+=("$1") 452s + rm -f /home/ubuntu/.config/softhsm2/softhsm2.conf 452s + for path_pair in "${softhsm2_conf_paths[@]}" 452s + IFS=: 452s + read -r -a path 452s + path=/etc/softhsm/softhsm2.conf 452s + backup_file /etc/softhsm/softhsm2.conf 452s + '[' -z /tmp/sssd-softhsm2-backups-psUgGO ']' 452s + '[' -e /etc/softhsm/softhsm2.conf ']' 452s ++ dirname /etc/softhsm/softhsm2.conf 452s + local back_dir=/tmp/sssd-softhsm2-backups-psUgGO//etc/softhsm 452s ++ basename /etc/softhsm/softhsm2.conf 452s + local back_path=/tmp/sssd-softhsm2-backups-psUgGO//etc/softhsm/softhsm2.conf 452s + '[' '!' -e /tmp/sssd-softhsm2-backups-psUgGO//etc/softhsm/softhsm2.conf ']' 452s + mkdir -p /tmp/sssd-softhsm2-backups-psUgGO//etc/softhsm 452s + cp -a /etc/softhsm/softhsm2.conf /tmp/sssd-softhsm2-backups-psUgGO//etc/softhsm/softhsm2.conf 452s + restore_paths+=("$back_path") 452s + rm -f /etc/softhsm/softhsm2.conf 452s + test_authentication login /tmp/sssd-softhsm2-certs-j4jLUd/softhsm2-test-root-CA-trusted-certificate-0001.conf /tmp/sssd-softhsm2-certs-j4jLUd/test-full-chain-CA.pem 452s + pam_service=login 452s + certificate_config=/tmp/sssd-softhsm2-certs-j4jLUd/softhsm2-test-root-CA-trusted-certificate-0001.conf 452s + ca_db=/tmp/sssd-softhsm2-certs-j4jLUd/test-full-chain-CA.pem 452s + verification_options= 452s + mkdir -p -m 700 /etc/sssd 452s Using CA DB '/tmp/sssd-softhsm2-certs-j4jLUd/test-full-chain-CA.pem' with verification options: '' 452s + echo 'Using CA DB '\''/tmp/sssd-softhsm2-certs-j4jLUd/test-full-chain-CA.pem'\'' with verification options: '\'''\''' 452s + cat 452s + chmod 600 /etc/sssd/sssd.conf 452s + for path_pair in "${softhsm2_conf_paths[@]}" 452s + IFS=: 452s + read -r -a path 452s + user=ubuntu 452s + path=/home/ubuntu/.config/softhsm2/softhsm2.conf 452s ++ dirname /home/ubuntu/.config/softhsm2/softhsm2.conf 452s + runuser -u ubuntu -- mkdir -p /home/ubuntu/.config/softhsm2 452s + runuser -u ubuntu -- ln -sf /tmp/sssd-softhsm2-certs-j4jLUd/softhsm2-test-root-CA-trusted-certificate-0001.conf /home/ubuntu/.config/softhsm2/softhsm2.conf 452s + runuser -u ubuntu -- softhsm2-util --show-slots 452s + grep 'Test Organization' 452s Label: Test Organization Root Tr Token 452s + for path_pair in "${softhsm2_conf_paths[@]}" 452s + IFS=: 452s + read -r -a path 452s + user=root 452s + path=/etc/softhsm/softhsm2.conf 452s ++ dirname /etc/softhsm/softhsm2.conf 452s + runuser -u root -- mkdir -p /etc/softhsm 452s + runuser -u root -- ln -sf /tmp/sssd-softhsm2-certs-j4jLUd/softhsm2-test-root-CA-trusted-certificate-0001.conf /etc/softhsm/softhsm2.conf 452s + runuser -u root -- softhsm2-util --show-slots 452s + grep 'Test Organization' 452s Label: Test Organization Root Tr Token 452s + systemctl restart sssd 452s + pam-auth-update --disable sss-smart-card-optional sss-smart-card-required 452s + for alternative in "${alternative_pam_configs[@]}" 452s + pam-auth-update --enable sss-smart-card-optional 452s + cat /etc/pam.d/common-auth 452s # 452s # /etc/pam.d/common-auth - authentication settings common to all services 452s # 452s # This file is included from other service-specific PAM config files, 452s # and should contain a list of the authentication modules that define 452s # the central authentication scheme for use on the system 452s # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the 452s # traditional Unix authentication mechanisms. 452s # 452s # As of pam 1.0.1-6, this file is managed by pam-auth-update by default. 452s # To take advantage of this, it is recommended that you configure any 452s # local modules either before or after the default block, and use 452s # pam-auth-update to manage selection of other modules. See 452s # pam-auth-update(8) for details. 452s 452s # here are the per-package modules (the "Primary" block) 452s auth [success=3 default=ignore] pam_sss.so allow_missing_name try_cert_auth 452s auth [success=2 default=ignore] pam_unix.so nullok try_first_pass 452s auth [success=1 default=ignore] pam_sss.so use_first_pass 452s # here's the fallback if no module succeeds 452s auth requisite pam_deny.so 452s # prime the stack with a positive return value if there isn't one already; 452s # this avoids us returning an error just because nothing sets a success code 452s # since the modules above will each just jump around 452s auth required pam_permit.so 452s # and here are more per-package modules (the "Additional" block) 452s auth optional pam_cap.so 452s # end of pam-auth-update config 452s + echo -n -e 123456 452s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 452s pamtester: invoking pam_start(login, ubuntu, ...) 452s pamtester: performing operation - authenticate 452s PIN for Test Organization Root Tr Token: pamtester: successfully authenticated 452s + echo -n -e 123456 452s + runuser -u ubuntu -- pamtester -v login '' authenticate 452s pamtester: invoking pam_start(login, , ...) 452s pamtester: performing operation - authenticate 452s PIN for Test Organization Root Tr Token: pamtester: successfully authenticated 452s + echo -n -e wrong123456 452s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 452s pamtester: invoking pam_start(login, ubuntu, ...) 452s pamtester: performing operation - authenticate 455s PIN for Test Organization Root Tr Token: Password: pamtester: Authentication failure 455s + echo -n -e wrong123456 455s + runuser -u ubuntu -- pamtester -v login '' authenticate 455s pamtester: invoking pam_start(login, , ...) 455s pamtester: performing operation - authenticate 458s PIN for Test Organization Root Tr Token: Password: pamtester: Authentication failure 458s + echo -n -e 123456 458s + pamtester -v login root authenticate 458s pamtester: invoking pam_start(login, root, ...) 458s pamtester: performing operation - authenticate 461s Password: pamtester: Authentication failure 461s + for alternative in "${alternative_pam_configs[@]}" 461s + pam-auth-update --enable sss-smart-card-required 461s PAM configuration 461s ----------------- 461s 461s Incompatible PAM profiles selected. 461s 461s The following PAM profiles cannot be used together: 461s 461s SSS required smart card authentication, SSS optional smart card 461s authentication 461s 461s Please select a different set of modules to enable. 461s 461s + cat /etc/pam.d/common-auth 461s # 461s # /etc/pam.d/common-auth - authentication settings common to all services 461s # 461s # This file is included from other service-specific PAM config files, 461s # and should contain a list of the authentication modules that define 461s # the central authentication scheme for use on the system 461s # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the 461s # traditional Unix authentication mechanisms. 461s # 461s # As of pam 1.0.1-6, this file is managed by pam-auth-update by default. 461s # To take advantage of this, it is recommended that you configure any 461s # local modules either before or after the default block, and use 461s # pam-auth-update to manage selection of other modules. See 461s # pam-auth-update(8) for details. 461s 461s # here are the per-package modules (the "Primary" block) 461s auth [success=3 ignore=ignore default=die] pam_sss.so allow_missing_name require_cert_auth 461s auth [success=2 default=ignore] pam_unix.so nullok try_first_pass 461s auth [success=1 default=ignore] pam_sss.so use_first_pass 461s # here's the fallback if no module succeeds 461s auth requisite pam_deny.so 461s # prime the stack with a positive return value if there isn't one already; 461s # this avoids us returning an error just because nothing sets a success code 461s # since the modules above will each just jump around 461s auth required pam_permit.so 461s # and here are more per-package modules (the "Additional" block) 461s auth optional pam_cap.so 461s # end of pam-auth-update config 461s + echo -n -e 123456 461s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 461s pamtester: invoking pam_start(login, ubuntu, ...) 461s pamtester: performing operation - authenticate 461s PIN for Test Organization Root Tr Token: pamtester: successfully authenticated 461s + echo -n -e 123456 461s + runuser -u ubuntu -- pamtester -v login '' authenticate 461s pamtester: invoking pam_start(login, , ...) 461s pamtester: performing operation - authenticate 461s PIN for Test Organization Root Tr Token: pamtester: successfully authenticated 461s + echo -n -e wrong123456 461s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 461s pamtester: invoking pam_start(login, ubuntu, ...) 461s pamtester: performing operation - authenticate 465s PIN for Test Organization Root Tr Token: pamtester: Authentication failure 465s + echo -n -e wrong123456 465s + runuser -u ubuntu -- pamtester -v login '' authenticate 465s pamtester: invoking pam_start(login, , ...) 465s pamtester: performing operation - authenticate 468s PIN for Test Organization Root Tr Token: pamtester: Authentication failure 468s + echo -n -e 123456 468s + pamtester -v login root authenticate 468s pamtester: invoking pam_start(login, root, ...) 468s pamtester: performing operation - authenticate 472s pamtester: Authentication service cannot retrieve authentication info 472s + test_authentication login /tmp/sssd-softhsm2-certs-j4jLUd/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf /tmp/sssd-softhsm2-certs-j4jLUd/test-full-chain-CA.pem 472s + pam_service=login 472s + certificate_config=/tmp/sssd-softhsm2-certs-j4jLUd/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 472s + ca_db=/tmp/sssd-softhsm2-certs-j4jLUd/test-full-chain-CA.pem 472s + verification_options= 472s + mkdir -p -m 700 /etc/sssd 472s Using CA DB '/tmp/sssd-softhsm2-certs-j4jLUd/test-full-chain-CA.pem' with verification options: '' 472s + echo 'Using CA DB '\''/tmp/sssd-softhsm2-certs-j4jLUd/test-full-chain-CA.pem'\'' with verification options: '\'''\''' 472s + cat 472s + chmod 600 /etc/sssd/sssd.conf 472s + for path_pair in "${softhsm2_conf_paths[@]}" 472s + IFS=: 472s + read -r -a path 472s + user=ubuntu 472s Label: Test Organization Sub Int Token 472s Label: Test Organization Sub Int Token 472s + path=/home/ubuntu/.config/softhsm2/softhsm2.conf 472s ++ dirname /home/ubuntu/.config/softhsm2/softhsm2.conf 472s + runuser -u ubuntu -- mkdir -p /home/ubuntu/.config/softhsm2 472s + runuser -u ubuntu -- ln -sf /tmp/sssd-softhsm2-certs-j4jLUd/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf /home/ubuntu/.config/softhsm2/softhsm2.conf 472s + runuser -u ubuntu -- softhsm2-util --show-slots 472s + grep 'Test Organization' 472s + for path_pair in "${softhsm2_conf_paths[@]}" 472s + IFS=: 472s + read -r -a path 472s + user=root 472s + path=/etc/softhsm/softhsm2.conf 472s ++ dirname /etc/softhsm/softhsm2.conf 472s + runuser -u root -- mkdir -p /etc/softhsm 472s + runuser -u root -- ln -sf /tmp/sssd-softhsm2-certs-j4jLUd/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf /etc/softhsm/softhsm2.conf 472s + runuser -u root -- softhsm2-util --show-slots 472s + grep 'Test Organization' 472s + systemctl restart sssd 472s + pam-auth-update --disable sss-smart-card-optional sss-smart-card-required 473s + for alternative in "${alternative_pam_configs[@]}" 473s + pam-auth-update --enable sss-smart-card-optional 473s + cat /etc/pam.d/common-auth 473s # 473s # /etc/pam.d/common-auth - authentication settings common to all services 473s # 473s # This file is included from other service-specific PAM config files, 473s # and should contain a list of the authentication modules that define 473s # the central authentication scheme for use on the system 473s # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the 473s # traditional Unix authentication mechanisms. 473s # 473s # As of pam 1.0.1-6, this file is managed by pam-auth-update by default. 473s # To take advantage of this, it is recommended that you configure any 473s # local modules either before or after the default block, and use 473s # pam-auth-update to manage selection of other modules. See 473s # pam-auth-update(8) for details. 473s 473s # here are the per-package modules (the "Primary" block) 473s auth [success=3 default=ignore] pam_sss.so allow_missing_name try_cert_auth 473s auth [success=2 default=ignore] pam_unix.so nullok try_first_pass 473s auth [success=1 default=ignore] pam_sss.so use_first_pass 473s # here's the fallback if no module succeeds 473s auth requisite pam_deny.so 473s # prime the stack with a positive return value if there isn't one already; 473s # this avoids us returning an error just because nothing sets a success code 473s # since the modules above will each just jump around 473s auth required pam_permit.so 473s # and here are more per-package modules (the "Additional" block) 473s auth optional pam_cap.so 473s # end of pam-auth-update config 473s + echo -n -e 123456 473s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 473s pamtester: invoking pam_start(login, ubuntu, ...) 473s pamtester: performing operation - authenticate 473s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 473s + echo -n -e 123456 473s + runuser -u ubuntu -- pamtester -v login '' authenticate 473s pamtester: invoking pam_start(login, , ...) 473s pamtester: performing operation - authenticate 473s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 473s + echo -n -e wrong123456 473s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 473s pamtester: invoking pam_start(login, ubuntu, ...) 473s pamtester: performing operation - authenticate 477s PIN for Test Organization Sub Int Token: Password: pamtester: Authentication failure 477s + echo -n -e wrong123456 477s + runuser -u ubuntu -- pamtester -v login '' authenticate 477s pamtester: invoking pam_start(login, , ...) 477s pamtester: performing operation - authenticate 481s PIN for Test Organization Sub Int Token: Password: pamtester: Authentication failure 481s + echo -n -e 123456 481s + pamtester -v login root authenticate 481s pamtester: invoking pam_start(login, root, ...) 481s pamtester: performing operation - authenticate 482s Password: pamtester: Authentication failure 482s + for alternative in "${alternative_pam_configs[@]}" 482s + pam-auth-update --enable sss-smart-card-required 482s PAM configuration 482s ----------------- 482s 482s Incompatible PAM profiles selected. 482s 482s The following PAM profiles cannot be used together: 482s 482s SSS required smart card authentication, SSS optional smart card 482s authentication 482s 482s Please select a different set of modules to enable. 482s 482s + cat /etc/pam.d/common-auth 482s # 482s # /etc/pam.d/common-auth - authentication settings common to all services 482s # 482s # This file is included from other service-specific PAM config files, 482s # and should contain a list of the authentication modules that define 482s # the central authentication scheme for use on the system 482s # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the 482s # traditional Unix authentication mechanisms. 482s # 482s # As of pam 1.0.1-6, this file is managed by pam-auth-update by default. 482s # To take advantage of this, it is recommended that you configure any 482s # local modules either before or after the default block, and use 482s # pam-auth-update to manage selection of other modules. See 482s # pam-auth-update(8) for details. 482s 482s # here are the per-package modules (the "Primary" block) 482s auth [success=3 ignore=ignore default=die] pam_sss.so allow_missing_name require_cert_auth 482s auth [success=2 default=ignore] pam_unix.so nullok try_first_pass 482s auth [success=1 default=ignore] pam_sss.so use_first_pass 482s # here's the fallback if no module succeeds 482s auth requisite pam_deny.so 482s # prime the stack with a positive return value if there isn't one already; 482s # this avoids us returning an error just because nothing sets a success code 482s # since the modules above will each just jump around 482s auth required pam_permit.so 482s # and here are more per-package modules (the "Additional" block) 482s auth optional pam_cap.so 482s # end of pam-auth-update config 482s + echo -n -e 123456 482s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 482s pamtester: invoking pam_start(login, ubuntu, ...) 482s pamtester: performing operation - authenticate 482s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 482s + echo -n -e 123456 482s + runuser -u ubuntu -- pamtester -v login '' authenticate 482s pamtester: invoking pam_start(login, , ...) 482s pamtester: performing operation - authenticate 482s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 482s + echo -n -e wrong123456 482s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 482s pamtester: invoking pam_start(login, ubuntu, ...) 482s pamtester: performing operation - authenticate 485s PIN for Test Organization Sub Int Token: pamtester: Authentication failure 485s + echo -n -e wrong123456 485s + runuser -u ubuntu -- pamtester -v login '' authenticate 485s pamtester: invoking pam_start(login, , ...) 485s pamtester: performing operation - authenticate 489s PIN for Test Organization Sub Int Token: pamtester: Authentication failure 489s + echo -n -e 123456 489s + pamtester -v login root authenticate 489s pamtester: invoking pam_start(login, root, ...) 489s pamtester: performing operation - authenticate 492s pamtester: Authentication service cannot retrieve authentication info 492s + test_authentication login /tmp/sssd-softhsm2-certs-j4jLUd/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf /tmp/sssd-softhsm2-certs-j4jLUd/test-sub-intermediate-CA.pem partial_chain 492s + pam_service=login 492s + certificate_config=/tmp/sssd-softhsm2-certs-j4jLUd/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 492s + ca_db=/tmp/sssd-softhsm2-certs-j4jLUd/test-sub-intermediate-CA.pem 492s + verification_options=partial_chain 492s + mkdir -p -m 700 /etc/sssd 492s + echo 'Using CA DB '\''/tmp/sssd-softhsm2-certs-j4jLUd/test-sub-intermediate-CA.pem'\'' with verification options: '\''partial_chain'\''' 492s Using CA DB '/tmp/sssd-softhsm2-certs-j4jLUd/test-sub-intermediate-CA.pem' with verification options: 'partial_chain' 492s + cat 492s + chmod 600 /etc/sssd/sssd.conf 492s + for path_pair in "${softhsm2_conf_paths[@]}" 492s + IFS=: 492s + read -r -a path 492s + user=ubuntu 492s + path=/home/ubuntu/.config/softhsm2/softhsm2.conf 492s Label: Test Organization Sub Int Token 492s Label: Test Organization Sub Int Token 492s ++ dirname /home/ubuntu/.config/softhsm2/softhsm2.conf 492s + runuser -u ubuntu -- mkdir -p /home/ubuntu/.config/softhsm2 492s + runuser -u ubuntu -- ln -sf /tmp/sssd-softhsm2-certs-j4jLUd/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf /home/ubuntu/.config/softhsm2/softhsm2.conf 492s + runuser -u ubuntu -- softhsm2-util --show-slots 492s + grep 'Test Organization' 492s + for path_pair in "${softhsm2_conf_paths[@]}" 492s + IFS=: 492s + read -r -a path 492s + user=root 492s + path=/etc/softhsm/softhsm2.conf 492s ++ dirname /etc/softhsm/softhsm2.conf 492s + runuser -u root -- mkdir -p /etc/softhsm 492s + runuser -u root -- ln -sf /tmp/sssd-softhsm2-certs-j4jLUd/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf /etc/softhsm/softhsm2.conf 492s + runuser -u root -- softhsm2-util --show-slots 492s + grep 'Test Organization' 492s + systemctl restart sssd 492s + pam-auth-update --disable sss-smart-card-optional sss-smart-card-required 492s + for alternative in "${alternative_pam_configs[@]}" 492s + pam-auth-update --enable sss-smart-card-optional 492s + cat /etc/pam.d/common-auth 492s # 492s # /etc/pam.d/common-auth - authentication settings common to all services 492s # 492s # This file is included from other service-specific PAM config files, 492s # and should contain a list of the authentication modules that define 492s # the central authentication scheme for use on the system 492s # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the 492s # traditional Unix authentication mechanisms. 492s # 492s # As of pam 1.0.1-6, this file is managed by pam-auth-update by default. 492s # To take advantage of this, it is recommended that you configure any 492s # local modules either before or after the default block, and use 492s # pam-auth-update to manage selection of other modules. See 492s # pam-auth-update(8) for details. 492s 492s # here are the per-package modules (the "Primary" block) 492s auth [success=3 default=ignore] pam_sss.so allow_missing_name try_cert_auth 492s auth [success=2 default=ignore] pam_unix.so nullok try_first_pass 492s auth [success=1 default=ignore] pam_sss.so use_first_pass 492s # here's the fallback if no module succeeds 492s auth requisite pam_deny.so 492s # prime the stack with a positive return value if there isn't one already; 492s # this avoids us returning an error just because nothing sets a success code 492s # since the modules above will each just jump around 492s auth required pam_permit.so 492s # and here are more per-package modules (the "Additional" block) 492s auth optional pam_cap.so 492s # end of pam-auth-update config 492s + echo -n -e 123456 492s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 492s pamtester: invoking pam_start(login, ubuntu, ...) 492s pamtester: performing operation - authenticate 492s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 492s + echo -n -e 123456 492s + runuser -u ubuntu -- pamtester -v login '' authenticate 492s pamtester: invoking pam_start(login, , ...) 492s pamtester: performing operation - authenticate 492s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 492s + echo -n -e wrong123456 492s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 492s pamtester: invoking pam_start(login, ubuntu, ...) 492s pamtester: performing operation - authenticate 497s PIN for Test Organization Sub Int Token: Password: pamtester: Authentication failure 497s + echo -n -e wrong123456 497s + runuser -u ubuntu -- pamtester -v login '' authenticate 497s pamtester: invoking pam_start(login, , ...) 497s pamtester: performing operation - authenticate 500s PIN for Test Organization Sub Int Token: Password: pamtester: Authentication failure 500s + echo -n -e 123456 500s + pamtester -v login root authenticate 500s pamtester: invoking pam_start(login, root, ...) 500s pamtester: performing operation - authenticate 502s Password: pamtester: Authentication failure 502s + for alternative in "${alternative_pam_configs[@]}" 502s + pam-auth-update --enable sss-smart-card-required 502s PAM configuration 502s ----------------- 502s 502s Incompatible PAM profiles selected. 502s 502s The following PAM profiles cannot be used together: 502s 502s SSS required smart card authentication, SSS optional smart card 502s authentication 502s 502s Please select a different set of modules to enable. 502s 502s + cat /etc/pam.d/common-auth 502s # 502s # /etc/pam.d/common-auth - authentication settings common to all services 502s # 502s # This file is included from other service-specific PAM config files, 502s # and should contain a list of the authentication modules that define 502s # the central authentication scheme for use on the system 502s # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the 502s # traditional Unix authentication mechanisms. 502s # 502s # As of pam 1.0.1-6, this file is managed by pam-auth-update by default. 502s # To take advantage of this, it is recommended that you configure any 502s # local modules either before or after the default block, and use 502s # pam-auth-update to manage selection of other modules. See 502s # pam-auth-update(8) for details. 502s 502s # here are the per-package modules (the "Primary" block) 502s auth [success=3 ignore=ignore default=die] pam_sss.so allow_missing_name require_cert_auth 502s auth [success=2 default=ignore] pam_unix.so nullok try_first_pass 502s auth [success=1 default=ignore] pam_sss.so use_first_pass 502s # here's the fallback if no module succeeds 502s auth requisite pam_deny.so 502s # prime the stack with a positive return value if there isn't one already; 502s # this avoids us returning an error just because nothing sets a success code 502s # since the modules above will each just jump around 502s auth required pam_permit.so 502s # and here are more per-package modules (the "Additional" block) 502s auth optional pam_cap.so 502s # end of pam-auth-update config 502s + echo -n -e 123456 502s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 502s pamtester: invoking pam_start(login, ubuntu, ...) 502s pamtester: performing operation - authenticate 502s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 502s + echo -n -e 123456 502s + runuser -u ubuntu -- pamtester -v login '' authenticate 502s pamtester: invoking pam_start(login, , ...) 502s pamtester: performing operation - authenticate 502s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 502s + echo -n -e wrong123456 502s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 502s pamtester: invoking pam_start(login, ubuntu, ...) 502s pamtester: performing operation - authenticate 505s PIN for Test Organization Sub Int Token: pamtester: Authentication failure 505s + echo -n -e wrong123456 505s + runuser -u ubuntu -- pamtester -v login '' authenticate 505s pamtester: invoking pam_start(login, , ...) 505s pamtester: performing operation - authenticate 508s PIN for Test Organization Sub Int Token: pamtester: Authentication failure 508s + echo -n -e 123456 508s + pamtester -v login root authenticate 508s pamtester: invoking pam_start(login, root, ...) 508s pamtester: performing operation - authenticate 511s pamtester: Authentication service cannot retrieve authentication info 511s + handle_exit 511s + exit_code=0 511s + restore_changes 511s + for path in "${restore_paths[@]}" 511s + local original_path 511s ++ realpath --strip --relative-base=/tmp/sssd-softhsm2-backups-psUgGO /tmp/sssd-softhsm2-backups-psUgGO//etc/softhsm/softhsm2.conf 511s + original_path=/etc/softhsm/softhsm2.conf 511s + rm /etc/softhsm/softhsm2.conf 511s + mv /tmp/sssd-softhsm2-backups-psUgGO//etc/softhsm/softhsm2.conf /etc/softhsm/softhsm2.conf 511s + for path in "${delete_paths[@]}" 511s + rm -f /etc/sssd/sssd.conf 511s + for path in "${delete_paths[@]}" 511s + rm -f /home/ubuntu/.config/softhsm2/softhsm2.conf 511s + pam-auth-update --disable sss-smart-card-optional sss-smart-card-required 511s + '[' -e /etc/sssd/sssd.conf ']' 511s + systemctl stop sssd 511s + '[' -e /etc/softhsm/softhsm2.conf ']' 511s + chmod 600 /etc/softhsm/softhsm2.conf 511s + rm -rf /tmp/sssd-softhsm2-certs-j4jLUd 511s + '[' 0 = 0 ']' 511s + rm -rf /tmp/sssd-softhsm2-backups-psUgGO 511s Script completed successfully! 511s + set +x 511s autopkgtest [01:22:45]: test sssd-smart-card-pam-auth-configs: -----------------------] 512s sssd-smart-card-pam-auth-configs PASS 512s autopkgtest [01:22:46]: test sssd-smart-card-pam-auth-configs: - - - - - - - - - - results - - - - - - - - - - 512s autopkgtest [01:22:46]: @@@@@@@@@@@@@@@@@@@@ summary 512s ldap-user-group-ldap-auth PASS 512s ldap-user-group-krb5-auth PASS 512s sssd-softhism2-certificates-tests.sh PASS 512s sssd-smart-card-pam-auth-configs PASS 533s Creating nova instance adt-noble-s390x-sssd-20240305-011414-juju-7f2275-prod-proposed-migration-environment-3 from image adt/ubuntu-noble-s390x-server-20240303.img (UUID f72b0c9b-69ea-40a3-b7a4-0b20dfc42153)... 533s Creating nova instance adt-noble-s390x-sssd-20240305-011414-juju-7f2275-prod-proposed-migration-environment-3 from image adt/ubuntu-noble-s390x-server-20240303.img (UUID f72b0c9b-69ea-40a3-b7a4-0b20dfc42153)...