0s autopkgtest [09:15:47]: starting date: 2024-03-10 0s autopkgtest [09:15:47]: git checkout: d9c0295 adt_testbed.py: supress warnings from apt using a shell pipeline 0s autopkgtest [09:15:47]: host juju-7f2275-prod-proposed-migration-environment-2; command line: /home/ubuntu/autopkgtest/runner/autopkgtest --output-dir /tmp/autopkgtest-work._8v223p5/out --timeout-copy=6000 --setup-commands /home/ubuntu/autopkgtest-cloud/worker-config-production/setup-canonical.sh --setup-commands /home/ubuntu/autopkgtest/setup-commands/setup-testbed --apt-pocket=proposed=src:dbus,src:glib2.0 --apt-upgrade sssd --timeout-short=300 --timeout-copy=20000 --timeout-build=20000 '--env=ADT_TEST_TRIGGERS=dbus/1.14.10-4ubuntu2 glib2.0/2.79.3-3ubuntu3' -- ssh -s /home/ubuntu/autopkgtest/ssh-setup/nova -- --flavor autopkgtest --security-groups autopkgtest-juju-7f2275-prod-proposed-migration-environment-2@bos02-s390x-6.secgroup --name adt-noble-s390x-sssd-20240310-091547-juju-7f2275-prod-proposed-migration-environment-2 --image adt/ubuntu-noble-s390x-server --keyname testbed-juju-7f2275-prod-proposed-migration-environment-2 --net-id=net_prod-proposed-migration -e TERM=linux -e ''"'"'http_proxy=http://squid.internal:3128'"'"'' -e ''"'"'https_proxy=http://squid.internal:3128'"'"'' -e ''"'"'no_proxy=127.0.0.1,127.0.1.1,login.ubuntu.com,localhost,localdomain,novalocal,internal,archive.ubuntu.com,ports.ubuntu.com,security.ubuntu.com,ddebs.ubuntu.com,changelogs.ubuntu.com,launchpadlibrarian.net,launchpadcontent.net,launchpad.net,10.24.0.0/24,keystone.ps5.canonical.com,objectstorage.prodstack5.canonical.com'"'"'' --mirror=http://ftpmaster.internal/ubuntu/ 372s autopkgtest [09:21:59]: @@@@@@@@@@@@@@@@@@@@ test bed setup 373s Get:1 http://ftpmaster.internal/ubuntu noble-proposed InRelease [117 kB] 373s Get:2 http://ftpmaster.internal/ubuntu noble-proposed/universe Sources [2647 kB] 373s Get:3 http://ftpmaster.internal/ubuntu noble-proposed/restricted Sources [3976 B] 373s Get:4 http://ftpmaster.internal/ubuntu noble-proposed/multiverse Sources [37.3 kB] 373s Get:5 http://ftpmaster.internal/ubuntu noble-proposed/main Sources [433 kB] 373s Get:6 http://ftpmaster.internal/ubuntu noble-proposed/main s390x Packages [570 kB] 373s Get:7 http://ftpmaster.internal/ubuntu noble-proposed/main s390x c-n-f Metadata [3032 B] 373s Get:8 http://ftpmaster.internal/ubuntu noble-proposed/restricted s390x Packages [1372 B] 373s Get:9 http://ftpmaster.internal/ubuntu noble-proposed/restricted s390x c-n-f Metadata [116 B] 373s Get:10 http://ftpmaster.internal/ubuntu noble-proposed/universe s390x Packages [2822 kB] 374s Get:11 http://ftpmaster.internal/ubuntu noble-proposed/universe s390x c-n-f Metadata [7292 B] 374s Get:12 http://ftpmaster.internal/ubuntu noble-proposed/multiverse s390x Packages [24.2 kB] 374s Get:13 http://ftpmaster.internal/ubuntu noble-proposed/multiverse s390x c-n-f Metadata [116 B] 375s Fetched 6666 kB in 2s (3560 kB/s) 375s Reading package lists... 380s Reading package lists... 380s Building dependency tree... 380s Reading state information... 380s Calculating upgrade... 380s The following packages will be REMOVED: 380s libglib2.0-0 380s The following NEW packages will be installed: 380s libglib2.0-0t64 xdg-user-dirs 380s The following packages will be upgraded: 380s dbus dbus-bin dbus-daemon dbus-session-bus-common dbus-system-bus-common 380s dbus-user-session gir1.2-glib-2.0 libdbus-1-3 libglib2.0-data python3-attr 380s 10 upgraded, 2 newly installed, 1 to remove and 0 not upgraded. 380s Need to get 2428 kB of archives. 380s After this operation, 159 kB of additional disk space will be used. 380s Get:1 http://ftpmaster.internal/ubuntu noble-proposed/main s390x gir1.2-glib-2.0 s390x 2.79.3-3ubuntu3 [180 kB] 380s Get:2 http://ftpmaster.internal/ubuntu noble-proposed/main s390x libglib2.0-0t64 s390x 2.79.3-3ubuntu3 [1566 kB] 381s Get:3 http://ftpmaster.internal/ubuntu noble-proposed/main s390x dbus-session-bus-common all 1.14.10-4ubuntu2 [80.3 kB] 381s Get:4 http://ftpmaster.internal/ubuntu noble-proposed/main s390x dbus-user-session s390x 1.14.10-4ubuntu2 [9960 B] 381s Get:5 http://ftpmaster.internal/ubuntu noble-proposed/main s390x dbus-daemon s390x 1.14.10-4ubuntu2 [118 kB] 381s Get:6 http://ftpmaster.internal/ubuntu noble-proposed/main s390x dbus-bin s390x 1.14.10-4ubuntu2 [41.4 kB] 381s Get:7 http://ftpmaster.internal/ubuntu noble-proposed/main s390x dbus-system-bus-common all 1.14.10-4ubuntu2 [81.5 kB] 381s Get:8 http://ftpmaster.internal/ubuntu noble-proposed/main s390x dbus s390x 1.14.10-4ubuntu2 [24.3 kB] 381s Get:9 http://ftpmaster.internal/ubuntu noble-proposed/main s390x libdbus-1-3 s390x 1.14.10-4ubuntu2 [213 kB] 381s Get:10 http://ftpmaster.internal/ubuntu noble-proposed/main s390x libglib2.0-data all 2.79.3-3ubuntu3 [46.6 kB] 381s Get:11 http://ftpmaster.internal/ubuntu noble/main s390x xdg-user-dirs s390x 0.18-1 [18.5 kB] 381s Get:12 http://ftpmaster.internal/ubuntu noble/main s390x python3-attr all 23.2.0-2 [48.6 kB] 381s Fetched 2428 kB in 1s (3408 kB/s) 381s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 52188 files and directories currently installed.) 381s Preparing to unpack .../gir1.2-glib-2.0_2.79.3-3ubuntu3_s390x.deb ... 381s Unpacking gir1.2-glib-2.0:s390x (2.79.3-3ubuntu3) over (2.79.2-1~ubuntu1) ... 381s dpkg: libglib2.0-0:s390x: dependency problems, but removing anyway as you requested: 381s udisks2 depends on libglib2.0-0 (>= 2.77.0). 381s shared-mime-info depends on libglib2.0-0 (>= 2.75.3). 381s s390-tools depends on libglib2.0-0 (>= 2.77.0). 381s python3-gi depends on libglib2.0-0 (>= 2.77.0). 381s python3-dbus depends on libglib2.0-0 (>= 2.16.0). 381s netplan.io depends on libglib2.0-0 (>= 2.70.0). 381s netplan-generator depends on libglib2.0-0 (>= 2.70.0). 381s libxmlb2:s390x depends on libglib2.0-0 (>= 2.54.0). 381s libvolume-key1:s390x depends on libglib2.0-0 (>= 2.18.0). 381s libudisks2-0:s390x depends on libglib2.0-0 (>= 2.75.3). 381s libqrtr-glib0:s390x depends on libglib2.0-0 (>= 2.56). 381s libqmi-proxy depends on libglib2.0-0 (>= 2.30.0). 381s libqmi-glib5:s390x depends on libglib2.0-0 (>= 2.54.0). 381s libpolkit-gobject-1-0:s390x depends on libglib2.0-0 (>= 2.38.0). 381s libpolkit-agent-1-0:s390x depends on libglib2.0-0 (>= 2.38.0). 381s libnetplan0:s390x depends on libglib2.0-0 (>= 2.75.3). 381s libmm-glib0:s390x depends on libglib2.0-0 (>= 2.62.0). 381s libmbim-proxy depends on libglib2.0-0 (>= 2.56). 381s libmbim-glib4:s390x depends on libglib2.0-0 (>= 2.56). 381s libjson-glib-1.0-0:s390x depends on libglib2.0-0 (>= 2.75.3). 381s libjcat1:s390x depends on libglib2.0-0 (>= 2.75.3). 381s libgusb2:s390x depends on libglib2.0-0 (>= 2.75.3). 381s libgudev-1.0-0:s390x depends on libglib2.0-0 (>= 2.38.0). 381s libgirepository-1.0-1:s390x depends on libglib2.0-0 (>= 2.79.0). 381s libfwupd2:s390x depends on libglib2.0-0 (>= 2.79.0). 381s libblockdev3:s390x depends on libglib2.0-0 (>= 2.42.2). 381s libblockdev-utils3:s390x depends on libglib2.0-0 (>= 2.75.3). 381s libblockdev-swap3:s390x depends on libglib2.0-0 (>= 2.42.2). 381s libblockdev-part3:s390x depends on libglib2.0-0 (>= 2.42.2). 381s libblockdev-nvme3:s390x depends on libglib2.0-0 (>= 2.42.2). 381s libblockdev-mdraid3:s390x depends on libglib2.0-0 (>= 2.42.2). 381s libblockdev-loop3:s390x depends on libglib2.0-0 (>= 2.42.2). 381s libblockdev-fs3:s390x depends on libglib2.0-0 (>= 2.42.2). 381s libblockdev-crypto3:s390x depends on libglib2.0-0 (>= 2.42.2). 381s fwupd depends on libglib2.0-0 (>= 2.79.0). 381s bolt depends on libglib2.0-0 (>= 2.56.0). 381s 381s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 52188 files and directories currently installed.) 381s Removing libglib2.0-0:s390x (2.79.2-1~ubuntu1) ... 381s Selecting previously unselected package libglib2.0-0t64:s390x. 381s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 52163 files and directories currently installed.) 381s Preparing to unpack .../00-libglib2.0-0t64_2.79.3-3ubuntu3_s390x.deb ... 381s libglib2.0-0t64.preinst: Removing /var/lib/dpkg/info/libglib2.0-0:s390x.postrm to avoid loss of /usr/share/glib-2.0/schemas/gschemas.compiled... 381s removed '/var/lib/dpkg/info/libglib2.0-0:s390x.postrm' 381s Unpacking libglib2.0-0t64:s390x (2.79.3-3ubuntu3) ... 381s Preparing to unpack .../01-dbus-session-bus-common_1.14.10-4ubuntu2_all.deb ... 381s Unpacking dbus-session-bus-common (1.14.10-4ubuntu2) over (1.14.10-4ubuntu1) ... 381s Preparing to unpack .../02-dbus-user-session_1.14.10-4ubuntu2_s390x.deb ... 381s Unpacking dbus-user-session (1.14.10-4ubuntu2) over (1.14.10-4ubuntu1) ... 381s Preparing to unpack .../03-dbus-daemon_1.14.10-4ubuntu2_s390x.deb ... 381s Unpacking dbus-daemon (1.14.10-4ubuntu2) over (1.14.10-4ubuntu1) ... 381s Preparing to unpack .../04-dbus-bin_1.14.10-4ubuntu2_s390x.deb ... 381s Unpacking dbus-bin (1.14.10-4ubuntu2) over (1.14.10-4ubuntu1) ... 381s Preparing to unpack .../05-dbus-system-bus-common_1.14.10-4ubuntu2_all.deb ... 381s Unpacking dbus-system-bus-common (1.14.10-4ubuntu2) over (1.14.10-4ubuntu1) ... 381s Preparing to unpack .../06-dbus_1.14.10-4ubuntu2_s390x.deb ... 381s Unpacking dbus (1.14.10-4ubuntu2) over (1.14.10-4ubuntu1) ... 381s Preparing to unpack .../07-libdbus-1-3_1.14.10-4ubuntu2_s390x.deb ... 381s Unpacking libdbus-1-3:s390x (1.14.10-4ubuntu2) over (1.14.10-4ubuntu1) ... 381s Preparing to unpack .../08-libglib2.0-data_2.79.3-3ubuntu3_all.deb ... 381s Unpacking libglib2.0-data (2.79.3-3ubuntu3) over (2.79.2-1~ubuntu1) ... 381s Selecting previously unselected package xdg-user-dirs. 381s Preparing to unpack .../09-xdg-user-dirs_0.18-1_s390x.deb ... 381s Unpacking xdg-user-dirs (0.18-1) ... 381s Preparing to unpack .../10-python3-attr_23.2.0-2_all.deb ... 381s Unpacking python3-attr (23.2.0-2) over (23.2.0-1) ... 382s Setting up python3-attr (23.2.0-2) ... 382s Setting up xdg-user-dirs (0.18-1) ... 382s Setting up libglib2.0-0t64:s390x (2.79.3-3ubuntu3) ... 382s No schema files found: doing nothing. 382s Setting up libglib2.0-data (2.79.3-3ubuntu3) ... 382s Setting up libdbus-1-3:s390x (1.14.10-4ubuntu2) ... 382s Setting up gir1.2-glib-2.0:s390x (2.79.3-3ubuntu3) ... 382s Setting up dbus-session-bus-common (1.14.10-4ubuntu2) ... 382s Setting up dbus-system-bus-common (1.14.10-4ubuntu2) ... 382s Setting up dbus-bin (1.14.10-4ubuntu2) ... 382s Setting up dbus-daemon (1.14.10-4ubuntu2) ... 382s Setting up dbus-user-session (1.14.10-4ubuntu2) ... 382s Setting up dbus (1.14.10-4ubuntu2) ... 382s A reboot is required to replace the running dbus-daemon. 382s Please reboot the system when convenient. 382s Processing triggers for man-db (2.12.0-3) ... 382s Processing triggers for libc-bin (2.39-0ubuntu2) ... 383s W: Target Packages (main/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 383s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 383s W: Target CNF (main/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 383s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 383s W: Target Packages (universe/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 383s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 383s W: Target CNF (universe/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 383s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 383s W: Target Packages (restricted/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 383s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 383s W: Target CNF (restricted/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 383s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 383s W: Target Packages (multiverse/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 383s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 383s W: Target CNF (multiverse/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 383s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 383s W: Target Packages (main/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 383s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 383s W: Target CNF (main/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 383s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 383s W: Target Packages (universe/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 383s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 383s W: Target CNF (universe/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 383s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 383s W: Target Packages (restricted/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 383s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 383s W: Target CNF (restricted/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 383s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 383s W: Target Packages (multiverse/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 383s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 383s W: Target CNF (multiverse/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 383s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 383s W: Target Packages (main/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 383s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 383s W: Target CNF (main/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 383s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 383s W: Target Packages (universe/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 383s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 383s W: Target CNF (universe/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 383s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 383s W: Target Packages (restricted/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 383s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 383s W: Target CNF (restricted/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 383s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 383s W: Target Packages (multiverse/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 383s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 383s W: Target CNF (multiverse/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 383s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 383s Reading package lists... 383s Building dependency tree... 383s Reading state information... 383s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 383s Unknown architecture, assuming PC-style ttyS0 384s sh: Attempting to set up Debian/Ubuntu apt sources automatically 384s sh: Distribution appears to be Ubuntu 387s Reading package lists... 387s Building dependency tree... 387s Reading state information... 387s eatmydata is already the newest version (131-1). 387s dbus is already the newest version (1.14.10-4ubuntu2). 387s dbus set to manually installed. 387s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 387s W: Target Packages (main/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 387s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 387s W: Target CNF (main/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 387s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 387s W: Target Packages (universe/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 387s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 387s W: Target CNF (universe/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 387s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 387s W: Target Packages (restricted/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 387s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 387s W: Target CNF (restricted/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 387s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 387s W: Target Packages (multiverse/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 387s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 387s W: Target CNF (multiverse/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 387s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 387s W: Target Packages (main/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 387s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 387s W: Target CNF (main/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 387s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 387s W: Target Packages (universe/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 387s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 387s W: Target CNF (universe/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 387s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 387s W: Target Packages (restricted/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 387s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 387s W: Target CNF (restricted/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 387s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 387s W: Target Packages (multiverse/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 387s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 387s W: Target CNF (multiverse/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 387s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 387s W: Target Packages (main/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 387s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 387s W: Target CNF (main/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 387s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 387s W: Target Packages (universe/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 387s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 387s W: Target CNF (universe/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 387s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 387s W: Target Packages (restricted/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 387s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 387s W: Target CNF (restricted/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 387s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 387s W: Target Packages (multiverse/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 387s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 387s W: Target CNF (multiverse/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 387s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 387s Reading package lists... 387s Building dependency tree... 387s Reading state information... 388s rng-tools-debian is already the newest version (2.4). 388s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 388s Reading package lists... 388s Building dependency tree... 388s Reading state information... 388s haveged is already the newest version (1.9.14-1ubuntu1). 388s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 388s Reading package lists... 389s Building dependency tree... 389s Reading state information... 389s The following packages will be REMOVED: 389s cloud-init* python3-configobj* python3-debconf* 389s 0 upgraded, 0 newly installed, 3 to remove and 0 not upgraded. 389s After this operation, 3248 kB disk space will be freed. 389s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 52202 files and directories currently installed.) 389s Removing cloud-init (24.1-0ubuntu1) ... 389s Removing python3-configobj (5.0.8-3) ... 389s Removing python3-debconf (1.5.86) ... 389s Processing triggers for man-db (2.12.0-3) ... 390s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 51813 files and directories currently installed.) 390s Purging configuration files for cloud-init (24.1-0ubuntu1) ... 390s dpkg: warning: while removing cloud-init, directory '/etc/cloud/cloud.cfg.d' not empty so not removed 390s Processing triggers for rsyslog (8.2312.0-3ubuntu3) ... 391s Reading package lists... 391s Building dependency tree... 391s Reading state information... 391s linux-generic is already the newest version (6.8.0-11.11+1). 391s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 392s Hit:1 http://ftpmaster.internal/ubuntu noble InRelease 392s Hit:2 http://ftpmaster.internal/ubuntu noble-updates InRelease 392s Hit:3 http://ftpmaster.internal/ubuntu noble-security InRelease 392s Hit:4 http://ftpmaster.internal/ubuntu noble-proposed InRelease 392s Hit:5 http://ftpmaster.internal/ubuntu noble-backports InRelease 395s Reading package lists... 395s W: Target Packages (main/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 395s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 395s W: Target CNF (main/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 395s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 395s W: Target Packages (universe/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 395s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 395s W: Target CNF (universe/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 395s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 395s W: Target Packages (restricted/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 395s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 395s W: Target CNF (restricted/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 395s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 395s W: Target Packages (multiverse/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 395s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 395s W: Target CNF (multiverse/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 395s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 395s W: Target Packages (main/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 395s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 395s W: Target CNF (main/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 395s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 395s W: Target Packages (universe/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 395s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 395s W: Target CNF (universe/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 395s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 395s W: Target Packages (restricted/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 395s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 395s W: Target CNF (restricted/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 395s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 395s W: Target Packages (multiverse/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 395s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 395s W: Target CNF (multiverse/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 395s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 395s W: Target Packages (main/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 395s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 395s W: Target CNF (main/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 395s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 395s W: Target Packages (universe/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 395s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 395s W: Target CNF (universe/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 395s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 395s W: Target Packages (restricted/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 395s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 395s W: Target CNF (restricted/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 395s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 395s W: Target Packages (multiverse/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 395s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 395s W: Target CNF (multiverse/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 395s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 395s W: Target Packages (main/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 395s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 395s W: Target CNF (main/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 395s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 395s W: Target Packages (universe/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 395s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 395s W: Target CNF (universe/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 395s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 395s W: Target Packages (restricted/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 395s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 395s W: Target CNF (restricted/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 395s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 395s W: Target Packages (multiverse/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 395s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 395s W: Target CNF (multiverse/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 395s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 395s W: Target Packages (main/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 395s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 395s W: Target CNF (main/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 395s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 395s W: Target Packages (universe/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 395s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 395s W: Target CNF (universe/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 395s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 395s W: Target Packages (restricted/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 395s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 395s W: Target CNF (restricted/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 395s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 395s W: Target Packages (multiverse/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 395s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 395s W: Target CNF (multiverse/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 395s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 395s W: Target Packages (main/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 395s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 395s W: Target CNF (main/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 395s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 395s W: Target Packages (universe/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 395s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 395s W: Target CNF (universe/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 395s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 395s W: Target Packages (restricted/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 395s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 395s WReading package lists...: Target CNF (restricted/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 395s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 395s W: Target Packages (multiverse/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 395s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 395s W: Target CNF (multiverse/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 395s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 395s 395s Building dependency tree... 395s Reading state information... 396s Calculating upgrade... 396s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 396s Reading package lists... 396s Building dependency tree... 396s Reading state information... 396s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 396s autopkgtest [09:22:23]: rebooting testbed after setup commands that affected boot 418s autopkgtest [09:22:45]: testbed running kernel: Linux 6.8.0-11-generic #11-Ubuntu SMP Tue Feb 13 23:45:46 UTC 2024 418s autopkgtest [09:22:45]: testbed dpkg architecture: s390x 419s autopkgtest [09:22:46]: @@@@@@@@@@@@@@@@@@@@ apt-source sssd 420s W: Target Packages (main/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 420s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 420s W: Target CNF (main/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 420s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 420s W: Target Packages (universe/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 420s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 420s W: Target CNF (universe/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 420s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 420s W: Target Packages (restricted/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 420s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 420s W: Target CNF (restricted/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 420s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 420s W: Target Packages (multiverse/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 420s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 420s W: Target CNF (multiverse/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 420s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 420s W: Target Packages (main/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 420s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 420s W: Target CNF (main/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 420s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 420s W: Target Packages (universe/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 420s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 420s W: Target CNF (universe/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 420s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 420s W: Target Packages (restricted/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 420s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 420s W: Target CNF (restricted/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 420s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 420s W: Target Packages (multiverse/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 420s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 420s W: Target CNF (multiverse/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 420s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 420s W: Target Packages (main/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 420s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 420s W: Target CNF (main/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 420s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 420s W: Target Packages (universe/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 420s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 420s W: Target CNF (universe/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 420s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 420s W: Target Packages (restricted/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 420s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 420s W: Target CNF (restricted/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 420s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 420s W: Target Packages (multiverse/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 420s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 420s W: Target CNF (multiverse/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 420s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 430s Get:1 http://ftpmaster.internal/ubuntu noble/main sssd 2.9.4-1ubuntu1 (dsc) [5269 B] 430s Get:2 http://ftpmaster.internal/ubuntu noble/main sssd 2.9.4-1ubuntu1 (tar) [7983 kB] 430s Get:3 http://ftpmaster.internal/ubuntu noble/main sssd 2.9.4-1ubuntu1 (asc) [833 B] 430s Get:4 http://ftpmaster.internal/ubuntu noble/main sssd 2.9.4-1ubuntu1 (diff) [48.4 kB] 430s gpgv: Signature made Mon Feb 26 21:56:54 2024 UTC 430s gpgv: using RSA key E92FD0B36B14F1F4D8E0EB2F106DA1C8C3CBBF14 430s gpgv: Can't check signature: No public key 430s dpkg-source: warning: cannot verify inline signature for ./sssd_2.9.4-1ubuntu1.dsc: no acceptable signature found 430s autopkgtest [09:22:57]: testing package sssd version 2.9.4-1ubuntu1 430s autopkgtest [09:22:57]: build not needed 437s autopkgtest [09:23:04]: test ldap-user-group-ldap-auth: preparing testbed 440s Reading package lists... 441s Building dependency tree... 441s Reading state information... 441s Correcting dependencies...Starting pkgProblemResolver with broken count: 0 441s Starting 2 pkgProblemResolver with broken count: 0 441s Done 441s Done 441s Starting pkgProblemResolver with broken count: 0 441s Starting 2 pkgProblemResolver with broken count: 0 441s Done 442s The following additional packages will be installed: 442s expect ldap-utils libavahi-client3 libavahi-common-data libavahi-common3 442s libbasicobjects0 libc-ares2 libcollection4 libcrack2 libdhash1 442s libevent-2.1-7 libini-config5 libipa-hbac-dev libipa-hbac0 libjose0 libkrad0 442s libldb2 libltdl7 libnfsidmap1 libnss-sss libnss-sudo libodbc2 442s libpam-pwquality libpam-sss libpath-utils1 libpwquality-common libpwquality1 442s libref-array1 libsmbclient libsss-certmap-dev libsss-certmap0 442s libsss-idmap-dev libsss-idmap0 libsss-nss-idmap-dev libsss-nss-idmap0 442s libsss-sudo libtalloc2 libtcl8.6 libtdb1 libtevent0 libverto-libevent1 442s libverto1 libwbclient0 python3-libipa-hbac python3-libsss-nss-idmap 442s python3-sss samba-libs slapd sssd sssd-ad sssd-ad-common sssd-common 442s sssd-dbus sssd-idp sssd-ipa sssd-kcm sssd-krb5 sssd-krb5-common sssd-ldap 442s sssd-passkey sssd-proxy sssd-tools tcl-expect tcl8.6 442s Suggested packages: 442s tk8.6 libsasl2-modules-gssapi-mit | libsasl2-modules-gssapi-heimdal 442s odbc-postgresql tdsodbc adcli libsasl2-modules-ldap tcl-tclreadline 442s Recommended packages: 442s cracklib-runtime libsasl2-modules-gssapi-mit 442s | libsasl2-modules-gssapi-heimdal 442s The following NEW packages will be installed: 442s expect ldap-utils libavahi-client3 libavahi-common-data libavahi-common3 442s libbasicobjects0 libc-ares2 libcollection4 libcrack2 libdhash1 442s libevent-2.1-7 libini-config5 libipa-hbac-dev libipa-hbac0 libjose0 libkrad0 442s libldb2 libltdl7 libnfsidmap1 libnss-sss libnss-sudo libodbc2 442s libpam-pwquality libpam-sss libpath-utils1 libpwquality-common libpwquality1 442s libref-array1 libsmbclient libsss-certmap-dev libsss-certmap0 442s libsss-idmap-dev libsss-idmap0 libsss-nss-idmap-dev libsss-nss-idmap0 442s libsss-sudo libtalloc2 libtcl8.6 libtdb1 libtevent0 libverto-libevent1 442s libverto1 libwbclient0 python3-libipa-hbac python3-libsss-nss-idmap 442s python3-sss samba-libs slapd sssd sssd-ad sssd-ad-common sssd-common 442s sssd-dbus sssd-idp sssd-ipa sssd-kcm sssd-krb5 sssd-krb5-common sssd-ldap 442s sssd-passkey sssd-proxy sssd-tools tcl-expect tcl8.6 442s 0 upgraded, 64 newly installed, 0 to remove and 0 not upgraded. 442s 1 not fully installed or removed. 442s Need to get 12.9 MB of archives. 442s After this operation, 50.0 MB of additional disk space will be used. 442s Get:1 http://ftpmaster.internal/ubuntu noble/main s390x libtalloc2 s390x 2.4.2-1 [28.3 kB] 442s Get:2 http://ftpmaster.internal/ubuntu noble/main s390x libtdb1 s390x 1.4.10-1 [49.9 kB] 442s Get:3 http://ftpmaster.internal/ubuntu noble/main s390x libtevent0 s390x 0.16.1-1 [43.1 kB] 442s Get:4 http://ftpmaster.internal/ubuntu noble/main s390x libldb2 s390x 2:2.8.0+samba4.19.5+dfsg-1ubuntu1 [191 kB] 442s Get:5 http://ftpmaster.internal/ubuntu noble/main s390x python3-sss s390x 2.9.4-1ubuntu1 [46.6 kB] 442s Get:6 http://ftpmaster.internal/ubuntu noble/main s390x libsss-idmap0 s390x 2.9.4-1ubuntu1 [22.1 kB] 442s Get:7 http://ftpmaster.internal/ubuntu noble/main s390x libnss-sss s390x 2.9.4-1ubuntu1 [32.6 kB] 442s Get:8 http://ftpmaster.internal/ubuntu noble/main s390x libcrack2 s390x 2.9.6-5.1 [29.6 kB] 442s Get:9 http://ftpmaster.internal/ubuntu noble/main s390x libpwquality-common all 1.4.5-3 [7658 B] 442s Get:10 http://ftpmaster.internal/ubuntu noble/main s390x libpwquality1 s390x 1.4.5-3 [14.7 kB] 442s Get:11 http://ftpmaster.internal/ubuntu noble/main s390x libpam-pwquality s390x 1.4.5-3 [11.6 kB] 442s Get:12 http://ftpmaster.internal/ubuntu noble/main s390x libpam-sss s390x 2.9.4-1ubuntu1 [51.9 kB] 442s Get:13 http://ftpmaster.internal/ubuntu noble/main s390x libc-ares2 s390x 1.27.0-1 [79.2 kB] 442s Get:14 http://ftpmaster.internal/ubuntu noble/main s390x libdhash1 s390x 0.6.2-2 [8648 B] 442s Get:15 http://ftpmaster.internal/ubuntu noble/main s390x libbasicobjects0 s390x 0.6.2-2 [5476 B] 442s Get:16 http://ftpmaster.internal/ubuntu noble/main s390x libcollection4 s390x 0.6.2-2 [23.2 kB] 442s Get:17 http://ftpmaster.internal/ubuntu noble/main s390x libpath-utils1 s390x 0.6.2-2 [8994 B] 442s Get:18 http://ftpmaster.internal/ubuntu noble/main s390x libref-array1 s390x 0.6.2-2 [6880 B] 442s Get:19 http://ftpmaster.internal/ubuntu noble/main s390x libini-config5 s390x 0.6.2-2 [45.3 kB] 442s Get:20 http://ftpmaster.internal/ubuntu noble/main s390x libnfsidmap1 s390x 1:2.6.3-3ubuntu1 [49.0 kB] 442s Get:21 http://ftpmaster.internal/ubuntu noble/main s390x libsss-certmap0 s390x 2.9.4-1ubuntu1 [46.7 kB] 442s Get:22 http://ftpmaster.internal/ubuntu noble/main s390x libsss-nss-idmap0 s390x 2.9.4-1ubuntu1 [31.4 kB] 442s Get:23 http://ftpmaster.internal/ubuntu noble/main s390x sssd-common s390x 2.9.4-1ubuntu1 [1125 kB] 442s Get:24 http://ftpmaster.internal/ubuntu noble/main s390x libavahi-common-data s390x 0.8-13ubuntu2 [29.5 kB] 443s Get:25 http://ftpmaster.internal/ubuntu noble/main s390x libavahi-common3 s390x 0.8-13ubuntu2 [23.8 kB] 443s Get:26 http://ftpmaster.internal/ubuntu noble/main s390x libavahi-client3 s390x 0.8-13ubuntu2 [26.7 kB] 443s Get:27 http://ftpmaster.internal/ubuntu noble/main s390x libwbclient0 s390x 2:4.19.5+dfsg-1ubuntu1 [70.3 kB] 443s Get:28 http://ftpmaster.internal/ubuntu noble/main s390x samba-libs s390x 2:4.19.5+dfsg-1ubuntu1 [6231 kB] 444s Get:29 http://ftpmaster.internal/ubuntu noble/main s390x sssd-ad-common s390x 2.9.4-1ubuntu1 [74.8 kB] 444s Get:30 http://ftpmaster.internal/ubuntu noble/main s390x sssd-krb5-common s390x 2.9.4-1ubuntu1 [90.3 kB] 444s Get:31 http://ftpmaster.internal/ubuntu noble/main s390x libsmbclient s390x 2:4.19.5+dfsg-1ubuntu1 [65.1 kB] 444s Get:32 http://ftpmaster.internal/ubuntu noble/main s390x sssd-ad s390x 2.9.4-1ubuntu1 [133 kB] 444s Get:33 http://ftpmaster.internal/ubuntu noble/main s390x libipa-hbac0 s390x 2.9.4-1ubuntu1 [16.8 kB] 444s Get:34 http://ftpmaster.internal/ubuntu noble/main s390x sssd-ipa s390x 2.9.4-1ubuntu1 [215 kB] 444s Get:35 http://ftpmaster.internal/ubuntu noble/main s390x sssd-krb5 s390x 2.9.4-1ubuntu1 [14.4 kB] 444s Get:36 http://ftpmaster.internal/ubuntu noble/main s390x sssd-ldap s390x 2.9.4-1ubuntu1 [31.0 kB] 444s Get:37 http://ftpmaster.internal/ubuntu noble/main s390x sssd-proxy s390x 2.9.4-1ubuntu1 [43.9 kB] 444s Get:38 http://ftpmaster.internal/ubuntu noble/main s390x sssd s390x 2.9.4-1ubuntu1 [4120 B] 444s Get:39 http://ftpmaster.internal/ubuntu noble/main s390x sssd-dbus s390x 2.9.4-1ubuntu1 [101 kB] 444s Get:40 http://ftpmaster.internal/ubuntu noble/universe s390x libjose0 s390x 11-3 [45.2 kB] 444s Get:41 http://ftpmaster.internal/ubuntu noble/main s390x libevent-2.1-7 s390x 2.1.12-stable-9 [144 kB] 444s Get:42 http://ftpmaster.internal/ubuntu noble/main s390x libverto-libevent1 s390x 0.3.1-1ubuntu5 [5810 B] 444s Get:43 http://ftpmaster.internal/ubuntu noble/main s390x libverto1 s390x 0.3.1-1ubuntu5 [10.6 kB] 444s Get:44 http://ftpmaster.internal/ubuntu noble/main s390x libkrad0 s390x 1.20.1-5build1 [22.0 kB] 444s Get:45 http://ftpmaster.internal/ubuntu noble/universe s390x sssd-idp s390x 2.9.4-1ubuntu1 [27.3 kB] 444s Get:46 http://ftpmaster.internal/ubuntu noble/universe s390x sssd-kcm s390x 2.9.4-1ubuntu1 [137 kB] 444s Get:47 http://ftpmaster.internal/ubuntu noble/universe s390x sssd-passkey s390x 2.9.4-1ubuntu1 [32.3 kB] 444s Get:48 http://ftpmaster.internal/ubuntu noble/main s390x sssd-tools s390x 2.9.4-1ubuntu1 [97.6 kB] 444s Get:49 http://ftpmaster.internal/ubuntu noble/main s390x libipa-hbac-dev s390x 2.9.4-1ubuntu1 [6660 B] 444s Get:50 http://ftpmaster.internal/ubuntu noble/main s390x libsss-certmap-dev s390x 2.9.4-1ubuntu1 [5734 B] 444s Get:51 http://ftpmaster.internal/ubuntu noble/main s390x libsss-idmap-dev s390x 2.9.4-1ubuntu1 [8376 B] 444s Get:52 http://ftpmaster.internal/ubuntu noble/main s390x libsss-nss-idmap-dev s390x 2.9.4-1ubuntu1 [6708 B] 444s Get:53 http://ftpmaster.internal/ubuntu noble/universe s390x libnss-sudo all 1.9.15p5-3ubuntu1 [14.9 kB] 444s Get:54 http://ftpmaster.internal/ubuntu noble/universe s390x libsss-sudo s390x 2.9.4-1ubuntu1 [21.3 kB] 444s Get:55 http://ftpmaster.internal/ubuntu noble/universe s390x python3-libipa-hbac s390x 2.9.4-1ubuntu1 [16.9 kB] 444s Get:56 http://ftpmaster.internal/ubuntu noble/universe s390x python3-libsss-nss-idmap s390x 2.9.4-1ubuntu1 [9140 B] 444s Get:57 http://ftpmaster.internal/ubuntu noble/main s390x libltdl7 s390x 2.4.7-7 [41.6 kB] 444s Get:58 http://ftpmaster.internal/ubuntu noble/main s390x libodbc2 s390x 2.3.12-1 [164 kB] 444s Get:59 http://ftpmaster.internal/ubuntu noble/main s390x slapd s390x 2.6.7+dfsg-1~exp1ubuntu1 [1617 kB] 444s Get:60 http://ftpmaster.internal/ubuntu noble/main s390x ldap-utils s390x 2.6.7+dfsg-1~exp1ubuntu1 [165 kB] 444s Get:61 http://ftpmaster.internal/ubuntu noble/main s390x libtcl8.6 s390x 8.6.13+dfsg-2 [948 kB] 444s Get:62 http://ftpmaster.internal/ubuntu noble/main s390x tcl8.6 s390x 8.6.13+dfsg-2 [14.7 kB] 444s Get:63 http://ftpmaster.internal/ubuntu noble/universe s390x tcl-expect s390x 5.45.4-2build1 [99.7 kB] 444s Get:64 http://ftpmaster.internal/ubuntu noble/universe s390x expect s390x 5.45.4-2build1 [137 kB] 445s Preconfiguring packages ... 445s Fetched 12.9 MB in 3s (4701 kB/s) 445s Selecting previously unselected package libtalloc2:s390x. 445s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 51758 files and directories currently installed.) 445s Preparing to unpack .../00-libtalloc2_2.4.2-1_s390x.deb ... 445s Unpacking libtalloc2:s390x (2.4.2-1) ... 445s Selecting previously unselected package libtdb1:s390x. 445s Preparing to unpack .../01-libtdb1_1.4.10-1_s390x.deb ... 445s Unpacking libtdb1:s390x (1.4.10-1) ... 445s Selecting previously unselected package libtevent0:s390x. 445s Preparing to unpack .../02-libtevent0_0.16.1-1_s390x.deb ... 445s Unpacking libtevent0:s390x (0.16.1-1) ... 445s Selecting previously unselected package libldb2:s390x. 445s Preparing to unpack .../03-libldb2_2%3a2.8.0+samba4.19.5+dfsg-1ubuntu1_s390x.deb ... 445s Unpacking libldb2:s390x (2:2.8.0+samba4.19.5+dfsg-1ubuntu1) ... 445s Selecting previously unselected package python3-sss. 445s Preparing to unpack .../04-python3-sss_2.9.4-1ubuntu1_s390x.deb ... 445s Unpacking python3-sss (2.9.4-1ubuntu1) ... 445s Selecting previously unselected package libsss-idmap0. 445s Preparing to unpack .../05-libsss-idmap0_2.9.4-1ubuntu1_s390x.deb ... 445s Unpacking libsss-idmap0 (2.9.4-1ubuntu1) ... 445s Selecting previously unselected package libnss-sss:s390x. 445s Preparing to unpack .../06-libnss-sss_2.9.4-1ubuntu1_s390x.deb ... 445s Unpacking libnss-sss:s390x (2.9.4-1ubuntu1) ... 445s Selecting previously unselected package libcrack2:s390x. 445s Preparing to unpack .../07-libcrack2_2.9.6-5.1_s390x.deb ... 445s Unpacking libcrack2:s390x (2.9.6-5.1) ... 445s Selecting previously unselected package libpwquality-common. 445s Preparing to unpack .../08-libpwquality-common_1.4.5-3_all.deb ... 445s Unpacking libpwquality-common (1.4.5-3) ... 445s Selecting previously unselected package libpwquality1:s390x. 445s Preparing to unpack .../09-libpwquality1_1.4.5-3_s390x.deb ... 445s Unpacking libpwquality1:s390x (1.4.5-3) ... 445s Selecting previously unselected package libpam-pwquality:s390x. 445s Preparing to unpack .../10-libpam-pwquality_1.4.5-3_s390x.deb ... 445s Unpacking libpam-pwquality:s390x (1.4.5-3) ... 445s Selecting previously unselected package libpam-sss:s390x. 445s Preparing to unpack .../11-libpam-sss_2.9.4-1ubuntu1_s390x.deb ... 445s Unpacking libpam-sss:s390x (2.9.4-1ubuntu1) ... 445s Selecting previously unselected package libc-ares2:s390x. 445s Preparing to unpack .../12-libc-ares2_1.27.0-1_s390x.deb ... 445s Unpacking libc-ares2:s390x (1.27.0-1) ... 445s Selecting previously unselected package libdhash1:s390x. 445s Preparing to unpack .../13-libdhash1_0.6.2-2_s390x.deb ... 445s Unpacking libdhash1:s390x (0.6.2-2) ... 445s Selecting previously unselected package libbasicobjects0:s390x. 445s Preparing to unpack .../14-libbasicobjects0_0.6.2-2_s390x.deb ... 445s Unpacking libbasicobjects0:s390x (0.6.2-2) ... 445s Selecting previously unselected package libcollection4:s390x. 445s Preparing to unpack .../15-libcollection4_0.6.2-2_s390x.deb ... 445s Unpacking libcollection4:s390x (0.6.2-2) ... 445s Selecting previously unselected package libpath-utils1:s390x. 445s Preparing to unpack .../16-libpath-utils1_0.6.2-2_s390x.deb ... 445s Unpacking libpath-utils1:s390x (0.6.2-2) ... 445s Selecting previously unselected package libref-array1:s390x. 445s Preparing to unpack .../17-libref-array1_0.6.2-2_s390x.deb ... 445s Unpacking libref-array1:s390x (0.6.2-2) ... 445s Selecting previously unselected package libini-config5:s390x. 445s Preparing to unpack .../18-libini-config5_0.6.2-2_s390x.deb ... 445s Unpacking libini-config5:s390x (0.6.2-2) ... 445s Selecting previously unselected package libnfsidmap1:s390x. 445s Preparing to unpack .../19-libnfsidmap1_1%3a2.6.3-3ubuntu1_s390x.deb ... 445s Unpacking libnfsidmap1:s390x (1:2.6.3-3ubuntu1) ... 445s Selecting previously unselected package libsss-certmap0. 445s Preparing to unpack .../20-libsss-certmap0_2.9.4-1ubuntu1_s390x.deb ... 445s Unpacking libsss-certmap0 (2.9.4-1ubuntu1) ... 445s Selecting previously unselected package libsss-nss-idmap0. 445s Preparing to unpack .../21-libsss-nss-idmap0_2.9.4-1ubuntu1_s390x.deb ... 445s Unpacking libsss-nss-idmap0 (2.9.4-1ubuntu1) ... 445s Selecting previously unselected package sssd-common. 445s Preparing to unpack .../22-sssd-common_2.9.4-1ubuntu1_s390x.deb ... 445s Unpacking sssd-common (2.9.4-1ubuntu1) ... 445s Selecting previously unselected package libavahi-common-data:s390x. 445s Preparing to unpack .../23-libavahi-common-data_0.8-13ubuntu2_s390x.deb ... 445s Unpacking libavahi-common-data:s390x (0.8-13ubuntu2) ... 445s Selecting previously unselected package libavahi-common3:s390x. 445s Preparing to unpack .../24-libavahi-common3_0.8-13ubuntu2_s390x.deb ... 445s Unpacking libavahi-common3:s390x (0.8-13ubuntu2) ... 445s Selecting previously unselected package libavahi-client3:s390x. 445s Preparing to unpack .../25-libavahi-client3_0.8-13ubuntu2_s390x.deb ... 445s Unpacking libavahi-client3:s390x (0.8-13ubuntu2) ... 445s Selecting previously unselected package libwbclient0:s390x. 445s Preparing to unpack .../26-libwbclient0_2%3a4.19.5+dfsg-1ubuntu1_s390x.deb ... 445s Unpacking libwbclient0:s390x (2:4.19.5+dfsg-1ubuntu1) ... 445s Selecting previously unselected package samba-libs:s390x. 445s Preparing to unpack .../27-samba-libs_2%3a4.19.5+dfsg-1ubuntu1_s390x.deb ... 445s Unpacking samba-libs:s390x (2:4.19.5+dfsg-1ubuntu1) ... 446s Selecting previously unselected package sssd-ad-common. 446s Preparing to unpack .../28-sssd-ad-common_2.9.4-1ubuntu1_s390x.deb ... 446s Unpacking sssd-ad-common (2.9.4-1ubuntu1) ... 446s Selecting previously unselected package sssd-krb5-common. 446s Preparing to unpack .../29-sssd-krb5-common_2.9.4-1ubuntu1_s390x.deb ... 446s Unpacking sssd-krb5-common (2.9.4-1ubuntu1) ... 446s Selecting previously unselected package libsmbclient:s390x. 446s Preparing to unpack .../30-libsmbclient_2%3a4.19.5+dfsg-1ubuntu1_s390x.deb ... 446s Unpacking libsmbclient:s390x (2:4.19.5+dfsg-1ubuntu1) ... 446s Selecting previously unselected package sssd-ad. 446s Preparing to unpack .../31-sssd-ad_2.9.4-1ubuntu1_s390x.deb ... 446s Unpacking sssd-ad (2.9.4-1ubuntu1) ... 446s Selecting previously unselected package libipa-hbac0. 446s Preparing to unpack .../32-libipa-hbac0_2.9.4-1ubuntu1_s390x.deb ... 446s Unpacking libipa-hbac0 (2.9.4-1ubuntu1) ... 446s Selecting previously unselected package sssd-ipa. 446s Preparing to unpack .../33-sssd-ipa_2.9.4-1ubuntu1_s390x.deb ... 446s Unpacking sssd-ipa (2.9.4-1ubuntu1) ... 446s Selecting previously unselected package sssd-krb5. 446s Preparing to unpack .../34-sssd-krb5_2.9.4-1ubuntu1_s390x.deb ... 446s Unpacking sssd-krb5 (2.9.4-1ubuntu1) ... 446s Selecting previously unselected package sssd-ldap. 446s Preparing to unpack .../35-sssd-ldap_2.9.4-1ubuntu1_s390x.deb ... 446s Unpacking sssd-ldap (2.9.4-1ubuntu1) ... 446s Selecting previously unselected package sssd-proxy. 446s Preparing to unpack .../36-sssd-proxy_2.9.4-1ubuntu1_s390x.deb ... 446s Unpacking sssd-proxy (2.9.4-1ubuntu1) ... 446s Selecting previously unselected package sssd. 446s Preparing to unpack .../37-sssd_2.9.4-1ubuntu1_s390x.deb ... 446s Unpacking sssd (2.9.4-1ubuntu1) ... 446s Selecting previously unselected package sssd-dbus. 446s Preparing to unpack .../38-sssd-dbus_2.9.4-1ubuntu1_s390x.deb ... 446s Unpacking sssd-dbus (2.9.4-1ubuntu1) ... 446s Selecting previously unselected package libjose0:s390x. 446s Preparing to unpack .../39-libjose0_11-3_s390x.deb ... 446s Unpacking libjose0:s390x (11-3) ... 446s Selecting previously unselected package libevent-2.1-7:s390x. 446s Preparing to unpack .../40-libevent-2.1-7_2.1.12-stable-9_s390x.deb ... 446s Unpacking libevent-2.1-7:s390x (2.1.12-stable-9) ... 446s Selecting previously unselected package libverto-libevent1:s390x. 446s Preparing to unpack .../41-libverto-libevent1_0.3.1-1ubuntu5_s390x.deb ... 446s Unpacking libverto-libevent1:s390x (0.3.1-1ubuntu5) ... 446s Selecting previously unselected package libverto1:s390x. 446s Preparing to unpack .../42-libverto1_0.3.1-1ubuntu5_s390x.deb ... 446s Unpacking libverto1:s390x (0.3.1-1ubuntu5) ... 446s Selecting previously unselected package libkrad0:s390x. 446s Preparing to unpack .../43-libkrad0_1.20.1-5build1_s390x.deb ... 446s Unpacking libkrad0:s390x (1.20.1-5build1) ... 446s Selecting previously unselected package sssd-idp. 446s Preparing to unpack .../44-sssd-idp_2.9.4-1ubuntu1_s390x.deb ... 446s Unpacking sssd-idp (2.9.4-1ubuntu1) ... 446s Selecting previously unselected package sssd-kcm. 446s Preparing to unpack .../45-sssd-kcm_2.9.4-1ubuntu1_s390x.deb ... 446s Unpacking sssd-kcm (2.9.4-1ubuntu1) ... 446s Selecting previously unselected package sssd-passkey. 446s Preparing to unpack .../46-sssd-passkey_2.9.4-1ubuntu1_s390x.deb ... 446s Unpacking sssd-passkey (2.9.4-1ubuntu1) ... 446s Selecting previously unselected package sssd-tools. 446s Preparing to unpack .../47-sssd-tools_2.9.4-1ubuntu1_s390x.deb ... 446s Unpacking sssd-tools (2.9.4-1ubuntu1) ... 446s Selecting previously unselected package libipa-hbac-dev. 446s Preparing to unpack .../48-libipa-hbac-dev_2.9.4-1ubuntu1_s390x.deb ... 446s Unpacking libipa-hbac-dev (2.9.4-1ubuntu1) ... 446s Selecting previously unselected package libsss-certmap-dev. 446s Preparing to unpack .../49-libsss-certmap-dev_2.9.4-1ubuntu1_s390x.deb ... 446s Unpacking libsss-certmap-dev (2.9.4-1ubuntu1) ... 446s Selecting previously unselected package libsss-idmap-dev. 446s Preparing to unpack .../50-libsss-idmap-dev_2.9.4-1ubuntu1_s390x.deb ... 446s Unpacking libsss-idmap-dev (2.9.4-1ubuntu1) ... 446s Selecting previously unselected package libsss-nss-idmap-dev. 446s Preparing to unpack .../51-libsss-nss-idmap-dev_2.9.4-1ubuntu1_s390x.deb ... 446s Unpacking libsss-nss-idmap-dev (2.9.4-1ubuntu1) ... 446s Selecting previously unselected package libnss-sudo. 446s Preparing to unpack .../52-libnss-sudo_1.9.15p5-3ubuntu1_all.deb ... 446s Unpacking libnss-sudo (1.9.15p5-3ubuntu1) ... 446s Selecting previously unselected package libsss-sudo. 446s Preparing to unpack .../53-libsss-sudo_2.9.4-1ubuntu1_s390x.deb ... 446s Unpacking libsss-sudo (2.9.4-1ubuntu1) ... 446s Selecting previously unselected package python3-libipa-hbac. 446s Preparing to unpack .../54-python3-libipa-hbac_2.9.4-1ubuntu1_s390x.deb ... 446s Unpacking python3-libipa-hbac (2.9.4-1ubuntu1) ... 446s Selecting previously unselected package python3-libsss-nss-idmap. 446s Preparing to unpack .../55-python3-libsss-nss-idmap_2.9.4-1ubuntu1_s390x.deb ... 446s Unpacking python3-libsss-nss-idmap (2.9.4-1ubuntu1) ... 446s Selecting previously unselected package libltdl7:s390x. 446s Preparing to unpack .../56-libltdl7_2.4.7-7_s390x.deb ... 446s Unpacking libltdl7:s390x (2.4.7-7) ... 446s Selecting previously unselected package libodbc2:s390x. 446s Preparing to unpack .../57-libodbc2_2.3.12-1_s390x.deb ... 446s Unpacking libodbc2:s390x (2.3.12-1) ... 446s Selecting previously unselected package slapd. 446s Preparing to unpack .../58-slapd_2.6.7+dfsg-1~exp1ubuntu1_s390x.deb ... 446s Unpacking slapd (2.6.7+dfsg-1~exp1ubuntu1) ... 446s Selecting previously unselected package ldap-utils. 446s Preparing to unpack .../59-ldap-utils_2.6.7+dfsg-1~exp1ubuntu1_s390x.deb ... 446s Unpacking ldap-utils (2.6.7+dfsg-1~exp1ubuntu1) ... 446s Selecting previously unselected package libtcl8.6:s390x. 446s Preparing to unpack .../60-libtcl8.6_8.6.13+dfsg-2_s390x.deb ... 446s Unpacking libtcl8.6:s390x (8.6.13+dfsg-2) ... 446s Selecting previously unselected package tcl8.6. 446s Preparing to unpack .../61-tcl8.6_8.6.13+dfsg-2_s390x.deb ... 446s Unpacking tcl8.6 (8.6.13+dfsg-2) ... 446s Selecting previously unselected package tcl-expect:s390x. 446s Preparing to unpack .../62-tcl-expect_5.45.4-2build1_s390x.deb ... 446s Unpacking tcl-expect:s390x (5.45.4-2build1) ... 446s Selecting previously unselected package expect. 446s Preparing to unpack .../63-expect_5.45.4-2build1_s390x.deb ... 446s Unpacking expect (5.45.4-2build1) ... 446s Setting up libpwquality-common (1.4.5-3) ... 446s Setting up libpath-utils1:s390x (0.6.2-2) ... 446s Setting up libnfsidmap1:s390x (1:2.6.3-3ubuntu1) ... 446s Setting up libsss-idmap0 (2.9.4-1ubuntu1) ... 446s Setting up libbasicobjects0:s390x (0.6.2-2) ... 446s Setting up libsss-idmap-dev (2.9.4-1ubuntu1) ... 446s Setting up libtdb1:s390x (1.4.10-1) ... 446s Setting up libc-ares2:s390x (1.27.0-1) ... 446s Setting up ldap-utils (2.6.7+dfsg-1~exp1ubuntu1) ... 446s Setting up libjose0:s390x (11-3) ... 446s Setting up libwbclient0:s390x (2:4.19.5+dfsg-1ubuntu1) ... 446s Setting up libtalloc2:s390x (2.4.2-1) ... 446s Setting up libdhash1:s390x (0.6.2-2) ... 446s Setting up libtevent0:s390x (0.16.1-1) ... 446s Setting up libavahi-common-data:s390x (0.8-13ubuntu2) ... 446s Setting up libevent-2.1-7:s390x (2.1.12-stable-9) ... 446s Setting up libtcl8.6:s390x (8.6.13+dfsg-2) ... 447s Setting up libltdl7:s390x (2.4.7-7) ... 447s Setting up libcrack2:s390x (2.9.6-5.1) ... 447s Setting up libcollection4:s390x (0.6.2-2) ... 447s Setting up libodbc2:s390x (2.3.12-1) ... 447s Setting up libipa-hbac0 (2.9.4-1ubuntu1) ... 447s Setting up python3-libipa-hbac (2.9.4-1ubuntu1) ... 447s Setting up libref-array1:s390x (0.6.2-2) ... 447s Setting up libnss-sudo (1.9.15p5-3ubuntu1) ... 447s Setting up libldb2:s390x (2:2.8.0+samba4.19.5+dfsg-1ubuntu1) ... 447s Setting up libsss-nss-idmap0 (2.9.4-1ubuntu1) ... 447s Setting up libnss-sss:s390x (2.9.4-1ubuntu1) ... 447s Setting up slapd (2.6.7+dfsg-1~exp1ubuntu1) ... 447s Creating new user openldap... done. 447s Creating initial configuration... done. 447s Creating LDAP directory... done. 447s Setting up tcl8.6 (8.6.13+dfsg-2) ... 447s Setting up libsss-sudo (2.9.4-1ubuntu1) ... 447s Setting up libsss-nss-idmap-dev (2.9.4-1ubuntu1) ... 447s Setting up libipa-hbac-dev (2.9.4-1ubuntu1) ... 447s Setting up libini-config5:s390x (0.6.2-2) ... 447s Setting up libavahi-common3:s390x (0.8-13ubuntu2) ... 447s Setting up tcl-expect:s390x (5.45.4-2build1) ... 447s Setting up python3-sss (2.9.4-1ubuntu1) ... 447s Setting up libsss-certmap0 (2.9.4-1ubuntu1) ... 447s Setting up libpwquality1:s390x (1.4.5-3) ... 447s Setting up python3-libsss-nss-idmap (2.9.4-1ubuntu1) ... 447s Setting up libavahi-client3:s390x (0.8-13ubuntu2) ... 447s Setting up expect (5.45.4-2build1) ... 447s Setting up libpam-pwquality:s390x (1.4.5-3) ... 448s Setting up samba-libs:s390x (2:4.19.5+dfsg-1ubuntu1) ... 448s Setting up libsss-certmap-dev (2.9.4-1ubuntu1) ... 448s Setting up libsmbclient:s390x (2:4.19.5+dfsg-1ubuntu1) ... 448s Setting up libpam-sss:s390x (2.9.4-1ubuntu1) ... 448s Setting up sssd-common (2.9.4-1ubuntu1) ... 448s Creating SSSD system user & group... 448s warn: The home directory `/var/lib/sss' already exists. Not touching this directory. 448s warn: Warning: The home directory `/var/lib/sss' does not belong to the user you are currently creating. 448s Warning: found usr.sbin.sssd in /etc/apparmor.d/force-complain, forcing complain mode 448s Warning from /etc/apparmor.d/usr.sbin.sssd (/etc/apparmor.d/usr.sbin.sssd line 63): Caching disabled for: 'usr.sbin.sssd' due to force complain 448s Created symlink /etc/systemd/system/sssd.service.wants/sssd-autofs.socket → /usr/lib/systemd/system/sssd-autofs.socket. 449s Created symlink /etc/systemd/system/sssd.service.wants/sssd-nss.socket → /usr/lib/systemd/system/sssd-nss.socket. 449s Created symlink /etc/systemd/system/sssd.service.wants/sssd-pam-priv.socket → /usr/lib/systemd/system/sssd-pam-priv.socket. 449s Created symlink /etc/systemd/system/sssd.service.wants/sssd-pam.socket → /usr/lib/systemd/system/sssd-pam.socket. 449s Created symlink /etc/systemd/system/sssd.service.wants/sssd-ssh.socket → /usr/lib/systemd/system/sssd-ssh.socket. 449s Created symlink /etc/systemd/system/sssd.service.wants/sssd-sudo.socket → /usr/lib/systemd/system/sssd-sudo.socket. 450s Created symlink /etc/systemd/system/multi-user.target.wants/sssd.service → /usr/lib/systemd/system/sssd.service. 450s sssd-autofs.service is a disabled or a static unit, not starting it. 450s sssd-nss.service is a disabled or a static unit, not starting it. 450s sssd-pam.service is a disabled or a static unit, not starting it. 450s sssd-ssh.service is a disabled or a static unit, not starting it. 450s sssd-sudo.service is a disabled or a static unit, not starting it. 450s Could not execute systemctl: at /usr/bin/deb-systemd-invoke line 148. 450s Setting up sssd-proxy (2.9.4-1ubuntu1) ... 450s Setting up sssd-kcm (2.9.4-1ubuntu1) ... 450s Created symlink /etc/systemd/system/sockets.target.wants/sssd-kcm.socket → /usr/lib/systemd/system/sssd-kcm.socket. 450s sssd-kcm.service is a disabled or a static unit, not starting it. 451s Setting up sssd-dbus (2.9.4-1ubuntu1) ... 451s sssd-ifp.service is a disabled or a static unit, not starting it. 451s Setting up sssd-ad-common (2.9.4-1ubuntu1) ... 451s Created symlink /etc/systemd/system/sssd.service.wants/sssd-pac.socket → /usr/lib/systemd/system/sssd-pac.socket. 451s sssd-pac.service is a disabled or a static unit, not starting it. 451s Could not execute systemctl: at /usr/bin/deb-systemd-invoke line 148. 451s Setting up sssd-krb5-common (2.9.4-1ubuntu1) ... 451s Setting up sssd-krb5 (2.9.4-1ubuntu1) ... 451s Setting up sssd-ldap (2.9.4-1ubuntu1) ... 451s Setting up sssd-ad (2.9.4-1ubuntu1) ... 451s Setting up sssd-tools (2.9.4-1ubuntu1) ... 451s Setting up sssd-ipa (2.9.4-1ubuntu1) ... 451s Setting up sssd (2.9.4-1ubuntu1) ... 451s Setting up libverto-libevent1:s390x (0.3.1-1ubuntu5) ... 451s Setting up libverto1:s390x (0.3.1-1ubuntu5) ... 451s Setting up libkrad0:s390x (1.20.1-5build1) ... 451s Setting up sssd-passkey (2.9.4-1ubuntu1) ... 451s Setting up sssd-idp (2.9.4-1ubuntu1) ... 451s Setting up autopkgtest-satdep (0) ... 451s Processing triggers for libc-bin (2.39-0ubuntu2) ... 451s Processing triggers for ufw (0.36.2-5) ... 451s Processing triggers for man-db (2.12.0-3) ... 452s Processing triggers for dbus (1.14.10-4ubuntu2) ... 462s (Reading database ... 53043 files and directories currently installed.) 462s Removing autopkgtest-satdep (0) ... 463s autopkgtest [09:23:30]: test ldap-user-group-ldap-auth: [----------------------- 463s + . debian/tests/util 463s + . debian/tests/common-tests 463s + mydomain=example.com 463s + myhostname=ldap.example.com 463s + mysuffix=dc=example,dc=com 463s + admin_dn=cn=admin,dc=example,dc=com 463s + admin_pw=secret 463s + ldap_user=testuser1 463s + ldap_user_pw=testuser1secret 463s + ldap_group=ldapusers 463s + adjust_hostname ldap.example.com 463s + local myhostname=ldap.example.com 463s + echo ldap.example.com 463s + hostname ldap.example.com 463s + grep -qE ldap.example.com /etc/hosts 463s + echo 127.0.1.10 ldap.example.com 463s + reconfigure_slapd 463s + debconf-set-selections 463s + rm -rf /var/backups/*slapd* /var/backups/unknown*ldapdb 463s + dpkg-reconfigure -fnoninteractive -pcritical slapd 464s Backing up /etc/ldap/slapd.d in /var/backups/slapd-2.6.7+dfsg-1~exp1ubuntu1... done. 464s Moving old database directory to /var/backups: 464s - directory unknown... done. 464s Creating initial configuration... done. 464s Creating LDAP directory... done. 464s + generate_certs ldap.example.com 464s + local cn=ldap.example.com 464s + local cert=/etc/ldap/server.pem 464s + local key=/etc/ldap/server.key 464s + local cnf=/etc/ldap/openssl.cnf 464s + cat 464s + openssl req -new -x509 -nodes -out /etc/ldap/server.pem -keyout /etc/ldap/server.key -config /etc/ldap/openssl.cnf 464s .....++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ 464s ...........................++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ 464s ----- 464s + chmod 0640 /etc/ldap/server.key 464s + chgrp openldap /etc/ldap/server.key 464s + [ ! -f /etc/ldap/server.pem ] 464s + [ ! -f /etc/ldap/server.key ] 464s + enable_ldap_ssl 464s + cat 464s + cat 464s + ldapmodify -H ldapi:/// -Y EXTERNAL -Q 464s + populate_ldap_rfc2307 464s + + cat 464s ldapadd -x -D cn=admin,dc=example,dc=com -w secret 464s + configure_sssd_ldap_rfc2307 464s + cat 464s + chmod 0600 /etc/sssd/sssd.conf 464s + systemctl restart sssd 464s modifying entry "cn=config" 464s 464s adding new entry "ou=People,dc=example,dc=com" 464s 464s adding new entry "ou=Group,dc=example,dc=com" 464s 464s adding new entry "uid=testuser1,ou=People,dc=example,dc=com" 464s 464s adding new entry "cn=testuser1,ou=Group,dc=example,dc=com" 464s 464s adding new entry "cn=ldapusers,ou=Group,dc=example,dc=com" 464s 465s Assert local user databases do not have our LDAP test data 465s + enable_pam_mkhomedir 465s + grep -qE ^session.*pam_mkhomedir\.so /etc/pam.d/common-session 465s + echo session optional pam_mkhomedir.so 465s + run_common_tests 465s + echo Assert local user databases do not have our LDAP test data 465s + check_local_user testuser1 465s + local local_user=testuser1 465s + grep -q ^testuser1 /etc/passwd 465s + check_local_group testuser1 465s + local local_group=testuser1 465s + grep -q ^testuser1 /etc/group 465s + check_local_group ldapusers 465s + local local_group=ldapusers 465s + grep -q ^ldapusers /etc/group 465s + echo The LDAP user is known to the system via getent 465s + check_getent_user testuser1 465s + local getent_user=testuser1 465s + local output 465s + getent passwd testuser1 465s The LDAP user is known to the system via getent 465s The LDAP user's private group is known to the system via getent 465s + output=testuser1:*:10001:10001:testuser1:/home/testuser1:/bin/bash 465s + [ -z testuser1:*:10001:10001:testuser1:/home/testuser1:/bin/bash ] 465s + echo The LDAP user's private group is known to the system via getent 465s + check_getent_group testuser1 465s + local getent_group=testuser1 465s + local output 465s + getent group testuser1 465s The LDAP group ldapusers is known to the system via getent 465s + output=testuser1:*:10001:testuser1 465s + [ -z testuser1:*:10001:testuser1 ] 465s + echo The LDAP group ldapusers is known to the system via getent 465s + check_getent_group ldapusers 465s + local getent_group=ldapusers 465s + local output 465s + getent group ldapusers 465s + output=ldapusers:*:10100:testuser1 465s + [ -z ldapusers:*:10100:testuser1 ] 465s + echo The id(1) command can resolve the group membership of the LDAP user 465s The id(1) command can resolve the group membership of the LDAP user 465s + id -Gn testuser1 465s + output=testuser1 ldapusers 465s + [ testuser1 ldapusers != testuser1 ldapusersThe LDAP user can login on a terminal 465s ] 465s + echo The LDAP user can login on a terminal 465s + /usr/bin/expect -f debian/tests/login.exp testuser1 testuser1secret 465s spawn login 465s ldap.example.com login: testuser1 465s Password: 465s Welcome to Ubuntu Noble Numbat (development branch) (GNU/Linux 6.8.0-11-generic s390x) 465s 465s * Documentation: https://help.ubuntu.com 465s * Management: https://landscape.canonical.com 465s * Support: https://ubuntu.com/pro 465s 465s 465s The programs included with the Ubuntu system are free software; 465s the exact distribution terms for each program are described in the 465s individual files in /usr/share/doc/*/copyright. 465s 465s Ubuntu comes with ABSOLUTELY NO WARRANTY, to the extent permitted by 465s applicable law. 465s 465s 465s The programs included with the Ubuntu system are free software; 465s the exact distribution terms for each program are described in the 465s individual files in /usr/share/doc/*/copyright. 465s 465s Ubuntu comes with ABSOLUTELY NO WARRANTY, to the extent permitted by 465s applicable law. 465s 465s Creating directory '/home/testuser1'. 465s [?2004htestuser1@ldap:~$ id -un 465s [?2004l testuser1 465s [?2004htestuser1@ldap:~$ autopkgtest [09:23:32]: test ldap-user-group-ldap-auth: -----------------------] 466s autopkgtest [09:23:33]: test ldap-user-group-ldap-auth: - - - - - - - - - - results - - - - - - - - - - 466s ldap-user-group-ldap-auth PASS 466s autopkgtest [09:23:33]: test ldap-user-group-krb5-auth: preparing testbed 478s Reading package lists... 478s Building dependency tree... 478s Reading state information... 478s Correcting dependencies...Starting pkgProblemResolver with broken count: 0 478s Starting 2 pkgProblemResolver with broken count: 0 478s Done 478s Done 478s Starting pkgProblemResolver with broken count: 0 479s Starting 2 pkgProblemResolver with broken count: 0 479s Done 479s The following additional packages will be installed: 479s krb5-admin-server krb5-config krb5-kdc krb5-user libgssrpc4 479s libkadm5clnt-mit12 libkadm5srv-mit12 libkdb5-10 479s Suggested packages: 479s krb5-kdc-ldap krb5-kpropd krb5-k5tls krb5-doc 479s The following NEW packages will be installed: 479s krb5-admin-server krb5-config krb5-kdc krb5-user libgssrpc4 479s libkadm5clnt-mit12 libkadm5srv-mit12 libkdb5-10 479s 0 upgraded, 8 newly installed, 0 to remove and 0 not upgraded. 479s 1 not fully installed or removed. 479s Need to get 612 kB of archives. 479s After this operation, 2067 kB of additional disk space will be used. 479s Get:1 http://ftpmaster.internal/ubuntu noble/main s390x libgssrpc4 s390x 1.20.1-5build1 [58.9 kB] 479s Get:2 http://ftpmaster.internal/ubuntu noble/main s390x libkadm5clnt-mit12 s390x 1.20.1-5build1 [40.5 kB] 479s Get:3 http://ftpmaster.internal/ubuntu noble/main s390x libkdb5-10 s390x 1.20.1-5build1 [41.4 kB] 479s Get:4 http://ftpmaster.internal/ubuntu noble/main s390x libkadm5srv-mit12 s390x 1.20.1-5build1 [55.2 kB] 479s Get:5 http://ftpmaster.internal/ubuntu noble/universe s390x krb5-user s390x 1.20.1-5build1 [110 kB] 479s Get:6 http://ftpmaster.internal/ubuntu noble/main s390x krb5-config all 2.7 [22.0 kB] 479s Get:7 http://ftpmaster.internal/ubuntu noble/universe s390x krb5-kdc s390x 1.20.1-5build1 [188 kB] 479s Get:8 http://ftpmaster.internal/ubuntu noble/universe s390x krb5-admin-server s390x 1.20.1-5build1 [95.9 kB] 480s Preconfiguring packages ... 481s Fetched 612 kB in 1s (1027 kB/s) 481s Selecting previously unselected package libgssrpc4:s390x. 481s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 53043 files and directories currently installed.) 481s Preparing to unpack .../0-libgssrpc4_1.20.1-5build1_s390x.deb ... 481s Unpacking libgssrpc4:s390x (1.20.1-5build1) ... 481s Selecting previously unselected package libkadm5clnt-mit12:s390x. 481s Preparing to unpack .../1-libkadm5clnt-mit12_1.20.1-5build1_s390x.deb ... 481s Unpacking libkadm5clnt-mit12:s390x (1.20.1-5build1) ... 481s Selecting previously unselected package libkdb5-10:s390x. 481s Preparing to unpack .../2-libkdb5-10_1.20.1-5build1_s390x.deb ... 481s Unpacking libkdb5-10:s390x (1.20.1-5build1) ... 481s Selecting previously unselected package libkadm5srv-mit12:s390x. 481s Preparing to unpack .../3-libkadm5srv-mit12_1.20.1-5build1_s390x.deb ... 481s Unpacking libkadm5srv-mit12:s390x (1.20.1-5build1) ... 481s Selecting previously unselected package krb5-user. 481s Preparing to unpack .../4-krb5-user_1.20.1-5build1_s390x.deb ... 481s Unpacking krb5-user (1.20.1-5build1) ... 481s Selecting previously unselected package krb5-config. 481s Preparing to unpack .../5-krb5-config_2.7_all.deb ... 481s Unpacking krb5-config (2.7) ... 481s Selecting previously unselected package krb5-kdc. 481s Preparing to unpack .../6-krb5-kdc_1.20.1-5build1_s390x.deb ... 481s Unpacking krb5-kdc (1.20.1-5build1) ... 481s Selecting previously unselected package krb5-admin-server. 481s Preparing to unpack .../7-krb5-admin-server_1.20.1-5build1_s390x.deb ... 481s Unpacking krb5-admin-server (1.20.1-5build1) ... 481s Setting up libgssrpc4:s390x (1.20.1-5build1) ... 481s Setting up krb5-config (2.7) ... 481s Setting up libkadm5clnt-mit12:s390x (1.20.1-5build1) ... 481s Setting up libkdb5-10:s390x (1.20.1-5build1) ... 481s Setting up libkadm5srv-mit12:s390x (1.20.1-5build1) ... 481s Setting up krb5-user (1.20.1-5build1) ... 481s update-alternatives: using /usr/bin/kinit.mit to provide /usr/bin/kinit (kinit) in auto mode 481s update-alternatives: using /usr/bin/klist.mit to provide /usr/bin/klist (klist) in auto mode 481s update-alternatives: using /usr/bin/kswitch.mit to provide /usr/bin/kswitch (kswitch) in auto mode 481s update-alternatives: using /usr/bin/ksu.mit to provide /usr/bin/ksu (ksu) in auto mode 481s update-alternatives: using /usr/bin/kpasswd.mit to provide /usr/bin/kpasswd (kpasswd) in auto mode 481s update-alternatives: using /usr/bin/kdestroy.mit to provide /usr/bin/kdestroy (kdestroy) in auto mode 481s update-alternatives: using /usr/bin/kadmin.mit to provide /usr/bin/kadmin (kadmin) in auto mode 481s update-alternatives: using /usr/bin/ktutil.mit to provide /usr/bin/ktutil (ktutil) in auto mode 481s Setting up krb5-kdc (1.20.1-5build1) ... 482s Created symlink /etc/systemd/system/multi-user.target.wants/krb5-kdc.service → /usr/lib/systemd/system/krb5-kdc.service. 482s Could not execute systemctl: at /usr/bin/deb-systemd-invoke line 148. 482s Setting up krb5-admin-server (1.20.1-5build1) ... 483s Created symlink /etc/systemd/system/multi-user.target.wants/krb5-admin-server.service → /usr/lib/systemd/system/krb5-admin-server.service. 483s Setting up autopkgtest-satdep (0) ... 483s Processing triggers for man-db (2.12.0-3) ... 484s Processing triggers for libc-bin (2.39-0ubuntu2) ... 491s (Reading database ... 53136 files and directories currently installed.) 491s Removing autopkgtest-satdep (0) ... 492s autopkgtest [09:23:59]: test ldap-user-group-krb5-auth: [----------------------- 492s + . debian/tests/util 492s + . debian/tests/common-tests 492s + mydomain=example.com 492s + myhostname=ldap.example.com 492s + mysuffix=dc=example,dc=com 492s + myrealm=EXAMPLE.COM 492s + admin_dn=cn=admin,dc=example,dc=com 492s + admin_pw=secret 492s + ldap_user=testuser1 492s + ldap_user_pw=testuser1secret 492s + kerberos_principal_pw=testuser1kerberos 492s + ldap_group=ldapusers 492s + adjust_hostname ldap.example.com 492s + local myhostname=ldap.example.com 492s + echo ldap.example.com 492s + hostname ldap.example.com 492s + grep -qE ldap.example.com /etc/hosts 492s + reconfigure_slapd 492s + debconf-set-selections 492s + rm -rf /var/backups/slapd-2.6.7+dfsg-1~exp1ubuntu1 /var/backups/unknown-2.6.7+dfsg-1~exp1ubuntu1-20240310-092331.ldapdb 492s + dpkg-reconfigure -fnoninteractive -pcritical slapd 493s Backing up /etc/ldap/slapd.d in /var/backups/slapd-2.6.7+dfsg-1~exp1ubuntu1... done. 493s Moving old database directory to /var/backups: 493s - directory unknown... done. 493s Creating initial configuration... done. 493s Creating LDAP directory... done. 493s + generate_certs ldap.example.com 493s + local cn=ldap.example.com 493s + local cert=/etc/ldap/server.pem 493s + local key=/etc/ldap/server.key 493s + local cnf=/etc/ldap/openssl.cnf 493s + cat 493s + openssl req -new -x509 -nodes -out /etc/ldap/server.pem -keyout /etc/ldap/server.key -config /etc/ldap/openssl.cnf 493s .............................++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ 493s ...++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ 493s ----- 493s + chmod 0640 /etc/ldap/server.key 493s + chgrp openldap /etc/ldap/server.key 493s + [ ! -f /etc/ldap/server.pem ] 493s + [ ! -f /etc/ldap/server.key ] 493s + enable_ldap_ssl 493s + cat 493s + cat+ 493s ldapmodify -H ldapi:/// -Y EXTERNAL -Q 493s + populate_ldap_rfc2307 493s + + cat 493s ldapadd -x -D cn=admin,dc=example,dc=com -w secret 493s + create_realm EXAMPLE.COMmodifying entry "cn=config" 493s 493s adding new entry "ou=People,dc=example,dc=com" 493s 493s adding new entry "ou=Group,dc=example,dc=com" 493s 493s adding new entry "uid=testuser1,ou=People,dc=example,dc=com" 493s 493s adding new entry "cn=testuser1,ou=Group,dc=example,dc=com" 493s 493s adding new entry "cn=ldapusers,ou=Group,dc=example,dc=com" 493s 493s Initializing database '/var/lib/krb5kdc/principal' for realm 'EXAMPLE.COM', 493s master key name 'K/M@EXAMPLE.COM' 493s ldap.example.com 493s + local realm_name=EXAMPLE.COM 493s + local kerberos_server=ldap.example.com 493s + rm -rf /var/lib/krb5kdc/* 493s + rm -rf /etc/krb5kdc/kdc.conf 493s + rm -f /etc/krb5.keytab 493s + cat 493s + cat 493s + echo # */admin * 493s + kdb5_util create -s -P secretpassword 493s + systemctl restart krb5-kdc.service krb5-admin-server.service 493s + create_krb_principal testuser1 testuser1kerberos 493s + local principal=testuser1 493s + local password=testuser1kerberos 493s + kadmin.local -q addprinc -pw testuser1kerberos testuser1 493s No policy specified for testuser1@EXAMPLE.COM; defaulting to no policy 493s Authenticating as principal root/admin@EXAMPLE.COM with password. 493s Principal "testuser1@EXAMPLE.COM" created. 493s + configure_sssd_ldap_rfc2307_krb5_auth 493s + cat 493s + chmod 0600 /etc/sssd/sssd.conf 493s + systemctl restart sssd 494s + enable_pam_mkhomedir 494s + grep -qE ^session.*pam_mkhomedir\.so /etc/pam.d/common-session 494s + run_common_tests 494s + echo Assert local user databases do not have our LDAP test data 494s + check_local_user testuser1 494s + local local_user=testuser1 494s Assert local user databases do not have our LDAP test data 494s + grep -q ^testuser1 /etc/passwd 494s + check_local_group testuser1 494s + local local_group=testuser1 494s + grep -q ^testuser1 /etc/group 494s + check_local_group ldapusers 494s + local local_group=ldapusers 494s + grep -q ^ldapusers /etc/group 494s + The LDAP user is known to the system via getent 494s echo The LDAP user is known to the system via getent 494s + check_getent_user testuser1 494s + local getent_user=testuser1 494s + local output 494s + getent passwd testuser1 494s The LDAP user's private group is known to the system via getent 494s + output=testuser1:*:10001:10001:testuser1:/home/testuser1:/bin/bash 494s + [ -z testuser1:*:10001:10001:testuser1:/home/testuser1:/bin/bash ] 494s + echo The LDAP user's private group is known to the system via getent 494s + check_getent_group testuser1 494s + local getent_group=testuser1 494s + local output 494s + getent group testuser1 494s The LDAP group ldapusers is known to the system via getent 494s + output=testuser1:*:10001:testuser1 494s + [ -z testuser1:*:10001:testuser1 ] 494s + echo The LDAP group ldapusers is known to the system via getent 494s + check_getent_group ldapusers 494s + local getent_group=ldapusers 494s + local output 494s + getent group ldapusers 494s The id(1) command can resolve the group membership of the LDAP user 494s + output=ldapusers:*:10100:testuser1 494s + [ -z ldapusers:*:10100:testuser1 ] 494s + echo The id(1) command can resolve the group membership of the LDAP user 494s + id -Gn testuser1 494s + output=testuser1 ldapusers 494s + [ testuser1 ldapusers != testuser1 ldapusers ] 494s + echo The Kerberos principal can login on a terminal 494s The Kerberos principal can login on a terminal 494s + kdestroy 494s + /usr/bin/expect -f debian/tests/login.exp testuser1 testuser1kerberos testuser1@EXAMPLE.COM 494s spawn login 494s ldap.example.com login: testuser1 494s Password: 494s Welcome to Ubuntu Noble Numbat (development branch) (GNU/Linux 6.8.0-11-generic s390x) 494s 494s * Documentation: https://help.ubuntu.com 494s * Management: https://landscape.canonical.com 494s * Support: https://ubuntu.com/pro 494s 494s 494s The programs included with the Ubuntu system are free software; 494s the exact distribution terms for each program are described in the 494s individual files in /usr/share/doc/*/copyright. 494s 494s Ubuntu comes with ABSOLUTELY NO WARRANTY, to the extent permitted by 494s applicable law. 494s 494s Last login: Sun Mar 10 09:23:32 UTC 2024 on pts/0 494s [?2004htestuser1@ldap:~$ id -un 494s [?2004l testuser1 494s [?2004htestuser1@ldap:~$ klist 494s [?2004l Ticket cache: FILE:/tmp/krb5cc_10001_gi6HX2 494s Default principal: testuser1@EXAMPLE.COM 494s autopkgtest [09:24:01]: test ldap-user-group-krb5-auth: -----------------------] 495s autopkgtest [09:24:02]: test ldap-user-group-krb5-auth: - - - - - - - - - - results - - - - - - - - - - 495s ldap-user-group-krb5-auth PASS 495s autopkgtest [09:24:02]: test sssd-softhism2-certificates-tests.sh: preparing testbed 961s autopkgtest [09:31:48]: @@@@@@@@@@@@@@@@@@@@ test bed setup 962s Get:1 http://ftpmaster.internal/ubuntu noble-proposed InRelease [117 kB] 962s Get:2 http://ftpmaster.internal/ubuntu noble-proposed/restricted Sources [3976 B] 962s Get:3 http://ftpmaster.internal/ubuntu noble-proposed/main Sources [433 kB] 963s Get:4 http://ftpmaster.internal/ubuntu noble-proposed/multiverse Sources [37.3 kB] 963s Get:5 http://ftpmaster.internal/ubuntu noble-proposed/universe Sources [2647 kB] 963s Get:6 http://ftpmaster.internal/ubuntu noble-proposed/main s390x Packages [570 kB] 963s Get:7 http://ftpmaster.internal/ubuntu noble-proposed/main s390x c-n-f Metadata [3032 B] 963s Get:8 http://ftpmaster.internal/ubuntu noble-proposed/restricted s390x Packages [1372 B] 963s Get:9 http://ftpmaster.internal/ubuntu noble-proposed/restricted s390x c-n-f Metadata [116 B] 963s Get:10 http://ftpmaster.internal/ubuntu noble-proposed/universe s390x Packages [2822 kB] 964s Get:11 http://ftpmaster.internal/ubuntu noble-proposed/universe s390x c-n-f Metadata [7292 B] 964s Get:12 http://ftpmaster.internal/ubuntu noble-proposed/multiverse s390x Packages [24.2 kB] 964s Get:13 http://ftpmaster.internal/ubuntu noble-proposed/multiverse s390x c-n-f Metadata [116 B] 965s Fetched 6666 kB in 2s (2713 kB/s) 965s Reading package lists... 969s Reading package lists... 969s Building dependency tree... 969s Reading state information... 970s Calculating upgrade... 970s The following packages will be REMOVED: 970s libglib2.0-0 970s The following NEW packages will be installed: 970s libglib2.0-0t64 xdg-user-dirs 970s The following packages will be upgraded: 970s dbus dbus-bin dbus-daemon dbus-session-bus-common dbus-system-bus-common 970s dbus-user-session gir1.2-glib-2.0 libdbus-1-3 libglib2.0-data python3-attr 970s 10 upgraded, 2 newly installed, 1 to remove and 0 not upgraded. 970s Need to get 2428 kB of archives. 970s After this operation, 159 kB of additional disk space will be used. 970s Get:1 http://ftpmaster.internal/ubuntu noble-proposed/main s390x gir1.2-glib-2.0 s390x 2.79.3-3ubuntu3 [180 kB] 970s Get:2 http://ftpmaster.internal/ubuntu noble-proposed/main s390x libglib2.0-0t64 s390x 2.79.3-3ubuntu3 [1566 kB] 971s Get:3 http://ftpmaster.internal/ubuntu noble-proposed/main s390x dbus-session-bus-common all 1.14.10-4ubuntu2 [80.3 kB] 971s Get:4 http://ftpmaster.internal/ubuntu noble-proposed/main s390x dbus-user-session s390x 1.14.10-4ubuntu2 [9960 B] 971s Get:5 http://ftpmaster.internal/ubuntu noble-proposed/main s390x dbus-daemon s390x 1.14.10-4ubuntu2 [118 kB] 971s Get:6 http://ftpmaster.internal/ubuntu noble-proposed/main s390x dbus-bin s390x 1.14.10-4ubuntu2 [41.4 kB] 971s Get:7 http://ftpmaster.internal/ubuntu noble-proposed/main s390x dbus-system-bus-common all 1.14.10-4ubuntu2 [81.5 kB] 971s Get:8 http://ftpmaster.internal/ubuntu noble-proposed/main s390x dbus s390x 1.14.10-4ubuntu2 [24.3 kB] 971s Get:9 http://ftpmaster.internal/ubuntu noble-proposed/main s390x libdbus-1-3 s390x 1.14.10-4ubuntu2 [213 kB] 971s Get:10 http://ftpmaster.internal/ubuntu noble-proposed/main s390x libglib2.0-data all 2.79.3-3ubuntu3 [46.6 kB] 971s Get:11 http://ftpmaster.internal/ubuntu noble/main s390x xdg-user-dirs s390x 0.18-1 [18.5 kB] 971s Get:12 http://ftpmaster.internal/ubuntu noble/main s390x python3-attr all 23.2.0-2 [48.6 kB] 971s Fetched 2428 kB in 1s (2615 kB/s) 971s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 52188 files and directories currently installed.) 971s Preparing to unpack .../gir1.2-glib-2.0_2.79.3-3ubuntu3_s390x.deb ... 971s Unpacking gir1.2-glib-2.0:s390x (2.79.3-3ubuntu3) over (2.79.2-1~ubuntu1) ... 971s dpkg: libglib2.0-0:s390x: dependency problems, but removing anyway as you requested: 971s udisks2 depends on libglib2.0-0 (>= 2.77.0). 971s shared-mime-info depends on libglib2.0-0 (>= 2.75.3). 971s s390-tools depends on libglib2.0-0 (>= 2.77.0). 971s python3-gi depends on libglib2.0-0 (>= 2.77.0). 971s python3-dbus depends on libglib2.0-0 (>= 2.16.0). 971s netplan.io depends on libglib2.0-0 (>= 2.70.0). 971s netplan-generator depends on libglib2.0-0 (>= 2.70.0). 971s libxmlb2:s390x depends on libglib2.0-0 (>= 2.54.0). 971s libvolume-key1:s390x depends on libglib2.0-0 (>= 2.18.0). 971s libudisks2-0:s390x depends on libglib2.0-0 (>= 2.75.3). 971s libqrtr-glib0:s390x depends on libglib2.0-0 (>= 2.56). 971s libqmi-proxy depends on libglib2.0-0 (>= 2.30.0). 971s libqmi-glib5:s390x depends on libglib2.0-0 (>= 2.54.0). 971s libpolkit-gobject-1-0:s390x depends on libglib2.0-0 (>= 2.38.0). 971s libpolkit-agent-1-0:s390x depends on libglib2.0-0 (>= 2.38.0). 971s libnetplan0:s390x depends on libglib2.0-0 (>= 2.75.3). 971s libmm-glib0:s390x depends on libglib2.0-0 (>= 2.62.0). 971s libmbim-proxy depends on libglib2.0-0 (>= 2.56). 971s libmbim-glib4:s390x depends on libglib2.0-0 (>= 2.56). 971s libjson-glib-1.0-0:s390x depends on libglib2.0-0 (>= 2.75.3). 971s libjcat1:s390x depends on libglib2.0-0 (>= 2.75.3). 971s libgusb2:s390x depends on libglib2.0-0 (>= 2.75.3). 971s libgudev-1.0-0:s390x depends on libglib2.0-0 (>= 2.38.0). 971s libgirepository-1.0-1:s390x depends on libglib2.0-0 (>= 2.79.0). 971s libfwupd2:s390x depends on libglib2.0-0 (>= 2.79.0). 971s libblockdev3:s390x depends on libglib2.0-0 (>= 2.42.2). 971s libblockdev-utils3:s390x depends on libglib2.0-0 (>= 2.75.3). 971s libblockdev-swap3:s390x depends on libglib2.0-0 (>= 2.42.2). 971s libblockdev-part3:s390x depends on libglib2.0-0 (>= 2.42.2). 971s libblockdev-nvme3:s390x depends on libglib2.0-0 (>= 2.42.2). 971s libblockdev-mdraid3:s390x depends on libglib2.0-0 (>= 2.42.2). 971s libblockdev-loop3:s390x depends on libglib2.0-0 (>= 2.42.2). 971s libblockdev-fs3:s390x depends on libglib2.0-0 (>= 2.42.2). 971s libblockdev-crypto3:s390x depends on libglib2.0-0 (>= 2.42.2). 971s fwupd depends on libglib2.0-0 (>= 2.79.0). 971s bolt depends on libglib2.0-0 (>= 2.56.0). 971s 971s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 52188 files and directories currently installed.) 971s Removing libglib2.0-0:s390x (2.79.2-1~ubuntu1) ... 971s Selecting previously unselected package libglib2.0-0t64:s390x. 971s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 52163 files and directories currently installed.) 971s Preparing to unpack .../00-libglib2.0-0t64_2.79.3-3ubuntu3_s390x.deb ... 971s libglib2.0-0t64.preinst: Removing /var/lib/dpkg/info/libglib2.0-0:s390x.postrm to avoid loss of /usr/share/glib-2.0/schemas/gschemas.compiled... 971s removed '/var/lib/dpkg/info/libglib2.0-0:s390x.postrm' 971s Unpacking libglib2.0-0t64:s390x (2.79.3-3ubuntu3) ... 971s Preparing to unpack .../01-dbus-session-bus-common_1.14.10-4ubuntu2_all.deb ... 971s Unpacking dbus-session-bus-common (1.14.10-4ubuntu2) over (1.14.10-4ubuntu1) ... 971s Preparing to unpack .../02-dbus-user-session_1.14.10-4ubuntu2_s390x.deb ... 971s Unpacking dbus-user-session (1.14.10-4ubuntu2) over (1.14.10-4ubuntu1) ... 971s Preparing to unpack .../03-dbus-daemon_1.14.10-4ubuntu2_s390x.deb ... 971s Unpacking dbus-daemon (1.14.10-4ubuntu2) over (1.14.10-4ubuntu1) ... 971s Preparing to unpack .../04-dbus-bin_1.14.10-4ubuntu2_s390x.deb ... 971s Unpacking dbus-bin (1.14.10-4ubuntu2) over (1.14.10-4ubuntu1) ... 971s Preparing to unpack .../05-dbus-system-bus-common_1.14.10-4ubuntu2_all.deb ... 971s Unpacking dbus-system-bus-common (1.14.10-4ubuntu2) over (1.14.10-4ubuntu1) ... 971s Preparing to unpack .../06-dbus_1.14.10-4ubuntu2_s390x.deb ... 971s Unpacking dbus (1.14.10-4ubuntu2) over (1.14.10-4ubuntu1) ... 971s Preparing to unpack .../07-libdbus-1-3_1.14.10-4ubuntu2_s390x.deb ... 971s Unpacking libdbus-1-3:s390x (1.14.10-4ubuntu2) over (1.14.10-4ubuntu1) ... 971s Preparing to unpack .../08-libglib2.0-data_2.79.3-3ubuntu3_all.deb ... 971s Unpacking libglib2.0-data (2.79.3-3ubuntu3) over (2.79.2-1~ubuntu1) ... 971s Selecting previously unselected package xdg-user-dirs. 971s Preparing to unpack .../09-xdg-user-dirs_0.18-1_s390x.deb ... 971s Unpacking xdg-user-dirs (0.18-1) ... 971s Preparing to unpack .../10-python3-attr_23.2.0-2_all.deb ... 972s Unpacking python3-attr (23.2.0-2) over (23.2.0-1) ... 972s Setting up python3-attr (23.2.0-2) ... 972s Setting up xdg-user-dirs (0.18-1) ... 972s Setting up libglib2.0-0t64:s390x (2.79.3-3ubuntu3) ... 972s No schema files found: doing nothing. 972s Setting up libglib2.0-data (2.79.3-3ubuntu3) ... 972s Setting up libdbus-1-3:s390x (1.14.10-4ubuntu2) ... 972s Setting up gir1.2-glib-2.0:s390x (2.79.3-3ubuntu3) ... 972s Setting up dbus-session-bus-common (1.14.10-4ubuntu2) ... 972s Setting up dbus-system-bus-common (1.14.10-4ubuntu2) ... 972s Setting up dbus-bin (1.14.10-4ubuntu2) ... 972s Setting up dbus-daemon (1.14.10-4ubuntu2) ... 972s Setting up dbus-user-session (1.14.10-4ubuntu2) ... 972s Setting up dbus (1.14.10-4ubuntu2) ... 972s A reboot is required to replace the running dbus-daemon. 972s Please reboot the system when convenient. 972s Processing triggers for man-db (2.12.0-3) ... 973s Processing triggers for libc-bin (2.39-0ubuntu2) ... 973s W: Target Packages (main/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 973s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 973s W: Target CNF (main/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 973s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 973s W: Target Packages (universe/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 973s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 973s W: Target CNF (universe/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 973s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 973s W: Target Packages (restricted/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 973s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 973s Reading package lists...W: Target CNF (restricted/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 973s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 973s W: Target Packages (multiverse/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 973s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 973s W: Target CNF (multiverse/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 973s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 973s W: Target Packages (main/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 973s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 973s W: Target CNF (main/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 973s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 973s W: Target Packages (universe/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 973s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 973s W: Target CNF (universe/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 973s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 973s W: Target Packages (restricted/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 973s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 973s W: Target CNF (restricted/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 973s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 973s W: Target Packages (multiverse/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 973s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 973s W: Target CNF (multiverse/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 973s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 973s W: Target Packages (main/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 973s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 973s W: Target CNF (main/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 973s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 973s W: Target Packages (universe/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 973s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 973s W: Target CNF (universe/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 973s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 973s W: Target Packages (restricted/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 973s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 973s W: Target CNF (restricted/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 973s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 973s W: Target Packages (multiverse/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 973s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 973s W: Target CNF (multiverse/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 973s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 973s 973s Building dependency tree... 973s Reading state information... 973s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 974s Unknown architecture, assuming PC-style ttyS0 974s sh: Attempting to set up Debian/Ubuntu apt sources automatically 974s sh: Distribution appears to be Ubuntu 977s Reading package lists... 977s Building dependency tree... 977s Reading state information... 977s eatmydata is already the newest version (131-1). 977s dbus is already the newest version (1.14.10-4ubuntu2). 977s dbus set to manually installed. 977s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 977s W: Target Packages (main/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 977s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 977s W: Target CNF (main/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 977s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 977s W: Target Packages (universe/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 977s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 977s W: Target CNF (universe/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 977s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 977s W: Target Packages (restricted/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 977s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 977s W: Target CNF (restricted/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 977s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 977s W: Target Packages (multiverse/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 977s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 977s W: Target CNF (multiverse/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 977s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 977s W: Target Packages (main/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 977s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 977s W: Target CNF (main/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 977s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 977s W: Target Packages (universe/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 977s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 977s W: Target CNF (universe/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 977s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 977s W: Target Packages (restricted/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 977s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 977s W: Target CNF (restricted/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 977s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 977s W: Target Packages (multiverse/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 977s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 977s W: Target CNF (multiverse/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 977s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 977s W: Target Packages (main/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 977s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 977s W: Target CNF (main/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 977s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 977s W: Target Packages (universe/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 977s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 977s W: Target CNF (universe/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 977s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 977s W: Target Packages (restricted/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 977s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 977s W: Target CNF (restricted/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 977s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 977s W: Target Packages (multiverse/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 977s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 977s W: Target CNF (multiverse/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 977s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 977s Reading package lists... 977s Building dependency tree... 977s Reading state information... 977s rng-tools-debian is already the newest version (2.4). 977s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 977s Reading package lists... 978s Building dependency tree... 978s Reading state information... 978s haveged is already the newest version (1.9.14-1ubuntu1). 978s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 978s Reading package lists... 978s Building dependency tree... 978s Reading state information... 978s The following packages will be REMOVED: 978s cloud-init* python3-configobj* python3-debconf* 978s 0 upgraded, 0 newly installed, 3 to remove and 0 not upgraded. 978s After this operation, 3248 kB disk space will be freed. 978s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 52202 files and directories currently installed.) 978s Removing cloud-init (24.1-0ubuntu1) ... 979s Removing python3-configobj (5.0.8-3) ... 979s Removing python3-debconf (1.5.86) ... 979s Processing triggers for man-db (2.12.0-3) ... 981s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 51813 files and directories currently installed.) 981s Purging configuration files for cloud-init (24.1-0ubuntu1) ... 981s dpkg: warning: while removing cloud-init, directory '/etc/cloud/cloud.cfg.d' not empty so not removed 981s Processing triggers for rsyslog (8.2312.0-3ubuntu3) ... 981s Reading package lists... 981s Building dependency tree... 981s Reading state information... 981s linux-generic is already the newest version (6.8.0-11.11+1). 981s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 981s Hit:1 http://ftpmaster.internal/ubuntu noble InRelease 981s Hit:2 http://ftpmaster.internal/ubuntu noble-updates InRelease 981s Hit:3 http://ftpmaster.internal/ubuntu noble-security InRelease 981s Hit:4 http://ftpmaster.internal/ubuntu noble-proposed InRelease 981s Hit:5 http://ftpmaster.internal/ubuntu noble-backports InRelease 984s Reading package lists... 984s W: Target Packages (main/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 984s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 984s W: Target CNF (main/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 984s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 984s W: Target Packages (universe/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 984s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 984s W: Target CNF (universe/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 984s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 984s W: Target Packages (restricted/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 984s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 984s W: Target CNF (restricted/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 985s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 985s W: Target Packages (multiverse/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 985s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 985s W: Target CNF (multiverse/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 985s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 985s W: Target Packages (main/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 985s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 985s W: Target CNF (main/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 985s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 985s W: Target Packages (universe/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 985s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 985s W: Target CNF (universe/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 985s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 985s W: Target Packages (restricted/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 985s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 985s W: Target CNF (restricted/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 985s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 985s W: Target Packages (multiverse/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 985s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 985s W: Target CNF (multiverse/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 985s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 985s W: Target Packages (main/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 985s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 985s W: Target CNF (main/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 985s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 985s W: Target Packages (universe/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 985s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 985s W: Target CNF (universe/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 985s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 985s W: Target Packages (restricted/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 985s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 985s W: Target CNF (restricted/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 985s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 985s W: Target Packages (multiverse/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 985s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 985s W: Target CNF (multiverse/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 985s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 985s W: Target Packages (main/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 985s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 985s W: Target CNF (main/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 985s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 985s W: Target Packages (universe/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 985s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 985s W: Target CNF (universe/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 985s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 985s W: Target Packages (restricted/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 985s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 985s W: Target CNF (restricted/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 985s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 985s W: Target Packages (multiverse/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 985s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 985s W: Target CNF (multiverse/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 985s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 985s W: Target Packages (main/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 985s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 985s W: Target CNF (main/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 985s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 985s W: Target Packages (universe/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 985s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 985s W: Target CNF (universe/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 985s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 985s W: Target Packages (restricted/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 985s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 985s W: Target CNF (restricted/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 985s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 985s W: Target Packages (multiverse/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 985s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 985s W: Target CNF (multiverse/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 985s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 985s W: Target Packages (main/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 985s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 985s W: Target CNF (main/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 985s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 985s W: Target Packages (universe/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 985s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 985s W: Target CNF (universe/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 985s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 985s W: Target Packages (restricted/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 985s W: Reading package lists...Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 985s W: Target CNF (restricted/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 985s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 985s W: Target Packages (multiverse/binary-s390x/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 985s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 985s W: Target CNF (multiverse/cnf/Commands-s390x) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 985s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 985s 985s Building dependency tree... 985s Reading state information... 985s Calculating upgrade... 985s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 985s Reading package lists... 985s Building dependency tree... 985s Reading state information... 985s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 986s autopkgtest [09:32:13]: rebooting testbed after setup commands that affected boot 999s autopkgtest [09:32:26]: testbed dpkg architecture: s390x 1003s Reading package lists... 1003s Building dependency tree... 1003s Reading state information... 1003s Correcting dependencies...Starting pkgProblemResolver with broken count: 0 1003s Starting 2 pkgProblemResolver with broken count: 0 1003s Done 1003s Done 1004s Starting pkgProblemResolver with broken count: 0 1004s Starting 2 pkgProblemResolver with broken count: 0 1004s Done 1004s The following additional packages will be installed: 1004s gnutls-bin libavahi-client3 libavahi-common-data libavahi-common3 1004s libbasicobjects0 libc-ares2 libcollection4 libcrack2 libdhash1 1004s libevent-2.1-7 libgnutls-dane0 libini-config5 libipa-hbac0 libldb2 1004s libnfsidmap1 libnss-sss libpam-pwquality libpam-sss libpath-utils1 1004s libpwquality-common libpwquality1 libref-array1 libsmbclient libsofthsm2 1004s libsss-certmap0 libsss-idmap0 libsss-nss-idmap0 libtalloc2 libtdb1 1004s libtevent0 libunbound8 libwbclient0 python3-sss samba-libs softhsm2 1004s softhsm2-common sssd sssd-ad sssd-ad-common sssd-common sssd-ipa sssd-krb5 1004s sssd-krb5-common sssd-ldap sssd-proxy 1004s Suggested packages: 1004s dns-root-data adcli libsss-sudo sssd-tools libsasl2-modules-ldap 1004s Recommended packages: 1004s cracklib-runtime libsasl2-modules-gssapi-mit 1004s | libsasl2-modules-gssapi-heimdal ldap-utils 1004s The following NEW packages will be installed: 1004s gnutls-bin libavahi-client3 libavahi-common-data libavahi-common3 1004s libbasicobjects0 libc-ares2 libcollection4 libcrack2 libdhash1 1004s libevent-2.1-7 libgnutls-dane0 libini-config5 libipa-hbac0 libldb2 1004s libnfsidmap1 libnss-sss libpam-pwquality libpam-sss libpath-utils1 1004s libpwquality-common libpwquality1 libref-array1 libsmbclient libsofthsm2 1004s libsss-certmap0 libsss-idmap0 libsss-nss-idmap0 libtalloc2 libtdb1 1004s libtevent0 libunbound8 libwbclient0 python3-sss samba-libs softhsm2 1004s softhsm2-common sssd sssd-ad sssd-ad-common sssd-common sssd-ipa sssd-krb5 1004s sssd-krb5-common sssd-ldap sssd-proxy 1004s 0 upgraded, 45 newly installed, 0 to remove and 0 not upgraded. 1004s 1 not fully installed or removed. 1004s Need to get 10.4 MB of archives. 1004s After this operation, 40.5 MB of additional disk space will be used. 1004s Get:1 http://ftpmaster.internal/ubuntu noble/main s390x libevent-2.1-7 s390x 2.1.12-stable-9 [144 kB] 1004s Get:2 http://ftpmaster.internal/ubuntu noble/main s390x libunbound8 s390x 1.19.1-1ubuntu1 [453 kB] 1005s Get:3 http://ftpmaster.internal/ubuntu noble/main s390x libgnutls-dane0 s390x 3.8.3-1ubuntu1 [23.6 kB] 1005s Get:4 http://ftpmaster.internal/ubuntu noble/universe s390x gnutls-bin s390x 3.8.3-1ubuntu1 [284 kB] 1005s Get:5 http://ftpmaster.internal/ubuntu noble/universe s390x softhsm2-common s390x 2.6.1-2.2 [5808 B] 1005s Get:6 http://ftpmaster.internal/ubuntu noble/universe s390x libsofthsm2 s390x 2.6.1-2.2 [265 kB] 1005s Get:7 http://ftpmaster.internal/ubuntu noble/universe s390x softhsm2 s390x 2.6.1-2.2 [174 kB] 1005s Get:8 http://ftpmaster.internal/ubuntu noble/main s390x libtalloc2 s390x 2.4.2-1 [28.3 kB] 1005s Get:9 http://ftpmaster.internal/ubuntu noble/main s390x libtdb1 s390x 1.4.10-1 [49.9 kB] 1005s Get:10 http://ftpmaster.internal/ubuntu noble/main s390x libtevent0 s390x 0.16.1-1 [43.1 kB] 1005s Get:11 http://ftpmaster.internal/ubuntu noble/main s390x libldb2 s390x 2:2.8.0+samba4.19.5+dfsg-1ubuntu1 [191 kB] 1005s Get:12 http://ftpmaster.internal/ubuntu noble/main s390x python3-sss s390x 2.9.4-1ubuntu1 [46.6 kB] 1005s Get:13 http://ftpmaster.internal/ubuntu noble/main s390x libsss-idmap0 s390x 2.9.4-1ubuntu1 [22.1 kB] 1005s Get:14 http://ftpmaster.internal/ubuntu noble/main s390x libnss-sss s390x 2.9.4-1ubuntu1 [32.6 kB] 1005s Get:15 http://ftpmaster.internal/ubuntu noble/main s390x libcrack2 s390x 2.9.6-5.1 [29.6 kB] 1005s Get:16 http://ftpmaster.internal/ubuntu noble/main s390x libpwquality-common all 1.4.5-3 [7658 B] 1005s Get:17 http://ftpmaster.internal/ubuntu noble/main s390x libpwquality1 s390x 1.4.5-3 [14.7 kB] 1005s Get:18 http://ftpmaster.internal/ubuntu noble/main s390x libpam-pwquality s390x 1.4.5-3 [11.6 kB] 1005s Get:19 http://ftpmaster.internal/ubuntu noble/main s390x libpam-sss s390x 2.9.4-1ubuntu1 [51.9 kB] 1005s Get:20 http://ftpmaster.internal/ubuntu noble/main s390x libc-ares2 s390x 1.27.0-1 [79.2 kB] 1005s Get:21 http://ftpmaster.internal/ubuntu noble/main s390x libdhash1 s390x 0.6.2-2 [8648 B] 1005s Get:22 http://ftpmaster.internal/ubuntu noble/main s390x libbasicobjects0 s390x 0.6.2-2 [5476 B] 1005s Get:23 http://ftpmaster.internal/ubuntu noble/main s390x libcollection4 s390x 0.6.2-2 [23.2 kB] 1005s Get:24 http://ftpmaster.internal/ubuntu noble/main s390x libpath-utils1 s390x 0.6.2-2 [8994 B] 1005s Get:25 http://ftpmaster.internal/ubuntu noble/main s390x libref-array1 s390x 0.6.2-2 [6880 B] 1005s Get:26 http://ftpmaster.internal/ubuntu noble/main s390x libini-config5 s390x 0.6.2-2 [45.3 kB] 1005s Get:27 http://ftpmaster.internal/ubuntu noble/main s390x libnfsidmap1 s390x 1:2.6.3-3ubuntu1 [49.0 kB] 1005s Get:28 http://ftpmaster.internal/ubuntu noble/main s390x libsss-certmap0 s390x 2.9.4-1ubuntu1 [46.7 kB] 1006s Get:29 http://ftpmaster.internal/ubuntu noble/main s390x libsss-nss-idmap0 s390x 2.9.4-1ubuntu1 [31.4 kB] 1006s Get:30 http://ftpmaster.internal/ubuntu noble/main s390x sssd-common s390x 2.9.4-1ubuntu1 [1125 kB] 1006s Get:31 http://ftpmaster.internal/ubuntu noble/main s390x libavahi-common-data s390x 0.8-13ubuntu2 [29.5 kB] 1006s Get:32 http://ftpmaster.internal/ubuntu noble/main s390x libavahi-common3 s390x 0.8-13ubuntu2 [23.8 kB] 1006s Get:33 http://ftpmaster.internal/ubuntu noble/main s390x libavahi-client3 s390x 0.8-13ubuntu2 [26.7 kB] 1006s Get:34 http://ftpmaster.internal/ubuntu noble/main s390x libwbclient0 s390x 2:4.19.5+dfsg-1ubuntu1 [70.3 kB] 1006s Get:35 http://ftpmaster.internal/ubuntu noble/main s390x samba-libs s390x 2:4.19.5+dfsg-1ubuntu1 [6231 kB] 1007s Get:36 http://ftpmaster.internal/ubuntu noble/main s390x sssd-ad-common s390x 2.9.4-1ubuntu1 [74.8 kB] 1007s Get:37 http://ftpmaster.internal/ubuntu noble/main s390x sssd-krb5-common s390x 2.9.4-1ubuntu1 [90.3 kB] 1007s Get:38 http://ftpmaster.internal/ubuntu noble/main s390x libsmbclient s390x 2:4.19.5+dfsg-1ubuntu1 [65.1 kB] 1007s Get:39 http://ftpmaster.internal/ubuntu noble/main s390x sssd-ad s390x 2.9.4-1ubuntu1 [133 kB] 1007s Get:40 http://ftpmaster.internal/ubuntu noble/main s390x libipa-hbac0 s390x 2.9.4-1ubuntu1 [16.8 kB] 1007s Get:41 http://ftpmaster.internal/ubuntu noble/main s390x sssd-ipa s390x 2.9.4-1ubuntu1 [215 kB] 1007s Get:42 http://ftpmaster.internal/ubuntu noble/main s390x sssd-krb5 s390x 2.9.4-1ubuntu1 [14.4 kB] 1007s Get:43 http://ftpmaster.internal/ubuntu noble/main s390x sssd-ldap s390x 2.9.4-1ubuntu1 [31.0 kB] 1007s Get:44 http://ftpmaster.internal/ubuntu noble/main s390x sssd-proxy s390x 2.9.4-1ubuntu1 [43.9 kB] 1007s Get:45 http://ftpmaster.internal/ubuntu noble/main s390x sssd s390x 2.9.4-1ubuntu1 [4120 B] 1008s Fetched 10.4 MB in 3s (3132 kB/s) 1008s Selecting previously unselected package libevent-2.1-7:s390x. 1008s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 51758 files and directories currently installed.) 1008s Preparing to unpack .../00-libevent-2.1-7_2.1.12-stable-9_s390x.deb ... 1008s Unpacking libevent-2.1-7:s390x (2.1.12-stable-9) ... 1008s Selecting previously unselected package libunbound8:s390x. 1008s Preparing to unpack .../01-libunbound8_1.19.1-1ubuntu1_s390x.deb ... 1008s Unpacking libunbound8:s390x (1.19.1-1ubuntu1) ... 1008s Selecting previously unselected package libgnutls-dane0:s390x. 1008s Preparing to unpack .../02-libgnutls-dane0_3.8.3-1ubuntu1_s390x.deb ... 1008s Unpacking libgnutls-dane0:s390x (3.8.3-1ubuntu1) ... 1008s Selecting previously unselected package gnutls-bin. 1008s Preparing to unpack .../03-gnutls-bin_3.8.3-1ubuntu1_s390x.deb ... 1008s Unpacking gnutls-bin (3.8.3-1ubuntu1) ... 1008s Selecting previously unselected package softhsm2-common. 1008s Preparing to unpack .../04-softhsm2-common_2.6.1-2.2_s390x.deb ... 1008s Unpacking softhsm2-common (2.6.1-2.2) ... 1008s Selecting previously unselected package libsofthsm2. 1008s Preparing to unpack .../05-libsofthsm2_2.6.1-2.2_s390x.deb ... 1008s Unpacking libsofthsm2 (2.6.1-2.2) ... 1008s Selecting previously unselected package softhsm2. 1008s Preparing to unpack .../06-softhsm2_2.6.1-2.2_s390x.deb ... 1008s Unpacking softhsm2 (2.6.1-2.2) ... 1008s Selecting previously unselected package libtalloc2:s390x. 1008s Preparing to unpack .../07-libtalloc2_2.4.2-1_s390x.deb ... 1008s Unpacking libtalloc2:s390x (2.4.2-1) ... 1008s Selecting previously unselected package libtdb1:s390x. 1008s Preparing to unpack .../08-libtdb1_1.4.10-1_s390x.deb ... 1008s Unpacking libtdb1:s390x (1.4.10-1) ... 1008s Selecting previously unselected package libtevent0:s390x. 1008s Preparing to unpack .../09-libtevent0_0.16.1-1_s390x.deb ... 1008s Unpacking libtevent0:s390x (0.16.1-1) ... 1008s Selecting previously unselected package libldb2:s390x. 1008s Preparing to unpack .../10-libldb2_2%3a2.8.0+samba4.19.5+dfsg-1ubuntu1_s390x.deb ... 1008s Unpacking libldb2:s390x (2:2.8.0+samba4.19.5+dfsg-1ubuntu1) ... 1008s Selecting previously unselected package python3-sss. 1008s Preparing to unpack .../11-python3-sss_2.9.4-1ubuntu1_s390x.deb ... 1008s Unpacking python3-sss (2.9.4-1ubuntu1) ... 1008s Selecting previously unselected package libsss-idmap0. 1008s Preparing to unpack .../12-libsss-idmap0_2.9.4-1ubuntu1_s390x.deb ... 1008s Unpacking libsss-idmap0 (2.9.4-1ubuntu1) ... 1008s Selecting previously unselected package libnss-sss:s390x. 1008s Preparing to unpack .../13-libnss-sss_2.9.4-1ubuntu1_s390x.deb ... 1008s Unpacking libnss-sss:s390x (2.9.4-1ubuntu1) ... 1008s Selecting previously unselected package libcrack2:s390x. 1008s Preparing to unpack .../14-libcrack2_2.9.6-5.1_s390x.deb ... 1008s Unpacking libcrack2:s390x (2.9.6-5.1) ... 1008s Selecting previously unselected package libpwquality-common. 1008s Preparing to unpack .../15-libpwquality-common_1.4.5-3_all.deb ... 1008s Unpacking libpwquality-common (1.4.5-3) ... 1008s Selecting previously unselected package libpwquality1:s390x. 1008s Preparing to unpack .../16-libpwquality1_1.4.5-3_s390x.deb ... 1008s Unpacking libpwquality1:s390x (1.4.5-3) ... 1008s Selecting previously unselected package libpam-pwquality:s390x. 1008s Preparing to unpack .../17-libpam-pwquality_1.4.5-3_s390x.deb ... 1008s Unpacking libpam-pwquality:s390x (1.4.5-3) ... 1008s Selecting previously unselected package libpam-sss:s390x. 1008s Preparing to unpack .../18-libpam-sss_2.9.4-1ubuntu1_s390x.deb ... 1008s Unpacking libpam-sss:s390x (2.9.4-1ubuntu1) ... 1008s Selecting previously unselected package libc-ares2:s390x. 1008s Preparing to unpack .../19-libc-ares2_1.27.0-1_s390x.deb ... 1008s Unpacking libc-ares2:s390x (1.27.0-1) ... 1008s Selecting previously unselected package libdhash1:s390x. 1008s Preparing to unpack .../20-libdhash1_0.6.2-2_s390x.deb ... 1008s Unpacking libdhash1:s390x (0.6.2-2) ... 1008s Selecting previously unselected package libbasicobjects0:s390x. 1008s Preparing to unpack .../21-libbasicobjects0_0.6.2-2_s390x.deb ... 1008s Unpacking libbasicobjects0:s390x (0.6.2-2) ... 1008s Selecting previously unselected package libcollection4:s390x. 1008s Preparing to unpack .../22-libcollection4_0.6.2-2_s390x.deb ... 1008s Unpacking libcollection4:s390x (0.6.2-2) ... 1008s Selecting previously unselected package libpath-utils1:s390x. 1008s Preparing to unpack .../23-libpath-utils1_0.6.2-2_s390x.deb ... 1008s Unpacking libpath-utils1:s390x (0.6.2-2) ... 1008s Selecting previously unselected package libref-array1:s390x. 1008s Preparing to unpack .../24-libref-array1_0.6.2-2_s390x.deb ... 1008s Unpacking libref-array1:s390x (0.6.2-2) ... 1008s Selecting previously unselected package libini-config5:s390x. 1008s Preparing to unpack .../25-libini-config5_0.6.2-2_s390x.deb ... 1008s Unpacking libini-config5:s390x (0.6.2-2) ... 1008s Selecting previously unselected package libnfsidmap1:s390x. 1008s Preparing to unpack .../26-libnfsidmap1_1%3a2.6.3-3ubuntu1_s390x.deb ... 1008s Unpacking libnfsidmap1:s390x (1:2.6.3-3ubuntu1) ... 1008s Selecting previously unselected package libsss-certmap0. 1008s Preparing to unpack .../27-libsss-certmap0_2.9.4-1ubuntu1_s390x.deb ... 1008s Unpacking libsss-certmap0 (2.9.4-1ubuntu1) ... 1008s Selecting previously unselected package libsss-nss-idmap0. 1008s Preparing to unpack .../28-libsss-nss-idmap0_2.9.4-1ubuntu1_s390x.deb ... 1008s Unpacking libsss-nss-idmap0 (2.9.4-1ubuntu1) ... 1008s Selecting previously unselected package sssd-common. 1008s Preparing to unpack .../29-sssd-common_2.9.4-1ubuntu1_s390x.deb ... 1008s Unpacking sssd-common (2.9.4-1ubuntu1) ... 1008s Selecting previously unselected package libavahi-common-data:s390x. 1008s Preparing to unpack .../30-libavahi-common-data_0.8-13ubuntu2_s390x.deb ... 1008s Unpacking libavahi-common-data:s390x (0.8-13ubuntu2) ... 1008s Selecting previously unselected package libavahi-common3:s390x. 1008s Preparing to unpack .../31-libavahi-common3_0.8-13ubuntu2_s390x.deb ... 1008s Unpacking libavahi-common3:s390x (0.8-13ubuntu2) ... 1008s Selecting previously unselected package libavahi-client3:s390x. 1008s Preparing to unpack .../32-libavahi-client3_0.8-13ubuntu2_s390x.deb ... 1008s Unpacking libavahi-client3:s390x (0.8-13ubuntu2) ... 1008s Selecting previously unselected package libwbclient0:s390x. 1008s Preparing to unpack .../33-libwbclient0_2%3a4.19.5+dfsg-1ubuntu1_s390x.deb ... 1008s Unpacking libwbclient0:s390x (2:4.19.5+dfsg-1ubuntu1) ... 1008s Selecting previously unselected package samba-libs:s390x. 1008s Preparing to unpack .../34-samba-libs_2%3a4.19.5+dfsg-1ubuntu1_s390x.deb ... 1008s Unpacking samba-libs:s390x (2:4.19.5+dfsg-1ubuntu1) ... 1008s Selecting previously unselected package sssd-ad-common. 1008s Preparing to unpack .../35-sssd-ad-common_2.9.4-1ubuntu1_s390x.deb ... 1008s Unpacking sssd-ad-common (2.9.4-1ubuntu1) ... 1008s Selecting previously unselected package sssd-krb5-common. 1008s Preparing to unpack .../36-sssd-krb5-common_2.9.4-1ubuntu1_s390x.deb ... 1008s Unpacking sssd-krb5-common (2.9.4-1ubuntu1) ... 1008s Selecting previously unselected package libsmbclient:s390x. 1008s Preparing to unpack .../37-libsmbclient_2%3a4.19.5+dfsg-1ubuntu1_s390x.deb ... 1008s Unpacking libsmbclient:s390x (2:4.19.5+dfsg-1ubuntu1) ... 1009s Selecting previously unselected package sssd-ad. 1009s Preparing to unpack .../38-sssd-ad_2.9.4-1ubuntu1_s390x.deb ... 1009s Unpacking sssd-ad (2.9.4-1ubuntu1) ... 1009s Selecting previously unselected package libipa-hbac0. 1009s Preparing to unpack .../39-libipa-hbac0_2.9.4-1ubuntu1_s390x.deb ... 1009s Unpacking libipa-hbac0 (2.9.4-1ubuntu1) ... 1009s Selecting previously unselected package sssd-ipa. 1009s Preparing to unpack .../40-sssd-ipa_2.9.4-1ubuntu1_s390x.deb ... 1009s Unpacking sssd-ipa (2.9.4-1ubuntu1) ... 1009s Selecting previously unselected package sssd-krb5. 1009s Preparing to unpack .../41-sssd-krb5_2.9.4-1ubuntu1_s390x.deb ... 1009s Unpacking sssd-krb5 (2.9.4-1ubuntu1) ... 1009s Selecting previously unselected package sssd-ldap. 1009s Preparing to unpack .../42-sssd-ldap_2.9.4-1ubuntu1_s390x.deb ... 1009s Unpacking sssd-ldap (2.9.4-1ubuntu1) ... 1009s Selecting previously unselected package sssd-proxy. 1009s Preparing to unpack .../43-sssd-proxy_2.9.4-1ubuntu1_s390x.deb ... 1009s Unpacking sssd-proxy (2.9.4-1ubuntu1) ... 1009s Selecting previously unselected package sssd. 1009s Preparing to unpack .../44-sssd_2.9.4-1ubuntu1_s390x.deb ... 1009s Unpacking sssd (2.9.4-1ubuntu1) ... 1009s Setting up libpwquality-common (1.4.5-3) ... 1009s Setting up libpath-utils1:s390x (0.6.2-2) ... 1009s Setting up softhsm2-common (2.6.1-2.2) ... 1009s 1009s Creating config file /etc/softhsm/softhsm2.conf with new version 1009s Setting up libnfsidmap1:s390x (1:2.6.3-3ubuntu1) ... 1009s Setting up libsss-idmap0 (2.9.4-1ubuntu1) ... 1009s Setting up libbasicobjects0:s390x (0.6.2-2) ... 1009s Setting up libtdb1:s390x (1.4.10-1) ... 1009s Setting up libc-ares2:s390x (1.27.0-1) ... 1009s Setting up libwbclient0:s390x (2:4.19.5+dfsg-1ubuntu1) ... 1009s Setting up libtalloc2:s390x (2.4.2-1) ... 1009s Setting up libdhash1:s390x (0.6.2-2) ... 1009s Setting up libtevent0:s390x (0.16.1-1) ... 1009s Setting up libavahi-common-data:s390x (0.8-13ubuntu2) ... 1009s Setting up libevent-2.1-7:s390x (2.1.12-stable-9) ... 1009s Setting up libcrack2:s390x (2.9.6-5.1) ... 1009s Setting up libcollection4:s390x (0.6.2-2) ... 1009s Setting up libipa-hbac0 (2.9.4-1ubuntu1) ... 1009s Setting up libref-array1:s390x (0.6.2-2) ... 1009s Setting up libldb2:s390x (2:2.8.0+samba4.19.5+dfsg-1ubuntu1) ... 1009s Setting up libsss-nss-idmap0 (2.9.4-1ubuntu1) ... 1009s Setting up libnss-sss:s390x (2.9.4-1ubuntu1) ... 1009s Setting up libsofthsm2 (2.6.1-2.2) ... 1009s Setting up softhsm2 (2.6.1-2.2) ... 1009s Setting up libini-config5:s390x (0.6.2-2) ... 1009s Setting up libavahi-common3:s390x (0.8-13ubuntu2) ... 1009s Setting up python3-sss (2.9.4-1ubuntu1) ... 1009s Setting up libsss-certmap0 (2.9.4-1ubuntu1) ... 1009s Setting up libunbound8:s390x (1.19.1-1ubuntu1) ... 1009s Setting up libpwquality1:s390x (1.4.5-3) ... 1009s Setting up libavahi-client3:s390x (0.8-13ubuntu2) ... 1009s Setting up libgnutls-dane0:s390x (3.8.3-1ubuntu1) ... 1009s Setting up libpam-pwquality:s390x (1.4.5-3) ... 1009s Setting up samba-libs:s390x (2:4.19.5+dfsg-1ubuntu1) ... 1009s Setting up libsmbclient:s390x (2:4.19.5+dfsg-1ubuntu1) ... 1009s Setting up libpam-sss:s390x (2.9.4-1ubuntu1) ... 1009s Setting up gnutls-bin (3.8.3-1ubuntu1) ... 1009s Setting up sssd-common (2.9.4-1ubuntu1) ... 1009s Creating SSSD system user & group... 1009s warn: The home directory `/var/lib/sss' already exists. Not touching this directory. 1009s warn: Warning: The home directory `/var/lib/sss' does not belong to the user you are currently creating. 1009s Warning: found usr.sbin.sssd in /etc/apparmor.d/force-complain, forcing complain mode 1009s Warning from /etc/apparmor.d/usr.sbin.sssd (/etc/apparmor.d/usr.sbin.sssd line 63): Caching disabled for: 'usr.sbin.sssd' due to force complain 1010s Created symlink /etc/systemd/system/sssd.service.wants/sssd-autofs.socket → /usr/lib/systemd/system/sssd-autofs.socket. 1010s Created symlink /etc/systemd/system/sssd.service.wants/sssd-nss.socket → /usr/lib/systemd/system/sssd-nss.socket. 1010s Created symlink /etc/systemd/system/sssd.service.wants/sssd-pam-priv.socket → /usr/lib/systemd/system/sssd-pam-priv.socket. 1010s Created symlink /etc/systemd/system/sssd.service.wants/sssd-pam.socket → /usr/lib/systemd/system/sssd-pam.socket. 1011s Created symlink /etc/systemd/system/sssd.service.wants/sssd-ssh.socket → /usr/lib/systemd/system/sssd-ssh.socket. 1011s Created symlink /etc/systemd/system/sssd.service.wants/sssd-sudo.socket → /usr/lib/systemd/system/sssd-sudo.socket. 1011s Created symlink /etc/systemd/system/multi-user.target.wants/sssd.service → /usr/lib/systemd/system/sssd.service. 1011s sssd-autofs.service is a disabled or a static unit, not starting it. 1011s sssd-nss.service is a disabled or a static unit, not starting it. 1011s sssd-pam.service is a disabled or a static unit, not starting it. 1011s sssd-ssh.service is a disabled or a static unit, not starting it. 1011s sssd-sudo.service is a disabled or a static unit, not starting it. 1011s Could not execute systemctl: at /usr/bin/deb-systemd-invoke line 148. 1011s Setting up sssd-proxy (2.9.4-1ubuntu1) ... 1011s Setting up sssd-ad-common (2.9.4-1ubuntu1) ... 1012s Created symlink /etc/systemd/system/sssd.service.wants/sssd-pac.socket → /usr/lib/systemd/system/sssd-pac.socket. 1012s sssd-pac.service is a disabled or a static unit, not starting it. 1012s Could not execute systemctl: at /usr/bin/deb-systemd-invoke line 148. 1012s Setting up sssd-krb5-common (2.9.4-1ubuntu1) ... 1012s Setting up sssd-krb5 (2.9.4-1ubuntu1) ... 1012s Setting up sssd-ldap (2.9.4-1ubuntu1) ... 1012s Setting up sssd-ad (2.9.4-1ubuntu1) ... 1012s Setting up sssd-ipa (2.9.4-1ubuntu1) ... 1012s Setting up sssd (2.9.4-1ubuntu1) ... 1012s Setting up autopkgtest-satdep (0) ... 1012s Processing triggers for man-db (2.12.0-3) ... 1013s Processing triggers for libc-bin (2.39-0ubuntu2) ... 1016s (Reading database ... 52346 files and directories currently installed.) 1016s Removing autopkgtest-satdep (0) ... 1020s autopkgtest [09:32:47]: test sssd-softhism2-certificates-tests.sh: [----------------------- 1021s + '[' -z ubuntu ']' 1021s + required_tools=(p11tool openssl softhsm2-util) 1021s + for cmd in "${required_tools[@]}" 1021s + command -v p11tool 1021s + for cmd in "${required_tools[@]}" 1021s + command -v openssl 1021s + for cmd in "${required_tools[@]}" 1021s + command -v softhsm2-util 1021s + PIN=053350 1021s +++ find /usr/lib/softhsm/libsofthsm2.so 1021s +++ head -n 1 1021s ++ realpath /usr/lib/softhsm/libsofthsm2.so 1021s + SOFTHSM2_MODULE=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so 1021s + SSSD_P11_CHILD=/usr/libexec/sssd/p11_child 1021s + TOKEN_ID=00112233445566778899FFAABBCCDDEEFF012345 1021s + '[' '!' -v NO_SSSD_TESTS ']' 1021s + '[' '!' -x /usr/libexec/sssd/p11_child ']' 1021s + ca_db_arg=ca_db 1021s ++ /usr/libexec/sssd/p11_child --help 1021s + p11_child_help='Usage: p11_child [OPTION...] 1021s -d, --debug-level=INT Debug level 1021s --debug-timestamps=INT Add debug timestamps 1021s --debug-microseconds=INT Show timestamps with microseconds 1021s --dumpable=INT Allow core dumps 1021s --debug-fd=INT An open file descriptor for the debug 1021s logs 1021s --logger=stderr|files|journald Set logger 1021s --auth Run in auth mode 1021s --pre Run in pre-auth mode 1021s --wait_for_card Wait until card is available 1021s --verification Run in verification mode 1021s --pin Expect PIN on stdin 1021s --keypad Expect PIN on keypad 1021s --verify=STRING Tune validation 1021s --ca_db=STRING CA DB to use 1021s --module_name=STRING Module name for authentication 1021s --token_name=STRING Token name for authentication 1021s --key_id=STRING Key ID for authentication 1021s --label=STRING Label for authentication 1021s --certificate=STRING certificate to verify, base64 encoded 1021s --uri=STRING PKCS#11 URI to restrict selection 1021s --chain-id=LONG Tevent chain ID used for logging 1021s purposes 1021s 1021s Help options: 1021s -?, --help Show this help message 1021s --usage Display brief usage message' 1021s + echo 'Usage: p11_child [OPTION...] 1021s -d, --debug-level=INT Debug level 1021s --debug-timestamps=INT Add debug timestamps 1021s --debug-microseconds=INT Show timestamps with microseconds 1021s --dumpable=INT Allow core dumps 1021s --debug-fd=INT An open file descriptor for the debug 1021s logs 1021s --logger=stderr|files|journald Set logger 1021s --auth Run in auth mode 1021s --pre Run in pre-auth mode 1021s --wait_for_card Wait until card is available 1021s --verification Run in verification mode 1021s --pin Expect PIN on stdin 1021s --keypad Expect PIN on keypad 1021s --verify=STRING Tune validation 1021s --ca_db=STRING CA DB to use 1021s --module_name=STRING Module name for authentication 1021s --token_name=STRING Token name for authentication 1021s --key_id=STRING Key ID for authentication 1021s --label=STRING Label for authentication 1021s --certificate=STRING certificate to verify, base64 encoded 1021s --uri=STRING PKCS#11 URI to restrict selection 1021s --chain-id=LONG Tevent chain ID used for logging 1021s purposes 1021s 1021s Help options: 1021s -?, --help Show this help message 1021s --usage Display brief usage message' 1021s + grep nssdb -qs 1021s + echo 'Usage: p11_child [OPTION...] 1021s -d, --debug-level=INT Debug level 1021s --debug-timestamps=INT Add debug timestamps 1021s --debug-microseconds=INT Show timestamps with microseconds 1021s --dumpable=INT Allow core dumps 1021s --debug-fd=INT An open file descriptor for the debug 1021s logs 1021s --logger=stderr|files|journald Set logger 1021s --auth Run in auth mode 1021s --pre Run in pre-auth mode 1021s --wait_for_card Wait until card is available 1021s --verification Run in verification mode 1021s --pin Expect PIN on stdin 1021s --keypad Expect PIN on keypad 1021s --verify=STRING Tune validation 1021s --ca_db=STRING CA DB to use 1021s --module_name=STRING Module name for authentication 1021s --token_name=STRING Token name for authentication 1021s --key_id=STRING Key ID for authentication 1021s --label=STRING Label for authentication 1021s --certificate=STRING certificate to verify, base64 encoded 1021s --uri=STRING PKCS#11 URI to restrict selection 1021s --chain-id=LONG Tevent chain ID used for logging 1021s purposes 1021s 1021s Help options: 1021s -?, --help Show this help message 1021s --usage Display brief usage message' 1021s + grep -qs -- --ca_db 1021s + '[' '!' -e /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so ']' 1021s ++ mktemp -d -t sssd-softhsm2-XXXXXX 1021s + tmpdir=/tmp/sssd-softhsm2-wKxRAf 1021s + keys_size=1024 1021s + [[ ! -v KEEP_TEMPORARY_FILES ]] 1021s + trap 'rm -rf "$tmpdir"' EXIT 1021s + trap 'set +x; echo -e "\nUnexpected failure!!!"' ERR 1021s + echo -n 01 1021s + touch /tmp/sssd-softhsm2-wKxRAf/index.txt 1021s + mkdir -p /tmp/sssd-softhsm2-wKxRAf/new_certs 1021s + cat 1021s + root_ca_key_pass=pass:random-root-CA-password-7708 1021s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-wKxRAf/test-root-CA-key.pem -passout pass:random-root-CA-password-7708 1024 1021s + openssl req -passin pass:random-root-CA-password-7708 -batch -config /tmp/sssd-softhsm2-wKxRAf/test-root-CA.config -x509 -new -nodes -key /tmp/sssd-softhsm2-wKxRAf/test-root-CA-key.pem -sha256 -days 1024 -set_serial 0 -extensions v3_ca -out /tmp/sssd-softhsm2-wKxRAf/test-root-CA.pem 1021s + openssl x509 -noout -in /tmp/sssd-softhsm2-wKxRAf/test-root-CA.pem 1021s + cat 1021s + intermediate_ca_key_pass=pass:random-intermediate-CA-password-10469 1021s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA-key.pem -passout pass:random-intermediate-CA-password-10469 1024 1021s + openssl req -batch -new -nodes -passin pass:random-intermediate-CA-password-10469 -config /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA.config -key /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA-key.pem -passout pass:random-root-CA-password-7708 -sha256 -extensions v3_ca -out /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA-certificate-request.pem 1021s + openssl req -text -noout -in /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA-certificate-request.pem 1021s Certificate Request: 1021s Data: 1021s Version: 1 (0x0) 1021s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 1021s Subject Public Key Info: 1021s Public Key Algorithm: rsaEncryption 1021s Public-Key: (1024 bit) 1021s Modulus: 1021s 00:ac:39:11:df:bc:71:36:f8:e2:06:c2:e0:33:f9: 1021s 76:07:67:22:85:d5:b2:9f:f4:f6:b2:bc:b9:2b:0b: 1021s 4d:a9:89:cb:a4:95:80:90:47:f5:c0:36:60:dc:48: 1021s f5:0e:c1:fd:74:cd:70:f2:0e:b9:77:7c:29:8b:9c: 1021s e0:57:15:2c:0a:a1:64:f9:db:56:00:23:49:37:72: 1021s d7:e9:ef:bf:89:0b:85:18:12:0f:9e:0d:bf:e1:e6: 1021s ea:47:d5:48:a6:fc:9f:25:4f:f7:d1:21:0b:24:b2: 1021s 13:dd:78:e1:92:a0:ae:8e:bb:27:e3:38:8d:ed:25: 1021s f1:bb:a0:28:3c:de:d6:84:cf 1021s Exponent: 65537 (0x10001) 1021s Attributes: 1021s (none) 1021s Requested Extensions: 1021s Signature Algorithm: sha256WithRSAEncryption 1021s Signature Value: 1021s 1a:ab:dd:8e:d5:e3:e2:ad:bd:25:98:bd:54:de:21:22:ec:0c: 1021s 58:85:13:3f:2e:65:65:73:7d:40:09:d7:3a:8c:4c:42:49:12: 1021s b1:68:55:14:c4:f0:33:f0:16:ec:2d:fc:a9:01:0e:58:ad:c5: 1021s 6a:b5:61:8d:e6:fa:2f:7a:e6:6e:47:e1:73:11:72:82:7a:c6: 1021s 7f:ca:20:87:a6:b4:05:bf:75:8c:1f:5c:ee:da:3c:b8:4d:b7: 1021s 79:cb:2d:9e:8d:0c:ee:fd:10:a3:ab:a9:a3:4e:1b:ed:c4:b6: 1021s e2:a7:2f:c9:85:c8:c0:87:3f:a6:d8:14:59:60:c7:4c:06:2a: 1021s 5b:52 1021s + openssl ca -batch -notext -config /tmp/sssd-softhsm2-wKxRAf/test-root-CA.config -passin pass:random-root-CA-password-7708 -keyfile /tmp/sssd-softhsm2-wKxRAf/test-root-CA-key.pem -in /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA-certificate-request.pem -days 365 -extensions v3_intermediate_ca -out /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA.pem 1021s Using configuration from /tmp/sssd-softhsm2-wKxRAf/test-root-CA.config 1021s Check that the request matches the signature 1021s Signature ok 1021s Certificate Details: 1021s Serial Number: 1 (0x1) 1021s Validity 1021s Not Before: Mar 10 09:32:46 2024 GMT 1021s Not After : Mar 10 09:32:46 2025 GMT 1021s Subject: 1021s organizationName = Test Organization 1021s organizationalUnitName = Test Organization Unit 1021s commonName = Test Organization Intermediate CA 1021s X509v3 extensions: 1021s X509v3 Subject Key Identifier: 1021s 5F:60:54:F1:AC:3E:2D:42:06:88:45:9F:29:ED:86:C4:87:30:11:47 1021s X509v3 Authority Key Identifier: 1021s keyid:B5:0A:C0:0C:7A:17:B9:8E:C4:3C:B1:90:34:7F:EB:43:9A:33:1F:B2 1021s DirName:/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root CA 1021s serial:00 1021s X509v3 Basic Constraints: 1021s CA:TRUE 1021s X509v3 Key Usage: critical 1021s Digital Signature, Certificate Sign, CRL Sign 1021s Certificate is to be certified until Mar 10 09:32:46 2025 GMT (365 days) 1021s 1021s Write out database with 1 new entries 1021s Database updated 1021s + openssl x509 -noout -in /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA.pem 1021s + openssl verify -CAfile /tmp/sssd-softhsm2-wKxRAf/test-root-CA.pem /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA.pem 1021s /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA.pem: OK 1021s + cat 1021s + sub_intermediate_ca_key_pass=pass:random-sub-intermediate-CA-password-29597 1021s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-key.pem -passout pass:random-sub-intermediate-CA-password-29597 1024 1021s + openssl req -batch -new -nodes -passin pass:random-sub-intermediate-CA-password-29597 -config /tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA.config -key /tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-key.pem -passout pass:random-intermediate-CA-password-10469 -sha256 -extensions v3_ca -out /tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-certificate-request.pem 1021s + openssl req -text -noout -in /tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-certificate-request.pem 1021s Certificate Request: 1021s Data: 1021s Version: 1 (0x0) 1021s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 1021s Subject Public Key Info: 1021s Public Key Algorithm: rsaEncryption 1021s Public-Key: (1024 bit) 1021s Modulus: 1021s 00:de:1f:d9:c6:1b:3e:20:a1:63:2b:58:7e:6b:ce: 1021s 5e:f9:50:69:35:2e:09:2f:13:db:e4:f8:7a:04:0c: 1021s 28:5b:cb:f4:4f:92:68:aa:26:bf:27:3c:e0:4e:c0: 1021s 36:6b:15:79:df:7e:7b:5f:f9:90:58:69:81:f4:a7: 1021s 91:a9:ca:b3:7e:7a:b5:1b:d6:fd:f8:a3:ac:67:de: 1021s 2d:ca:81:d0:a9:03:2f:3b:93:1c:0b:a6:ea:89:1c: 1021s ad:88:11:af:48:bf:1a:91:13:a4:a5:0b:dd:bc:d1: 1021s 2d:89:02:4d:f5:c6:ad:32:a2:cf:d8:fe:db:bc:f6: 1021s d2:d1:8d:fa:73:ee:f0:2b:1d 1021s Exponent: 65537 (0x10001) 1021s Attributes: 1021s (none) 1021s Requested Extensions: 1021s Signature Algorithm: sha256WithRSAEncryption 1021s Signature Value: 1021s 1e:35:10:81:c4:8a:5b:2c:83:71:24:e8:ba:b9:2c:b6:ea:2a: 1021s ca:fe:aa:cf:8f:1a:10:c5:15:1d:54:5a:90:3a:66:59:e5:3d: 1021s 9d:ea:b4:6a:13:98:60:6a:4c:82:a0:2c:7a:14:92:59:40:d8: 1021s 4a:f9:d5:c9:89:5a:62:95:c0:bb:b9:3f:43:e9:82:6f:a5:3c: 1021s 2b:81:b7:b3:be:1d:ae:8c:85:7f:37:0f:b1:13:74:6f:6f:71: 1021s d7:6a:eb:90:0d:fb:d2:66:a5:52:14:2a:2e:42:74:c9:72:9a: 1021s 3c:5c:3b:30:b5:69:54:37:70:17:d0:ae:d7:70:7a:f9:06:3c: 1021s 98:29 1021s + openssl ca -batch -notext -config /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA.config -passin pass:random-intermediate-CA-password-10469 -keyfile /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA-key.pem -in /tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-certificate-request.pem -days 365 -extensions v3_intermediate_ca -out /tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA.pem 1021s Using configuration from /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA.config 1021s Check that the request matches the signature 1021s Signature ok 1021s Certificate Details: 1021s Serial Number: 2 (0x2) 1021s Validity 1021s Not Before: Mar 10 09:32:46 2024 GMT 1021s Not After : Mar 10 09:32:46 2025 GMT 1021s Subject: 1021s organizationName = Test Organization 1021s organizationalUnitName = Test Organization Unit 1021s commonName = Test Organization Sub Intermediate CA 1021s X509v3 extensions: 1021s X509v3 Subject Key Identifier: 1021s 4D:00:A7:25:2A:ED:11:13:81:A0:07:AB:53:9E:AE:AF:1F:BA:CA:42 1021s X509v3 Authority Key Identifier: 1021s keyid:5F:60:54:F1:AC:3E:2D:42:06:88:45:9F:29:ED:86:C4:87:30:11:47 1021s DirName:/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root CA 1021s serial:01/tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA.pem: OK 1021s 1021s X509v3 Basic Constraints: 1021s CA:TRUE 1021s X509v3 Key Usage: critical 1021s Digital Signature, Certificate Sign, CRL Sign 1021s Certificate is to be certified until Mar 10 09:32:46 2025 GMT (365 days) 1021s 1021s Write out database with 1 new entries 1021s Database updated 1021s + openssl x509 -noout -in /tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA.pem 1021s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA.pem /tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA.pem 1021s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-wKxRAf/test-root-CA.pem /tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA.pem 1021s + local cmd=openssl 1021s + shift 1021s + openssl verify -CAfile /tmp/sssd-softhsm2-wKxRAf/test-root-CA.pem /tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA.pem 1021s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 1021s error 20 at 0 depth lookup: unable to get local issuer certificate 1021s error /tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA.pem: verification failed 1021s + cat 1021s + root_ca_trusted_cert_0001_key_pass=pass:random-root-ca-trusted-cert-0001-5150 1021s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-wKxRAf/test-root-CA-trusted-certificate-0001-key.pem -passout pass:random-root-ca-trusted-cert-0001-5150 1024 1021s + openssl req -new -nodes -reqexts req_exts -passin pass:random-root-ca-trusted-cert-0001-5150 -key /tmp/sssd-softhsm2-wKxRAf/test-root-CA-trusted-certificate-0001-key.pem -config /tmp/sssd-softhsm2-wKxRAf/test-root-CA-trusted-certificate-0001.config -out /tmp/sssd-softhsm2-wKxRAf/test-root-CA-trusted-certificate-0001-request.pem 1021s + openssl req -text -noout -in /tmp/sssd-softhsm2-wKxRAf/test-root-CA-trusted-certificate-0001-request.pem 1021s Certificate Request: 1021s Data: 1021s Version: 1 (0x0) 1021s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 1021s Subject Public Key Info: 1021s Public Key Algorithm: rsaEncryption 1021s Public-Key: (1024 bit) 1021s Modulus: 1021s 00:e5:f6:30:18:21:ae:30:22:b7:c8:dd:a4:6f:93: 1021s ae:1e:bd:ba:4b:b5:c0:bb:c8:a6:28:bb:e0:ef:95: 1021s 72:e7:2f:b9:62:9e:64:1c:4c:3c:ea:85:cb:f1:05: 1021s 68:fe:4e:2c:e5:b6:3c:3d:af:c9:de:83:78:ce:47: 1021s c3:06:6e:a6:ae:27:3a:d0:3d:4e:13:60:e3:1c:7c: 1021s 73:ed:72:a8:ed:e2:5b:6e:b9:59:1c:c0:2f:7b:26: 1021s 74:63:15:8e:e2:0a:b3:6d:ca:85:f1:23:5a:54:ab: 1021s e7:d0:d1:da:f5:f3:ca:07:ed:53:de:df:a0:55:41: 1021s 1a:af:6c:09:9e:69:ae:4a:8f 1021s Exponent: 65537 (0x10001) 1021s Attributes: 1021s Requested Extensions: 1021s X509v3 Basic Constraints: 1021s CA:FALSE 1021s Netscape Cert Type: 1021s SSL Client, S/MIME 1021s Netscape Comment: 1021s Test Organization Root CA trusted Certificate 1021s X509v3 Subject Key Identifier: 1021s 9F:27:56:AD:34:BB:56:79:81:E8:11:9E:04:37:D3:1F:02:CC:65:4B 1021s X509v3 Key Usage: critical 1021s Digital Signature, Non Repudiation, Key Encipherment 1021s X509v3 Extended Key Usage: 1021s TLS Web Client Authentication, E-mail Protection 1021s X509v3 Subject Alternative Name: 1021s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 1021s Signature Algorithm: sha256WithRSAEncryption 1021s Signature Value: 1021s 76:a9:00:dc:43:bd:78:6b:96:8b:b6:8a:fc:ed:bb:89:b8:91: 1021s 8a:6b:5e:0c:04:bd:b4:5b:d4:90:27:02:ff:ed:71:d7:27:92: 1021s f8:bc:bb:7a:f5:e4:b6:c6:6c:8e:e6:a2:e9:52:38:d7:d4:cd: 1021s d7:cc:cd:d9:d5:06:b0:01:c0:ab:36:b6:36:2b:83:0a:c5:73: 1021s 03:60:56:b9:cb:21:c1:74:dc:a7:b1:e1:23:5f:d7:87:65:88: 1021s 27:6b:95:86:f1:6a:7f:a2:6d:99:af:a8:98:3b:bc:95:ff:08: 1021s 4c:85:f8:87:ab:5c:6b:d8:ab:22:3a:67:36:7c:e4:15:70:6e: 1021s 7f:21 1021s + openssl ca -batch -notext -config /tmp/sssd-softhsm2-wKxRAf/test-root-CA.config -passin pass:random-root-CA-password-7708 -keyfile /tmp/sssd-softhsm2-wKxRAf/test-root-CA-key.pem -in /tmp/sssd-softhsm2-wKxRAf/test-root-CA-trusted-certificate-0001-request.pem -days 365 -extensions usr_cert -out /tmp/sssd-softhsm2-wKxRAf/test-root-CA-trusted-certificate-0001.pem 1021s Using configuration from /tmp/sssd-softhsm2-wKxRAf/test-root-CA.config 1021s Check that the request matches the signature 1021s Signature ok 1021s Certificate Details: 1021s Serial Number: 3 (0x3) 1021s Validity 1021s Not Before: Mar 10 09:32:46 2024 GMT 1021s Not After : Mar 10 09:32:46 2025 GMT 1021s Subject: 1021s organizationName = Test Organization 1021s organizationalUnitName = Test Organization Unit 1021s commonName = Test Organization Root Trusted Certificate 0001 1021s X509v3 extensions: 1021s X509v3 Authority Key Identifier: 1021s B5:0A:C0:0C:7A:17:B9:8E:C4:3C:B1:90:34:7F:EB:43:9A:33:1F:B2 1021s X509v3 Basic Constraints: 1021s CA:FALSE 1021s Netscape Cert Type: 1021s SSL Client, S/MIME 1021s Netscape Comment: 1021s Test Organization Root CA trusted Certificate 1021s X509v3 Subject Key Identifier: 1021s 9F:27:56:AD:34:BB:56:79:81:E8:11:9E:04:37:D3:1F:02:CC:65:4B 1021s X509v3 Key Usage: critical 1021s Digital Signature, Non Repudiation, Key Encipherment 1021s X509v3 Extended Key Usage: 1021s TLS Web Client Authentication, E-mail Protection 1021s X509v3 Subject Alternative Name: 1021s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 1021s Certificate is to be certified until Mar 10 09:32:46 2025 GMT (365 days) 1021s 1021s Write out database with 1 new entries 1021s Database updated 1021s + openssl x509 -noout -in /tmp/sssd-softhsm2-wKxRAf/test-root-CA-trusted-certificate-0001.pem 1021s + openssl verify -CAfile /tmp/sssd-softhsm2-wKxRAf/test-root-CA.pem /tmp/sssd-softhsm2-wKxRAf/test-root-CA-trusted-certificate-0001.pem 1021s /tmp/sssd-softhsm2-wKxRAf/test-root-CA-trusted-certificate-0001.pem: OK 1021s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA.pem /tmp/sssd-softhsm2-wKxRAf/test-root-CA-trusted-certificate-0001.pem 1021s + local cmd=openssl 1021s + shift 1021s + openssl verify -CAfile /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA.pem /tmp/sssd-softhsm2-wKxRAf/test-root-CA-trusted-certificate-0001.pem 1021s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 1021s error 20 at 0 depth lookup: unable to get local issuer certificate 1021s error /tmp/sssd-softhsm2-wKxRAf/test-root-CA-trusted-certificate-0001.pem: verification failed 1021s + cat 1021s + intermediate_ca_trusted_cert_0001_key_pass=pass:random-intermediate-ca-trusted-cert-0001-6600 1021s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA-trusted-certificate-0001-key.pem -passout pass:random-intermediate-ca-trusted-cert-0001-6600 1024 1021s + openssl req -new -nodes -reqexts req_exts -passin pass:random-intermediate-ca-trusted-cert-0001-6600 -key /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA-trusted-certificate-0001-key.pem -config /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA-trusted-certificate-0001.config -out /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA-trusted-certificate-0001-request.pem 1021s + openssl req -text -noout -in /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA-trusted-certificate-0001-request.pem 1021s Certificate Request: 1021s Data: 1021s Version: 1 (0x0) 1021s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 1021s Subject Public Key Info: 1021s Public Key Algorithm: rsaEncryption 1021s Public-Key: (1024 bit) 1021s Modulus: 1021s 00:b2:5b:d6:a5:fb:cb:b0:29:e6:53:7c:31:3d:b3: 1021s 27:a3:e1:d0:50:cb:ac:1b:af:ce:b2:cc:43:98:83: 1021s 5c:19:e9:c1:97:6c:eb:f1:ae:89:62:8c:29:7f:6b: 1021s 22:2e:1d:34:fa:32:b0:b5:cb:00:36:b6:d6:b5:77: 1021s e1:41:99:4c:c3:e3:be:99:b6:61:61:76:36:f0:26: 1021s 47:f2:9f:df:90:15:08:ca:8c:d4:b0:fe:8c:af:bf: 1021s e4:03:d6:c6:ca:c0:d4:e5:53:e0:ff:5d:fd:34:c0: 1021s a7:3a:5d:13:2b:3f:05:93:83:8e:5c:0b:a9:c9:76: 1021s 1f:97:bc:8a:3a:07:33:bd:c1 1021s Exponent: 65537 (0x10001) 1021s Attributes: 1021s Requested Extensions: 1021s X509v3 Basic Constraints: 1021s CA:FALSE 1021s Netscape Cert Type: 1021s SSL Client, S/MIME 1021s Netscape Comment: 1021s Test Organization Intermediate CA trusted Certificate 1021s X509v3 Subject Key Identifier: 1021s 42:7C:FC:71:35:E9:AA:EF:FD:7C:E5:03:F1:E8:8D:84:38:9F:97:E9 1021s X509v3 Key Usage: critical 1021s Digital Signature, Non Repudiation, Key Encipherment 1021s X509v3 Extended Key Usage: 1021s TLS Web Client Authentication, E-mail Protection 1021s X509v3 Subject Alternative Name: 1021s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 1021s Signature Algorithm: sha256WithRSAEncryption 1021s Signature Value: 1021s 20:8d:6c:94:ef:f8:9b:49:ab:98:0b:82:20:19:f1:11:c9:0c: 1021s 6f:de:06:90:7b:e8:37:27:48:cc:e2:22:b9:30:96:60:ba:f1: 1021s de:e8:45:99:04:9e:60:aa:89:ad:13:e3:5f:96:58:45:d3:9b: 1021s 88:42:6a:05:80:72:9e:a5:19:8b:43:94:a5:fa:ab:fc:9a:0f: 1021s d0:61:76:0d:87:f8:74:13:0b:3d:71:69:e6:53:68:eb:99:86: 1021s 39:8a:dc:4e:e6:87:58:6a:99:5b:c4:cb:c5:de:f3:0b:2b:cc: 1021s dd:5f:4d:2a:a3:e9:94:2c:88:3e:3b:90:c6:e1:da:1f:2b:a7: 1021s 4e:8f 1021s + openssl ca -passin pass:random-intermediate-CA-password-10469 -config /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA.config -batch -notext -keyfile /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA-key.pem -in /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA-trusted-certificate-0001-request.pem -days 365 -extensions usr_cert -out /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA-trusted-certificate-0001.pem 1021s Using configuration from /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA.config 1021s Check that the request matches the signature 1021s Signature ok 1021s Certificate Details: 1021s Serial Number: 4 (0x4) 1021s Validity 1021s Not Before: Mar 10 09:32:47 2024 GMT 1021s Not After : Mar 10 09:32:47 2025 GMT 1021s Subject: 1021s organizationName = Test Organization 1021s organizationalUnitName = Test Organization Unit 1021s commonName = Test Organization Intermediate Trusted Certificate 0001 1021s X509v3 extensions: 1021s X509v3 Authority Key Identifier: 1021s 5F:60:54:F1:AC:3E:2D:42:06:88:45:9F:29:ED:86:C4:87:30:11:47 1021s X509v3 Basic Constraints: 1021s CA:FALSE 1021s Netscape Cert Type: 1021s SSL Client, S/MIME 1021s Netscape Comment: 1021s Test Organization Intermediate CA trusted Certificate 1021s X509v3 Subject Key Identifier: 1021s 42:7C:FC:71:35:E9:AA:EF:FD:7C:E5:03:F1:E8:8D:84:38:9F:97:E9 1021s X509v3 Key Usage: critical 1021s Digital Signature, Non Repudiation, Key Encipherment 1021s X509v3 Extended Key Usage: 1021s TLS Web Client Authentication, E-mail Protection 1021s X509v3 Subject Alternative Name: 1021s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 1021s Certificate is to be certified until Mar 10 09:32:47 2025 GMT (365 days) 1021s 1021s Write out database with 1 new entries 1021s Database updated 1021s + openssl x509 -noout -in /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA-trusted-certificate-0001.pem 1021s This certificate should not be trusted fully 1021s + echo 'This certificate should not be trusted fully' 1021s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA.pem /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA-trusted-certificate-0001.pem 1021s + local cmd=openssl 1021s + shift 1021s + openssl verify -CAfile /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA.pem /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA-trusted-certificate-0001.pem 1021s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 1021s error 2 at 1 depth lookup: unable to get issuer certificate 1021s error /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA-trusted-certificate-0001.pem: verification failed 1021s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA.pem /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA-trusted-certificate-0001.pem 1021s /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA-trusted-certificate-0001.pem: OK 1021s + cat 1021s + sub_intermediate_ca_trusted_cert_0001_key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-6081 1021s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-trusted-certificate-0001-key.pem -passout pass:random-sub-intermediate-ca-trusted-cert-0001-6081 1024 1021s + openssl req -new -nodes -reqexts req_exts -passin pass:random-sub-intermediate-ca-trusted-cert-0001-6081 -key /tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-trusted-certificate-0001-key.pem -config /tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-trusted-certificate-0001.config -out /tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-trusted-certificate-0001-request.pem 1021s + openssl req -text -noout -in /tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-trusted-certificate-0001-request.pem 1021s Certificate Request: 1021s Data: 1021s Version: 1 (0x0) 1021s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 1021s Subject Public Key Info: 1021s Public Key Algorithm: rsaEncryption 1021s Public-Key: (1024 bit) 1021s Modulus: 1021s 00:9f:ed:04:9d:54:cd:4e:8b:8a:0c:a9:7c:f6:5a: 1021s 6b:67:63:02:f8:6c:f2:68:92:3c:a2:24:df:eb:5e: 1021s 88:bd:ab:af:b2:7f:b9:2e:bb:18:db:66:63:80:bb: 1021s 2d:af:e0:35:64:4d:d4:69:24:58:a7:42:00:be:a4: 1021s c3:09:9b:0f:ec:b4:56:ee:4d:bc:62:43:2d:8d:2b: 1021s 29:14:7c:9c:eb:63:8b:56:28:e0:6e:b6:f2:6c:f5: 1021s 92:90:a6:d7:8b:7e:36:48:42:06:55:20:87:37:31: 1021s 60:bc:2c:dc:70:b7:7f:d5:b1:ef:c5:c5:d4:ac:29: 1021s c2:4d:9f:88:b6:dc:26:9b:4d 1021s Exponent: 65537 (0x10001) 1021s Attributes: 1021s Requested Extensions: 1021s X509v3 Basic Constraints: 1021s CA:FALSE 1021s Netscape Cert Type: 1021s SSL Client, S/MIME 1021s Netscape Comment: 1021s Test Organization Sub Intermediate CA trusted Certificate 1021s X509v3 Subject Key Identifier: 1021s 2D:0A:D5:39:06:98:35:57:FD:E2:33:15:3F:26:DD:EF:72:5B:B1:C8 1021s X509v3 Key Usage: critical 1021s Digital Signature, Non Repudiation, Key Encipherment 1021s X509v3 Extended Key Usage: 1021s TLS Web Client Authentication, E-mail Protection 1021s X509v3 Subject Alternative Name: 1021s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 1021s Signature Algorithm: sha256WithRSAEncryption 1021s Signature Value: 1021s 96:98:a9:0f:be:63:08:9e:f1:b8:cd:50:e6:38:af:94:3f:f6: 1021s 67:e0:4c:df:96:cc:ee:38:ca:7b:5f:9e:2c:e7:b3:54:a1:02: 1021s 14:7f:f2:6e:f2:3b:fe:27:bd:62:a4:15:ac:5c:22:c6:55:f7: 1021s b8:bb:cd:98:70:f7:c2:9d:f5:b2:ef:bd:c5:e5:19:17:3f:ba: 1021s a6:47:0d:c8:ef:cc:9b:47:0b:aa:f9:ab:a2:1d:8d:40:2d:67: 1021s e6:6c:97:7f:3b:5d:a1:8d:c2:a7:a1:32:0f:49:33:4b:b9:2c: 1021s b5:3e:a2:95:c1:02:fb:be:00:7a:d0:b5:a5:61:84:3a:e1:07: 1021s 08:4f 1021s + openssl ca -passin pass:random-sub-intermediate-CA-password-29597 -config /tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA.config -batch -notext -keyfile /tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-key.pem -in /tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-trusted-certificate-0001-request.pem -days 365 -extensions usr_cert -out /tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-trusted-certificate-0001.pem 1021s Using configuration from /tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA.config 1021s Check that the request matches the signature 1021s Signature ok 1021s Certificate Details: 1021s Serial Number: 5 (0x5) 1021s Validity 1021s Not Before: Mar 10 09:32:47 2024 GMT 1021s Not After : Mar 10 09:32:47 2025 GMT 1021s Subject: 1021s organizationName = Test Organization 1021s organizationalUnitName = Test Organization Unit 1021s commonName = Test Organization Sub Intermediate Trusted Certificate 0001 1021s X509v3 extensions: 1021s X509v3 Authority Key Identifier: 1021s 4D:00:A7:25:2A:ED:11:13:81:A0:07:AB:53:9E:AE:AF:1F:BA:CA:42 1021s X509v3 Basic Constraints: 1021s CA:FALSE 1021s Netscape Cert Type: 1021s SSL Client, S/MIME 1021s Netscape Comment: 1021s Test Organization Sub Intermediate CA trusted Certificate 1021s X509v3 Subject Key Identifier: 1021s 2D:0A:D5:39:06:98:35:57:FD:E2:33:15:3F:26:DD:EF:72:5B:B1:C8 1021s X509v3 Key Usage: critical 1021s Digital Signature, Non Repudiation, Key Encipherment 1021s X509v3 Extended Key Usage: 1021s TLS Web Client Authentication, E-mail Protection 1021s X509v3 Subject Alternative Name: 1021s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 1021s Certificate is to be certified until Mar 10 09:32:47 2025 GMT (365 days) 1021s 1021s Write out database with 1 new entries 1021s Database updated 1021s + openssl x509 -noout -in /tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-trusted-certificate-0001.pem 1021s + echo 'This certificate should not be trusted fully' 1021s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA.pem /tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-trusted-certificate-0001.pem 1021s This certificate should not be trusted fully 1021s + local cmd=openssl 1021s + shift 1021s + openssl verify -CAfile /tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA.pem /tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-trusted-certificate-0001.pem 1021s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 1021s error 2 at 1 depth lookup: unable to get issuer certificate 1021s error /tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-trusted-certificate-0001.pem: verification failed 1021s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA.pem /tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-trusted-certificate-0001.pem 1021s + local cmd=openssl 1021s + shift 1021s + openssl verify -CAfile /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA.pem /tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-trusted-certificate-0001.pem 1021s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 1021s error 20 at 0 depth lookup: unable to get local issuer certificate 1021s error /tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-trusted-certificate-0001.pem: verification failed 1021s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA.pem /tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-trusted-certificate-0001.pem 1021s + expect_fail openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA.pem /tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-trusted-certificate-0001.pem 1021s + local cmd=openssl 1021s + shift 1021s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA.pem /tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-trusted-certificate-0001.pem 1021s O = Test Organization, OU = Test/tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-trusted-certificate-0001.pem: OK 1021s Building a the full-chain CA file... 1021s subject=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 1021s issuer=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 1021s 1021s subject=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 1021s issuer=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 1021s 1021s subject=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 1021s issuer=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 1021s 1021s Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 1021s error 20 at 0 depth lookup: unable to get local issuer certificate 1021s error /tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-trusted-certificate-0001.pem: verification failed 1021s + echo 'Building a the full-chain CA file...' 1021s + cat /tmp/sssd-softhsm2-wKxRAf/test-root-CA.pem /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA.pem /tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA.pem 1021s + cat /tmp/sssd-softhsm2-wKxRAf/test-root-CA.pem /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA.pem 1021s + cat /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA.pem /tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA.pem 1021s + openssl crl2pkcs7 -nocrl -certfile /tmp/sssd-softhsm2-wKxRAf/test-full-chain-CA.pem 1021s + openssl pkcs7 -print_certs -noout 1021s + openssl verify -CAfile /tmp/sssd-softhsm2-wKxRAf/test-full-chain-CA.pem /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA.pem 1021s /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA.pem: OK 1021s /tmp/sssd-softhsm2-wKxRAf/test-root-CA-trusted-certificate-0001.pem: OK 1021s /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA-trusted-certificate-0001.pem: OK 1021s /tmp/sssd-softhsm2-wKxRAf/test-root-intermediate-chain-CA.pem: OK 1021s /tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-trusted-certificate-0001.pem: OK 1021s Certificates generation completed! 1021s + openssl verify -CAfile /tmp/sssd-softhsm2-wKxRAf/test-full-chain-CA.pem /tmp/sssd-softhsm2-wKxRAf/test-root-CA-trusted-certificate-0001.pem 1021s + openssl verify -CAfile /tmp/sssd-softhsm2-wKxRAf/test-full-chain-CA.pem /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA-trusted-certificate-0001.pem 1021s + openssl verify -CAfile /tmp/sssd-softhsm2-wKxRAf/test-full-chain-CA.pem /tmp/sssd-softhsm2-wKxRAf/test-root-intermediate-chain-CA.pem 1021s + openssl verify -CAfile /tmp/sssd-softhsm2-wKxRAf/test-full-chain-CA.pem /tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-trusted-certificate-0001.pem 1021s + echo 'Certificates generation completed!' 1021s + [[ -v NO_SSSD_TESTS ]] 1021s + invalid_certificate /tmp/sssd-softhsm2-wKxRAf/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-5150 /dev/null 1021s + check_certificate /tmp/sssd-softhsm2-wKxRAf/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-5150 /dev/null 1021s + local certificate=/tmp/sssd-softhsm2-wKxRAf/test-root-CA-trusted-certificate-0001.pem 1021s + local key_pass=pass:random-root-ca-trusted-cert-0001-5150 1021s + local key_ring=/dev/null 1021s + local verify_option= 1021s + prepare_softhsm2_card /tmp/sssd-softhsm2-wKxRAf/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-5150 1021s + local certificate=/tmp/sssd-softhsm2-wKxRAf/test-root-CA-trusted-certificate-0001.pem 1021s + local key_pass=pass:random-root-ca-trusted-cert-0001-5150 1021s + local key_cn 1021s + local key_name 1021s + local tokens_dir 1021s + local output_cert_file 1021s + token_name= 1021s ++ basename /tmp/sssd-softhsm2-wKxRAf/test-root-CA-trusted-certificate-0001.pem .pem 1021s + key_name=test-root-CA-trusted-certificate-0001 1021s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-wKxRAf/test-root-CA-trusted-certificate-0001.pem 1021s ++ sed -n 's/ *commonName *= //p' 1021s + key_cn='Test Organization Root Trusted Certificate 0001' 1021s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 1021s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-wKxRAf/softhsm2-test-root-CA-trusted-certificate-0001.conf 1021s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-wKxRAf/softhsm2-test-root-CA-trusted-certificate-0001.conf 1021s ++ basename /tmp/sssd-softhsm2-wKxRAf/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 1021s + tokens_dir=/tmp/sssd-softhsm2-wKxRAf/softhsm2-test-root-CA-trusted-certificate-0001 1021s + token_name='Test Organization Root Tr Token' 1021s + '[' '!' -e /tmp/sssd-softhsm2-wKxRAf/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 1021s + local key_file 1021s + local decrypted_key 1021s + mkdir -p /tmp/sssd-softhsm2-wKxRAf/softhsm2-test-root-CA-trusted-certificate-0001 1021s + key_file=/tmp/sssd-softhsm2-wKxRAf/test-root-CA-trusted-certificate-0001-key.pem 1021s + decrypted_key=/tmp/sssd-softhsm2-wKxRAf/test-root-CA-trusted-certificate-0001-key-decrypted.pem 1021s + cat 1021s + softhsm2-util --init-token --label 'Test Organization Root Tr Token' --pin 053350 --so-pin 053350 --free 1021s Slot 0 has a free/uninitialized token. 1021s The token has been initialized and is reassigned to slot 2111373453 1021s + softhsm2-util --show-slots 1021s Available slots: 1021s Slot 2111373453 1021s Slot info: 1021s Description: SoftHSM slot ID 0x7dd9008d 1021s Manufacturer ID: SoftHSM project 1021s Hardware version: 2.6 1021s Firmware version: 2.6 1021s Token present: yes 1021s Token info: 1021s Manufacturer ID: SoftHSM project 1021s Model: SoftHSM v2 1021s Hardware version: 2.6 1021s Firmware version: 2.6 1021s Serial number: b0e148097dd9008d 1021s Initialized: yes 1021s User PIN init.: yes 1021s Label: Test Organization Root Tr Token 1021s Slot 1 1021s Slot info: 1021s Description: SoftHSM slot ID 0x1 1021s Manufacturer ID: SoftHSM project 1021s Hardware version: 2.6 1021s Firmware version: 2.6 1021s Token present: yes 1021s Token info: 1021s Manufacturer ID: SoftHSM project 1021s Model: SoftHSM v2 1021s Hardware version: 2.6 1021s Firmware version: 2.6 1021s Serial number: 1021s Initialized: no 1021s User PIN init.: no 1021s Label: 1021s + p11tool --provider=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --write --no-mark-private --load-certificate=/tmp/sssd-softhsm2-wKxRAf/test-root-CA-trusted-certificate-0001.pem --login --set-pin=053350 --label 'Test Organization Root Trusted Certificate 0001' --id 00112233445566778899FFAABBCCDDEEFF012345 1021s + openssl rsa -passin pass:random-root-ca-trusted-cert-0001-5150 -in /tmp/sssd-softhsm2-wKxRAf/test-root-CA-trusted-certificate-0001-key.pem -out /tmp/sssd-softhsm2-wKxRAf/test-root-CA-trusted-certificate-0001-key-decrypted.pem 1021s writing RSA key 1021s + p11tool --provider=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --write --load-privkey=/tmp/sssd-softhsm2-wKxRAf/test-root-CA-trusted-certificate-0001-key-decrypted.pem --login --set-pin=053350 --label 'Test Organization Root Trusted Certificate 0001 Key' --id 00112233445566778899FFAABBCCDDEEFF012345 1021s + rm /tmp/sssd-softhsm2-wKxRAf/test-root-CA-trusted-certificate-0001-key-decrypted.pem 1021s + p11tool --provider=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --list-all 1021s Object 0: 1021s URL: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=b0e148097dd9008d;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert 1021s Type: X.509 Certificate (RSA-1024) 1021s Expires: Mon Mar 10 09:32:46 2025 1021s Label: Test Organization Root Trusted Certificate 0001 1021s ID: 00:11:22:33:44:55:66:77:88:99:ff:aa:bb:cc:dd:ee:ff:01:23:45 1021s 1021s + echo 'Test Organization Root Tr Token' 1021s + '[' -n '' ']' 1021s Test Organization Root Tr Token 1021s + local output_base_name=SSSD-child-22229 1021s + local output_file=/tmp/sssd-softhsm2-wKxRAf/SSSD-child-22229.output 1021s + output_cert_file=/tmp/sssd-softhsm2-wKxRAf/SSSD-child-22229.pem 1021s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/dev/null 1021s [p11_child[1932]] [main] (0x0400): p11_child started. 1021s [p11_child[1932]] [main] (0x2000): Running in [pre-auth] mode. 1021s [p11_child[1932]] [main] (0x2000): Running with effective IDs: [0][0]. 1021s [p11_child[1932]] [main] (0x2000): Running with real IDs [0][0]. 1021s [p11_child[1932]] [init_verification] (0x0040): X509_LOOKUP_load_file [/dev/null] failed [92274824][error:05800088:x509 certificate routines::no certificate or crl found]. 1021s [p11_child[1932]] [do_work] (0x0040): init_verification failed. 1021s [p11_child[1932]] [main] (0x0020): p11_child failed (5) 1021s + return 2 1021s + valid_certificate /tmp/sssd-softhsm2-wKxRAf/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-5150 /dev/null no_verification 1021s + check_certificate /tmp/sssd-softhsm2-wKxRAf/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-5150 /dev/null no_verification 1021s + local certificate=/tmp/sssd-softhsm2-wKxRAf/test-root-CA-trusted-certificate-0001.pem 1021s + local key_pass=pass:random-root-ca-trusted-cert-0001-5150 1021s + local key_ring=/dev/null 1021s + local verify_option=no_verification 1021s + prepare_softhsm2_card /tmp/sssd-softhsm2-wKxRAf/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-5150 1021s + local certificate=/tmp/sssd-softhsm2-wKxRAf/test-root-CA-trusted-certificate-0001.pem 1021s + local key_pass=pass:random-root-ca-trusted-cert-0001-5150 1021s + local key_cn 1021s + local key_name 1021s + local tokens_dir 1021s + local output_cert_file 1021s + token_name= 1021s ++ basename /tmp/sssd-softhsm2-wKxRAf/test-root-CA-trusted-certificate-0001.pem .pem 1021s + key_name=test-root-CA-trusted-certificate-0001 1021s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-wKxRAf/test-root-CA-trusted-certificate-0001.pem 1021s ++ sed -n 's/ *commonName *= //p' 1021s + key_cn='Test Organization Root Trusted Certificate 0001' 1021s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 1021s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-wKxRAf/softhsm2-test-root-CA-trusted-certificate-0001.conf 1021s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-wKxRAf/softhsm2-test-root-CA-trusted-certificate-0001.conf 1021s ++ basename /tmp/sssd-softhsm2-wKxRAf/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 1021s Test Organization Root Tr Token 1021s + tokens_dir=/tmp/sssd-softhsm2-wKxRAf/softhsm2-test-root-CA-trusted-certificate-0001 1021s + token_name='Test Organization Root Tr Token' 1021s + '[' '!' -e /tmp/sssd-softhsm2-wKxRAf/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 1021s + '[' '!' -d /tmp/sssd-softhsm2-wKxRAf/softhsm2-test-root-CA-trusted-certificate-0001 ']' 1021s + echo 'Test Organization Root Tr Token' 1021s + '[' -n no_verification ']' 1021s + local verify_arg=--verify=no_verification 1021s + local output_base_name=SSSD-child-24421 1021s + local output_file=/tmp/sssd-softhsm2-wKxRAf/SSSD-child-24421.output 1021s + output_cert_file=/tmp/sssd-softhsm2-wKxRAf/SSSD-child-24421.pem 1021s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --verify=no_verification --ca_db=/dev/null 1021s [p11_child[1938]] [main] (0x0400): p11_child started. 1021s [p11_child[1938]] [main] (0x2000): Running in [pre-auth] mode. 1021s [p11_child[1938]] [main] (0x2000): Running with effective IDs: [0][0]. 1021s [p11_child[1938]] [main] (0x2000): Running with real IDs [0][0]. 1021s [p11_child[1938]] [parse_cert_verify_opts] (0x0020): Found 'no_verification' option, disabling verification completely. This should not be used in production. 1022s [p11_child[1938]] [do_card] (0x4000): Module List: 1022s [p11_child[1938]] [do_card] (0x4000): common name: [softhsm2]. 1022s [p11_child[1938]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 1022s [p11_child[1938]] [do_card] (0x4000): Description [SoftHSM slot ID 0x7dd9008d] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 1022s [p11_child[1938]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 1022s [p11_child[1938]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x7dd9008d][2111373453] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 1022s [p11_child[1938]] [do_card] (0x4000): Login NOT required. 1022s [p11_child[1938]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 1022s [p11_child[1938]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Root Tr Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 1022s [p11_child[1938]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x7dd9008d;slot-manufacturer=SoftHSM%20project;slot-id=2111373453;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=b0e148097dd9008d;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 1022s [p11_child[1938]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 1022s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-wKxRAf/SSSD-child-24421.output 1022s + echo '-----BEGIN CERTIFICATE-----' 1022s + tail -n1 /tmp/sssd-softhsm2-wKxRAf/SSSD-child-24421.output 1022s + echo '-----END CERTIFICATE-----' 1022s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-wKxRAf/SSSD-child-24421.pem 1022s Certificate: 1022s Data: 1022s Version: 3 (0x2) 1022s Serial Number: 3 (0x3) 1022s Signature Algorithm: sha256WithRSAEncryption 1022s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 1022s Validity 1022s Not Before: Mar 10 09:32:46 2024 GMT 1022s Not After : Mar 10 09:32:46 2025 GMT 1022s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 1022s Subject Public Key Info: 1022s Public Key Algorithm: rsaEncryption 1022s Public-Key: (1024 bit) 1022s Modulus: 1022s 00:e5:f6:30:18:21:ae:30:22:b7:c8:dd:a4:6f:93: 1022s ae:1e:bd:ba:4b:b5:c0:bb:c8:a6:28:bb:e0:ef:95: 1022s 72:e7:2f:b9:62:9e:64:1c:4c:3c:ea:85:cb:f1:05: 1022s 68:fe:4e:2c:e5:b6:3c:3d:af:c9:de:83:78:ce:47: 1022s c3:06:6e:a6:ae:27:3a:d0:3d:4e:13:60:e3:1c:7c: 1022s 73:ed:72:a8:ed:e2:5b:6e:b9:59:1c:c0:2f:7b:26: 1022s 74:63:15:8e:e2:0a:b3:6d:ca:85:f1:23:5a:54:ab: 1022s e7:d0:d1:da:f5:f3:ca:07:ed:53:de:df:a0:55:41: 1022s 1a:af:6c:09:9e:69:ae:4a:8f 1022s Exponent: 65537 (0x10001) 1022s X509v3 extensions: 1022s X509v3 Authority Key Identifier: 1022s B5:0A:C0:0C:7A:17:B9:8E:C4:3C:B1:90:34:7F:EB:43:9A:33:1F:B2 1022s X509v3 Basic Constraints: 1022s CA:FALSE 1022s Netscape Cert Type: 1022s SSL Client, S/MIME 1022s Netscape Comment: 1022s Test Organization Root CA trusted Certificate 1022s X509v3 Subject Key Identifier: 1022s 9F:27:56:AD:34:BB:56:79:81:E8:11:9E:04:37:D3:1F:02:CC:65:4B 1022s X509v3 Key Usage: critical 1022s Digital Signature, Non Repudiation, Key Encipherment 1022s X509v3 Extended Key Usage: 1022s TLS Web Client Authentication, E-mail Protection 1022s X509v3 Subject Alternative Name: 1022s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 1022s Signature Algorithm: sha256WithRSAEncryption 1022s Signature Value: 1022s 0e:bf:7e:d6:7a:22:a0:d2:5d:46:b2:56:42:36:0c:b1:63:27: 1022s 3d:6f:e5:dd:21:f3:16:6b:81:bd:d6:5f:1f:88:a7:ff:ca:18: 1022s 92:dc:b0:75:5c:63:03:76:48:00:e4:8e:3c:0d:bc:0b:69:97: 1022s 29:f6:00:67:19:a1:b1:35:c3:e4:d1:7f:a1:3c:37:b9:68:f9: 1022s 9e:9a:03:82:7a:43:b0:a7:2d:fc:25:96:26:45:26:1f:ce:0b: 1022s cc:5a:e5:8e:e9:af:93:a4:72:81:c4:93:7b:4f:af:6e:01:3f: 1022s 2b:73:57:3a:4a:9e:aa:36:97:df:4b:e5:99:85:4d:ee:2b:97: 1022s 4f:04 1022s + local found_md5 expected_md5 1022s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-wKxRAf/test-root-CA-trusted-certificate-0001.pem 1022s + expected_md5=Modulus=E5F6301821AE3022B7C8DDA46F93AE1EBDBA4BB5C0BBC8A628BBE0EF9572E72FB9629E641C4C3CEA85CBF10568FE4E2CE5B63C3DAFC9DE8378CE47C3066EA6AE273AD03D4E1360E31C7C73ED72A8EDE25B6EB9591CC02F7B267463158EE20AB36DCA85F1235A54ABE7D0D1DAF5F3CA07ED53DEDFA055411AAF6C099E69AE4A8F 1022s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-wKxRAf/SSSD-child-24421.pem 1022s + found_md5=Modulus=E5F6301821AE3022B7C8DDA46F93AE1EBDBA4BB5C0BBC8A628BBE0EF9572E72FB9629E641C4C3CEA85CBF10568FE4E2CE5B63C3DAFC9DE8378CE47C3066EA6AE273AD03D4E1360E31C7C73ED72A8EDE25B6EB9591CC02F7B267463158EE20AB36DCA85F1235A54ABE7D0D1DAF5F3CA07ED53DEDFA055411AAF6C099E69AE4A8F 1022s + '[' Modulus=E5F6301821AE3022B7C8DDA46F93AE1EBDBA4BB5C0BBC8A628BBE0EF9572E72FB9629E641C4C3CEA85CBF10568FE4E2CE5B63C3DAFC9DE8378CE47C3066EA6AE273AD03D4E1360E31C7C73ED72A8EDE25B6EB9591CC02F7B267463158EE20AB36DCA85F1235A54ABE7D0D1DAF5F3CA07ED53DEDFA055411AAF6C099E69AE4A8F '!=' Modulus=E5F6301821AE3022B7C8DDA46F93AE1EBDBA4BB5C0BBC8A628BBE0EF9572E72FB9629E641C4C3CEA85CBF10568FE4E2CE5B63C3DAFC9DE8378CE47C3066EA6AE273AD03D4E1360E31C7C73ED72A8EDE25B6EB9591CC02F7B267463158EE20AB36DCA85F1235A54ABE7D0D1DAF5F3CA07ED53DEDFA055411AAF6C099E69AE4A8F ']' 1022s + output_file=/tmp/sssd-softhsm2-wKxRAf/SSSD-child-24421-auth.output 1022s ++ basename /tmp/sssd-softhsm2-wKxRAf/SSSD-child-24421-auth.output .output 1022s + output_cert_file=/tmp/sssd-softhsm2-wKxRAf/SSSD-child-24421-auth.pem 1022s + echo -n 053350 1022s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/dev/null --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=no_verification --token_name 'Test Organization Root Tr Token' --module_name /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so 1022s [p11_child[1946]] [main] (0x0400): p11_child started. 1022s [p11_child[1946]] [main] (0x2000): Running in [auth] mode. 1022s [p11_child[1946]] [main] (0x2000): Running with effective IDs: [0][0]. 1022s [p11_child[1946]] [main] (0x2000): Running with real IDs [0][0]. 1022s [p11_child[1946]] [parse_cert_verify_opts] (0x0020): Found 'no_verification' option, disabling verification completely. This should not be used in production. 1022s [p11_child[1946]] [do_card] (0x4000): Module List: 1022s [p11_child[1946]] [do_card] (0x4000): common name: [softhsm2]. 1022s [p11_child[1946]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 1022s [p11_child[1946]] [do_card] (0x4000): Description [SoftHSM slot ID 0x7dd9008d] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 1022s [p11_child[1946]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 1022s [p11_child[1946]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x7dd9008d][2111373453] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 1022s [p11_child[1946]] [do_card] (0x4000): Login required. 1022s [p11_child[1946]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 1022s [p11_child[1946]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so Test Organization Root Tr Token Test Organization Root Tr Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 1022s [p11_child[1946]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x7dd9008d;slot-manufacturer=SoftHSM%20project;slot-id=2111373453;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=b0e148097dd9008d;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 1022s [p11_child[1946]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 1022s [p11_child[1946]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 1022s [p11_child[1946]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 1022s [p11_child[1946]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 1022s [p11_child[1946]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 1022s [p11_child[1946]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 1022s [p11_child[1946]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 1022s [p11_child[1946]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 1022s [p11_child[1946]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 1022s [p11_child[1946]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 1022s [p11_child[1946]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 1022s [p11_child[1946]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 1022s [p11_child[1946]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 1022s [p11_child[1946]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 1022s [p11_child[1946]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 1022s [p11_child[1946]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 1022s [p11_child[1946]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 1022s [p11_child[1946]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 1022s [p11_child[1946]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 1022s [p11_child[1946]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 1022s [p11_child[1946]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 1022s [p11_child[1946]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 1022s [p11_child[1946]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 1022s [p11_child[1946]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 1022s [p11_child[1946]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 1022s [p11_child[1946]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 1022s [p11_child[1946]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 1022s [p11_child[1946]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 1022s [p11_child[1946]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 1022s [p11_child[1946]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 1022s [p11_child[1946]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 1022s [p11_child[1946]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 1022s [p11_child[1946]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 1022s [p11_child[1946]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 1022s [p11_child[1946]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 1022s [p11_child[1946]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 1022s [p11_child[1946]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 1022s [p11_child[1946]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 1022s [p11_child[1946]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 1022s [p11_child[1946]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 1022s [p11_child[1946]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 1022s [p11_child[1946]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 1022s [p11_child[1946]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 1022s [p11_child[1946]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 1022s [p11_child[1946]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 1022s [p11_child[1946]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 1022s [p11_child[1946]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 1022s [p11_child[1946]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 1022s [p11_child[1946]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 1022s [p11_child[1946]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 1022s [p11_child[1946]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 1022s [p11_child[1946]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 1022s [p11_child[1946]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 1022s [p11_child[1946]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 1022s [p11_child[1946]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 1022s [p11_child[1946]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 1022s [p11_child[1946]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 1022s [p11_child[1946]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 1022s [p11_child[1946]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 1022s [p11_child[1946]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 1022s [p11_child[1946]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 1022s [p11_child[1946]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 1022s [p11_child[1946]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 1022s [p11_child[1946]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 1022s [p11_child[1946]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 1022s [p11_child[1946]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 1022s [p11_child[1946]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 1022s [p11_child[1946]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 1022s [p11_child[1946]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 1022s [p11_child[1946]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 1022s [p11_child[1946]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 1022s [p11_child[1946]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 1022s [p11_child[1946]] [do_card] (0x4000): Certificate verified and validated. 1022s [p11_child[1946]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 1022s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-wKxRAf/SSSD-child-24421-auth.output 1022s + echo '-----BEGIN CERTIFICATE-----' 1022s + tail -n1 /tmp/sssd-softhsm2-wKxRAf/SSSD-child-24421-auth.output 1022s + echo '-----END CERTIFICATE-----' 1022s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-wKxRAf/SSSD-child-24421-auth.pem 1022s Certificate: 1022s Data: 1022s Version: 3 (0x2) 1022s Serial Number: 3 (0x3) 1022s Signature Algorithm: sha256WithRSAEncryption 1022s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 1022s Validity 1022s Not Before: Mar 10 09:32:46 2024 GMT 1022s Not After : Mar 10 09:32:46 2025 GMT 1022s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 1022s Subject Public Key Info: 1022s Public Key Algorithm: rsaEncryption 1022s Public-Key: (1024 bit) 1022s Modulus: 1022s 00:e5:f6:30:18:21:ae:30:22:b7:c8:dd:a4:6f:93: 1022s ae:1e:bd:ba:4b:b5:c0:bb:c8:a6:28:bb:e0:ef:95: 1022s 72:e7:2f:b9:62:9e:64:1c:4c:3c:ea:85:cb:f1:05: 1022s 68:fe:4e:2c:e5:b6:3c:3d:af:c9:de:83:78:ce:47: 1022s c3:06:6e:a6:ae:27:3a:d0:3d:4e:13:60:e3:1c:7c: 1022s 73:ed:72:a8:ed:e2:5b:6e:b9:59:1c:c0:2f:7b:26: 1022s 74:63:15:8e:e2:0a:b3:6d:ca:85:f1:23:5a:54:ab: 1022s e7:d0:d1:da:f5:f3:ca:07:ed:53:de:df:a0:55:41: 1022s 1a:af:6c:09:9e:69:ae:4a:8f 1022s Exponent: 65537 (0x10001) 1022s X509v3 extensions: 1022s X509v3 Authority Key Identifier: 1022s B5:0A:C0:0C:7A:17:B9:8E:C4:3C:B1:90:34:7F:EB:43:9A:33:1F:B2 1022s X509v3 Basic Constraints: 1022s CA:FALSE 1022s Netscape Cert Type: 1022s SSL Client, S/MIME 1022s Netscape Comment: 1022s Test Organization Root CA trusted Certificate 1022s X509v3 Subject Key Identifier: 1022s 9F:27:56:AD:34:BB:56:79:81:E8:11:9E:04:37:D3:1F:02:CC:65:4B 1022s X509v3 Key Usage: critical 1022s Digital Signature, Non Repudiation, Key Encipherment 1022s X509v3 Extended Key Usage: 1022s TLS Web Client Authentication, E-mail Protection 1022s X509v3 Subject Alternative Name: 1022s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 1022s Signature Algorithm: sha256WithRSAEncryption 1022s Signature Value: 1022s 0e:bf:7e:d6:7a:22:a0:d2:5d:46:b2:56:42:36:0c:b1:63:27: 1022s 3d:6f:e5:dd:21:f3:16:6b:81:bd:d6:5f:1f:88:a7:ff:ca:18: 1022s 92:dc:b0:75:5c:63:03:76:48:00:e4:8e:3c:0d:bc:0b:69:97: 1022s 29:f6:00:67:19:a1:b1:35:c3:e4:d1:7f:a1:3c:37:b9:68:f9: 1022s 9e:9a:03:82:7a:43:b0:a7:2d:fc:25:96:26:45:26:1f:ce:0b: 1022s cc:5a:e5:8e:e9:af:93:a4:72:81:c4:93:7b:4f:af:6e:01:3f: 1022s 2b:73:57:3a:4a:9e:aa:36:97:df:4b:e5:99:85:4d:ee:2b:97: 1022s 4f:04 1022s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-wKxRAf/SSSD-child-24421-auth.pem 1022s + found_md5=Modulus=E5F6301821AE3022B7C8DDA46F93AE1EBDBA4BB5C0BBC8A628BBE0EF9572E72FB9629E641C4C3CEA85CBF10568FE4E2CE5B63C3DAFC9DE8378CE47C3066EA6AE273AD03D4E1360E31C7C73ED72A8EDE25B6EB9591CC02F7B267463158EE20AB36DCA85F1235A54ABE7D0D1DAF5F3CA07ED53DEDFA055411AAF6C099E69AE4A8F 1022s + '[' Modulus=E5F6301821AE3022B7C8DDA46F93AE1EBDBA4BB5C0BBC8A628BBE0EF9572E72FB9629E641C4C3CEA85CBF10568FE4E2CE5B63C3DAFC9DE8378CE47C3066EA6AE273AD03D4E1360E31C7C73ED72A8EDE25B6EB9591CC02F7B267463158EE20AB36DCA85F1235A54ABE7D0D1DAF5F3CA07ED53DEDFA055411AAF6C099E69AE4A8F '!=' Modulus=E5F6301821AE3022B7C8DDA46F93AE1EBDBA4BB5C0BBC8A628BBE0EF9572E72FB9629E641C4C3CEA85CBF10568FE4E2CE5B63C3DAFC9DE8378CE47C3066EA6AE273AD03D4E1360E31C7C73ED72A8EDE25B6EB9591CC02F7B267463158EE20AB36DCA85F1235A54ABE7D0D1DAF5F3CA07ED53DEDFA055411AAF6C099E69AE4A8F ']' 1022s + valid_certificate /tmp/sssd-softhsm2-wKxRAf/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-5150 /tmp/sssd-softhsm2-wKxRAf/test-root-CA.pem 1022s + check_certificate /tmp/sssd-softhsm2-wKxRAf/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-5150 /tmp/sssd-softhsm2-wKxRAf/test-root-CA.pem 1022s + local certificate=/tmp/sssd-softhsm2-wKxRAf/test-root-CA-trusted-certificate-0001.pem 1022s + local key_pass=pass:random-root-ca-trusted-cert-0001-5150 1022s + local key_ring=/tmp/sssd-softhsm2-wKxRAf/test-root-CA.pem 1022s + local verify_option= 1022s + prepare_softhsm2_card /tmp/sssd-softhsm2-wKxRAf/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-5150 1022s + local certificate=/tmp/sssd-softhsm2-wKxRAf/test-root-CA-trusted-certificate-0001.pem 1022s + local key_pass=pass:random-root-ca-trusted-cert-0001-5150 1022s + local key_cn 1022s + local key_name 1022s + local tokens_dir 1022s + local output_cert_file 1022s + token_name= 1022s ++ basename /tmp/sssd-softhsm2-wKxRAf/test-root-CA-trusted-certificate-0001.pem .pem 1022s + key_name=test-root-CA-trusted-certificate-0001 1022s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-wKxRAf/test-root-CA-trusted-certificate-0001.pem 1022s ++ sed -n 's/ *commonName *= //p' 1022s + key_cn='Test Organization Root Trusted Certificate 0001' 1022s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 1022s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-wKxRAf/softhsm2-test-root-CA-trusted-certificate-0001.conf 1022s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-wKxRAf/softhsm2-test-root-CA-trusted-certificate-0001.conf 1022s ++ basename /tmp/sssd-softhsm2-wKxRAf/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 1022s Test Organization Root Tr Token 1022s + tokens_dir=/tmp/sssd-softhsm2-wKxRAf/softhsm2-test-root-CA-trusted-certificate-0001 1022s + token_name='Test Organization Root Tr Token' 1022s + '[' '!' -e /tmp/sssd-softhsm2-wKxRAf/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 1022s + '[' '!' -d /tmp/sssd-softhsm2-wKxRAf/softhsm2-test-root-CA-trusted-certificate-0001 ']' 1022s + echo 'Test Organization Root Tr Token' 1022s + '[' -n '' ']' 1022s + local output_base_name=SSSD-child-27659 1022s + local output_file=/tmp/sssd-softhsm2-wKxRAf/SSSD-child-27659.output 1022s + output_cert_file=/tmp/sssd-softhsm2-wKxRAf/SSSD-child-27659.pem 1022s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-wKxRAf/test-root-CA.pem 1022s [p11_child[1956]] [main] (0x0400): p11_child started. 1022s [p11_child[1956]] [main] (0x2000): Running in [pre-auth] mode. 1022s [p11_child[1956]] [main] (0x2000): Running with effective IDs: [0][0]. 1022s [p11_child[1956]] [main] (0x2000): Running with real IDs [0][0]. 1022s [p11_child[1956]] [do_card] (0x4000): Module List: 1022s [p11_child[1956]] [do_card] (0x4000): common name: [softhsm2]. 1022s [p11_child[1956]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 1022s [p11_child[1956]] [do_card] (0x4000): Description [SoftHSM slot ID 0x7dd9008d] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 1022s [p11_child[1956]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 1022s [p11_child[1956]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x7dd9008d][2111373453] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 1022s [p11_child[1956]] [do_card] (0x4000): Login NOT required. 1022s [p11_child[1956]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 1022s [p11_child[1956]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 1022s [p11_child[1956]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Root Tr Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 1022s [p11_child[1956]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x7dd9008d;slot-manufacturer=SoftHSM%20project;slot-id=2111373453;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=b0e148097dd9008d;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 1022s [p11_child[1956]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 1022s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-wKxRAf/SSSD-child-27659.output 1022s + echo '-----BEGIN CERTIFICATE-----' 1022s + tail -n1 /tmp/sssd-softhsm2-wKxRAf/SSSD-child-27659.output 1022s + echo '-----END CERTIFICATE-----' 1022s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-wKxRAf/SSSD-child-27659.pem 1022s Certificate: 1022s Data: 1022s Version: 3 (0x2) 1022s Serial Number: 3 (0x3) 1022s Signature Algorithm: sha256WithRSAEncryption 1022s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 1022s Validity 1022s Not Before: Mar 10 09:32:46 2024 GMT 1022s Not After : Mar 10 09:32:46 2025 GMT 1022s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 1022s Subject Public Key Info: 1022s Public Key Algorithm: rsaEncryption 1022s Public-Key: (1024 bit) 1022s Modulus: 1022s 00:e5:f6:30:18:21:ae:30:22:b7:c8:dd:a4:6f:93: 1022s ae:1e:bd:ba:4b:b5:c0:bb:c8:a6:28:bb:e0:ef:95: 1022s 72:e7:2f:b9:62:9e:64:1c:4c:3c:ea:85:cb:f1:05: 1022s 68:fe:4e:2c:e5:b6:3c:3d:af:c9:de:83:78:ce:47: 1022s c3:06:6e:a6:ae:27:3a:d0:3d:4e:13:60:e3:1c:7c: 1022s 73:ed:72:a8:ed:e2:5b:6e:b9:59:1c:c0:2f:7b:26: 1022s 74:63:15:8e:e2:0a:b3:6d:ca:85:f1:23:5a:54:ab: 1022s e7:d0:d1:da:f5:f3:ca:07:ed:53:de:df:a0:55:41: 1022s 1a:af:6c:09:9e:69:ae:4a:8f 1022s Exponent: 65537 (0x10001) 1022s X509v3 extensions: 1022s X509v3 Authority Key Identifier: 1022s B5:0A:C0:0C:7A:17:B9:8E:C4:3C:B1:90:34:7F:EB:43:9A:33:1F:B2 1022s X509v3 Basic Constraints: 1022s CA:FALSE 1022s Netscape Cert Type: 1022s SSL Client, S/MIME 1022s Netscape Comment: 1022s Test Organization Root CA trusted Certificate 1022s X509v3 Subject Key Identifier: 1022s 9F:27:56:AD:34:BB:56:79:81:E8:11:9E:04:37:D3:1F:02:CC:65:4B 1022s X509v3 Key Usage: critical 1022s Digital Signature, Non Repudiation, Key Encipherment 1022s X509v3 Extended Key Usage: 1022s TLS Web Client Authentication, E-mail Protection 1022s X509v3 Subject Alternative Name: 1022s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 1022s Signature Algorithm: sha256WithRSAEncryption 1022s Signature Value: 1022s 0e:bf:7e:d6:7a:22:a0:d2:5d:46:b2:56:42:36:0c:b1:63:27: 1022s 3d:6f:e5:dd:21:f3:16:6b:81:bd:d6:5f:1f:88:a7:ff:ca:18: 1022s 92:dc:b0:75:5c:63:03:76:48:00:e4:8e:3c:0d:bc:0b:69:97: 1022s 29:f6:00:67:19:a1:b1:35:c3:e4:d1:7f:a1:3c:37:b9:68:f9: 1022s 9e:9a:03:82:7a:43:b0:a7:2d:fc:25:96:26:45:26:1f:ce:0b: 1022s cc:5a:e5:8e:e9:af:93:a4:72:81:c4:93:7b:4f:af:6e:01:3f: 1022s 2b:73:57:3a:4a:9e:aa:36:97:df:4b:e5:99:85:4d:ee:2b:97: 1022s 4f:04 1022s + local found_md5 expected_md5 1022s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-wKxRAf/test-root-CA-trusted-certificate-0001.pem 1022s + expected_md5=Modulus=E5F6301821AE3022B7C8DDA46F93AE1EBDBA4BB5C0BBC8A628BBE0EF9572E72FB9629E641C4C3CEA85CBF10568FE4E2CE5B63C3DAFC9DE8378CE47C3066EA6AE273AD03D4E1360E31C7C73ED72A8EDE25B6EB9591CC02F7B267463158EE20AB36DCA85F1235A54ABE7D0D1DAF5F3CA07ED53DEDFA055411AAF6C099E69AE4A8F 1022s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-wKxRAf/SSSD-child-27659.pem 1022s + found_md5=Modulus=E5F6301821AE3022B7C8DDA46F93AE1EBDBA4BB5C0BBC8A628BBE0EF9572E72FB9629E641C4C3CEA85CBF10568FE4E2CE5B63C3DAFC9DE8378CE47C3066EA6AE273AD03D4E1360E31C7C73ED72A8EDE25B6EB9591CC02F7B267463158EE20AB36DCA85F1235A54ABE7D0D1DAF5F3CA07ED53DEDFA055411AAF6C099E69AE4A8F 1022s + '[' Modulus=E5F6301821AE3022B7C8DDA46F93AE1EBDBA4BB5C0BBC8A628BBE0EF9572E72FB9629E641C4C3CEA85CBF10568FE4E2CE5B63C3DAFC9DE8378CE47C3066EA6AE273AD03D4E1360E31C7C73ED72A8EDE25B6EB9591CC02F7B267463158EE20AB36DCA85F1235A54ABE7D0D1DAF5F3CA07ED53DEDFA055411AAF6C099E69AE4A8F '!=' Modulus=E5F6301821AE3022B7C8DDA46F93AE1EBDBA4BB5C0BBC8A628BBE0EF9572E72FB9629E641C4C3CEA85CBF10568FE4E2CE5B63C3DAFC9DE8378CE47C3066EA6AE273AD03D4E1360E31C7C73ED72A8EDE25B6EB9591CC02F7B267463158EE20AB36DCA85F1235A54ABE7D0D1DAF5F3CA07ED53DEDFA055411AAF6C099E69AE4A8F ']' 1022s + output_file=/tmp/sssd-softhsm2-wKxRAf/SSSD-child-27659-auth.output 1022s ++ basename /tmp/sssd-softhsm2-wKxRAf/SSSD-child-27659-auth.output .output 1022s + output_cert_file=/tmp/sssd-softhsm2-wKxRAf/SSSD-child-27659-auth.pem 1022s + echo -n 053350 1022s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-wKxRAf/test-root-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 '' --token_name 'Test Organization Root Tr Token' --module_name /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so 1022s [p11_child[1964]] [main] (0x0400): p11_child started. 1022s [p11_child[1964]] [main] (0x2000): Running in [auth] mode. 1022s [p11_child[1964]] [main] (0x2000): Running with effective IDs: [0][0]. 1022s [p11_child[1964]] [main] (0x2000): Running with real IDs [0][0]. 1022s [p11_child[1964]] [do_card] (0x4000): Module List: 1022s [p11_child[1964]] [do_card] (0x4000): common name: [softhsm2]. 1022s [p11_child[1964]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 1022s [p11_child[1964]] [do_card] (0x4000): Description [SoftHSM slot ID 0x7dd9008d] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 1022s [p11_child[1964]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 1022s [p11_child[1964]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x7dd9008d][2111373453] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 1022s [p11_child[1964]] [do_card] (0x4000): Login required. 1022s [p11_child[1964]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 1022s [p11_child[1964]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 1022s [p11_child[1964]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so Test Organization Root Tr Token Test Organization Root Tr Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 1022s [p11_child[1964]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x7dd9008d;slot-manufacturer=SoftHSM%20project;slot-id=2111373453;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=b0e148097dd9008d;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 1022s [p11_child[1964]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 1022s [p11_child[1964]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 1022s [p11_child[1964]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 1022s [p11_child[1964]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 1022s [p11_child[1964]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 1022s [p11_child[1964]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 1022s [p11_child[1964]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 1022s [p11_child[1964]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 1022s [p11_child[1964]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 1022s [p11_child[1964]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 1022s [p11_child[1964]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 1022s [p11_child[1964]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 1022s [p11_child[1964]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 1022s [p11_child[1964]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 1022s [p11_child[1964]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 1022s [p11_child[1964]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 1022s [p11_child[1964]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 1022s [p11_child[1964]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 1022s [p11_child[1964]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 1022s [p11_child[1964]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 1022s [p11_child[1964]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 1022s [p11_child[1964]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 1022s [p11_child[1964]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 1022s [p11_child[1964]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 1022s [p11_child[1964]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 1022s [p11_child[1964]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 1022s [p11_child[1964]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 1022s [p11_child[1964]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 1022s [p11_child[1964]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 1022s [p11_child[1964]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 1022s [p11_child[1964]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 1022s [p11_child[1964]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 1022s [p11_child[1964]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 1022s [p11_child[1964]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 1022s [p11_child[1964]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 1022s [p11_child[1964]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 1022s [p11_child[1964]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 1022s [p11_child[1964]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 1022s [p11_child[1964]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 1022s [p11_child[1964]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 1022s [p11_child[1964]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 1022s [p11_child[1964]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 1022s [p11_child[1964]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 1022s [p11_child[1964]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 1022s [p11_child[1964]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 1022s [p11_child[1964]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 1022s [p11_child[1964]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 1022s [p11_child[1964]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 1022s [p11_child[1964]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 1022s [p11_child[1964]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 1022s [p11_child[1964]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 1022s [p11_child[1964]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 1022s [p11_child[1964]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 1022s [p11_child[1964]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 1022s [p11_child[1964]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 1022s [p11_child[1964]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 1022s [p11_child[1964]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 1022s [p11_child[1964]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 1022s [p11_child[1964]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 1022s [p11_child[1964]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 1022s [p11_child[1964]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 1022s [p11_child[1964]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 1022s [p11_child[1964]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 1022s [p11_child[1964]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 1022s [p11_child[1964]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 1022s [p11_child[1964]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 1022s [p11_child[1964]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 1022s [p11_child[1964]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 1022s [p11_child[1964]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 1022s [p11_child[1964]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 1022s [p11_child[1964]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 1022s [p11_child[1964]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 1022s [p11_child[1964]] [do_card] (0x4000): Certificate verified and validated. 1022s [p11_child[1964]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 1022s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-wKxRAf/SSSD-child-27659-auth.output 1022s + echo '-----BEGIN CERTIFICATE-----' 1022s + tail -n1 /tmp/sssd-softhsm2-wKxRAf/SSSD-child-27659-auth.output 1022s + echo '-----END CERTIFICATE-----' 1022s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-wKxRAf/SSSD-child-27659-auth.pem 1022s Certificate: 1022s Data: 1022s Version: 3 (0x2) 1022s Serial Number: 3 (0x3) 1022s Signature Algorithm: sha256WithRSAEncryption 1022s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 1022s Validity 1022s Not Before: Mar 10 09:32:46 2024 GMT 1022s Not After : Mar 10 09:32:46 2025 GMT 1022s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 1022s Subject Public Key Info: 1022s Public Key Algorithm: rsaEncryption 1022s Public-Key: (1024 bit) 1022s Modulus: 1022s 00:e5:f6:30:18:21:ae:30:22:b7:c8:dd:a4:6f:93: 1022s ae:1e:bd:ba:4b:b5:c0:bb:c8:a6:28:bb:e0:ef:95: 1022s 72:e7:2f:b9:62:9e:64:1c:4c:3c:ea:85:cb:f1:05: 1022s 68:fe:4e:2c:e5:b6:3c:3d:af:c9:de:83:78:ce:47: 1022s c3:06:6e:a6:ae:27:3a:d0:3d:4e:13:60:e3:1c:7c: 1022s 73:ed:72:a8:ed:e2:5b:6e:b9:59:1c:c0:2f:7b:26: 1022s 74:63:15:8e:e2:0a:b3:6d:ca:85:f1:23:5a:54:ab: 1022s e7:d0:d1:da:f5:f3:ca:07:ed:53:de:df:a0:55:41: 1022s 1a:af:6c:09:9e:69:ae:4a:8f 1022s Exponent: 65537 (0x10001) 1022s X509v3 extensions: 1022s X509v3 Authority Key Identifier: 1022s B5:0A:C0:0C:7A:17:B9:8E:C4:3C:B1:90:34:7F:EB:43:9A:33:1F:B2 1022s X509v3 Basic Constraints: 1022s CA:FALSE 1022s Netscape Cert Type: 1022s SSL Client, S/MIME 1022s Netscape Comment: 1022s Test Organization Root CA trusted Certificate 1022s X509v3 Subject Key Identifier: 1022s 9F:27:56:AD:34:BB:56:79:81:E8:11:9E:04:37:D3:1F:02:CC:65:4B 1022s X509v3 Key Usage: critical 1022s Digital Signature, Non Repudiation, Key Encipherment 1022s X509v3 Extended Key Usage: 1022s TLS Web Client Authentication, E-mail Protection 1022s X509v3 Subject Alternative Name: 1022s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 1022s Signature Algorithm: sha256WithRSAEncryption 1022s Signature Value: 1022s 0e:bf:7e:d6:7a:22:a0:d2:5d:46:b2:56:42:36:0c:b1:63:27: 1022s 3d:6f:e5:dd:21:f3:16:6b:81:bd:d6:5f:1f:88:a7:ff:ca:18: 1022s 92:dc:b0:75:5c:63:03:76:48:00:e4:8e:3c:0d:bc:0b:69:97: 1022s 29:f6:00:67:19:a1:b1:35:c3:e4:d1:7f:a1:3c:37:b9:68:f9: 1022s 9e:9a:03:82:7a:43:b0:a7:2d:fc:25:96:26:45:26:1f:ce:0b: 1022s cc:5a:e5:8e:e9:af:93:a4:72:81:c4:93:7b:4f:af:6e:01:3f: 1022s 2b:73:57:3a:4a:9e:aa:36:97:df:4b:e5:99:85:4d:ee:2b:97: 1022s 4f:04 1022s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-wKxRAf/SSSD-child-27659-auth.pem 1022s + found_md5=Modulus=E5F6301821AE3022B7C8DDA46F93AE1EBDBA4BB5C0BBC8A628BBE0EF9572E72FB9629E641C4C3CEA85CBF10568FE4E2CE5B63C3DAFC9DE8378CE47C3066EA6AE273AD03D4E1360E31C7C73ED72A8EDE25B6EB9591CC02F7B267463158EE20AB36DCA85F1235A54ABE7D0D1DAF5F3CA07ED53DEDFA055411AAF6C099E69AE4A8F 1022s + '[' Modulus=E5F6301821AE3022B7C8DDA46F93AE1EBDBA4BB5C0BBC8A628BBE0EF9572E72FB9629E641C4C3CEA85CBF10568FE4E2CE5B63C3DAFC9DE8378CE47C3066EA6AE273AD03D4E1360E31C7C73ED72A8EDE25B6EB9591CC02F7B267463158EE20AB36DCA85F1235A54ABE7D0D1DAF5F3CA07ED53DEDFA055411AAF6C099E69AE4A8F '!=' Modulus=E5F6301821AE3022B7C8DDA46F93AE1EBDBA4BB5C0BBC8A628BBE0EF9572E72FB9629E641C4C3CEA85CBF10568FE4E2CE5B63C3DAFC9DE8378CE47C3066EA6AE273AD03D4E1360E31C7C73ED72A8EDE25B6EB9591CC02F7B267463158EE20AB36DCA85F1235A54ABE7D0D1DAF5F3CA07ED53DEDFA055411AAF6C099E69AE4A8F ']' 1022s + valid_certificate /tmp/sssd-softhsm2-wKxRAf/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-5150 /tmp/sssd-softhsm2-wKxRAf/test-root-CA.pem partial_chain 1022s + check_certificate /tmp/sssd-softhsm2-wKxRAf/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-5150 /tmp/sssd-softhsm2-wKxRAf/test-root-CA.pem partial_chain 1022s + local certificate=/tmp/sssd-softhsm2-wKxRAf/test-root-CA-trusted-certificate-0001.pem 1022s + local key_pass=pass:random-root-ca-trusted-cert-0001-5150 1022s + local key_ring=/tmp/sssd-softhsm2-wKxRAf/test-root-CA.pem 1022s + local verify_option=partial_chain 1022s + prepare_softhsm2_card /tmp/sssd-softhsm2-wKxRAf/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-5150 1022s + local certificate=/tmp/sssd-softhsm2-wKxRAf/test-root-CA-trusted-certificate-0001.pem 1022s + local key_pass=pass:random-root-ca-trusted-cert-0001-5150 1022s + local key_cn 1022s + local key_name 1022s + local tokens_dir 1022s + local output_cert_file 1022s + token_name= 1022s ++ basename /tmp/sssd-softhsm2-wKxRAf/test-root-CA-trusted-certificate-0001.pem .pem 1022s + key_name=test-root-CA-trusted-certificate-0001 1022s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-wKxRAf/test-root-CA-trusted-certificate-0001.pem 1022s ++ sed -n 's/ *commonName *= //p' 1022s + key_cn='Test Organization Root Trusted Certificate 0001' 1022s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 1022s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-wKxRAf/softhsm2-test-root-CA-trusted-certificate-0001.conf 1022s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-wKxRAf/softhsm2-test-root-CA-trusted-certificate-0001.conf 1022s ++ basename /tmp/sssd-softhsm2-wKxRAf/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 1022s + tokens_dir=/tmp/sssd-softhsm2-wKxRAf/softhsm2-test-root-CA-trusted-certificate-0001 1022s + token_name='Test Organization Root Tr Token' 1022s + '[' '!' -e /tmp/sssd-softhsm2-wKxRAf/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 1022s Test Organization Root Tr Token 1022s + '[' '!' -d /tmp/sssd-softhsm2-wKxRAf/softhsm2-test-root-CA-trusted-certificate-0001 ']' 1022s + echo 'Test Organization Root Tr Token' 1022s + '[' -n partial_chain ']' 1022s + local verify_arg=--verify=partial_chain 1022s + local output_base_name=SSSD-child-7355 1022s + local output_file=/tmp/sssd-softhsm2-wKxRAf/SSSD-child-7355.output 1022s + output_cert_file=/tmp/sssd-softhsm2-wKxRAf/SSSD-child-7355.pem 1022s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-wKxRAf/test-root-CA.pem 1022s [p11_child[1974]] [main] (0x0400): p11_child started. 1022s [p11_child[1974]] [main] (0x2000): Running in [pre-auth] mode. 1022s [p11_child[1974]] [main] (0x2000): Running with effective IDs: [0][0]. 1022s [p11_child[1974]] [main] (0x2000): Running with real IDs [0][0]. 1022s [p11_child[1974]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 1022s [p11_child[1974]] [do_card] (0x4000): Module List: 1022s [p11_child[1974]] [do_card] (0x4000): common name: [softhsm2]. 1022s [p11_child[1974]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 1022s [p11_child[1974]] [do_card] (0x4000): Description [SoftHSM slot ID 0x7dd9008d] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 1022s [p11_child[1974]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 1022s [p11_child[1974]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x7dd9008d][2111373453] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 1022s [p11_child[1974]] [do_card] (0x4000): Login NOT required. 1022s [p11_child[1974]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 1022s [p11_child[1974]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 1022s [p11_child[1974]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Root Tr Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 1022s [p11_child[1974]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x7dd9008d;slot-manufacturer=SoftHSM%20project;slot-id=2111373453;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=b0e148097dd9008d;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 1022s [p11_child[1974]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 1022s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-wKxRAf/SSSD-child-7355.output 1022s + echo '-----BEGIN CERTIFICATE-----' 1022s + tail -n1 /tmp/sssd-softhsm2-wKxRAf/SSSD-child-7355.output 1022s + echo '-----END CERTIFICATE-----' 1022s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-wKxRAf/SSSD-child-7355.pem 1022s Certificate: 1022s Data: 1022s Version: 3 (0x2) 1022s Serial Number: 3 (0x3) 1022s Signature Algorithm: sha256WithRSAEncryption 1022s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 1022s Validity 1022s Not Before: Mar 10 09:32:46 2024 GMT 1022s Not After : Mar 10 09:32:46 2025 GMT 1022s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 1022s Subject Public Key Info: 1022s Public Key Algorithm: rsaEncryption 1022s Public-Key: (1024 bit) 1022s Modulus: 1022s 00:e5:f6:30:18:21:ae:30:22:b7:c8:dd:a4:6f:93: 1022s ae:1e:bd:ba:4b:b5:c0:bb:c8:a6:28:bb:e0:ef:95: 1022s 72:e7:2f:b9:62:9e:64:1c:4c:3c:ea:85:cb:f1:05: 1022s 68:fe:4e:2c:e5:b6:3c:3d:af:c9:de:83:78:ce:47: 1022s c3:06:6e:a6:ae:27:3a:d0:3d:4e:13:60:e3:1c:7c: 1022s 73:ed:72:a8:ed:e2:5b:6e:b9:59:1c:c0:2f:7b:26: 1022s 74:63:15:8e:e2:0a:b3:6d:ca:85:f1:23:5a:54:ab: 1022s e7:d0:d1:da:f5:f3:ca:07:ed:53:de:df:a0:55:41: 1022s 1a:af:6c:09:9e:69:ae:4a:8f 1022s Exponent: 65537 (0x10001) 1022s X509v3 extensions: 1022s X509v3 Authority Key Identifier: 1022s B5:0A:C0:0C:7A:17:B9:8E:C4:3C:B1:90:34:7F:EB:43:9A:33:1F:B2 1022s X509v3 Basic Constraints: 1022s CA:FALSE 1022s Netscape Cert Type: 1022s SSL Client, S/MIME 1022s Netscape Comment: 1022s Test Organization Root CA trusted Certificate 1022s X509v3 Subject Key Identifier: 1022s 9F:27:56:AD:34:BB:56:79:81:E8:11:9E:04:37:D3:1F:02:CC:65:4B 1022s X509v3 Key Usage: critical 1022s Digital Signature, Non Repudiation, Key Encipherment 1022s X509v3 Extended Key Usage: 1022s TLS Web Client Authentication, E-mail Protection 1022s X509v3 Subject Alternative Name: 1022s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 1022s Signature Algorithm: sha256WithRSAEncryption 1022s Signature Value: 1022s 0e:bf:7e:d6:7a:22:a0:d2:5d:46:b2:56:42:36:0c:b1:63:27: 1022s 3d:6f:e5:dd:21:f3:16:6b:81:bd:d6:5f:1f:88:a7:ff:ca:18: 1022s 92:dc:b0:75:5c:63:03:76:48:00:e4:8e:3c:0d:bc:0b:69:97: 1022s 29:f6:00:67:19:a1:b1:35:c3:e4:d1:7f:a1:3c:37:b9:68:f9: 1022s 9e:9a:03:82:7a:43:b0:a7:2d:fc:25:96:26:45:26:1f:ce:0b: 1022s cc:5a:e5:8e:e9:af:93:a4:72:81:c4:93:7b:4f:af:6e:01:3f: 1022s 2b:73:57:3a:4a:9e:aa:36:97:df:4b:e5:99:85:4d:ee:2b:97: 1022s 4f:04 1022s + local found_md5 expected_md5 1022s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-wKxRAf/test-root-CA-trusted-certificate-0001.pem 1022s + expected_md5=Modulus=E5F6301821AE3022B7C8DDA46F93AE1EBDBA4BB5C0BBC8A628BBE0EF9572E72FB9629E641C4C3CEA85CBF10568FE4E2CE5B63C3DAFC9DE8378CE47C3066EA6AE273AD03D4E1360E31C7C73ED72A8EDE25B6EB9591CC02F7B267463158EE20AB36DCA85F1235A54ABE7D0D1DAF5F3CA07ED53DEDFA055411AAF6C099E69AE4A8F 1022s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-wKxRAf/SSSD-child-7355.pem 1022s + found_md5=Modulus=E5F6301821AE3022B7C8DDA46F93AE1EBDBA4BB5C0BBC8A628BBE0EF9572E72FB9629E641C4C3CEA85CBF10568FE4E2CE5B63C3DAFC9DE8378CE47C3066EA6AE273AD03D4E1360E31C7C73ED72A8EDE25B6EB9591CC02F7B267463158EE20AB36DCA85F1235A54ABE7D0D1DAF5F3CA07ED53DEDFA055411AAF6C099E69AE4A8F 1022s + '[' Modulus=E5F6301821AE3022B7C8DDA46F93AE1EBDBA4BB5C0BBC8A628BBE0EF9572E72FB9629E641C4C3CEA85CBF10568FE4E2CE5B63C3DAFC9DE8378CE47C3066EA6AE273AD03D4E1360E31C7C73ED72A8EDE25B6EB9591CC02F7B267463158EE20AB36DCA85F1235A54ABE7D0D1DAF5F3CA07ED53DEDFA055411AAF6C099E69AE4A8F '!=' Modulus=E5F6301821AE3022B7C8DDA46F93AE1EBDBA4BB5C0BBC8A628BBE0EF9572E72FB9629E641C4C3CEA85CBF10568FE4E2CE5B63C3DAFC9DE8378CE47C3066EA6AE273AD03D4E1360E31C7C73ED72A8EDE25B6EB9591CC02F7B267463158EE20AB36DCA85F1235A54ABE7D0D1DAF5F3CA07ED53DEDFA055411AAF6C099E69AE4A8F ']' 1022s + output_file=/tmp/sssd-softhsm2-wKxRAf/SSSD-child-7355-auth.output 1022s ++ basename /tmp/sssd-softhsm2-wKxRAf/SSSD-child-7355-auth.output .output 1022s + output_cert_file=/tmp/sssd-softhsm2-wKxRAf/SSSD-child-7355-auth.pem 1022s + echo -n 053350 1022s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-wKxRAf/test-root-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Root Tr Token' --module_name /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so 1022s [p11_child[1982]] [main] (0x0400): p11_child started. 1022s [p11_child[1982]] [main] (0x2000): Running in [auth] mode. 1022s [p11_child[1982]] [main] (0x2000): Running with effective IDs: [0][0]. 1022s [p11_child[1982]] [main] (0x2000): Running with real IDs [0][0]. 1022s [p11_child[1982]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 1022s [p11_child[1982]] [do_card] (0x4000): Module List: 1022s [p11_child[1982]] [do_card] (0x4000): common name: [softhsm2]. 1022s [p11_child[1982]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 1022s [p11_child[1982]] [do_card] (0x4000): Description [SoftHSM slot ID 0x7dd9008d] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 1022s [p11_child[1982]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 1022s [p11_child[1982]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x7dd9008d][2111373453] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 1022s [p11_child[1982]] [do_card] (0x4000): Login required. 1022s [p11_child[1982]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 1022s [p11_child[1982]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 1022s [p11_child[1982]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so Test Organization Root Tr Token Test Organization Root Tr Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 1022s [p11_child[1982]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x7dd9008d;slot-manufacturer=SoftHSM%20project;slot-id=2111373453;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=b0e148097dd9008d;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 1022s [p11_child[1982]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 1022s [p11_child[1982]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 1022s [p11_child[1982]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 1022s [p11_child[1982]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 1022s [p11_child[1982]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 1022s [p11_child[1982]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 1022s [p11_child[1982]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 1022s [p11_child[1982]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 1022s [p11_child[1982]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 1022s [p11_child[1982]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 1022s [p11_child[1982]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 1022s [p11_child[1982]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 1022s [p11_child[1982]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 1022s [p11_child[1982]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 1022s [p11_child[1982]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 1022s [p11_child[1982]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 1022s [p11_child[1982]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 1022s [p11_child[1982]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 1022s [p11_child[1982]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 1022s [p11_child[1982]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 1022s [p11_child[1982]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 1022s [p11_child[1982]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 1022s [p11_child[1982]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 1022s [p11_child[1982]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 1022s [p11_child[1982]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 1022s [p11_child[1982]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 1022s [p11_child[1982]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 1022s [p11_child[1982]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 1022s [p11_child[1982]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 1022s [p11_child[1982]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 1022s [p11_child[1982]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 1022s [p11_child[1982]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 1022s [p11_child[1982]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 1022s [p11_child[1982]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 1022s [p11_child[1982]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 1022s [p11_child[1982]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 1022s [p11_child[1982]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 1022s [p11_child[1982]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 1022s [p11_child[1982]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 1022s [p11_child[1982]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 1022s [p11_child[1982]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 1022s [p11_child[1982]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 1022s [p11_child[1982]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 1022s [p11_child[1982]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 1022s [p11_child[1982]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 1022s [p11_child[1982]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 1022s [p11_child[1982]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 1022s [p11_child[1982]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 1022s [p11_child[1982]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 1022s [p11_child[1982]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 1022s [p11_child[1982]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 1022s [p11_child[1982]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 1022s [p11_child[1982]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 1022s [p11_child[1982]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 1022s [p11_child[1982]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 1022s [p11_child[1982]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 1022s [p11_child[1982]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 1022s [p11_child[1982]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 1022s [p11_child[1982]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 1022s [p11_child[1982]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 1022s [p11_child[1982]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 1022s [p11_child[1982]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 1022s [p11_child[1982]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 1022s [p11_child[1982]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 1022s [p11_child[1982]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 1022s [p11_child[1982]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 1022s [p11_child[1982]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 1022s [p11_child[1982]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 1022s [p11_child[1982]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 1022s [p11_child[1982]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 1022s [p11_child[1982]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 1022s [p11_child[1982]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 1022s [p11_child[1982]] [do_card] (0x4000): Certificate verified and validated. 1022s [p11_child[1982]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 1022s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-wKxRAf/SSSD-child-7355-auth.output 1022s + echo '-----BEGIN CERTIFICATE-----' 1022s + tail -n1 /tmp/sssd-softhsm2-wKxRAf/SSSD-child-7355-auth.output 1022s + echo '-----END CERTIFICATE-----' 1022s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-wKxRAf/SSSD-child-7355-auth.pem 1022s Certificate: 1022s Data: 1022s Version: 3 (0x2) 1022s Serial Number: 3 (0x3) 1022s Signature Algorithm: sha256WithRSAEncryption 1022s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 1022s Validity 1022s Not Before: Mar 10 09:32:46 2024 GMT 1022s Not After : Mar 10 09:32:46 2025 GMT 1022s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 1022s Subject Public Key Info: 1022s Public Key Algorithm: rsaEncryption 1022s Public-Key: (1024 bit) 1022s Modulus: 1022s 00:e5:f6:30:18:21:ae:30:22:b7:c8:dd:a4:6f:93: 1022s ae:1e:bd:ba:4b:b5:c0:bb:c8:a6:28:bb:e0:ef:95: 1022s 72:e7:2f:b9:62:9e:64:1c:4c:3c:ea:85:cb:f1:05: 1022s 68:fe:4e:2c:e5:b6:3c:3d:af:c9:de:83:78:ce:47: 1022s c3:06:6e:a6:ae:27:3a:d0:3d:4e:13:60:e3:1c:7c: 1022s 73:ed:72:a8:ed:e2:5b:6e:b9:59:1c:c0:2f:7b:26: 1022s 74:63:15:8e:e2:0a:b3:6d:ca:85:f1:23:5a:54:ab: 1022s e7:d0:d1:da:f5:f3:ca:07:ed:53:de:df:a0:55:41: 1022s 1a:af:6c:09:9e:69:ae:4a:8f 1022s Exponent: 65537 (0x10001) 1022s X509v3 extensions: 1022s X509v3 Authority Key Identifier: 1022s B5:0A:C0:0C:7A:17:B9:8E:C4:3C:B1:90:34:7F:EB:43:9A:33:1F:B2 1022s X509v3 Basic Constraints: 1022s CA:FALSE 1022s Netscape Cert Type: 1022s SSL Client, S/MIME 1022s Netscape Comment: 1022s Test Organization Root CA trusted Certificate 1022s X509v3 Subject Key Identifier: 1022s 9F:27:56:AD:34:BB:56:79:81:E8:11:9E:04:37:D3:1F:02:CC:65:4B 1022s X509v3 Key Usage: critical 1022s Digital Signature, Non Repudiation, Key Encipherment 1022s X509v3 Extended Key Usage: 1022s TLS Web Client Authentication, E-mail Protection 1022s X509v3 Subject Alternative Name: 1022s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 1022s Signature Algorithm: sha256WithRSAEncryption 1022s Signature Value: 1022s 0e:bf:7e:d6:7a:22:a0:d2:5d:46:b2:56:42:36:0c:b1:63:27: 1022s 3d:6f:e5:dd:21:f3:16:6b:81:bd:d6:5f:1f:88:a7:ff:ca:18: 1022s 92:dc:b0:75:5c:63:03:76:48:00:e4:8e:3c:0d:bc:0b:69:97: 1022s 29:f6:00:67:19:a1:b1:35:c3:e4:d1:7f:a1:3c:37:b9:68:f9: 1022s 9e:9a:03:82:7a:43:b0:a7:2d:fc:25:96:26:45:26:1f:ce:0b: 1022s cc:5a:e5:8e:e9:af:93:a4:72:81:c4:93:7b:4f:af:6e:01:3f: 1022s 2b:73:57:3a:4a:9e:aa:36:97:df:4b:e5:99:85:4d:ee:2b:97: 1022s 4f:04 1022s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-wKxRAf/SSSD-child-7355-auth.pem 1022s + found_md5=Modulus=E5F6301821AE3022B7C8DDA46F93AE1EBDBA4BB5C0BBC8A628BBE0EF9572E72FB9629E641C4C3CEA85CBF10568FE4E2CE5B63C3DAFC9DE8378CE47C3066EA6AE273AD03D4E1360E31C7C73ED72A8EDE25B6EB9591CC02F7B267463158EE20AB36DCA85F1235A54ABE7D0D1DAF5F3CA07ED53DEDFA055411AAF6C099E69AE4A8F 1022s + '[' Modulus=E5F6301821AE3022B7C8DDA46F93AE1EBDBA4BB5C0BBC8A628BBE0EF9572E72FB9629E641C4C3CEA85CBF10568FE4E2CE5B63C3DAFC9DE8378CE47C3066EA6AE273AD03D4E1360E31C7C73ED72A8EDE25B6EB9591CC02F7B267463158EE20AB36DCA85F1235A54ABE7D0D1DAF5F3CA07ED53DEDFA055411AAF6C099E69AE4A8F '!=' Modulus=E5F6301821AE3022B7C8DDA46F93AE1EBDBA4BB5C0BBC8A628BBE0EF9572E72FB9629E641C4C3CEA85CBF10568FE4E2CE5B63C3DAFC9DE8378CE47C3066EA6AE273AD03D4E1360E31C7C73ED72A8EDE25B6EB9591CC02F7B267463158EE20AB36DCA85F1235A54ABE7D0D1DAF5F3CA07ED53DEDFA055411AAF6C099E69AE4A8F ']' 1022s + valid_certificate /tmp/sssd-softhsm2-wKxRAf/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-5150 /tmp/sssd-softhsm2-wKxRAf/test-full-chain-CA.pem 1022s + check_certificate /tmp/sssd-softhsm2-wKxRAf/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-5150 /tmp/sssd-softhsm2-wKxRAf/test-full-chain-CA.pem 1022s + local certificate=/tmp/sssd-softhsm2-wKxRAf/test-root-CA-trusted-certificate-0001.pem 1022s + local key_pass=pass:random-root-ca-trusted-cert-0001-5150 1022s + local key_ring=/tmp/sssd-softhsm2-wKxRAf/test-full-chain-CA.pem 1022s + local verify_option= 1022s + prepare_softhsm2_card /tmp/sssd-softhsm2-wKxRAf/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-5150 1022s + local certificate=/tmp/sssd-softhsm2-wKxRAf/test-root-CA-trusted-certificate-0001.pem 1022s + local key_pass=pass:random-root-ca-trusted-cert-0001-5150 1022s + local key_cn 1022s + local key_name 1022s + local tokens_dir 1022s + local output_cert_file 1022s + token_name= 1022s ++ basename /tmp/sssd-softhsm2-wKxRAf/test-root-CA-trusted-certificate-0001.pem .pem 1022s + key_name=test-root-CA-trusted-certificate-0001 1022s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-wKxRAf/test-root-CA-trusted-certificate-0001.pem 1022s ++ sed -n 's/ *commonName *= //p' 1022s + key_cn='Test Organization Root Trusted Certificate 0001' 1022s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 1022s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-wKxRAf/softhsm2-test-root-CA-trusted-certificate-0001.conf 1022s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-wKxRAf/softhsm2-test-root-CA-trusted-certificate-0001.conf 1022s ++ basename /tmp/sssd-softhsm2-wKxRAf/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 1022s + tokens_dir=/tmp/sssd-softhsm2-wKxRAf/softhsm2-test-root-CA-trusted-certificate-0001 1022s + token_name='Test Organization Root Tr Token' 1022s Test Organization Root Tr Token 1022s + '[' '!' -e /tmp/sssd-softhsm2-wKxRAf/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 1022s + '[' '!' -d /tmp/sssd-softhsm2-wKxRAf/softhsm2-test-root-CA-trusted-certificate-0001 ']' 1022s + echo 'Test Organization Root Tr Token' 1022s + '[' -n '' ']' 1022s + local output_base_name=SSSD-child-1173 1022s + local output_file=/tmp/sssd-softhsm2-wKxRAf/SSSD-child-1173.output 1022s + output_cert_file=/tmp/sssd-softhsm2-wKxRAf/SSSD-child-1173.pem 1022s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-wKxRAf/test-full-chain-CA.pem 1022s [p11_child[1992]] [main] (0x0400): p11_child started. 1022s [p11_child[1992]] [main] (0x2000): Running in [pre-auth] mode. 1022s [p11_child[1992]] [main] (0x2000): Running with effective IDs: [0][0]. 1022s [p11_child[1992]] [main] (0x2000): Running with real IDs [0][0]. 1022s [p11_child[1992]] [do_card] (0x4000): Module List: 1022s [p11_child[1992]] [do_card] (0x4000): common name: [softhsm2]. 1022s [p11_child[1992]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 1022s [p11_child[1992]] [do_card] (0x4000): Description [SoftHSM slot ID 0x7dd9008d] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 1022s [p11_child[1992]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 1022s [p11_child[1992]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x7dd9008d][2111373453] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 1022s [p11_child[1992]] [do_card] (0x4000): Login NOT required. 1022s [p11_child[1992]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 1022s [p11_child[1992]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 1022s [p11_child[1992]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Root Tr Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 1022s [p11_child[1992]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x7dd9008d;slot-manufacturer=SoftHSM%20project;slot-id=2111373453;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=b0e148097dd9008d;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 1022s [p11_child[1992]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 1022s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-wKxRAf/SSSD-child-1173.output 1022s + echo '-----BEGIN CERTIFICATE-----' 1022s + tail -n1 /tmp/sssd-softhsm2-wKxRAf/SSSD-child-1173.output 1022s + echo '-----END CERTIFICATE-----' 1022s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-wKxRAf/SSSD-child-1173.pem 1022s Certificate: 1022s Data: 1022s Version: 3 (0x2) 1022s Serial Number: 3 (0x3) 1022s Signature Algorithm: sha256WithRSAEncryption 1022s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 1022s Validity 1022s Not Before: Mar 10 09:32:46 2024 GMT 1022s Not After : Mar 10 09:32:46 2025 GMT 1022s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 1022s Subject Public Key Info: 1022s Public Key Algorithm: rsaEncryption 1022s Public-Key: (1024 bit) 1022s Modulus: 1022s 00:e5:f6:30:18:21:ae:30:22:b7:c8:dd:a4:6f:93: 1022s ae:1e:bd:ba:4b:b5:c0:bb:c8:a6:28:bb:e0:ef:95: 1022s 72:e7:2f:b9:62:9e:64:1c:4c:3c:ea:85:cb:f1:05: 1022s 68:fe:4e:2c:e5:b6:3c:3d:af:c9:de:83:78:ce:47: 1022s c3:06:6e:a6:ae:27:3a:d0:3d:4e:13:60:e3:1c:7c: 1022s 73:ed:72:a8:ed:e2:5b:6e:b9:59:1c:c0:2f:7b:26: 1022s 74:63:15:8e:e2:0a:b3:6d:ca:85:f1:23:5a:54:ab: 1022s e7:d0:d1:da:f5:f3:ca:07:ed:53:de:df:a0:55:41: 1022s 1a:af:6c:09:9e:69:ae:4a:8f 1022s Exponent: 65537 (0x10001) 1022s X509v3 extensions: 1022s X509v3 Authority Key Identifier: 1022s B5:0A:C0:0C:7A:17:B9:8E:C4:3C:B1:90:34:7F:EB:43:9A:33:1F:B2 1022s X509v3 Basic Constraints: 1022s CA:FALSE 1022s Netscape Cert Type: 1022s SSL Client, S/MIME 1022s Netscape Comment: 1022s Test Organization Root CA trusted Certificate 1022s X509v3 Subject Key Identifier: 1022s 9F:27:56:AD:34:BB:56:79:81:E8:11:9E:04:37:D3:1F:02:CC:65:4B 1022s X509v3 Key Usage: critical 1022s Digital Signature, Non Repudiation, Key Encipherment 1022s X509v3 Extended Key Usage: 1022s TLS Web Client Authentication, E-mail Protection 1022s X509v3 Subject Alternative Name: 1022s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 1022s Signature Algorithm: sha256WithRSAEncryption 1022s Signature Value: 1022s 0e:bf:7e:d6:7a:22:a0:d2:5d:46:b2:56:42:36:0c:b1:63:27: 1022s 3d:6f:e5:dd:21:f3:16:6b:81:bd:d6:5f:1f:88:a7:ff:ca:18: 1022s 92:dc:b0:75:5c:63:03:76:48:00:e4:8e:3c:0d:bc:0b:69:97: 1022s 29:f6:00:67:19:a1:b1:35:c3:e4:d1:7f:a1:3c:37:b9:68:f9: 1022s 9e:9a:03:82:7a:43:b0:a7:2d:fc:25:96:26:45:26:1f:ce:0b: 1022s cc:5a:e5:8e:e9:af:93:a4:72:81:c4:93:7b:4f:af:6e:01:3f: 1022s 2b:73:57:3a:4a:9e:aa:36:97:df:4b:e5:99:85:4d:ee:2b:97: 1022s 4f:04 1022s + local found_md5 expected_md5 1022s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-wKxRAf/test-root-CA-trusted-certificate-0001.pem 1022s + expected_md5=Modulus=E5F6301821AE3022B7C8DDA46F93AE1EBDBA4BB5C0BBC8A628BBE0EF9572E72FB9629E641C4C3CEA85CBF10568FE4E2CE5B63C3DAFC9DE8378CE47C3066EA6AE273AD03D4E1360E31C7C73ED72A8EDE25B6EB9591CC02F7B267463158EE20AB36DCA85F1235A54ABE7D0D1DAF5F3CA07ED53DEDFA055411AAF6C099E69AE4A8F 1022s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-wKxRAf/SSSD-child-1173.pem 1022s + found_md5=Modulus=E5F6301821AE3022B7C8DDA46F93AE1EBDBA4BB5C0BBC8A628BBE0EF9572E72FB9629E641C4C3CEA85CBF10568FE4E2CE5B63C3DAFC9DE8378CE47C3066EA6AE273AD03D4E1360E31C7C73ED72A8EDE25B6EB9591CC02F7B267463158EE20AB36DCA85F1235A54ABE7D0D1DAF5F3CA07ED53DEDFA055411AAF6C099E69AE4A8F 1022s + '[' Modulus=E5F6301821AE3022B7C8DDA46F93AE1EBDBA4BB5C0BBC8A628BBE0EF9572E72FB9629E641C4C3CEA85CBF10568FE4E2CE5B63C3DAFC9DE8378CE47C3066EA6AE273AD03D4E1360E31C7C73ED72A8EDE25B6EB9591CC02F7B267463158EE20AB36DCA85F1235A54ABE7D0D1DAF5F3CA07ED53DEDFA055411AAF6C099E69AE4A8F '!=' Modulus=E5F6301821AE3022B7C8DDA46F93AE1EBDBA4BB5C0BBC8A628BBE0EF9572E72FB9629E641C4C3CEA85CBF10568FE4E2CE5B63C3DAFC9DE8378CE47C3066EA6AE273AD03D4E1360E31C7C73ED72A8EDE25B6EB9591CC02F7B267463158EE20AB36DCA85F1235A54ABE7D0D1DAF5F3CA07ED53DEDFA055411AAF6C099E69AE4A8F ']' 1022s + output_file=/tmp/sssd-softhsm2-wKxRAf/SSSD-child-1173-auth.output 1022s ++ basename /tmp/sssd-softhsm2-wKxRAf/SSSD-child-1173-auth.output .output 1022s + output_cert_file=/tmp/sssd-softhsm2-wKxRAf/SSSD-child-1173-auth.pem 1022s + echo -n 053350 1022s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-wKxRAf/test-full-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 '' --token_name 'Test Organization Root Tr Token' --module_name /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so 1022s [p11_child[2000]] [main] (0x0400): p11_child started. 1022s [p11_child[2000]] [main] (0x2000): Running in [auth] mode. 1022s [p11_child[2000]] [main] (0x2000): Running with effective IDs: [0][0]. 1022s [p11_child[2000]] [main] (0x2000): Running with real IDs [0][0]. 1022s [p11_child[2000]] [do_card] (0x4000): Module List: 1022s [p11_child[2000]] [do_card] (0x4000): common name: [softhsm2]. 1022s [p11_child[2000]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 1022s [p11_child[2000]] [do_card] (0x4000): Description [SoftHSM slot ID 0x7dd9008d] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 1022s [p11_child[2000]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 1022s [p11_child[2000]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x7dd9008d][2111373453] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 1022s [p11_child[2000]] [do_card] (0x4000): Login required. 1022s [p11_child[2000]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 1022s [p11_child[2000]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 1022s [p11_child[2000]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so Test Organization Root Tr Token Test Organization Root Tr Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 1022s [p11_child[2000]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x7dd9008d;slot-manufacturer=SoftHSM%20project;slot-id=2111373453;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=b0e148097dd9008d;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 1022s [p11_child[2000]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 1022s [p11_child[2000]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 1022s [p11_child[2000]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 1022s [p11_child[2000]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 1022s [p11_child[2000]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 1022s [p11_child[2000]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 1022s [p11_child[2000]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 1022s [p11_child[2000]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 1022s [p11_child[2000]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 1022s [p11_child[2000]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 1022s [p11_child[2000]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 1022s [p11_child[2000]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 1022s [p11_child[2000]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 1022s [p11_child[2000]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 1022s [p11_child[2000]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 1022s [p11_child[2000]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 1022s [p11_child[2000]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 1022s [p11_child[2000]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 1022s [p11_child[2000]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 1022s [p11_child[2000]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 1022s [p11_child[2000]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 1022s [p11_child[2000]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 1022s [p11_child[2000]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 1022s [p11_child[2000]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 1022s [p11_child[2000]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 1022s [p11_child[2000]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 1022s [p11_child[2000]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 1022s [p11_child[2000]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 1022s [p11_child[2000]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 1022s [p11_child[2000]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 1022s [p11_child[2000]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 1022s [p11_child[2000]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 1022s [p11_child[2000]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 1022s [p11_child[2000]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 1022s [p11_child[2000]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 1022s [p11_child[2000]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 1022s [p11_child[2000]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 1022s [p11_child[2000]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 1022s [p11_child[2000]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 1022s [p11_child[2000]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 1022s [p11_child[2000]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 1022s [p11_child[2000]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 1022s [p11_child[2000]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 1022s [p11_child[2000]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 1022s [p11_child[2000]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 1022s [p11_child[2000]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 1022s [p11_child[2000]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 1022s [p11_child[2000]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 1022s [p11_child[2000]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 1022s [p11_child[2000]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 1022s [p11_child[2000]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 1022s [p11_child[2000]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 1022s [p11_child[2000]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 1022s [p11_child[2000]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 1022s [p11_child[2000]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 1022s [p11_child[2000]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 1022s [p11_child[2000]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 1022s [p11_child[2000]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 1022s [p11_child[2000]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 1022s [p11_child[2000]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 1022s [p11_child[2000]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 1022s [p11_child[2000]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 1022s [p11_child[2000]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 1022s [p11_child[2000]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 1022s [p11_child[2000]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 1022s [p11_child[2000]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 1022s [p11_child[2000]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 1022s [p11_child[2000]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 1022s [p11_child[2000]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 1022s [p11_child[2000]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 1022s [p11_child[2000]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 1022s [p11_child[2000]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 1022s [p11_child[2000]] [do_card] (0x4000): Certificate verified and validated. 1022s [p11_child[2000]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 1022s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-wKxRAf/SSSD-child-1173-auth.output 1022s + echo '-----BEGIN CERTIFICATE-----' 1022s + tail -n1 /tmp/sssd-softhsm2-wKxRAf/SSSD-child-1173-auth.output 1022s + echo '-----END CERTIFICATE-----' 1022s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-wKxRAf/SSSD-child-1173-auth.pem 1022s Certificate: 1022s Data: 1022s Version: 3 (0x2) 1022s Serial Number: 3 (0x3) 1022s Signature Algorithm: sha256WithRSAEncryption 1022s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 1022s Validity 1022s Not Before: Mar 10 09:32:46 2024 GMT 1022s Not After : Mar 10 09:32:46 2025 GMT 1022s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 1022s Subject Public Key Info: 1022s Public Key Algorithm: rsaEncryption 1022s Public-Key: (1024 bit) 1022s Modulus: 1022s 00:e5:f6:30:18:21:ae:30:22:b7:c8:dd:a4:6f:93: 1022s ae:1e:bd:ba:4b:b5:c0:bb:c8:a6:28:bb:e0:ef:95: 1022s 72:e7:2f:b9:62:9e:64:1c:4c:3c:ea:85:cb:f1:05: 1022s 68:fe:4e:2c:e5:b6:3c:3d:af:c9:de:83:78:ce:47: 1022s c3:06:6e:a6:ae:27:3a:d0:3d:4e:13:60:e3:1c:7c: 1022s 73:ed:72:a8:ed:e2:5b:6e:b9:59:1c:c0:2f:7b:26: 1022s 74:63:15:8e:e2:0a:b3:6d:ca:85:f1:23:5a:54:ab: 1022s e7:d0:d1:da:f5:f3:ca:07:ed:53:de:df:a0:55:41: 1022s 1a:af:6c:09:9e:69:ae:4a:8f 1022s Exponent: 65537 (0x10001) 1022s X509v3 extensions: 1022s X509v3 Authority Key Identifier: 1022s B5:0A:C0:0C:7A:17:B9:8E:C4:3C:B1:90:34:7F:EB:43:9A:33:1F:B2 1022s X509v3 Basic Constraints: 1022s CA:FALSE 1022s Netscape Cert Type: 1022s SSL Client, S/MIME 1022s Netscape Comment: 1022s Test Organization Root CA trusted Certificate 1022s X509v3 Subject Key Identifier: 1022s 9F:27:56:AD:34:BB:56:79:81:E8:11:9E:04:37:D3:1F:02:CC:65:4B 1022s X509v3 Key Usage: critical 1022s Digital Signature, Non Repudiation, Key Encipherment 1022s X509v3 Extended Key Usage: 1022s TLS Web Client Authentication, E-mail Protection 1022s X509v3 Subject Alternative Name: 1022s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 1022s Signature Algorithm: sha256WithRSAEncryption 1022s Signature Value: 1022s 0e:bf:7e:d6:7a:22:a0:d2:5d:46:b2:56:42:36:0c:b1:63:27: 1022s 3d:6f:e5:dd:21:f3:16:6b:81:bd:d6:5f:1f:88:a7:ff:ca:18: 1022s 92:dc:b0:75:5c:63:03:76:48:00:e4:8e:3c:0d:bc:0b:69:97: 1022s 29:f6:00:67:19:a1:b1:35:c3:e4:d1:7f:a1:3c:37:b9:68:f9: 1022s 9e:9a:03:82:7a:43:b0:a7:2d:fc:25:96:26:45:26:1f:ce:0b: 1022s cc:5a:e5:8e:e9:af:93:a4:72:81:c4:93:7b:4f:af:6e:01:3f: 1022s 2b:73:57:3a:4a:9e:aa:36:97:df:4b:e5:99:85:4d:ee:2b:97: 1022s 4f:04 1022s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-wKxRAf/SSSD-child-1173-auth.pem 1022s + found_md5=Modulus=E5F6301821AE3022B7C8DDA46F93AE1EBDBA4BB5C0BBC8A628BBE0EF9572E72FB9629E641C4C3CEA85CBF10568FE4E2CE5B63C3DAFC9DE8378CE47C3066EA6AE273AD03D4E1360E31C7C73ED72A8EDE25B6EB9591CC02F7B267463158EE20AB36DCA85F1235A54ABE7D0D1DAF5F3CA07ED53DEDFA055411AAF6C099E69AE4A8F 1022s + '[' Modulus=E5F6301821AE3022B7C8DDA46F93AE1EBDBA4BB5C0BBC8A628BBE0EF9572E72FB9629E641C4C3CEA85CBF10568FE4E2CE5B63C3DAFC9DE8378CE47C3066EA6AE273AD03D4E1360E31C7C73ED72A8EDE25B6EB9591CC02F7B267463158EE20AB36DCA85F1235A54ABE7D0D1DAF5F3CA07ED53DEDFA055411AAF6C099E69AE4A8F '!=' Modulus=E5F6301821AE3022B7C8DDA46F93AE1EBDBA4BB5C0BBC8A628BBE0EF9572E72FB9629E641C4C3CEA85CBF10568FE4E2CE5B63C3DAFC9DE8378CE47C3066EA6AE273AD03D4E1360E31C7C73ED72A8EDE25B6EB9591CC02F7B267463158EE20AB36DCA85F1235A54ABE7D0D1DAF5F3CA07ED53DEDFA055411AAF6C099E69AE4A8F ']' 1022s + valid_certificate /tmp/sssd-softhsm2-wKxRAf/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-5150 /tmp/sssd-softhsm2-wKxRAf/test-full-chain-CA.pem partial_chain 1022s + check_certificate /tmp/sssd-softhsm2-wKxRAf/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-5150 /tmp/sssd-softhsm2-wKxRAf/test-full-chain-CA.pem partial_chain 1022s + local certificate=/tmp/sssd-softhsm2-wKxRAf/test-root-CA-trusted-certificate-0001.pem 1022s + local key_pass=pass:random-root-ca-trusted-cert-0001-5150 1022s + local key_ring=/tmp/sssd-softhsm2-wKxRAf/test-full-chain-CA.pem 1022s + local verify_option=partial_chain 1022s + prepare_softhsm2_card /tmp/sssd-softhsm2-wKxRAf/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-5150 1022s + local certificate=/tmp/sssd-softhsm2-wKxRAf/test-root-CA-trusted-certificate-0001.pem 1022s + local key_pass=pass:random-root-ca-trusted-cert-0001-5150 1022s + local key_cn 1022s + local key_name 1022s + local tokens_dir 1022s + local output_cert_file 1022s + token_name= 1022s ++ basename /tmp/sssd-softhsm2-wKxRAf/test-root-CA-trusted-certificate-0001.pem .pem 1022s + key_name=test-root-CA-trusted-certificate-0001 1022s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-wKxRAf/test-root-CA-trusted-certificate-0001.pem 1022s ++ sed -n 's/ *commonName *= //p' 1022s + key_cn='Test Organization Root Trusted Certificate 0001' 1022s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 1022s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-wKxRAf/softhsm2-test-root-CA-trusted-certificate-0001.conf 1022s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-wKxRAf/softhsm2-test-root-CA-trusted-certificate-0001.conf 1022s ++ basename /tmp/sssd-softhsm2-wKxRAf/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 1022s + tokens_dir=/tmp/sssd-softhsm2-wKxRAf/softhsm2-test-root-CA-trusted-certificate-0001 1022s + token_name='Test Organization Root Tr Token' 1022s + '[' '!' -e /tmp/sssd-softhsm2-wKxRAf/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 1022s + '[' '!' -d /tmp/sssd-softhsm2-wKxRAf/softhsm2-test-root-CA-trusted-certificate-0001 ']' 1022s + echo 'Test Organization Root Tr Token' 1022s Test Organization Root Tr Token 1022s + '[' -n partial_chain ']' 1022s + local verify_arg=--verify=partial_chain 1022s + local output_base_name=SSSD-child-25392 1022s + local output_file=/tmp/sssd-softhsm2-wKxRAf/SSSD-child-25392.output 1022s + output_cert_file=/tmp/sssd-softhsm2-wKxRAf/SSSD-child-25392.pem 1022s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-wKxRAf/test-full-chain-CA.pem 1022s [p11_child[2010]] [main] (0x0400): p11_child started. 1022s [p11_child[2010]] [main] (0x2000): Running in [pre-auth] mode. 1022s [p11_child[2010]] [main] (0x2000): Running with effective IDs: [0][0]. 1022s [p11_child[2010]] [main] (0x2000): Running with real IDs [0][0]. 1022s [p11_child[2010]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 1022s [p11_child[2010]] [do_card] (0x4000): Module List: 1022s [p11_child[2010]] [do_card] (0x4000): common name: [softhsm2]. 1022s [p11_child[2010]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 1022s [p11_child[2010]] [do_card] (0x4000): Description [SoftHSM slot ID 0x7dd9008d] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 1022s [p11_child[2010]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 1022s [p11_child[2010]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x7dd9008d][2111373453] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 1022s [p11_child[2010]] [do_card] (0x4000): Login NOT required. 1022s [p11_child[2010]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 1022s [p11_child[2010]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 1022s [p11_child[2010]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Root Tr Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 1022s [p11_child[2010]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x7dd9008d;slot-manufacturer=SoftHSM%20project;slot-id=2111373453;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=b0e148097dd9008d;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 1022s [p11_child[2010]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 1022s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-wKxRAf/SSSD-child-25392.output 1022s + echo '-----BEGIN CERTIFICATE-----' 1022s + tail -n1 /tmp/sssd-softhsm2-wKxRAf/SSSD-child-25392.output 1022s + echo '-----END CERTIFICATE-----' 1022s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-wKxRAf/SSSD-child-25392.pem 1023s Certificate: 1023s Data: 1023s Version: 3 (0x2) 1023s Serial Number: 3 (0x3) 1023s Signature Algorithm: sha256WithRSAEncryption 1023s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 1023s Validity 1023s Not Before: Mar 10 09:32:46 2024 GMT 1023s Not After : Mar 10 09:32:46 2025 GMT 1023s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 1023s Subject Public Key Info: 1023s Public Key Algorithm: rsaEncryption 1023s Public-Key: (1024 bit) 1023s Modulus: 1023s 00:e5:f6:30:18:21:ae:30:22:b7:c8:dd:a4:6f:93: 1023s ae:1e:bd:ba:4b:b5:c0:bb:c8:a6:28:bb:e0:ef:95: 1023s 72:e7:2f:b9:62:9e:64:1c:4c:3c:ea:85:cb:f1:05: 1023s 68:fe:4e:2c:e5:b6:3c:3d:af:c9:de:83:78:ce:47: 1023s c3:06:6e:a6:ae:27:3a:d0:3d:4e:13:60:e3:1c:7c: 1023s 73:ed:72:a8:ed:e2:5b:6e:b9:59:1c:c0:2f:7b:26: 1023s 74:63:15:8e:e2:0a:b3:6d:ca:85:f1:23:5a:54:ab: 1023s e7:d0:d1:da:f5:f3:ca:07:ed:53:de:df:a0:55:41: 1023s 1a:af:6c:09:9e:69:ae:4a:8f 1023s Exponent: 65537 (0x10001) 1023s X509v3 extensions: 1023s X509v3 Authority Key Identifier: 1023s B5:0A:C0:0C:7A:17:B9:8E:C4:3C:B1:90:34:7F:EB:43:9A:33:1F:B2 1023s X509v3 Basic Constraints: 1023s CA:FALSE 1023s Netscape Cert Type: 1023s SSL Client, S/MIME 1023s Netscape Comment: 1023s Test Organization Root CA trusted Certificate 1023s X509v3 Subject Key Identifier: 1023s 9F:27:56:AD:34:BB:56:79:81:E8:11:9E:04:37:D3:1F:02:CC:65:4B 1023s X509v3 Key Usage: critical 1023s Digital Signature, Non Repudiation, Key Encipherment 1023s X509v3 Extended Key Usage: 1023s TLS Web Client Authentication, E-mail Protection 1023s X509v3 Subject Alternative Name: 1023s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 1023s Signature Algorithm: sha256WithRSAEncryption 1023s Signature Value: 1023s 0e:bf:7e:d6:7a:22:a0:d2:5d:46:b2:56:42:36:0c:b1:63:27: 1023s 3d:6f:e5:dd:21:f3:16:6b:81:bd:d6:5f:1f:88:a7:ff:ca:18: 1023s 92:dc:b0:75:5c:63:03:76:48:00:e4:8e:3c:0d:bc:0b:69:97: 1023s 29:f6:00:67:19:a1:b1:35:c3:e4:d1:7f:a1:3c:37:b9:68:f9: 1023s 9e:9a:03:82:7a:43:b0:a7:2d:fc:25:96:26:45:26:1f:ce:0b: 1023s cc:5a:e5:8e:e9:af:93:a4:72:81:c4:93:7b:4f:af:6e:01:3f: 1023s 2b:73:57:3a:4a:9e:aa:36:97:df:4b:e5:99:85:4d:ee:2b:97: 1023s 4f:04 1023s + local found_md5 expected_md5 1023s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-wKxRAf/test-root-CA-trusted-certificate-0001.pem 1023s + expected_md5=Modulus=E5F6301821AE3022B7C8DDA46F93AE1EBDBA4BB5C0BBC8A628BBE0EF9572E72FB9629E641C4C3CEA85CBF10568FE4E2CE5B63C3DAFC9DE8378CE47C3066EA6AE273AD03D4E1360E31C7C73ED72A8EDE25B6EB9591CC02F7B267463158EE20AB36DCA85F1235A54ABE7D0D1DAF5F3CA07ED53DEDFA055411AAF6C099E69AE4A8F 1023s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-wKxRAf/SSSD-child-25392.pem 1023s + found_md5=Modulus=E5F6301821AE3022B7C8DDA46F93AE1EBDBA4BB5C0BBC8A628BBE0EF9572E72FB9629E641C4C3CEA85CBF10568FE4E2CE5B63C3DAFC9DE8378CE47C3066EA6AE273AD03D4E1360E31C7C73ED72A8EDE25B6EB9591CC02F7B267463158EE20AB36DCA85F1235A54ABE7D0D1DAF5F3CA07ED53DEDFA055411AAF6C099E69AE4A8F 1023s + '[' Modulus=E5F6301821AE3022B7C8DDA46F93AE1EBDBA4BB5C0BBC8A628BBE0EF9572E72FB9629E641C4C3CEA85CBF10568FE4E2CE5B63C3DAFC9DE8378CE47C3066EA6AE273AD03D4E1360E31C7C73ED72A8EDE25B6EB9591CC02F7B267463158EE20AB36DCA85F1235A54ABE7D0D1DAF5F3CA07ED53DEDFA055411AAF6C099E69AE4A8F '!=' Modulus=E5F6301821AE3022B7C8DDA46F93AE1EBDBA4BB5C0BBC8A628BBE0EF9572E72FB9629E641C4C3CEA85CBF10568FE4E2CE5B63C3DAFC9DE8378CE47C3066EA6AE273AD03D4E1360E31C7C73ED72A8EDE25B6EB9591CC02F7B267463158EE20AB36DCA85F1235A54ABE7D0D1DAF5F3CA07ED53DEDFA055411AAF6C099E69AE4A8F ']' 1023s + output_file=/tmp/sssd-softhsm2-wKxRAf/SSSD-child-25392-auth.output 1023s ++ basename /tmp/sssd-softhsm2-wKxRAf/SSSD-child-25392-auth.output .output 1023s + output_cert_file=/tmp/sssd-softhsm2-wKxRAf/SSSD-child-25392-auth.pem 1023s + echo -n 053350 1023s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-wKxRAf/test-full-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Root Tr Token' --module_name /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so 1023s [p11_child[2018]] [main] (0x0400): p11_child started. 1023s [p11_child[2018]] [main] (0x2000): Running in [auth] mode. 1023s [p11_child[2018]] [main] (0x2000): Running with effective IDs: [0][0]. 1023s [p11_child[2018]] [main] (0x2000): Running with real IDs [0][0]. 1023s [p11_child[2018]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 1023s [p11_child[2018]] [do_card] (0x4000): Module List: 1023s [p11_child[2018]] [do_card] (0x4000): common name: [softhsm2]. 1023s [p11_child[2018]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 1023s [p11_child[2018]] [do_card] (0x4000): Description [SoftHSM slot ID 0x7dd9008d] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 1023s [p11_child[2018]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 1023s [p11_child[2018]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x7dd9008d][2111373453] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 1023s [p11_child[2018]] [do_card] (0x4000): Login required. 1023s [p11_child[2018]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 1023s [p11_child[2018]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 1023s [p11_child[2018]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so Test Organization Root Tr Token Test Organization Root Tr Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 1023s [p11_child[2018]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x7dd9008d;slot-manufacturer=SoftHSM%20project;slot-id=2111373453;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=b0e148097dd9008d;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 1023s [p11_child[2018]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 1023s [p11_child[2018]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 1023s [p11_child[2018]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 1023s [p11_child[2018]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 1023s [p11_child[2018]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 1023s [p11_child[2018]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 1023s [p11_child[2018]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 1023s [p11_child[2018]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 1023s [p11_child[2018]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 1023s [p11_child[2018]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 1023s [p11_child[2018]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 1023s [p11_child[2018]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 1023s [p11_child[2018]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 1023s [p11_child[2018]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 1023s [p11_child[2018]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 1023s [p11_child[2018]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 1023s [p11_child[2018]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 1023s [p11_child[2018]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 1023s [p11_child[2018]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 1023s [p11_child[2018]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 1023s [p11_child[2018]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 1023s [p11_child[2018]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 1023s [p11_child[2018]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 1023s [p11_child[2018]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 1023s [p11_child[2018]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 1023s [p11_child[2018]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 1023s [p11_child[2018]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 1023s [p11_child[2018]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 1023s [p11_child[2018]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 1023s [p11_child[2018]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 1023s [p11_child[2018]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 1023s [p11_child[2018]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 1023s [p11_child[2018]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 1023s [p11_child[2018]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 1023s [p11_child[2018]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 1023s [p11_child[2018]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 1023s [p11_child[2018]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 1023s [p11_child[2018]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 1023s [p11_child[2018]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 1023s [p11_child[2018]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 1023s [p11_child[2018]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 1023s [p11_child[2018]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 1023s [p11_child[2018]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 1023s [p11_child[2018]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 1023s [p11_child[2018]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 1023s [p11_child[2018]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 1023s [p11_child[2018]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 1023s [p11_child[2018]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 1023s [p11_child[2018]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 1023s [p11_child[2018]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 1023s [p11_child[2018]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 1023s [p11_child[2018]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 1023s [p11_child[2018]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 1023s [p11_child[2018]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 1023s [p11_child[2018]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 1023s [p11_child[2018]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 1023s [p11_child[2018]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 1023s [p11_child[2018]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 1023s [p11_child[2018]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 1023s [p11_child[2018]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 1023s [p11_child[2018]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 1023s [p11_child[2018]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 1023s [p11_child[2018]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 1023s [p11_child[2018]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 1023s [p11_child[2018]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 1023s [p11_child[2018]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 1023s [p11_child[2018]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 1023s [p11_child[2018]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 1023s [p11_child[2018]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 1023s [p11_child[2018]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 1023s [p11_child[2018]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 1023s [p11_child[2018]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 1023s [p11_child[2018]] [do_card] (0x4000): Certificate verified and validated. 1023s [p11_child[2018]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 1023s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-wKxRAf/SSSD-child-25392-auth.output 1023s + echo '-----BEGIN CERTIFICATE-----' 1023s + tail -n1 /tmp/sssd-softhsm2-wKxRAf/SSSD-child-25392-auth.output 1023s + echo '-----END CERTIFICATE-----' 1023s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-wKxRAf/SSSD-child-25392-auth.pem 1023s Certificate: 1023s Data: 1023s Version: 3 (0x2) 1023s Serial Number: 3 (0x3) 1023s Signature Algorithm: sha256WithRSAEncryption 1023s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 1023s Validity 1023s Not Before: Mar 10 09:32:46 2024 GMT 1023s Not After : Mar 10 09:32:46 2025 GMT 1023s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 1023s Subject Public Key Info: 1023s Public Key Algorithm: rsaEncryption 1023s Public-Key: (1024 bit) 1023s Modulus: 1023s 00:e5:f6:30:18:21:ae:30:22:b7:c8:dd:a4:6f:93: 1023s ae:1e:bd:ba:4b:b5:c0:bb:c8:a6:28:bb:e0:ef:95: 1023s 72:e7:2f:b9:62:9e:64:1c:4c:3c:ea:85:cb:f1:05: 1023s 68:fe:4e:2c:e5:b6:3c:3d:af:c9:de:83:78:ce:47: 1023s c3:06:6e:a6:ae:27:3a:d0:3d:4e:13:60:e3:1c:7c: 1023s 73:ed:72:a8:ed:e2:5b:6e:b9:59:1c:c0:2f:7b:26: 1023s 74:63:15:8e:e2:0a:b3:6d:ca:85:f1:23:5a:54:ab: 1023s e7:d0:d1:da:f5:f3:ca:07:ed:53:de:df:a0:55:41: 1023s 1a:af:6c:09:9e:69:ae:4a:8f 1023s Exponent: 65537 (0x10001) 1023s X509v3 extensions: 1023s X509v3 Authority Key Identifier: 1023s B5:0A:C0:0C:7A:17:B9:8E:C4:3C:B1:90:34:7F:EB:43:9A:33:1F:B2 1023s X509v3 Basic Constraints: 1023s CA:FALSE 1023s Netscape Cert Type: 1023s SSL Client, S/MIME 1023s Netscape Comment: 1023s Test Organization Root CA trusted Certificate 1023s X509v3 Subject Key Identifier: 1023s 9F:27:56:AD:34:BB:56:79:81:E8:11:9E:04:37:D3:1F:02:CC:65:4B 1023s X509v3 Key Usage: critical 1023s Digital Signature, Non Repudiation, Key Encipherment 1023s X509v3 Extended Key Usage: 1023s TLS Web Client Authentication, E-mail Protection 1023s X509v3 Subject Alternative Name: 1023s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 1023s Signature Algorithm: sha256WithRSAEncryption 1023s Signature Value: 1023s 0e:bf:7e:d6:7a:22:a0:d2:5d:46:b2:56:42:36:0c:b1:63:27: 1023s 3d:6f:e5:dd:21:f3:16:6b:81:bd:d6:5f:1f:88:a7:ff:ca:18: 1023s 92:dc:b0:75:5c:63:03:76:48:00:e4:8e:3c:0d:bc:0b:69:97: 1023s 29:f6:00:67:19:a1:b1:35:c3:e4:d1:7f:a1:3c:37:b9:68:f9: 1023s 9e:9a:03:82:7a:43:b0:a7:2d:fc:25:96:26:45:26:1f:ce:0b: 1023s cc:5a:e5:8e:e9:af:93:a4:72:81:c4:93:7b:4f:af:6e:01:3f: 1023s 2b:73:57:3a:4a:9e:aa:36:97:df:4b:e5:99:85:4d:ee:2b:97: 1023s 4f:04 1023s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-wKxRAf/SSSD-child-25392-auth.pem 1023s + found_md5=Modulus=E5F6301821AE3022B7C8DDA46F93AE1EBDBA4BB5C0BBC8A628BBE0EF9572E72FB9629E641C4C3CEA85CBF10568FE4E2CE5B63C3DAFC9DE8378CE47C3066EA6AE273AD03D4E1360E31C7C73ED72A8EDE25B6EB9591CC02F7B267463158EE20AB36DCA85F1235A54ABE7D0D1DAF5F3CA07ED53DEDFA055411AAF6C099E69AE4A8F 1023s + '[' Modulus=E5F6301821AE3022B7C8DDA46F93AE1EBDBA4BB5C0BBC8A628BBE0EF9572E72FB9629E641C4C3CEA85CBF10568FE4E2CE5B63C3DAFC9DE8378CE47C3066EA6AE273AD03D4E1360E31C7C73ED72A8EDE25B6EB9591CC02F7B267463158EE20AB36DCA85F1235A54ABE7D0D1DAF5F3CA07ED53DEDFA055411AAF6C099E69AE4A8F '!=' Modulus=E5F6301821AE3022B7C8DDA46F93AE1EBDBA4BB5C0BBC8A628BBE0EF9572E72FB9629E641C4C3CEA85CBF10568FE4E2CE5B63C3DAFC9DE8378CE47C3066EA6AE273AD03D4E1360E31C7C73ED72A8EDE25B6EB9591CC02F7B267463158EE20AB36DCA85F1235A54ABE7D0D1DAF5F3CA07ED53DEDFA055411AAF6C099E69AE4A8F ']' 1023s + invalid_certificate /tmp/sssd-softhsm2-wKxRAf/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-5150 /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA.pem 1023s + check_certificate /tmp/sssd-softhsm2-wKxRAf/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-5150 /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA.pem 1023s + local certificate=/tmp/sssd-softhsm2-wKxRAf/test-root-CA-trusted-certificate-0001.pem 1023s + local key_pass=pass:random-root-ca-trusted-cert-0001-5150 1023s + local key_ring=/tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA.pem 1023s + local verify_option= 1023s + prepare_softhsm2_card /tmp/sssd-softhsm2-wKxRAf/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-5150 1023s + local certificate=/tmp/sssd-softhsm2-wKxRAf/test-root-CA-trusted-certificate-0001.pem 1023s + local key_pass=pass:random-root-ca-trusted-cert-0001-5150 1023s + local key_cn 1023s + local key_name 1023s + local tokens_dir 1023s + local output_cert_file 1023s + token_name= 1023s ++ basename /tmp/sssd-softhsm2-wKxRAf/test-root-CA-trusted-certificate-0001.pem .pem 1023s + key_name=test-root-CA-trusted-certificate-0001 1023s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-wKxRAf/test-root-CA-trusted-certificate-0001.pem 1023s ++ sed -n 's/ *commonName *= //p' 1023s + key_cn='Test Organization Root Trusted Certificate 0001' 1023s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 1023s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-wKxRAf/softhsm2-test-root-CA-trusted-certificate-0001.conf 1023s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-wKxRAf/softhsm2-test-root-CA-trusted-certificate-0001.conf 1023s ++ basename /tmp/sssd-softhsm2-wKxRAf/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 1023s + tokens_dir=/tmp/sssd-softhsm2-wKxRAf/softhsm2-test-root-CA-trusted-certificate-0001 1023s + token_name='Test Organization Root Tr Token' 1023s + '[' '!' -e /tmp/sssd-softhsm2-wKxRAf/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 1023s + '[' '!' -d /tmp/sssd-softhsm2-wKxRAf/softhsm2-test-root-CA-trusted-certificate-0001 ']' 1023s + echo 'Test Organization Root Tr Token' 1023s + '[' -n '' ']' 1023s Test Organization Root Tr Token 1023s + local output_base_name=SSSD-child-20365 1023s + local output_file=/tmp/sssd-softhsm2-wKxRAf/SSSD-child-20365.output 1023s + output_cert_file=/tmp/sssd-softhsm2-wKxRAf/SSSD-child-20365.pem 1023s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA.pem 1023s [p11_child[2028]] [main] (0x0400): p11_child started. 1023s [p11_child[2028]] [main] (0x2000): Running in [pre-auth] mode. 1023s [p11_child[2028]] [main] (0x2000): Running with effective IDs: [0][0]. 1023s [p11_child[2028]] [main] (0x2000): Running with real IDs [0][0]. 1023s [p11_child[2028]] [do_card] (0x4000): Module List: 1023s [p11_child[2028]] [do_card] (0x4000): common name: [softhsm2]. 1023s [p11_child[2028]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 1023s [p11_child[2028]] [do_card] (0x4000): Description [SoftHSM slot ID 0x7dd9008d] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 1023s [p11_child[2028]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 1023s [p11_child[2028]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x7dd9008d][2111373453] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 1023s [p11_child[2028]] [do_card] (0x4000): Login NOT required. 1023s [p11_child[2028]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 1023s [p11_child[2028]] [do_verification] (0x0040): X509_verify_cert failed [0]. 1023s [p11_child[2028]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 1023s [p11_child[2028]] [read_certs] (0x0040): Certificate [Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] not valid, skipping. 1023s [p11_child[2028]] [do_card] (0x4000): No certificate found. 1023s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-wKxRAf/SSSD-child-20365.output 1023s + return 2 1023s + invalid_certificate /tmp/sssd-softhsm2-wKxRAf/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-5150 /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA.pem partial_chain 1023s + check_certificate /tmp/sssd-softhsm2-wKxRAf/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-5150 /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA.pem partial_chain 1023s + local certificate=/tmp/sssd-softhsm2-wKxRAf/test-root-CA-trusted-certificate-0001.pem 1023s + local key_pass=pass:random-root-ca-trusted-cert-0001-5150 1023s + local key_ring=/tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA.pem 1023s + local verify_option=partial_chain 1023s + prepare_softhsm2_card /tmp/sssd-softhsm2-wKxRAf/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-5150 1023s + local certificate=/tmp/sssd-softhsm2-wKxRAf/test-root-CA-trusted-certificate-0001.pem 1023s + local key_pass=pass:random-root-ca-trusted-cert-0001-5150 1023s + local key_cn 1023s + local key_name 1023s + local tokens_dir 1023s + local output_cert_file 1023s + token_name= 1023s ++ basename /tmp/sssd-softhsm2-wKxRAf/test-root-CA-trusted-certificate-0001.pem .pem 1023s + key_name=test-root-CA-trusted-certificate-0001 1023s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-wKxRAf/test-root-CA-trusted-certificate-0001.pem 1023s ++ sed -n 's/ *commonName *= //p' 1023s + key_cn='Test Organization Root Trusted Certificate 0001' 1023s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 1023s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-wKxRAf/softhsm2-test-root-CA-trusted-certificate-0001.conf 1023s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-wKxRAf/softhsm2-test-root-CA-trusted-certificate-0001.conf 1023s ++ basename /tmp/sssd-softhsm2-wKxRAf/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 1023s + tokens_dir=/tmp/sssd-softhsm2-wKxRAf/softhsm2-test-root-CA-trusted-certificate-0001 1023s + token_name='Test Organization Root Tr Token' 1023s + '[' '!' -e /tmp/sssd-softhsm2-wKxRAf/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 1023s + '[' '!' -d /tmp/sssd-softhsm2-wKxRAf/softhsm2-test-root-CA-trusted-certificate-0001 ']' 1023s + echo 'Test Organization Root Tr Token' 1023s Test Organization Root Tr Token 1023s + '[' -n partial_chain ']' 1023s + local verify_arg=--verify=partial_chain 1023s + local output_base_name=SSSD-child-21824 1023s + local output_file=/tmp/sssd-softhsm2-wKxRAf/SSSD-child-21824.output 1023s + output_cert_file=/tmp/sssd-softhsm2-wKxRAf/SSSD-child-21824.pem 1023s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA.pem 1023s [p11_child[2035]] [main] (0x0400): p11_child started. 1023s [p11_child[2035]] [main] (0x2000): Running in [pre-auth] mode. 1023s [p11_child[2035]] [main] (0x2000): Running with effective IDs: [0][0]. 1023s [p11_child[2035]] [main] (0x2000): Running with real IDs [0][0]. 1023s [p11_child[2035]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 1023s [p11_child[2035]] [do_card] (0x4000): Module List: 1023s [p11_child[2035]] [do_card] (0x4000): common name: [softhsm2]. 1023s [p11_child[2035]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 1023s [p11_child[2035]] [do_card] (0x4000): Description [SoftHSM slot ID 0x7dd9008d] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 1023s [p11_child[2035]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 1023s [p11_child[2035]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x7dd9008d][2111373453] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 1023s [p11_child[2035]] [do_card] (0x4000): Login NOT required. 1023s [p11_child[2035]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 1023s [p11_child[2035]] [do_verification] (0x0040): X509_verify_cert failed [0]. 1023s [p11_child[2035]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 1023s [p11_child[2035]] [read_certs] (0x0040): Certificate [Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] not valid, skipping. 1023s [p11_child[2035]] [do_card] (0x4000): No certificate found. 1023s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-wKxRAf/SSSD-child-21824.output 1023s + return 2 1023s + invalid_certificate /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-6600 /dev/null 1023s + check_certificate /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-6600 /dev/null 1023s + local certificate=/tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA-trusted-certificate-0001.pem 1023s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-6600 1023s + local key_ring=/dev/null 1023s + local verify_option= 1023s + prepare_softhsm2_card /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-6600 1023s + local certificate=/tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA-trusted-certificate-0001.pem 1023s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-6600 1023s + local key_cn 1023s + local key_name 1023s + local tokens_dir 1023s + local output_cert_file 1023s + token_name= 1023s ++ basename /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA-trusted-certificate-0001.pem .pem 1023s + key_name=test-intermediate-CA-trusted-certificate-0001 1023s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA-trusted-certificate-0001.pem 1023s ++ sed -n 's/ *commonName *= //p' 1023s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 1023s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 1023s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-wKxRAf/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 1023s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-wKxRAf/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 1023s ++ basename /tmp/sssd-softhsm2-wKxRAf/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 1023s + tokens_dir=/tmp/sssd-softhsm2-wKxRAf/softhsm2-test-intermediate-CA-trusted-certificate-0001 1023s + token_name='Test Organization Interme Token' 1023s + '[' '!' -e /tmp/sssd-softhsm2-wKxRAf/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 1023s + local key_file 1023s + local decrypted_key 1023s + mkdir -p /tmp/sssd-softhsm2-wKxRAf/softhsm2-test-intermediate-CA-trusted-certificate-0001 1023s + key_file=/tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA-trusted-certificate-0001-key.pem 1023s + decrypted_key=/tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 1023s + cat 1023s + softhsm2-util --init-token --label 'Test Organization Interme Token' --pin 053350 --so-pin 053350 --free 1023s Slot 0 has a free/uninitialized token. 1023s The token has been initialized and is reassigned to slot 862324689 1023s + softhsm2-util --show-slots 1023s Available slots: 1023s Slot 862324689 1023s Slot info: 1023s Description: SoftHSM slot ID 0x336607d1 1023s Manufacturer ID: SoftHSM project 1023s Hardware version: 2.6 1023s Firmware version: 2.6 1023s Token present: yes 1023s Token info: 1023s Manufacturer ID: SoftHSM project 1023s Model: SoftHSM v2 1023s Hardware version: 2.6 1023s Firmware version: 2.6 1023s Serial number: fb7d087f336607d1 1023s Initialized: yes 1023s User PIN init.: yes 1023s Label: Test Organization Interme Token 1023s Slot 1 1023s Slot info: 1023s Description: SoftHSM slot ID 0x1 1023s Manufacturer ID: SoftHSM project 1023s Hardware version: 2.6 1023s Firmware version: 2.6 1023s Token present: yes 1023s Token info: 1023s Manufacturer ID: SoftHSM project 1023s Model: SoftHSM v2 1023s Hardware version: 2.6 1023s Firmware version: 2.6 1023s Serial number: 1023s Initialized: no 1023s User PIN init.: no 1023s Label: 1023s + p11tool --provider=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --write --no-mark-private --load-certificate=/tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA-trusted-certificate-0001.pem --login --set-pin=053350 --label 'Test Organization Intermediate Trusted Certificate 0001' --id 00112233445566778899FFAABBCCDDEEFF012345 1023s + openssl rsa -passin pass:random-intermediate-ca-trusted-cert-0001-6600 -in /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA-trusted-certificate-0001-key.pem -out /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 1023s writing RSA key 1023s + p11tool --provider=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --write --load-privkey=/tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem --login --set-pin=053350 --label 'Test Organization Intermediate Trusted Certificate 0001 Key' --id 00112233445566778899FFAABBCCDDEEFF012345 1023s + rm /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 1023s + p11tool --provider=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --list-all 1023s Object 0: 1023s URL: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fb7d087f336607d1;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert 1023s Type: X.509 Certificate (RSA-1024) 1023s Expires: Mon Mar 10 09:32:47 2025 1023s Label: Test Organization Intermediate Trusted Certificate 0001 1023s ID: 00:11:22:33:44:55:66:77:88:99:ff:aa:bb:cc:dd:ee:ff:01:23:45 1023s 1023s Test Organization Interme Token 1023s + echo 'Test Organization Interme Token' 1023s + '[' -n '' ']' 1023s + local output_base_name=SSSD-child-26342 1023s + local output_file=/tmp/sssd-softhsm2-wKxRAf/SSSD-child-26342.output 1023s + output_cert_file=/tmp/sssd-softhsm2-wKxRAf/SSSD-child-26342.pem 1023s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/dev/null 1023s [p11_child[2051]] [main] (0x0400): p11_child started. 1023s [p11_child[2051]] [main] (0x2000): Running in [pre-auth] mode. 1023s [p11_child[2051]] [main] (0x2000): Running with effective IDs: [0][0]. 1023s [p11_child[2051]] [main] (0x2000): Running with real IDs [0][0]. 1023s [p11_child[2051]] [init_verification] (0x0040): X509_LOOKUP_load_file [/dev/null] failed [92274824][error:05800088:x509 certificate routines::no certificate or crl found]. 1023s [p11_child[2051]] [do_work] (0x0040): init_verification failed. 1023s [p11_child[2051]] [main] (0x0020): p11_child failed (5) 1023s + return 2 1023s + valid_certificate /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-6600 /dev/null no_verification 1023s + check_certificate /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-6600 /dev/null no_verification 1023s + local certificate=/tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA-trusted-certificate-0001.pem 1023s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-6600 1023s + local key_ring=/dev/null 1023s + local verify_option=no_verification 1023s + prepare_softhsm2_card /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-6600 1023s + local certificate=/tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA-trusted-certificate-0001.pem 1023s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-6600 1023s + local key_cn 1023s + local key_name 1023s + local tokens_dir 1023s + local output_cert_file 1023s + token_name= 1023s ++ basename /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA-trusted-certificate-0001.pem .pem 1023s + key_name=test-intermediate-CA-trusted-certificate-0001 1023s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA-trusted-certificate-0001.pem 1023s ++ sed -n 's/ *commonName *= //p' 1023s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 1023s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 1023s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-wKxRAf/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 1023s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-wKxRAf/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 1023s ++ basename /tmp/sssd-softhsm2-wKxRAf/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 1023s + tokens_dir=/tmp/sssd-softhsm2-wKxRAf/softhsm2-test-intermediate-CA-trusted-certificate-0001 1023s + token_name='Test Organization Interme Token' 1023s + '[' '!' -e /tmp/sssd-softhsm2-wKxRAf/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 1023s + '[' '!' -d /tmp/sssd-softhsm2-wKxRAf/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 1023s + echo 'Test Organization Interme Token' 1023s + '[' -n no_verification ']' 1023s + local verify_arg=--verify=no_verification 1023s Test Organization Interme Token 1023s + local output_base_name=SSSD-child-13680 1023s + local output_file=/tmp/sssd-softhsm2-wKxRAf/SSSD-child-13680.output 1023s + output_cert_file=/tmp/sssd-softhsm2-wKxRAf/SSSD-child-13680.pem 1023s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --verify=no_verification --ca_db=/dev/null 1023s [p11_child[2057]] [main] (0x0400): p11_child started. 1023s [p11_child[2057]] [main] (0x2000): Running in [pre-auth] mode. 1023s [p11_child[2057]] [main] (0x2000): Running with effective IDs: [0][0]. 1023s [p11_child[2057]] [main] (0x2000): Running with real IDs [0][0]. 1023s [p11_child[2057]] [parse_cert_verify_opts] (0x0020): Found 'no_verification' option, disabling verification completely. This should not be used in production. 1023s [p11_child[2057]] [do_card] (0x4000): Module List: 1023s [p11_child[2057]] [do_card] (0x4000): common name: [softhsm2]. 1023s [p11_child[2057]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 1023s [p11_child[2057]] [do_card] (0x4000): Description [SoftHSM slot ID 0x336607d1] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 1023s [p11_child[2057]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 1023s [p11_child[2057]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x336607d1][862324689] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 1023s [p11_child[2057]] [do_card] (0x4000): Login NOT required. 1023s [p11_child[2057]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 1023s [p11_child[2057]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Interme Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 1023s [p11_child[2057]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x336607d1;slot-manufacturer=SoftHSM%20project;slot-id=862324689;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fb7d087f336607d1;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 1023s [p11_child[2057]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 1023s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-wKxRAf/SSSD-child-13680.output 1023s + echo '-----BEGIN CERTIFICATE-----' 1023s + tail -n1 /tmp/sssd-softhsm2-wKxRAf/SSSD-child-13680.output 1023s + echo '-----END CERTIFICATE-----' 1023s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-wKxRAf/SSSD-child-13680.pem 1023s Certificate: 1023s Data: 1023s Version: 3 (0x2) 1023s Serial Number: 4 (0x4) 1023s Signature Algorithm: sha256WithRSAEncryption 1023s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 1023s Validity 1023s Not Before: Mar 10 09:32:47 2024 GMT 1023s Not After : Mar 10 09:32:47 2025 GMT 1023s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 1023s Subject Public Key Info: 1023s Public Key Algorithm: rsaEncryption 1023s Public-Key: (1024 bit) 1023s Modulus: 1023s 00:b2:5b:d6:a5:fb:cb:b0:29:e6:53:7c:31:3d:b3: 1023s 27:a3:e1:d0:50:cb:ac:1b:af:ce:b2:cc:43:98:83: 1023s 5c:19:e9:c1:97:6c:eb:f1:ae:89:62:8c:29:7f:6b: 1023s 22:2e:1d:34:fa:32:b0:b5:cb:00:36:b6:d6:b5:77: 1023s e1:41:99:4c:c3:e3:be:99:b6:61:61:76:36:f0:26: 1023s 47:f2:9f:df:90:15:08:ca:8c:d4:b0:fe:8c:af:bf: 1023s e4:03:d6:c6:ca:c0:d4:e5:53:e0:ff:5d:fd:34:c0: 1023s a7:3a:5d:13:2b:3f:05:93:83:8e:5c:0b:a9:c9:76: 1023s 1f:97:bc:8a:3a:07:33:bd:c1 1023s Exponent: 65537 (0x10001) 1023s X509v3 extensions: 1023s X509v3 Authority Key Identifier: 1023s 5F:60:54:F1:AC:3E:2D:42:06:88:45:9F:29:ED:86:C4:87:30:11:47 1023s X509v3 Basic Constraints: 1023s CA:FALSE 1023s Netscape Cert Type: 1023s SSL Client, S/MIME 1023s Netscape Comment: 1023s Test Organization Intermediate CA trusted Certificate 1023s X509v3 Subject Key Identifier: 1023s 42:7C:FC:71:35:E9:AA:EF:FD:7C:E5:03:F1:E8:8D:84:38:9F:97:E9 1023s X509v3 Key Usage: critical 1023s Digital Signature, Non Repudiation, Key Encipherment 1023s X509v3 Extended Key Usage: 1023s TLS Web Client Authentication, E-mail Protection 1023s X509v3 Subject Alternative Name: 1023s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 1023s Signature Algorithm: sha256WithRSAEncryption 1023s Signature Value: 1023s a3:9a:e8:63:b7:10:ca:fb:b2:4f:e8:36:dc:c0:25:78:94:e4: 1023s 1b:2b:50:51:7d:79:c6:4d:93:74:83:18:2b:3d:95:cd:7f:2e: 1023s 46:63:39:37:2d:f0:7c:63:d7:31:90:01:24:c3:ab:bd:82:32: 1023s 47:f8:47:e1:b9:03:88:c7:86:0f:43:71:25:5b:7e:b0:23:d8: 1023s 7f:9b:30:43:fd:71:99:49:0a:2d:52:47:a7:90:01:4a:85:31: 1023s 89:a4:f3:d4:73:ca:9e:91:35:23:88:94:30:ea:53:f3:5b:d8: 1023s a6:b5:5f:5a:34:b8:29:cc:23:48:e0:ad:a0:21:c8:9e:11:8b: 1023s 88:c1 1023s + local found_md5 expected_md5 1023s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA-trusted-certificate-0001.pem 1023s + expected_md5=Modulus=B25BD6A5FBCBB029E6537C313DB327A3E1D050CBAC1BAFCEB2CC4398835C19E9C1976CEBF1AE89628C297F6B222E1D34FA32B0B5CB0036B6D6B577E141994CC3E3BE99B661617636F02647F29FDF901508CA8CD4B0FE8CAFBFE403D6C6CAC0D4E553E0FF5DFD34C0A73A5D132B3F0593838E5C0BA9C9761F97BC8A3A0733BDC1 1023s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-wKxRAf/SSSD-child-13680.pem 1023s + found_md5=Modulus=B25BD6A5FBCBB029E6537C313DB327A3E1D050CBAC1BAFCEB2CC4398835C19E9C1976CEBF1AE89628C297F6B222E1D34FA32B0B5CB0036B6D6B577E141994CC3E3BE99B661617636F02647F29FDF901508CA8CD4B0FE8CAFBFE403D6C6CAC0D4E553E0FF5DFD34C0A73A5D132B3F0593838E5C0BA9C9761F97BC8A3A0733BDC1 1023s + '[' Modulus=B25BD6A5FBCBB029E6537C313DB327A3E1D050CBAC1BAFCEB2CC4398835C19E9C1976CEBF1AE89628C297F6B222E1D34FA32B0B5CB0036B6D6B577E141994CC3E3BE99B661617636F02647F29FDF901508CA8CD4B0FE8CAFBFE403D6C6CAC0D4E553E0FF5DFD34C0A73A5D132B3F0593838E5C0BA9C9761F97BC8A3A0733BDC1 '!=' Modulus=B25BD6A5FBCBB029E6537C313DB327A3E1D050CBAC1BAFCEB2CC4398835C19E9C1976CEBF1AE89628C297F6B222E1D34FA32B0B5CB0036B6D6B577E141994CC3E3BE99B661617636F02647F29FDF901508CA8CD4B0FE8CAFBFE403D6C6CAC0D4E553E0FF5DFD34C0A73A5D132B3F0593838E5C0BA9C9761F97BC8A3A0733BDC1 ']' 1023s + output_file=/tmp/sssd-softhsm2-wKxRAf/SSSD-child-13680-auth.output 1023s ++ basename /tmp/sssd-softhsm2-wKxRAf/SSSD-child-13680-auth.output .output 1023s + output_cert_file=/tmp/sssd-softhsm2-wKxRAf/SSSD-child-13680-auth.pem 1023s + echo -n 053350 1023s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/dev/null --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=no_verification --token_name 'Test Organization Interme Token' --module_name /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so 1023s [p11_child[2065]] [main] (0x0400): p11_child started. 1023s [p11_child[2065]] [main] (0x2000): Running in [auth] mode. 1023s [p11_child[2065]] [main] (0x2000): Running with effective IDs: [0][0]. 1023s [p11_child[2065]] [main] (0x2000): Running with real IDs [0][0]. 1023s [p11_child[2065]] [parse_cert_verify_opts] (0x0020): Found 'no_verification' option, disabling verification completely. This should not be used in production. 1023s [p11_child[2065]] [do_card] (0x4000): Module List: 1023s [p11_child[2065]] [do_card] (0x4000): common name: [softhsm2]. 1023s [p11_child[2065]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 1023s [p11_child[2065]] [do_card] (0x4000): Description [SoftHSM slot ID 0x336607d1] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 1023s [p11_child[2065]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 1023s [p11_child[2065]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x336607d1][862324689] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 1023s [p11_child[2065]] [do_card] (0x4000): Login required. 1023s [p11_child[2065]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 1023s [p11_child[2065]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so Test Organization Interme Token Test Organization Interme Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 1023s [p11_child[2065]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x336607d1;slot-manufacturer=SoftHSM%20project;slot-id=862324689;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fb7d087f336607d1;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 1023s [p11_child[2065]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 1023s [p11_child[2065]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 1023s [p11_child[2065]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 1023s [p11_child[2065]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 1023s [p11_child[2065]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 1023s [p11_child[2065]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 1023s [p11_child[2065]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 1023s [p11_child[2065]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 1023s [p11_child[2065]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 1023s [p11_child[2065]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 1023s [p11_child[2065]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 1023s [p11_child[2065]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 1023s [p11_child[2065]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 1023s [p11_child[2065]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 1023s [p11_child[2065]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 1023s [p11_child[2065]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 1023s [p11_child[2065]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 1023s [p11_child[2065]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 1023s [p11_child[2065]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 1023s [p11_child[2065]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 1023s [p11_child[2065]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 1023s [p11_child[2065]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 1023s [p11_child[2065]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 1023s [p11_child[2065]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 1023s [p11_child[2065]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 1023s [p11_child[2065]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 1023s [p11_child[2065]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 1023s [p11_child[2065]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 1023s [p11_child[2065]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 1023s [p11_child[2065]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 1023s [p11_child[2065]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 1023s [p11_child[2065]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 1023s [p11_child[2065]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 1023s [p11_child[2065]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 1023s [p11_child[2065]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 1023s [p11_child[2065]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 1023s [p11_child[2065]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 1023s [p11_child[2065]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 1023s [p11_child[2065]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 1023s [p11_child[2065]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 1023s [p11_child[2065]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 1023s [p11_child[2065]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 1023s [p11_child[2065]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 1023s [p11_child[2065]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 1023s [p11_child[2065]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 1023s [p11_child[2065]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 1023s [p11_child[2065]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 1023s [p11_child[2065]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 1023s [p11_child[2065]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 1023s [p11_child[2065]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 1023s [p11_child[2065]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 1023s [p11_child[2065]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 1023s [p11_child[2065]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 1023s [p11_child[2065]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 1023s [p11_child[2065]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 1023s [p11_child[2065]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 1023s [p11_child[2065]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 1023s [p11_child[2065]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 1023s [p11_child[2065]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 1023s [p11_child[2065]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 1023s [p11_child[2065]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 1023s [p11_child[2065]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 1023s [p11_child[2065]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 1023s [p11_child[2065]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 1023s [p11_child[2065]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 1023s [p11_child[2065]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 1023s [p11_child[2065]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 1023s [p11_child[2065]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 1023s [p11_child[2065]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 1023s [p11_child[2065]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 1023s [p11_child[2065]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 1023s [p11_child[2065]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 1023s [p11_child[2065]] [do_card] (0x4000): Certificate verified and validated. 1023s [p11_child[2065]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 1023s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-wKxRAf/SSSD-child-13680-auth.output 1023s + echo '-----BEGIN CERTIFICATE-----' 1023s + tail -n1 /tmp/sssd-softhsm2-wKxRAf/SSSD-child-13680-auth.output 1023s + echo '-----END CERTIFICATE-----' 1023s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-wKxRAf/SSSD-child-13680-auth.pem 1023s Certificate: 1023s Data: 1023s Version: 3 (0x2) 1023s Serial Number: 4 (0x4) 1023s Signature Algorithm: sha256WithRSAEncryption 1023s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 1023s Validity 1023s Not Before: Mar 10 09:32:47 2024 GMT 1023s Not After : Mar 10 09:32:47 2025 GMT 1023s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 1023s Subject Public Key Info: 1023s Public Key Algorithm: rsaEncryption 1023s Public-Key: (1024 bit) 1023s Modulus: 1023s 00:b2:5b:d6:a5:fb:cb:b0:29:e6:53:7c:31:3d:b3: 1023s 27:a3:e1:d0:50:cb:ac:1b:af:ce:b2:cc:43:98:83: 1023s 5c:19:e9:c1:97:6c:eb:f1:ae:89:62:8c:29:7f:6b: 1023s 22:2e:1d:34:fa:32:b0:b5:cb:00:36:b6:d6:b5:77: 1023s e1:41:99:4c:c3:e3:be:99:b6:61:61:76:36:f0:26: 1023s 47:f2:9f:df:90:15:08:ca:8c:d4:b0:fe:8c:af:bf: 1023s e4:03:d6:c6:ca:c0:d4:e5:53:e0:ff:5d:fd:34:c0: 1023s a7:3a:5d:13:2b:3f:05:93:83:8e:5c:0b:a9:c9:76: 1023s 1f:97:bc:8a:3a:07:33:bd:c1 1023s Exponent: 65537 (0x10001) 1023s X509v3 extensions: 1023s X509v3 Authority Key Identifier: 1023s 5F:60:54:F1:AC:3E:2D:42:06:88:45:9F:29:ED:86:C4:87:30:11:47 1023s X509v3 Basic Constraints: 1023s CA:FALSE 1023s Netscape Cert Type: 1023s SSL Client, S/MIME 1023s Netscape Comment: 1023s Test Organization Intermediate CA trusted Certificate 1023s X509v3 Subject Key Identifier: 1023s 42:7C:FC:71:35:E9:AA:EF:FD:7C:E5:03:F1:E8:8D:84:38:9F:97:E9 1023s X509v3 Key Usage: critical 1023s Digital Signature, Non Repudiation, Key Encipherment 1023s X509v3 Extended Key Usage: 1023s TLS Web Client Authentication, E-mail Protection 1023s X509v3 Subject Alternative Name: 1023s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 1023s Signature Algorithm: sha256WithRSAEncryption 1023s Signature Value: 1023s a3:9a:e8:63:b7:10:ca:fb:b2:4f:e8:36:dc:c0:25:78:94:e4: 1023s 1b:2b:50:51:7d:79:c6:4d:93:74:83:18:2b:3d:95:cd:7f:2e: 1023s 46:63:39:37:2d:f0:7c:63:d7:31:90:01:24:c3:ab:bd:82:32: 1023s 47:f8:47:e1:b9:03:88:c7:86:0f:43:71:25:5b:7e:b0:23:d8: 1023s 7f:9b:30:43:fd:71:99:49:0a:2d:52:47:a7:90:01:4a:85:31: 1023s 89:a4:f3:d4:73:ca:9e:91:35:23:88:94:30:ea:53:f3:5b:d8: 1023s a6:b5:5f:5a:34:b8:29:cc:23:48:e0:ad:a0:21:c8:9e:11:8b: 1023s 88:c1 1023s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-wKxRAf/SSSD-child-13680-auth.pem 1023s + found_md5=Modulus=B25BD6A5FBCBB029E6537C313DB327A3E1D050CBAC1BAFCEB2CC4398835C19E9C1976CEBF1AE89628C297F6B222E1D34FA32B0B5CB0036B6D6B577E141994CC3E3BE99B661617636F02647F29FDF901508CA8CD4B0FE8CAFBFE403D6C6CAC0D4E553E0FF5DFD34C0A73A5D132B3F0593838E5C0BA9C9761F97BC8A3A0733BDC1 1023s + '[' Modulus=B25BD6A5FBCBB029E6537C313DB327A3E1D050CBAC1BAFCEB2CC4398835C19E9C1976CEBF1AE89628C297F6B222E1D34FA32B0B5CB0036B6D6B577E141994CC3E3BE99B661617636F02647F29FDF901508CA8CD4B0FE8CAFBFE403D6C6CAC0D4E553E0FF5DFD34C0A73A5D132B3F0593838E5C0BA9C9761F97BC8A3A0733BDC1 '!=' Modulus=B25BD6A5FBCBB029E6537C313DB327A3E1D050CBAC1BAFCEB2CC4398835C19E9C1976CEBF1AE89628C297F6B222E1D34FA32B0B5CB0036B6D6B577E141994CC3E3BE99B661617636F02647F29FDF901508CA8CD4B0FE8CAFBFE403D6C6CAC0D4E553E0FF5DFD34C0A73A5D132B3F0593838E5C0BA9C9761F97BC8A3A0733BDC1 ']' 1023s + invalid_certificate /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-6600 /tmp/sssd-softhsm2-wKxRAf/test-root-CA.pem 1023s + check_certificate /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-6600 /tmp/sssd-softhsm2-wKxRAf/test-root-CA.pem 1023s + local certificate=/tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA-trusted-certificate-0001.pem 1023s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-6600 1023s + local key_ring=/tmp/sssd-softhsm2-wKxRAf/test-root-CA.pem 1023s + local verify_option= 1023s + prepare_softhsm2_card /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-6600 1023s + local certificate=/tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA-trusted-certificate-0001.pem 1023s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-6600 1023s + local key_cn 1023s + local key_name 1023s + local tokens_dir 1023s + local output_cert_file 1023s + token_name= 1023s ++ basename /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA-trusted-certificate-0001.pem .pem 1023s + key_name=test-intermediate-CA-trusted-certificate-0001 1023s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA-trusted-certificate-0001.pem 1023s ++ sed -n 's/ *commonName *= //p' 1023s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 1023s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 1023s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-wKxRAf/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 1023s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-wKxRAf/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 1023s ++ basename /tmp/sssd-softhsm2-wKxRAf/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 1023s + tokens_dir=/tmp/sssd-softhsm2-wKxRAf/softhsm2-test-intermediate-CA-trusted-certificate-0001 1023s + token_name='Test Organization Interme Token' 1023s + '[' '!' -e /tmp/sssd-softhsm2-wKxRAf/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 1023s + '[' '!' -d /tmp/sssd-softhsm2-wKxRAf/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 1023s + echo 'Test Organization Interme Token' 1023s Test Organization Interme Token 1023s + '[' -n '' ']' 1023s + local output_base_name=SSSD-child-9626 1023s + local output_file=/tmp/sssd-softhsm2-wKxRAf/SSSD-child-9626.output 1023s + output_cert_file=/tmp/sssd-softhsm2-wKxRAf/SSSD-child-9626.pem 1023s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-wKxRAf/test-root-CA.pem 1023s [p11_child[2075]] [main] (0x0400): p11_child started. 1023s [p11_child[2075]] [main] (0x2000): Running in [pre-auth] mode. 1023s [p11_child[2075]] [main] (0x2000): Running with effective IDs: [0][0]. 1023s [p11_child[2075]] [main] (0x2000): Running with real IDs [0][0]. 1023s [p11_child[2075]] [do_card] (0x4000): Module List: 1023s [p11_child[2075]] [do_card] (0x4000): common name: [softhsm2]. 1023s [p11_child[2075]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 1023s [p11_child[2075]] [do_card] (0x4000): Description [SoftHSM slot ID 0x336607d1] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 1023s [p11_child[2075]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 1023s [p11_child[2075]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x336607d1][862324689] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 1023s [p11_child[2075]] [do_card] (0x4000): Login NOT required. 1023s [p11_child[2075]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 1023s [p11_child[2075]] [do_verification] (0x0040): X509_verify_cert failed [0]. 1023s [p11_child[2075]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 1023s [p11_child[2075]] [read_certs] (0x0040): Certificate [Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] not valid, skipping. 1023s [p11_child[2075]] [do_card] (0x4000): No certificate found. 1023s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-wKxRAf/SSSD-child-9626.output 1023s + return 2 1023s + invalid_certificate /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-6600 /tmp/sssd-softhsm2-wKxRAf/test-root-CA.pem partial_chain 1023s + check_certificate /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-6600 /tmp/sssd-softhsm2-wKxRAf/test-root-CA.pem partial_chain 1023s + local certificate=/tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA-trusted-certificate-0001.pem 1023s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-6600 1023s + local key_ring=/tmp/sssd-softhsm2-wKxRAf/test-root-CA.pem 1023s + local verify_option=partial_chain 1023s + prepare_softhsm2_card /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-6600 1023s + local certificate=/tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA-trusted-certificate-0001.pem 1023s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-6600 1023s + local key_cn 1023s + local key_name 1023s + local tokens_dir 1023s + local output_cert_file 1023s + token_name= 1023s ++ basename /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA-trusted-certificate-0001.pem .pem 1023s + key_name=test-intermediate-CA-trusted-certificate-0001 1023s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA-trusted-certificate-0001.pem 1023s ++ sed -n 's/ *commonName *= //p' 1023s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 1023s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 1023s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-wKxRAf/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 1023s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-wKxRAf/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 1023s ++ basename /tmp/sssd-softhsm2-wKxRAf/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 1023s + tokens_dir=/tmp/sssd-softhsm2-wKxRAf/softhsm2-test-intermediate-CA-trusted-certificate-0001 1023s + token_name='Test Organization Interme Token' 1023s Test Organization Interme Token 1023s + '[' '!' -e /tmp/sssd-softhsm2-wKxRAf/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 1023s + '[' '!' -d /tmp/sssd-softhsm2-wKxRAf/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 1023s + echo 'Test Organization Interme Token' 1023s + '[' -n partial_chain ']' 1023s + local verify_arg=--verify=partial_chain 1023s + local output_base_name=SSSD-child-5950 1023s + local output_file=/tmp/sssd-softhsm2-wKxRAf/SSSD-child-5950.output 1023s + output_cert_file=/tmp/sssd-softhsm2-wKxRAf/SSSD-child-5950.pem 1023s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-wKxRAf/test-root-CA.pem 1023s [p11_child[2082]] [main] (0x0400): p11_child started. 1023s [p11_child[2082]] [main] (0x2000): Running in [pre-auth] mode. 1023s [p11_child[2082]] [main] (0x2000): Running with effective IDs: [0][0]. 1023s [p11_child[2082]] [main] (0x2000): Running with real IDs [0][0]. 1023s [p11_child[2082]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 1023s [p11_child[2082]] [do_card] (0x4000): Module List: 1023s [p11_child[2082]] [do_card] (0x4000): common name: [softhsm2]. 1023s [p11_child[2082]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 1023s [p11_child[2082]] [do_card] (0x4000): Description [SoftHSM slot ID 0x336607d1] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 1023s [p11_child[2082]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 1023s [p11_child[2082]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x336607d1][862324689] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 1023s [p11_child[2082]] [do_card] (0x4000): Login NOT required. 1023s [p11_child[2082]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 1023s [p11_child[2082]] [do_verification] (0x0040): X509_verify_cert failed [0]. 1023s [p11_child[2082]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 1023s [p11_child[2082]] [read_certs] (0x0040): Certificate [Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] not valid, skipping. 1023s [p11_child[2082]] [do_card] (0x4000): No certificate found. 1023s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-wKxRAf/SSSD-child-5950.output 1023s + return 2 1023s + valid_certificate /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-6600 /tmp/sssd-softhsm2-wKxRAf/test-full-chain-CA.pem 1023s + check_certificate /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-6600 /tmp/sssd-softhsm2-wKxRAf/test-full-chain-CA.pem 1023s + local certificate=/tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA-trusted-certificate-0001.pem 1023s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-6600 1023s + local key_ring=/tmp/sssd-softhsm2-wKxRAf/test-full-chain-CA.pem 1023s + local verify_option= 1023s + prepare_softhsm2_card /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-6600 1023s + local certificate=/tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA-trusted-certificate-0001.pem 1023s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-6600 1023s + local key_cn 1023s + local key_name 1023s + local tokens_dir 1023s + local output_cert_file 1023s + token_name= 1023s ++ basename /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA-trusted-certificate-0001.pem .pem 1023s + key_name=test-intermediate-CA-trusted-certificate-0001 1023s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA-trusted-certificate-0001.pem 1023s ++ sed -n 's/ *commonName *= //p' 1023s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 1023s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 1023s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-wKxRAf/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 1023s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-wKxRAf/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 1023s ++ basename /tmp/sssd-softhsm2-wKxRAf/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 1023s + tokens_dir=/tmp/sssd-softhsm2-wKxRAf/softhsm2-test-intermediate-CA-trusted-certificate-0001 1023s + token_name='Test Organization Interme Token' 1023s + '[' '!' -e /tmp/sssd-softhsm2-wKxRAf/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 1023s Test Organization Interme Token 1023s + '[' '!' -d /tmp/sssd-softhsm2-wKxRAf/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 1023s + echo 'Test Organization Interme Token' 1023s + '[' -n '' ']' 1023s + local output_base_name=SSSD-child-25636 1023s + local output_file=/tmp/sssd-softhsm2-wKxRAf/SSSD-child-25636.output 1023s + output_cert_file=/tmp/sssd-softhsm2-wKxRAf/SSSD-child-25636.pem 1023s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-wKxRAf/test-full-chain-CA.pem 1023s [p11_child[2089]] [main] (0x0400): p11_child started. 1023s [p11_child[2089]] [main] (0x2000): Running in [pre-auth] mode. 1023s [p11_child[2089]] [main] (0x2000): Running with effective IDs: [0][0]. 1023s [p11_child[2089]] [main] (0x2000): Running with real IDs [0][0]. 1023s [p11_child[2089]] [do_card] (0x4000): Module List: 1023s [p11_child[2089]] [do_card] (0x4000): common name: [softhsm2]. 1023s [p11_child[2089]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 1023s [p11_child[2089]] [do_card] (0x4000): Description [SoftHSM slot ID 0x336607d1] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 1023s [p11_child[2089]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 1023s [p11_child[2089]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x336607d1][862324689] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 1023s [p11_child[2089]] [do_card] (0x4000): Login NOT required. 1023s [p11_child[2089]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 1023s [p11_child[2089]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 1023s [p11_child[2089]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Interme Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 1023s [p11_child[2089]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x336607d1;slot-manufacturer=SoftHSM%20project;slot-id=862324689;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fb7d087f336607d1;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 1023s [p11_child[2089]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 1023s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-wKxRAf/SSSD-child-25636.output 1023s + echo '-----BEGIN CERTIFICATE-----' 1023s + tail -n1 /tmp/sssd-softhsm2-wKxRAf/SSSD-child-25636.output 1023s + echo '-----END CERTIFICATE-----' 1023s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-wKxRAf/SSSD-child-25636.pem 1023s Certificate: 1023s Data: 1023s Version: 3 (0x2) 1023s Serial Number: 4 (0x4) 1023s Signature Algorithm: sha256WithRSAEncryption 1023s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 1023s Validity 1023s Not Before: Mar 10 09:32:47 2024 GMT 1023s Not After : Mar 10 09:32:47 2025 GMT 1023s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 1023s Subject Public Key Info: 1023s Public Key Algorithm: rsaEncryption 1023s Public-Key: (1024 bit) 1023s Modulus: 1023s 00:b2:5b:d6:a5:fb:cb:b0:29:e6:53:7c:31:3d:b3: 1023s 27:a3:e1:d0:50:cb:ac:1b:af:ce:b2:cc:43:98:83: 1023s 5c:19:e9:c1:97:6c:eb:f1:ae:89:62:8c:29:7f:6b: 1023s 22:2e:1d:34:fa:32:b0:b5:cb:00:36:b6:d6:b5:77: 1023s e1:41:99:4c:c3:e3:be:99:b6:61:61:76:36:f0:26: 1023s 47:f2:9f:df:90:15:08:ca:8c:d4:b0:fe:8c:af:bf: 1023s e4:03:d6:c6:ca:c0:d4:e5:53:e0:ff:5d:fd:34:c0: 1023s a7:3a:5d:13:2b:3f:05:93:83:8e:5c:0b:a9:c9:76: 1023s 1f:97:bc:8a:3a:07:33:bd:c1 1023s Exponent: 65537 (0x10001) 1023s X509v3 extensions: 1023s X509v3 Authority Key Identifier: 1023s 5F:60:54:F1:AC:3E:2D:42:06:88:45:9F:29:ED:86:C4:87:30:11:47 1023s X509v3 Basic Constraints: 1023s CA:FALSE 1023s Netscape Cert Type: 1023s SSL Client, S/MIME 1023s Netscape Comment: 1023s Test Organization Intermediate CA trusted Certificate 1023s X509v3 Subject Key Identifier: 1023s 42:7C:FC:71:35:E9:AA:EF:FD:7C:E5:03:F1:E8:8D:84:38:9F:97:E9 1023s X509v3 Key Usage: critical 1023s Digital Signature, Non Repudiation, Key Encipherment 1023s X509v3 Extended Key Usage: 1023s TLS Web Client Authentication, E-mail Protection 1023s X509v3 Subject Alternative Name: 1023s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 1023s Signature Algorithm: sha256WithRSAEncryption 1023s Signature Value: 1023s a3:9a:e8:63:b7:10:ca:fb:b2:4f:e8:36:dc:c0:25:78:94:e4: 1023s 1b:2b:50:51:7d:79:c6:4d:93:74:83:18:2b:3d:95:cd:7f:2e: 1023s 46:63:39:37:2d:f0:7c:63:d7:31:90:01:24:c3:ab:bd:82:32: 1023s 47:f8:47:e1:b9:03:88:c7:86:0f:43:71:25:5b:7e:b0:23:d8: 1023s 7f:9b:30:43:fd:71:99:49:0a:2d:52:47:a7:90:01:4a:85:31: 1023s 89:a4:f3:d4:73:ca:9e:91:35:23:88:94:30:ea:53:f3:5b:d8: 1023s a6:b5:5f:5a:34:b8:29:cc:23:48:e0:ad:a0:21:c8:9e:11:8b: 1023s 88:c1 1023s + local found_md5 expected_md5 1023s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA-trusted-certificate-0001.pem 1023s + expected_md5=Modulus=B25BD6A5FBCBB029E6537C313DB327A3E1D050CBAC1BAFCEB2CC4398835C19E9C1976CEBF1AE89628C297F6B222E1D34FA32B0B5CB0036B6D6B577E141994CC3E3BE99B661617636F02647F29FDF901508CA8CD4B0FE8CAFBFE403D6C6CAC0D4E553E0FF5DFD34C0A73A5D132B3F0593838E5C0BA9C9761F97BC8A3A0733BDC1 1023s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-wKxRAf/SSSD-child-25636.pem 1023s + found_md5=Modulus=B25BD6A5FBCBB029E6537C313DB327A3E1D050CBAC1BAFCEB2CC4398835C19E9C1976CEBF1AE89628C297F6B222E1D34FA32B0B5CB0036B6D6B577E141994CC3E3BE99B661617636F02647F29FDF901508CA8CD4B0FE8CAFBFE403D6C6CAC0D4E553E0FF5DFD34C0A73A5D132B3F0593838E5C0BA9C9761F97BC8A3A0733BDC1 1023s + '[' Modulus=B25BD6A5FBCBB029E6537C313DB327A3E1D050CBAC1BAFCEB2CC4398835C19E9C1976CEBF1AE89628C297F6B222E1D34FA32B0B5CB0036B6D6B577E141994CC3E3BE99B661617636F02647F29FDF901508CA8CD4B0FE8CAFBFE403D6C6CAC0D4E553E0FF5DFD34C0A73A5D132B3F0593838E5C0BA9C9761F97BC8A3A0733BDC1 '!=' Modulus=B25BD6A5FBCBB029E6537C313DB327A3E1D050CBAC1BAFCEB2CC4398835C19E9C1976CEBF1AE89628C297F6B222E1D34FA32B0B5CB0036B6D6B577E141994CC3E3BE99B661617636F02647F29FDF901508CA8CD4B0FE8CAFBFE403D6C6CAC0D4E553E0FF5DFD34C0A73A5D132B3F0593838E5C0BA9C9761F97BC8A3A0733BDC1 ']' 1023s + output_file=/tmp/sssd-softhsm2-wKxRAf/SSSD-child-25636-auth.output 1023s ++ basename /tmp/sssd-softhsm2-wKxRAf/SSSD-child-25636-auth.output .output 1023s + output_cert_file=/tmp/sssd-softhsm2-wKxRAf/SSSD-child-25636-auth.pem 1023s + echo -n 053350 1023s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-wKxRAf/test-full-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 '' --token_name 'Test Organization Interme Token' --module_name /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so 1023s [p11_child[2097]] [main] (0x0400): p11_child started. 1023s [p11_child[2097]] [main] (0x2000): Running in [auth] mode. 1023s [p11_child[2097]] [main] (0x2000): Running with effective IDs: [0][0]. 1023s [p11_child[2097]] [main] (0x2000): Running with real IDs [0][0]. 1023s [p11_child[2097]] [do_card] (0x4000): Module List: 1023s [p11_child[2097]] [do_card] (0x4000): common name: [softhsm2]. 1023s [p11_child[2097]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 1023s [p11_child[2097]] [do_card] (0x4000): Description [SoftHSM slot ID 0x336607d1] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 1023s [p11_child[2097]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 1023s [p11_child[2097]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x336607d1][862324689] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 1023s [p11_child[2097]] [do_card] (0x4000): Login required. 1023s [p11_child[2097]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 1023s [p11_child[2097]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 1023s [p11_child[2097]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so Test Organization Interme Token Test Organization Interme Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 1023s [p11_child[2097]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x336607d1;slot-manufacturer=SoftHSM%20project;slot-id=862324689;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fb7d087f336607d1;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 1023s [p11_child[2097]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 1023s [p11_child[2097]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 1023s [p11_child[2097]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 1023s [p11_child[2097]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 1023s [p11_child[2097]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 1023s [p11_child[2097]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 1023s [p11_child[2097]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 1023s [p11_child[2097]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 1023s [p11_child[2097]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 1023s [p11_child[2097]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 1023s [p11_child[2097]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 1023s [p11_child[2097]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 1023s [p11_child[2097]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 1023s [p11_child[2097]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 1023s [p11_child[2097]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 1023s [p11_child[2097]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 1023s [p11_child[2097]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 1023s [p11_child[2097]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 1023s [p11_child[2097]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 1023s [p11_child[2097]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 1023s [p11_child[2097]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 1023s [p11_child[2097]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 1023s [p11_child[2097]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 1023s [p11_child[2097]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 1023s [p11_child[2097]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 1023s [p11_child[2097]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 1023s [p11_child[2097]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 1023s [p11_child[2097]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 1023s [p11_child[2097]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 1023s [p11_child[2097]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 1023s [p11_child[2097]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 1023s [p11_child[2097]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 1023s [p11_child[2097]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 1023s [p11_child[2097]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 1023s [p11_child[2097]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 1023s [p11_child[2097]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 1023s [p11_child[2097]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 1023s [p11_child[2097]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 1023s [p11_child[2097]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 1023s [p11_child[2097]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 1023s [p11_child[2097]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 1023s [p11_child[2097]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 1023s [p11_child[2097]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 1023s [p11_child[2097]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 1023s [p11_child[2097]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 1023s [p11_child[2097]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 1023s [p11_child[2097]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 1023s [p11_child[2097]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 1023s [p11_child[2097]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 1023s [p11_child[2097]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 1023s [p11_child[2097]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 1023s [p11_child[2097]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 1023s [p11_child[2097]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 1023s [p11_child[2097]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 1023s [p11_child[2097]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 1023s [p11_child[2097]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 1023s [p11_child[2097]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 1023s [p11_child[2097]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 1023s [p11_child[2097]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 1023s [p11_child[2097]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 1023s [p11_child[2097]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 1023s [p11_child[2097]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 1023s [p11_child[2097]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 1023s [p11_child[2097]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 1023s [p11_child[2097]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 1023s [p11_child[2097]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 1023s [p11_child[2097]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 1023s [p11_child[2097]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 1023s [p11_child[2097]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 1023s [p11_child[2097]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 1023s [p11_child[2097]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 1023s [p11_child[2097]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 1023s [p11_child[2097]] [do_card] (0x4000): Certificate verified and validated. 1023s [p11_child[2097]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 1023s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-wKxRAf/SSSD-child-25636-auth.output 1023s + echo '-----BEGIN CERTIFICATE-----' 1023s + tail -n1 /tmp/sssd-softhsm2-wKxRAf/SSSD-child-25636-auth.output 1023s + echo '-----END CERTIFICATE-----' 1023s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-wKxRAf/SSSD-child-25636-auth.pem 1023s Certificate: 1023s Data: 1023s Version: 3 (0x2) 1023s Serial Number: 4 (0x4) 1023s Signature Algorithm: sha256WithRSAEncryption 1023s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 1023s Validity 1023s Not Before: Mar 10 09:32:47 2024 GMT 1023s Not After : Mar 10 09:32:47 2025 GMT 1023s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 1023s Subject Public Key Info: 1023s Public Key Algorithm: rsaEncryption 1023s Public-Key: (1024 bit) 1023s Modulus: 1023s 00:b2:5b:d6:a5:fb:cb:b0:29:e6:53:7c:31:3d:b3: 1023s 27:a3:e1:d0:50:cb:ac:1b:af:ce:b2:cc:43:98:83: 1023s 5c:19:e9:c1:97:6c:eb:f1:ae:89:62:8c:29:7f:6b: 1023s 22:2e:1d:34:fa:32:b0:b5:cb:00:36:b6:d6:b5:77: 1023s e1:41:99:4c:c3:e3:be:99:b6:61:61:76:36:f0:26: 1023s 47:f2:9f:df:90:15:08:ca:8c:d4:b0:fe:8c:af:bf: 1023s e4:03:d6:c6:ca:c0:d4:e5:53:e0:ff:5d:fd:34:c0: 1023s a7:3a:5d:13:2b:3f:05:93:83:8e:5c:0b:a9:c9:76: 1023s 1f:97:bc:8a:3a:07:33:bd:c1 1023s Exponent: 65537 (0x10001) 1023s X509v3 extensions: 1023s X509v3 Authority Key Identifier: 1023s 5F:60:54:F1:AC:3E:2D:42:06:88:45:9F:29:ED:86:C4:87:30:11:47 1023s X509v3 Basic Constraints: 1023s CA:FALSE 1023s Netscape Cert Type: 1023s SSL Client, S/MIME 1023s Netscape Comment: 1023s Test Organization Intermediate CA trusted Certificate 1023s X509v3 Subject Key Identifier: 1023s 42:7C:FC:71:35:E9:AA:EF:FD:7C:E5:03:F1:E8:8D:84:38:9F:97:E9 1023s X509v3 Key Usage: critical 1023s Digital Signature, Non Repudiation, Key Encipherment 1023s X509v3 Extended Key Usage: 1023s TLS Web Client Authentication, E-mail Protection 1023s X509v3 Subject Alternative Name: 1023s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 1023s Signature Algorithm: sha256WithRSAEncryption 1023s Signature Value: 1023s a3:9a:e8:63:b7:10:ca:fb:b2:4f:e8:36:dc:c0:25:78:94:e4: 1023s 1b:2b:50:51:7d:79:c6:4d:93:74:83:18:2b:3d:95:cd:7f:2e: 1023s 46:63:39:37:2d:f0:7c:63:d7:31:90:01:24:c3:ab:bd:82:32: 1023s 47:f8:47:e1:b9:03:88:c7:86:0f:43:71:25:5b:7e:b0:23:d8: 1023s 7f:9b:30:43:fd:71:99:49:0a:2d:52:47:a7:90:01:4a:85:31: 1023s 89:a4:f3:d4:73:ca:9e:91:35:23:88:94:30:ea:53:f3:5b:d8: 1023s a6:b5:5f:5a:34:b8:29:cc:23:48:e0:ad:a0:21:c8:9e:11:8b: 1023s 88:c1 1023s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-wKxRAf/SSSD-child-25636-auth.pem 1023s + found_md5=Modulus=B25BD6A5FBCBB029E6537C313DB327A3E1D050CBAC1BAFCEB2CC4398835C19E9C1976CEBF1AE89628C297F6B222E1D34FA32B0B5CB0036B6D6B577E141994CC3E3BE99B661617636F02647F29FDF901508CA8CD4B0FE8CAFBFE403D6C6CAC0D4E553E0FF5DFD34C0A73A5D132B3F0593838E5C0BA9C9761F97BC8A3A0733BDC1 1023s + '[' Modulus=B25BD6A5FBCBB029E6537C313DB327A3E1D050CBAC1BAFCEB2CC4398835C19E9C1976CEBF1AE89628C297F6B222E1D34FA32B0B5CB0036B6D6B577E141994CC3E3BE99B661617636F02647F29FDF901508CA8CD4B0FE8CAFBFE403D6C6CAC0D4E553E0FF5DFD34C0A73A5D132B3F0593838E5C0BA9C9761F97BC8A3A0733BDC1 '!=' Modulus=B25BD6A5FBCBB029E6537C313DB327A3E1D050CBAC1BAFCEB2CC4398835C19E9C1976CEBF1AE89628C297F6B222E1D34FA32B0B5CB0036B6D6B577E141994CC3E3BE99B661617636F02647F29FDF901508CA8CD4B0FE8CAFBFE403D6C6CAC0D4E553E0FF5DFD34C0A73A5D132B3F0593838E5C0BA9C9761F97BC8A3A0733BDC1 ']' 1023s + valid_certificate /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-6600 /tmp/sssd-softhsm2-wKxRAf/test-full-chain-CA.pem partial_chain 1023s + check_certificate /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-6600 /tmp/sssd-softhsm2-wKxRAf/test-full-chain-CA.pem partial_chain 1023s + local certificate=/tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA-trusted-certificate-0001.pem 1023s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-6600 1023s + local key_ring=/tmp/sssd-softhsm2-wKxRAf/test-full-chain-CA.pem 1023s + local verify_option=partial_chain 1023s + prepare_softhsm2_card /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-6600 1023s + local certificate=/tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA-trusted-certificate-0001.pem 1023s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-6600 1023s + local key_cn 1023s + local key_name 1023s + local tokens_dir 1023s + local output_cert_file 1023s + token_name= 1023s ++ basename /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA-trusted-certificate-0001.pem .pem 1023s + key_name=test-intermediate-CA-trusted-certificate-0001 1023s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA-trusted-certificate-0001.pem 1023s ++ sed -n 's/ *commonName *= //p' 1023s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 1023s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 1023s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-wKxRAf/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 1023s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-wKxRAf/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 1023s ++ basename /tmp/sssd-softhsm2-wKxRAf/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 1023s Test Organization Interme Token 1023s + tokens_dir=/tmp/sssd-softhsm2-wKxRAf/softhsm2-test-intermediate-CA-trusted-certificate-0001 1023s + token_name='Test Organization Interme Token' 1023s + '[' '!' -e /tmp/sssd-softhsm2-wKxRAf/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 1023s + '[' '!' -d /tmp/sssd-softhsm2-wKxRAf/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 1023s + echo 'Test Organization Interme Token' 1023s + '[' -n partial_chain ']' 1023s + local verify_arg=--verify=partial_chain 1023s + local output_base_name=SSSD-child-23264 1023s + local output_file=/tmp/sssd-softhsm2-wKxRAf/SSSD-child-23264.output 1023s + output_cert_file=/tmp/sssd-softhsm2-wKxRAf/SSSD-child-23264.pem 1023s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-wKxRAf/test-full-chain-CA.pem 1023s [p11_child[2107]] [main] (0x0400): p11_child started. 1023s [p11_child[2107]] [main] (0x2000): Running in [pre-auth] mode. 1023s [p11_child[2107]] [main] (0x2000): Running with effective IDs: [0][0]. 1023s [p11_child[2107]] [main] (0x2000): Running with real IDs [0][0]. 1023s [p11_child[2107]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 1023s [p11_child[2107]] [do_card] (0x4000): Module List: 1023s [p11_child[2107]] [do_card] (0x4000): common name: [softhsm2]. 1023s [p11_child[2107]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 1023s [p11_child[2107]] [do_card] (0x4000): Description [SoftHSM slot ID 0x336607d1] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 1023s [p11_child[2107]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 1023s [p11_child[2107]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x336607d1][862324689] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 1023s [p11_child[2107]] [do_card] (0x4000): Login NOT required. 1023s [p11_child[2107]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 1023s [p11_child[2107]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 1023s [p11_child[2107]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Interme Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 1023s [p11_child[2107]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x336607d1;slot-manufacturer=SoftHSM%20project;slot-id=862324689;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fb7d087f336607d1;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 1023s [p11_child[2107]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 1023s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-wKxRAf/SSSD-child-23264.output 1023s + echo '-----BEGIN CERTIFICATE-----' 1023s + tail -n1 /tmp/sssd-softhsm2-wKxRAf/SSSD-child-23264.output 1023s + echo '-----END CERTIFICATE-----' 1023s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-wKxRAf/SSSD-child-23264.pem 1024s Certificate: 1024s Data: 1024s Version: 3 (0x2) 1024s Serial Number: 4 (0x4) 1024s Signature Algorithm: sha256WithRSAEncryption 1024s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 1024s Validity 1024s Not Before: Mar 10 09:32:47 2024 GMT 1024s Not After : Mar 10 09:32:47 2025 GMT 1024s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 1024s Subject Public Key Info: 1024s Public Key Algorithm: rsaEncryption 1024s Public-Key: (1024 bit) 1024s Modulus: 1024s 00:b2:5b:d6:a5:fb:cb:b0:29:e6:53:7c:31:3d:b3: 1024s 27:a3:e1:d0:50:cb:ac:1b:af:ce:b2:cc:43:98:83: 1024s 5c:19:e9:c1:97:6c:eb:f1:ae:89:62:8c:29:7f:6b: 1024s 22:2e:1d:34:fa:32:b0:b5:cb:00:36:b6:d6:b5:77: 1024s e1:41:99:4c:c3:e3:be:99:b6:61:61:76:36:f0:26: 1024s 47:f2:9f:df:90:15:08:ca:8c:d4:b0:fe:8c:af:bf: 1024s e4:03:d6:c6:ca:c0:d4:e5:53:e0:ff:5d:fd:34:c0: 1024s a7:3a:5d:13:2b:3f:05:93:83:8e:5c:0b:a9:c9:76: 1024s 1f:97:bc:8a:3a:07:33:bd:c1 1024s Exponent: 65537 (0x10001) 1024s X509v3 extensions: 1024s X509v3 Authority Key Identifier: 1024s 5F:60:54:F1:AC:3E:2D:42:06:88:45:9F:29:ED:86:C4:87:30:11:47 1024s X509v3 Basic Constraints: 1024s CA:FALSE 1024s Netscape Cert Type: 1024s SSL Client, S/MIME 1024s Netscape Comment: 1024s Test Organization Intermediate CA trusted Certificate 1024s X509v3 Subject Key Identifier: 1024s 42:7C:FC:71:35:E9:AA:EF:FD:7C:E5:03:F1:E8:8D:84:38:9F:97:E9 1024s X509v3 Key Usage: critical 1024s Digital Signature, Non Repudiation, Key Encipherment 1024s X509v3 Extended Key Usage: 1024s TLS Web Client Authentication, E-mail Protection 1024s X509v3 Subject Alternative Name: 1024s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 1024s Signature Algorithm: sha256WithRSAEncryption 1024s Signature Value: 1024s a3:9a:e8:63:b7:10:ca:fb:b2:4f:e8:36:dc:c0:25:78:94:e4: 1024s 1b:2b:50:51:7d:79:c6:4d:93:74:83:18:2b:3d:95:cd:7f:2e: 1024s 46:63:39:37:2d:f0:7c:63:d7:31:90:01:24:c3:ab:bd:82:32: 1024s 47:f8:47:e1:b9:03:88:c7:86:0f:43:71:25:5b:7e:b0:23:d8: 1024s 7f:9b:30:43:fd:71:99:49:0a:2d:52:47:a7:90:01:4a:85:31: 1024s 89:a4:f3:d4:73:ca:9e:91:35:23:88:94:30:ea:53:f3:5b:d8: 1024s a6:b5:5f:5a:34:b8:29:cc:23:48:e0:ad:a0:21:c8:9e:11:8b: 1024s 88:c1 1024s + local found_md5 expected_md5 1024s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA-trusted-certificate-0001.pem 1024s + expected_md5=Modulus=B25BD6A5FBCBB029E6537C313DB327A3E1D050CBAC1BAFCEB2CC4398835C19E9C1976CEBF1AE89628C297F6B222E1D34FA32B0B5CB0036B6D6B577E141994CC3E3BE99B661617636F02647F29FDF901508CA8CD4B0FE8CAFBFE403D6C6CAC0D4E553E0FF5DFD34C0A73A5D132B3F0593838E5C0BA9C9761F97BC8A3A0733BDC1 1024s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-wKxRAf/SSSD-child-23264.pem 1024s + found_md5=Modulus=B25BD6A5FBCBB029E6537C313DB327A3E1D050CBAC1BAFCEB2CC4398835C19E9C1976CEBF1AE89628C297F6B222E1D34FA32B0B5CB0036B6D6B577E141994CC3E3BE99B661617636F02647F29FDF901508CA8CD4B0FE8CAFBFE403D6C6CAC0D4E553E0FF5DFD34C0A73A5D132B3F0593838E5C0BA9C9761F97BC8A3A0733BDC1 1024s + '[' Modulus=B25BD6A5FBCBB029E6537C313DB327A3E1D050CBAC1BAFCEB2CC4398835C19E9C1976CEBF1AE89628C297F6B222E1D34FA32B0B5CB0036B6D6B577E141994CC3E3BE99B661617636F02647F29FDF901508CA8CD4B0FE8CAFBFE403D6C6CAC0D4E553E0FF5DFD34C0A73A5D132B3F0593838E5C0BA9C9761F97BC8A3A0733BDC1 '!=' Modulus=B25BD6A5FBCBB029E6537C313DB327A3E1D050CBAC1BAFCEB2CC4398835C19E9C1976CEBF1AE89628C297F6B222E1D34FA32B0B5CB0036B6D6B577E141994CC3E3BE99B661617636F02647F29FDF901508CA8CD4B0FE8CAFBFE403D6C6CAC0D4E553E0FF5DFD34C0A73A5D132B3F0593838E5C0BA9C9761F97BC8A3A0733BDC1 ']' 1024s + output_file=/tmp/sssd-softhsm2-wKxRAf/SSSD-child-23264-auth.output 1024s ++ basename /tmp/sssd-softhsm2-wKxRAf/SSSD-child-23264-auth.output .output 1024s + output_cert_file=/tmp/sssd-softhsm2-wKxRAf/SSSD-child-23264-auth.pem 1024s + echo -n 053350 1024s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-wKxRAf/test-full-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Interme Token' --module_name /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so 1024s [p11_child[2115]] [main] (0x0400): p11_child started. 1024s [p11_child[2115]] [main] (0x2000): Running in [auth] mode. 1024s [p11_child[2115]] [main] (0x2000): Running with effective IDs: [0][0]. 1024s [p11_child[2115]] [main] (0x2000): Running with real IDs [0][0]. 1024s [p11_child[2115]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 1024s [p11_child[2115]] [do_card] (0x4000): Module List: 1024s [p11_child[2115]] [do_card] (0x4000): common name: [softhsm2]. 1024s [p11_child[2115]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 1024s [p11_child[2115]] [do_card] (0x4000): Description [SoftHSM slot ID 0x336607d1] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 1024s [p11_child[2115]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 1024s [p11_child[2115]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x336607d1][862324689] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 1024s [p11_child[2115]] [do_card] (0x4000): Login required. 1024s [p11_child[2115]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 1024s [p11_child[2115]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 1024s [p11_child[2115]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so Test Organization Interme Token Test Organization Interme Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 1024s [p11_child[2115]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x336607d1;slot-manufacturer=SoftHSM%20project;slot-id=862324689;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fb7d087f336607d1;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 1024s [p11_child[2115]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 1024s [p11_child[2115]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 1024s [p11_child[2115]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 1024s [p11_child[2115]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 1024s [p11_child[2115]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 1024s [p11_child[2115]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 1024s [p11_child[2115]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 1024s [p11_child[2115]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 1024s [p11_child[2115]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 1024s [p11_child[2115]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 1024s [p11_child[2115]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 1024s [p11_child[2115]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 1024s [p11_child[2115]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 1024s [p11_child[2115]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 1024s [p11_child[2115]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 1024s [p11_child[2115]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 1024s [p11_child[2115]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 1024s [p11_child[2115]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 1024s [p11_child[2115]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 1024s [p11_child[2115]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 1024s [p11_child[2115]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 1024s [p11_child[2115]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 1024s [p11_child[2115]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 1024s [p11_child[2115]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 1024s [p11_child[2115]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 1024s [p11_child[2115]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 1024s [p11_child[2115]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 1024s [p11_child[2115]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 1024s [p11_child[2115]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 1024s [p11_child[2115]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 1024s [p11_child[2115]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 1024s [p11_child[2115]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 1024s [p11_child[2115]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 1024s [p11_child[2115]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 1024s [p11_child[2115]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 1024s [p11_child[2115]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 1024s [p11_child[2115]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 1024s [p11_child[2115]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 1024s [p11_child[2115]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 1024s [p11_child[2115]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 1024s [p11_child[2115]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 1024s [p11_child[2115]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 1024s [p11_child[2115]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 1024s [p11_child[2115]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 1024s [p11_child[2115]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 1024s [p11_child[2115]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 1024s [p11_child[2115]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 1024s [p11_child[2115]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 1024s [p11_child[2115]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 1024s [p11_child[2115]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 1024s [p11_child[2115]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 1024s [p11_child[2115]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 1024s [p11_child[2115]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 1024s [p11_child[2115]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 1024s [p11_child[2115]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 1024s [p11_child[2115]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 1024s [p11_child[2115]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 1024s [p11_child[2115]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 1024s [p11_child[2115]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 1024s [p11_child[2115]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 1024s [p11_child[2115]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 1024s [p11_child[2115]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 1024s [p11_child[2115]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 1024s [p11_child[2115]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 1024s [p11_child[2115]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 1024s [p11_child[2115]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 1024s [p11_child[2115]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 1024s [p11_child[2115]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 1024s [p11_child[2115]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 1024s [p11_child[2115]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 1024s [p11_child[2115]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 1024s [p11_child[2115]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 1024s [p11_child[2115]] [do_card] (0x4000): Certificate verified and validated. 1024s [p11_child[2115]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 1024s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-wKxRAf/SSSD-child-23264-auth.output 1024s + echo '-----BEGIN CERTIFICATE-----' 1024s + tail -n1 /tmp/sssd-softhsm2-wKxRAf/SSSD-child-23264-auth.output 1024s + echo '-----END CERTIFICATE-----' 1024s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-wKxRAf/SSSD-child-23264-auth.pem 1024s Certificate: 1024s Data: 1024s Version: 3 (0x2) 1024s Serial Number: 4 (0x4) 1024s Signature Algorithm: sha256WithRSAEncryption 1024s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 1024s Validity 1024s Not Before: Mar 10 09:32:47 2024 GMT 1024s Not After : Mar 10 09:32:47 2025 GMT 1024s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 1024s Subject Public Key Info: 1024s Public Key Algorithm: rsaEncryption 1024s Public-Key: (1024 bit) 1024s Modulus: 1024s 00:b2:5b:d6:a5:fb:cb:b0:29:e6:53:7c:31:3d:b3: 1024s 27:a3:e1:d0:50:cb:ac:1b:af:ce:b2:cc:43:98:83: 1024s 5c:19:e9:c1:97:6c:eb:f1:ae:89:62:8c:29:7f:6b: 1024s 22:2e:1d:34:fa:32:b0:b5:cb:00:36:b6:d6:b5:77: 1024s e1:41:99:4c:c3:e3:be:99:b6:61:61:76:36:f0:26: 1024s 47:f2:9f:df:90:15:08:ca:8c:d4:b0:fe:8c:af:bf: 1024s e4:03:d6:c6:ca:c0:d4:e5:53:e0:ff:5d:fd:34:c0: 1024s a7:3a:5d:13:2b:3f:05:93:83:8e:5c:0b:a9:c9:76: 1024s 1f:97:bc:8a:3a:07:33:bd:c1 1024s Exponent: 65537 (0x10001) 1024s X509v3 extensions: 1024s X509v3 Authority Key Identifier: 1024s 5F:60:54:F1:AC:3E:2D:42:06:88:45:9F:29:ED:86:C4:87:30:11:47 1024s X509v3 Basic Constraints: 1024s CA:FALSE 1024s Netscape Cert Type: 1024s SSL Client, S/MIME 1024s Netscape Comment: 1024s Test Organization Intermediate CA trusted Certificate 1024s X509v3 Subject Key Identifier: 1024s 42:7C:FC:71:35:E9:AA:EF:FD:7C:E5:03:F1:E8:8D:84:38:9F:97:E9 1024s X509v3 Key Usage: critical 1024s Digital Signature, Non Repudiation, Key Encipherment 1024s X509v3 Extended Key Usage: 1024s TLS Web Client Authentication, E-mail Protection 1024s X509v3 Subject Alternative Name: 1024s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 1024s Signature Algorithm: sha256WithRSAEncryption 1024s Signature Value: 1024s a3:9a:e8:63:b7:10:ca:fb:b2:4f:e8:36:dc:c0:25:78:94:e4: 1024s 1b:2b:50:51:7d:79:c6:4d:93:74:83:18:2b:3d:95:cd:7f:2e: 1024s 46:63:39:37:2d:f0:7c:63:d7:31:90:01:24:c3:ab:bd:82:32: 1024s 47:f8:47:e1:b9:03:88:c7:86:0f:43:71:25:5b:7e:b0:23:d8: 1024s 7f:9b:30:43:fd:71:99:49:0a:2d:52:47:a7:90:01:4a:85:31: 1024s 89:a4:f3:d4:73:ca:9e:91:35:23:88:94:30:ea:53:f3:5b:d8: 1024s a6:b5:5f:5a:34:b8:29:cc:23:48:e0:ad:a0:21:c8:9e:11:8b: 1024s 88:c1 1024s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-wKxRAf/SSSD-child-23264-auth.pem 1024s + found_md5=Modulus=B25BD6A5FBCBB029E6537C313DB327A3E1D050CBAC1BAFCEB2CC4398835C19E9C1976CEBF1AE89628C297F6B222E1D34FA32B0B5CB0036B6D6B577E141994CC3E3BE99B661617636F02647F29FDF901508CA8CD4B0FE8CAFBFE403D6C6CAC0D4E553E0FF5DFD34C0A73A5D132B3F0593838E5C0BA9C9761F97BC8A3A0733BDC1 1024s + '[' Modulus=B25BD6A5FBCBB029E6537C313DB327A3E1D050CBAC1BAFCEB2CC4398835C19E9C1976CEBF1AE89628C297F6B222E1D34FA32B0B5CB0036B6D6B577E141994CC3E3BE99B661617636F02647F29FDF901508CA8CD4B0FE8CAFBFE403D6C6CAC0D4E553E0FF5DFD34C0A73A5D132B3F0593838E5C0BA9C9761F97BC8A3A0733BDC1 '!=' Modulus=B25BD6A5FBCBB029E6537C313DB327A3E1D050CBAC1BAFCEB2CC4398835C19E9C1976CEBF1AE89628C297F6B222E1D34FA32B0B5CB0036B6D6B577E141994CC3E3BE99B661617636F02647F29FDF901508CA8CD4B0FE8CAFBFE403D6C6CAC0D4E553E0FF5DFD34C0A73A5D132B3F0593838E5C0BA9C9761F97BC8A3A0733BDC1 ']' 1024s + invalid_certificate /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-6600 /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA.pem 1024s + check_certificate /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-6600 /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA.pem 1024s + local certificate=/tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA-trusted-certificate-0001.pem 1024s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-6600 1024s + local key_ring=/tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA.pem 1024s + local verify_option= 1024s + prepare_softhsm2_card /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-6600 1024s + local certificate=/tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA-trusted-certificate-0001.pem 1024s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-6600 1024s + local key_cn 1024s + local key_name 1024s + local tokens_dir 1024s + local output_cert_file 1024s + token_name= 1024s ++ basename /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA-trusted-certificate-0001.pem .pem 1024s + key_name=test-intermediate-CA-trusted-certificate-0001 1024s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA-trusted-certificate-0001.pem 1024s ++ sed -n 's/ *commonName *= //p' 1024s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 1024s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 1024s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-wKxRAf/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 1024s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-wKxRAf/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 1024s ++ basename /tmp/sssd-softhsm2-wKxRAf/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 1024s + tokens_dir=/tmp/sssd-softhsm2-wKxRAf/softhsm2-test-intermediate-CA-trusted-certificate-0001 1024s + token_name='Test Organization Interme Token' 1024s + '[' '!' -e /tmp/sssd-softhsm2-wKxRAf/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 1024s Test Organization Interme Token 1024s + '[' '!' -d /tmp/sssd-softhsm2-wKxRAf/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 1024s + echo 'Test Organization Interme Token' 1024s + '[' -n '' ']' 1024s + local output_base_name=SSSD-child-23846 1024s + local output_file=/tmp/sssd-softhsm2-wKxRAf/SSSD-child-23846.output 1024s + output_cert_file=/tmp/sssd-softhsm2-wKxRAf/SSSD-child-23846.pem 1024s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA.pem 1024s [p11_child[2125]] [main] (0x0400): p11_child started. 1024s [p11_child[2125]] [main] (0x2000): Running in [pre-auth] mode. 1024s [p11_child[2125]] [main] (0x2000): Running with effective IDs: [0][0]. 1024s [p11_child[2125]] [main] (0x2000): Running with real IDs [0][0]. 1024s [p11_child[2125]] [do_card] (0x4000): Module List: 1024s [p11_child[2125]] [do_card] (0x4000): common name: [softhsm2]. 1024s [p11_child[2125]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 1024s [p11_child[2125]] [do_card] (0x4000): Description [SoftHSM slot ID 0x336607d1] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 1024s [p11_child[2125]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 1024s [p11_child[2125]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x336607d1][862324689] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 1024s [p11_child[2125]] [do_card] (0x4000): Login NOT required. 1024s [p11_child[2125]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 1024s [p11_child[2125]] [do_verification] (0x0040): X509_verify_cert failed [0]. 1024s [p11_child[2125]] [do_verification] (0x0040): X509_verify_cert failed [2][unable to get issuer certificate]. 1024s [p11_child[2125]] [read_certs] (0x0040): Certificate [Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] not valid, skipping. 1024s [p11_child[2125]] [do_card] (0x4000): No certificate found. 1024s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-wKxRAf/SSSD-child-23846.output 1024s + return 2 1024s + valid_certificate /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-6600 /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA.pem partial_chain 1024s + check_certificate /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-6600 /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA.pem partial_chain 1024s + local certificate=/tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA-trusted-certificate-0001.pem 1024s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-6600 1024s + local key_ring=/tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA.pem 1024s + local verify_option=partial_chain 1024s + prepare_softhsm2_card /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-6600 1024s + local certificate=/tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA-trusted-certificate-0001.pem 1024s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-6600 1024s + local key_cn 1024s + local key_name 1024s + local tokens_dir 1024s + local output_cert_file 1024s + token_name= 1024s ++ basename /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA-trusted-certificate-0001.pem .pem 1024s + key_name=test-intermediate-CA-trusted-certificate-0001 1024s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA-trusted-certificate-0001.pem 1024s ++ sed -n 's/ *commonName *= //p' 1024s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 1024s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 1024s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-wKxRAf/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 1024s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-wKxRAf/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 1024s ++ basename /tmp/sssd-softhsm2-wKxRAf/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 1024s + tokens_dir=/tmp/sssd-softhsm2-wKxRAf/softhsm2-test-intermediate-CA-trusted-certificate-0001 1024s + token_name='Test Organization Interme Token' 1024s + '[' '!' -e /tmp/sssd-softhsm2-wKxRAf/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 1024s + '[' '!' -d /tmp/sssd-softhsm2-wKxRAf/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 1024s Test Organization Interme Token 1024s + echo 'Test Organization Interme Token' 1024s + '[' -n partial_chain ']' 1024s + local verify_arg=--verify=partial_chain 1024s + local output_base_name=SSSD-child-4358 1024s + local output_file=/tmp/sssd-softhsm2-wKxRAf/SSSD-child-4358.output 1024s + output_cert_file=/tmp/sssd-softhsm2-wKxRAf/SSSD-child-4358.pem 1024s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA.pem 1024s [p11_child[2132]] [main] (0x0400): p11_child started. 1024s [p11_child[2132]] [main] (0x2000): Running in [pre-auth] mode. 1024s [p11_child[2132]] [main] (0x2000): Running with effective IDs: [0][0]. 1024s [p11_child[2132]] [main] (0x2000): Running with real IDs [0][0]. 1024s [p11_child[2132]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 1024s [p11_child[2132]] [do_card] (0x4000): Module List: 1024s [p11_child[2132]] [do_card] (0x4000): common name: [softhsm2]. 1024s [p11_child[2132]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 1024s [p11_child[2132]] [do_card] (0x4000): Description [SoftHSM slot ID 0x336607d1] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 1024s [p11_child[2132]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 1024s [p11_child[2132]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x336607d1][862324689] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 1024s [p11_child[2132]] [do_card] (0x4000): Login NOT required. 1024s [p11_child[2132]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 1024s [p11_child[2132]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 1024s [p11_child[2132]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Interme Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 1024s [p11_child[2132]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x336607d1;slot-manufacturer=SoftHSM%20project;slot-id=862324689;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fb7d087f336607d1;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 1024s [p11_child[2132]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 1024s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-wKxRAf/SSSD-child-4358.output 1024s + echo '-----BEGIN CERTIFICATE-----' 1024s + tail -n1 /tmp/sssd-softhsm2-wKxRAf/SSSD-child-4358.output 1024s + echo '-----END CERTIFICATE-----' 1024s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-wKxRAf/SSSD-child-4358.pem 1024s Certificate: 1024s Data: 1024s Version: 3 (0x2) 1024s Serial Number: 4 (0x4) 1024s Signature Algorithm: sha256WithRSAEncryption 1024s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 1024s Validity 1024s Not Before: Mar 10 09:32:47 2024 GMT 1024s Not After : Mar 10 09:32:47 2025 GMT 1024s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 1024s Subject Public Key Info: 1024s Public Key Algorithm: rsaEncryption 1024s Public-Key: (1024 bit) 1024s Modulus: 1024s 00:b2:5b:d6:a5:fb:cb:b0:29:e6:53:7c:31:3d:b3: 1024s 27:a3:e1:d0:50:cb:ac:1b:af:ce:b2:cc:43:98:83: 1024s 5c:19:e9:c1:97:6c:eb:f1:ae:89:62:8c:29:7f:6b: 1024s 22:2e:1d:34:fa:32:b0:b5:cb:00:36:b6:d6:b5:77: 1024s e1:41:99:4c:c3:e3:be:99:b6:61:61:76:36:f0:26: 1024s 47:f2:9f:df:90:15:08:ca:8c:d4:b0:fe:8c:af:bf: 1024s e4:03:d6:c6:ca:c0:d4:e5:53:e0:ff:5d:fd:34:c0: 1024s a7:3a:5d:13:2b:3f:05:93:83:8e:5c:0b:a9:c9:76: 1024s 1f:97:bc:8a:3a:07:33:bd:c1 1024s Exponent: 65537 (0x10001) 1024s X509v3 extensions: 1024s X509v3 Authority Key Identifier: 1024s 5F:60:54:F1:AC:3E:2D:42:06:88:45:9F:29:ED:86:C4:87:30:11:47 1024s X509v3 Basic Constraints: 1024s CA:FALSE 1024s Netscape Cert Type: 1024s SSL Client, S/MIME 1024s Netscape Comment: 1024s Test Organization Intermediate CA trusted Certificate 1024s X509v3 Subject Key Identifier: 1024s 42:7C:FC:71:35:E9:AA:EF:FD:7C:E5:03:F1:E8:8D:84:38:9F:97:E9 1024s X509v3 Key Usage: critical 1024s Digital Signature, Non Repudiation, Key Encipherment 1024s X509v3 Extended Key Usage: 1024s TLS Web Client Authentication, E-mail Protection 1024s X509v3 Subject Alternative Name: 1024s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 1024s Signature Algorithm: sha256WithRSAEncryption 1024s Signature Value: 1024s a3:9a:e8:63:b7:10:ca:fb:b2:4f:e8:36:dc:c0:25:78:94:e4: 1024s 1b:2b:50:51:7d:79:c6:4d:93:74:83:18:2b:3d:95:cd:7f:2e: 1024s 46:63:39:37:2d:f0:7c:63:d7:31:90:01:24:c3:ab:bd:82:32: 1024s 47:f8:47:e1:b9:03:88:c7:86:0f:43:71:25:5b:7e:b0:23:d8: 1024s 7f:9b:30:43:fd:71:99:49:0a:2d:52:47:a7:90:01:4a:85:31: 1024s 89:a4:f3:d4:73:ca:9e:91:35:23:88:94:30:ea:53:f3:5b:d8: 1024s a6:b5:5f:5a:34:b8:29:cc:23:48:e0:ad:a0:21:c8:9e:11:8b: 1024s 88:c1 1024s + local found_md5 expected_md5 1024s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA-trusted-certificate-0001.pem 1024s + expected_md5=Modulus=B25BD6A5FBCBB029E6537C313DB327A3E1D050CBAC1BAFCEB2CC4398835C19E9C1976CEBF1AE89628C297F6B222E1D34FA32B0B5CB0036B6D6B577E141994CC3E3BE99B661617636F02647F29FDF901508CA8CD4B0FE8CAFBFE403D6C6CAC0D4E553E0FF5DFD34C0A73A5D132B3F0593838E5C0BA9C9761F97BC8A3A0733BDC1 1024s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-wKxRAf/SSSD-child-4358.pem 1024s + found_md5=Modulus=B25BD6A5FBCBB029E6537C313DB327A3E1D050CBAC1BAFCEB2CC4398835C19E9C1976CEBF1AE89628C297F6B222E1D34FA32B0B5CB0036B6D6B577E141994CC3E3BE99B661617636F02647F29FDF901508CA8CD4B0FE8CAFBFE403D6C6CAC0D4E553E0FF5DFD34C0A73A5D132B3F0593838E5C0BA9C9761F97BC8A3A0733BDC1 1024s + '[' Modulus=B25BD6A5FBCBB029E6537C313DB327A3E1D050CBAC1BAFCEB2CC4398835C19E9C1976CEBF1AE89628C297F6B222E1D34FA32B0B5CB0036B6D6B577E141994CC3E3BE99B661617636F02647F29FDF901508CA8CD4B0FE8CAFBFE403D6C6CAC0D4E553E0FF5DFD34C0A73A5D132B3F0593838E5C0BA9C9761F97BC8A3A0733BDC1 '!=' Modulus=B25BD6A5FBCBB029E6537C313DB327A3E1D050CBAC1BAFCEB2CC4398835C19E9C1976CEBF1AE89628C297F6B222E1D34FA32B0B5CB0036B6D6B577E141994CC3E3BE99B661617636F02647F29FDF901508CA8CD4B0FE8CAFBFE403D6C6CAC0D4E553E0FF5DFD34C0A73A5D132B3F0593838E5C0BA9C9761F97BC8A3A0733BDC1 ']' 1024s + output_file=/tmp/sssd-softhsm2-wKxRAf/SSSD-child-4358-auth.output 1024s ++ basename /tmp/sssd-softhsm2-wKxRAf/SSSD-child-4358-auth.output .output 1024s + output_cert_file=/tmp/sssd-softhsm2-wKxRAf/SSSD-child-4358-auth.pem 1024s + echo -n 053350 1024s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-wKxRAf/test-intermediate-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Interme Token' --module_name /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so 1024s [p11_child[2140]] [main] (0x0400): p11_child started. 1024s [p11_child[2140]] [main] (0x2000): Running in [auth] mode. 1024s [p11_child[2140]] [main] (0x2000): Running with effective IDs: [0][0]. 1024s [p11_child[2140]] [main] (0x2000): Running with real IDs [0][0]. 1024s [p11_child[2140]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 1024s [p11_child[2140]] [do_card] (0x4000): Module List: 1024s [p11_child[2140]] [do_card] (0x4000): common name: [softhsm2]. 1024s [p11_child[2140]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 1024s [p11_child[2140]] [do_card] (0x4000): Description [SoftHSM slot ID 0x336607d1] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 1024s [p11_child[2140]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 1024s [p11_child[2140]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x336607d1][862324689] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 1024s [p11_child[2140]] [do_card] (0x4000): Login required. 1024s [p11_child[2140]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 1024s [p11_child[2140]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 1024s [p11_child[2140]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so Test Organization Interme Token Test Organization Interme Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 1024s [p11_child[2140]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x336607d1;slot-manufacturer=SoftHSM%20project;slot-id=862324689;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fb7d087f336607d1;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 1024s [p11_child[2140]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 1024s [p11_child[2140]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 1024s [p11_child[2140]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 1024s [p11_child[2140]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 1024s [p11_child[2140]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 1024s [p11_child[2140]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 1024s [p11_child[2140]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 1024s [p11_child[2140]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 1024s [p11_child[2140]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 1024s [p11_child[2140]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 1024s [p11_child[2140]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 1024s [p11_child[2140]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 1024s [p11_child[2140]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 1024s [p11_child[2140]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 1024s [p11_child[2140]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 1024s [p11_child[2140]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 1024s [p11_child[2140]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 1024s [p11_child[2140]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 1024s [p11_child[2140]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 1024s [p11_child[2140]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 1024s [p11_child[2140]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 1024s [p11_child[2140]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 1024s [p11_child[2140]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 1024s [p11_child[2140]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 1024s [p11_child[2140]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 1024s [p11_child[2140]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 1024s [p11_child[2140]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 1024s [p11_child[2140]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 1024s [p11_child[2140]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 1024s [p11_child[2140]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 1024s [p11_child[2140]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 1024s [p11_child[2140]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 1024s [p11_child[2140]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 1024s [p11_child[2140]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 1024s [p11_child[2140]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 1024s [p11_child[2140]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 1024s [p11_child[2140]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 1024s [p11_child[2140]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 1024s [p11_child[2140]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 1024s [p11_child[2140]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 1024s [p11_child[2140]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 1024s [p11_child[2140]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 1024s [p11_child[2140]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 1024s [p11_child[2140]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 1024s [p11_child[2140]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 1024s [p11_child[2140]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 1024s [p11_child[2140]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 1024s [p11_child[2140]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 1024s [p11_child[2140]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 1024s [p11_child[2140]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 1024s [p11_child[2140]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 1024s [p11_child[2140]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 1024s [p11_child[2140]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 1024s [p11_child[2140]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 1024s [p11_child[2140]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 1024s [p11_child[2140]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 1024s [p11_child[2140]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 1024s [p11_child[2140]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 1024s [p11_child[2140]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 1024s [p11_child[2140]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 1024s [p11_child[2140]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 1024s [p11_child[2140]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 1024s [p11_child[2140]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 1024s [p11_child[2140]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 1024s [p11_child[2140]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 1024s [p11_child[2140]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 1024s [p11_child[2140]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 1024s [p11_child[2140]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 1024s [p11_child[2140]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 1024s [p11_child[2140]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 1024s [p11_child[2140]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 1024s [p11_child[2140]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 1024s [p11_child[2140]] [do_card] (0x4000): Certificate verified and validated. 1024s [p11_child[2140]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 1024s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-wKxRAf/SSSD-child-4358-auth.output 1024s + echo '-----BEGIN CERTIFICATE-----' 1024s + tail -n1 /tmp/sssd-softhsm2-wKxRAf/SSSD-child-4358-auth.output 1024s + echo '-----END CERTIFICATE-----' 1024s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-wKxRAf/SSSD-child-4358-auth.pem 1024s Certificate: 1024s Data: 1024s Version: 3 (0x2) 1024s Serial Number: 4 (0x4) 1024s Signature Algorithm: sha256WithRSAEncryption 1024s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 1024s Validity 1024s Not Before: Mar 10 09:32:47 2024 GMT 1024s Not After : Mar 10 09:32:47 2025 GMT 1024s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 1024s Subject Public Key Info: 1024s Public Key Algorithm: rsaEncryption 1024s Public-Key: (1024 bit) 1024s Modulus: 1024s 00:b2:5b:d6:a5:fb:cb:b0:29:e6:53:7c:31:3d:b3: 1024s 27:a3:e1:d0:50:cb:ac:1b:af:ce:b2:cc:43:98:83: 1024s 5c:19:e9:c1:97:6c:eb:f1:ae:89:62:8c:29:7f:6b: 1024s 22:2e:1d:34:fa:32:b0:b5:cb:00:36:b6:d6:b5:77: 1024s e1:41:99:4c:c3:e3:be:99:b6:61:61:76:36:f0:26: 1024s 47:f2:9f:df:90:15:08:ca:8c:d4:b0:fe:8c:af:bf: 1024s e4:03:d6:c6:ca:c0:d4:e5:53:e0:ff:5d:fd:34:c0: 1024s a7:3a:5d:13:2b:3f:05:93:83:8e:5c:0b:a9:c9:76: 1024s 1f:97:bc:8a:3a:07:33:bd:c1 1024s Exponent: 65537 (0x10001) 1024s X509v3 extensions: 1024s X509v3 Authority Key Identifier: 1024s 5F:60:54:F1:AC:3E:2D:42:06:88:45:9F:29:ED:86:C4:87:30:11:47 1024s X509v3 Basic Constraints: 1024s CA:FALSE 1024s Netscape Cert Type: 1024s SSL Client, S/MIME 1024s Netscape Comment: 1024s Test Organization Intermediate CA trusted Certificate 1024s X509v3 Subject Key Identifier: 1024s 42:7C:FC:71:35:E9:AA:EF:FD:7C:E5:03:F1:E8:8D:84:38:9F:97:E9 1024s X509v3 Key Usage: critical 1024s Digital Signature, Non Repudiation, Key Encipherment 1024s X509v3 Extended Key Usage: 1024s TLS Web Client Authentication, E-mail Protection 1024s X509v3 Subject Alternative Name: 1024s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 1024s Signature Algorithm: sha256WithRSAEncryption 1024s Signature Value: 1024s a3:9a:e8:63:b7:10:ca:fb:b2:4f:e8:36:dc:c0:25:78:94:e4: 1024s 1b:2b:50:51:7d:79:c6:4d:93:74:83:18:2b:3d:95:cd:7f:2e: 1024s 46:63:39:37:2d:f0:7c:63:d7:31:90:01:24:c3:ab:bd:82:32: 1024s 47:f8:47:e1:b9:03:88:c7:86:0f:43:71:25:5b:7e:b0:23:d8: 1024s 7f:9b:30:43:fd:71:99:49:0a:2d:52:47:a7:90:01:4a:85:31: 1024s 89:a4:f3:d4:73:ca:9e:91:35:23:88:94:30:ea:53:f3:5b:d8: 1024s a6:b5:5f:5a:34:b8:29:cc:23:48:e0:ad:a0:21:c8:9e:11:8b: 1024s 88:c1 1024s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-wKxRAf/SSSD-child-4358-auth.pem 1024s + found_md5=Modulus=B25BD6A5FBCBB029E6537C313DB327A3E1D050CBAC1BAFCEB2CC4398835C19E9C1976CEBF1AE89628C297F6B222E1D34FA32B0B5CB0036B6D6B577E141994CC3E3BE99B661617636F02647F29FDF901508CA8CD4B0FE8CAFBFE403D6C6CAC0D4E553E0FF5DFD34C0A73A5D132B3F0593838E5C0BA9C9761F97BC8A3A0733BDC1 1024s + '[' Modulus=B25BD6A5FBCBB029E6537C313DB327A3E1D050CBAC1BAFCEB2CC4398835C19E9C1976CEBF1AE89628C297F6B222E1D34FA32B0B5CB0036B6D6B577E141994CC3E3BE99B661617636F02647F29FDF901508CA8CD4B0FE8CAFBFE403D6C6CAC0D4E553E0FF5DFD34C0A73A5D132B3F0593838E5C0BA9C9761F97BC8A3A0733BDC1 '!=' Modulus=B25BD6A5FBCBB029E6537C313DB327A3E1D050CBAC1BAFCEB2CC4398835C19E9C1976CEBF1AE89628C297F6B222E1D34FA32B0B5CB0036B6D6B577E141994CC3E3BE99B661617636F02647F29FDF901508CA8CD4B0FE8CAFBFE403D6C6CAC0D4E553E0FF5DFD34C0A73A5D132B3F0593838E5C0BA9C9761F97BC8A3A0733BDC1 ']' 1024s + invalid_certificate /tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-6081 /tmp/sssd-softhsm2-wKxRAf/test-root-CA.pem 1024s + check_certificate /tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-6081 /tmp/sssd-softhsm2-wKxRAf/test-root-CA.pem 1024s + local certificate=/tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-trusted-certificate-0001.pem 1024s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-6081 1024s + local key_ring=/tmp/sssd-softhsm2-wKxRAf/test-root-CA.pem 1024s + local verify_option= 1024s + prepare_softhsm2_card /tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-6081 1024s + local certificate=/tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-trusted-certificate-0001.pem 1024s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-6081 1024s + local key_cn 1024s + local key_name 1024s + local tokens_dir 1024s + local output_cert_file 1024s + token_name= 1024s ++ basename /tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 1024s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 1024s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-trusted-certificate-0001.pem 1024s ++ sed -n 's/ *commonName *= //p' 1024s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 1024s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 1024s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-wKxRAf/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 1024s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-wKxRAf/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 1024s ++ basename /tmp/sssd-softhsm2-wKxRAf/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 1024s + tokens_dir=/tmp/sssd-softhsm2-wKxRAf/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 1024s + token_name='Test Organization Sub Int Token' 1024s + '[' '!' -e /tmp/sssd-softhsm2-wKxRAf/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 1024s + local key_file 1024s + local decrypted_key 1024s + mkdir -p /tmp/sssd-softhsm2-wKxRAf/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 1024s + key_file=/tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-trusted-certificate-0001-key.pem 1024s + decrypted_key=/tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 1024s + cat 1024s + softhsm2-util --init-token --label 'Test Organization Sub Int Token' --pin 053350 --so-pin 053350 --free 1024s Slot 0 has a free/uninitialized token. 1024s The token has been initialized and is reassigned to slot 1625184156 1024s + softhsm2-util --show-slots 1024s Available slots: 1024s Slot 1625184156 1024s Slot info: 1024s Description: SoftHSM slot ID 0x60de579c 1024s Manufacturer ID: SoftHSM project 1024s Hardware version: 2.6 1024s Firmware version: 2.6 1024s Token present: yes 1024s Token info: 1024s Manufacturer ID: SoftHSM project 1024s Model: SoftHSM v2 1024s Hardware version: 2.6 1024s Firmware version: 2.6 1024s Serial number: ab0ec2dfe0de579c 1024s Initialized: yes 1024s User PIN init.: yes 1024s Label: Test Organization Sub Int Token 1024s Slot 1 1024s Slot info: 1024s Description: SoftHSM slot ID 0x1 1024s Manufacturer ID: SoftHSM project 1024s Hardware version: 2.6 1024s Firmware version: 2.6 1024s Token present: yes 1024s Token info: 1024s Manufacturer ID: SoftHSM project 1024s Model: SoftHSM v2 1024s Hardware version: 2.6 1024s Firmware version: 2.6 1024s Serial number: 1024s Initialized: no 1024s User PIN init.: no 1024s Label: 1024s + p11tool --provider=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --write --no-mark-private --load-certificate=/tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-trusted-certificate-0001.pem --login --set-pin=053350 --label 'Test Organization Sub Intermediate Trusted Certificate 0001' --id 00112233445566778899FFAABBCCDDEEFF012345 1024s + openssl rsa -passin pass:random-sub-intermediate-ca-trusted-cert-0001-6081 -in /tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-trusted-certificate-0001-key.pem -out /tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 1024s writing RSA key 1024s + p11tool --provider=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --write --load-privkey=/tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem --login --set-pin=053350 --label 'Test Organization Sub Intermediate Trusted Certificate 0001 Key' --id 00112233445566778899FFAABBCCDDEEFF012345 1024s + rm /tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 1024s + p11tool --provider=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --list-all 1024s Object 0: 1024s URL: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=ab0ec2dfe0de579c;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert 1024s Type: X.509 Certificate (RSA-1024) 1024s Expires: Mon Mar 10 09:32:47 2025 1024s Label: Test Organization Sub Intermediate Trusted Certificate 0001 1024s ID: 00:11:22:33:44:55:66:77:88:99:ff:aa:bb:cc:dd:ee:ff:01:23:45 1024s 1024s Test Organization Sub Int Token 1024s + echo 'Test Organization Sub Int Token' 1024s + '[' -n '' ']' 1024s + local output_base_name=SSSD-child-11807 1024s + local output_file=/tmp/sssd-softhsm2-wKxRAf/SSSD-child-11807.output 1024s + output_cert_file=/tmp/sssd-softhsm2-wKxRAf/SSSD-child-11807.pem 1024s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-wKxRAf/test-root-CA.pem 1024s [p11_child[2159]] [main] (0x0400): p11_child started. 1024s [p11_child[2159]] [main] (0x2000): Running in [pre-auth] mode. 1024s [p11_child[2159]] [main] (0x2000): Running with effective IDs: [0][0]. 1024s [p11_child[2159]] [main] (0x2000): Running with real IDs [0][0]. 1024s [p11_child[2159]] [do_card] (0x4000): Module List: 1024s [p11_child[2159]] [do_card] (0x4000): common name: [softhsm2]. 1024s [p11_child[2159]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 1024s [p11_child[2159]] [do_card] (0x4000): Description [SoftHSM slot ID 0x60de579c] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 1024s [p11_child[2159]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 1024s [p11_child[2159]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x60de579c][1625184156] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 1024s [p11_child[2159]] [do_card] (0x4000): Login NOT required. 1024s [p11_child[2159]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 1024s [p11_child[2159]] [do_verification] (0x0040): X509_verify_cert failed [0]. 1024s [p11_child[2159]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 1024s [p11_child[2159]] [read_certs] (0x0040): Certificate [Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] not valid, skipping. 1024s [p11_child[2159]] [do_card] (0x4000): No certificate found. 1024s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-wKxRAf/SSSD-child-11807.output 1024s + return 2 1024s + invalid_certificate /tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-6081 /tmp/sssd-softhsm2-wKxRAf/test-root-CA.pem partial_chain 1024s + check_certificate /tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-6081 /tmp/sssd-softhsm2-wKxRAf/test-root-CA.pem partial_chain 1024s + local certificate=/tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-trusted-certificate-0001.pem 1024s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-6081 1024s + local key_ring=/tmp/sssd-softhsm2-wKxRAf/test-root-CA.pem 1024s + local verify_option=partial_chain 1024s + prepare_softhsm2_card /tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-6081 1024s + local certificate=/tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-trusted-certificate-0001.pem 1024s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-6081 1024s + local key_cn 1024s + local key_name 1024s + local tokens_dir 1024s + local output_cert_file 1024s + token_name= 1024s ++ basename /tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 1024s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 1024s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-trusted-certificate-0001.pem 1024s ++ sed -n 's/ *commonName *= //p' 1024s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 1024s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 1024s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-wKxRAf/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 1024s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-wKxRAf/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 1024s ++ basename /tmp/sssd-softhsm2-wKxRAf/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 1024s + tokens_dir=/tmp/sssd-softhsm2-wKxRAf/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 1024s + token_name='Test Organization Sub Int Token' 1024s + '[' '!' -e /tmp/sssd-softhsm2-wKxRAf/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 1024s + '[' '!' -d /tmp/sssd-softhsm2-wKxRAf/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 1024s Test Organization Sub Int Token 1024s + echo 'Test Organization Sub Int Token' 1024s + '[' -n partial_chain ']' 1024s + local verify_arg=--verify=partial_chain 1024s + local output_base_name=SSSD-child-2498 1024s + local output_file=/tmp/sssd-softhsm2-wKxRAf/SSSD-child-2498.output 1024s + output_cert_file=/tmp/sssd-softhsm2-wKxRAf/SSSD-child-2498.pem 1024s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-wKxRAf/test-root-CA.pem 1024s [p11_child[2166]] [main] (0x0400): p11_child started. 1024s [p11_child[2166]] [main] (0x2000): Running in [pre-auth] mode. 1024s [p11_child[2166]] [main] (0x2000): Running with effective IDs: [0][0]. 1024s [p11_child[2166]] [main] (0x2000): Running with real IDs [0][0]. 1024s [p11_child[2166]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 1024s [p11_child[2166]] [do_card] (0x4000): Module List: 1024s [p11_child[2166]] [do_card] (0x4000): common name: [softhsm2]. 1024s [p11_child[2166]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 1024s [p11_child[2166]] [do_card] (0x4000): Description [SoftHSM slot ID 0x60de579c] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 1024s [p11_child[2166]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 1024s [p11_child[2166]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x60de579c][1625184156] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 1024s [p11_child[2166]] [do_card] (0x4000): Login NOT required. 1024s [p11_child[2166]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 1024s [p11_child[2166]] [do_verification] (0x0040): X509_verify_cert failed [0]. 1024s [p11_child[2166]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 1024s [p11_child[2166]] [read_certs] (0x0040): Certificate [Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] not valid, skipping. 1024s [p11_child[2166]] [do_card] (0x4000): No certificate found. 1024s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-wKxRAf/SSSD-child-2498.output 1024s + return 2 1024s + valid_certificate /tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-6081 /tmp/sssd-softhsm2-wKxRAf/test-full-chain-CA.pem 1024s + check_certificate /tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-6081 /tmp/sssd-softhsm2-wKxRAf/test-full-chain-CA.pem 1024s + local certificate=/tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-trusted-certificate-0001.pem 1024s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-6081 1024s + local key_ring=/tmp/sssd-softhsm2-wKxRAf/test-full-chain-CA.pem 1024s + local verify_option= 1024s + prepare_softhsm2_card /tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-6081 1024s + local certificate=/tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-trusted-certificate-0001.pem 1024s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-6081 1024s + local key_cn 1024s + local key_name 1024s + local tokens_dir 1024s + local output_cert_file 1024s + token_name= 1024s ++ basename /tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 1024s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 1024s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-trusted-certificate-0001.pem 1024s ++ sed -n 's/ *commonName *= //p' 1024s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 1024s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 1024s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-wKxRAf/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 1024s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-wKxRAf/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 1024s ++ basename /tmp/sssd-softhsm2-wKxRAf/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 1024s Test Organization Sub Int Token 1024s + tokens_dir=/tmp/sssd-softhsm2-wKxRAf/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 1024s + token_name='Test Organization Sub Int Token' 1024s + '[' '!' -e /tmp/sssd-softhsm2-wKxRAf/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 1024s + '[' '!' -d /tmp/sssd-softhsm2-wKxRAf/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 1024s + echo 'Test Organization Sub Int Token' 1024s + '[' -n '' ']' 1024s + local output_base_name=SSSD-child-7755 1024s + local output_file=/tmp/sssd-softhsm2-wKxRAf/SSSD-child-7755.output 1024s + output_cert_file=/tmp/sssd-softhsm2-wKxRAf/SSSD-child-7755.pem 1024s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-wKxRAf/test-full-chain-CA.pem 1024s [p11_child[2173]] [main] (0x0400): p11_child started. 1024s [p11_child[2173]] [main] (0x2000): Running in [pre-auth] mode. 1024s [p11_child[2173]] [main] (0x2000): Running with effective IDs: [0][0]. 1024s [p11_child[2173]] [main] (0x2000): Running with real IDs [0][0]. 1024s [p11_child[2173]] [do_card] (0x4000): Module List: 1024s [p11_child[2173]] [do_card] (0x4000): common name: [softhsm2]. 1024s [p11_child[2173]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 1024s [p11_child[2173]] [do_card] (0x4000): Description [SoftHSM slot ID 0x60de579c] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 1024s [p11_child[2173]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 1024s [p11_child[2173]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x60de579c][1625184156] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 1024s [p11_child[2173]] [do_card] (0x4000): Login NOT required. 1024s [p11_child[2173]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 1024s [p11_child[2173]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 1024s [p11_child[2173]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Sub Int Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 1024s [p11_child[2173]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x60de579c;slot-manufacturer=SoftHSM%20project;slot-id=1625184156;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=ab0ec2dfe0de579c;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 1024s [p11_child[2173]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 1024s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-wKxRAf/SSSD-child-7755.output 1024s + echo '-----BEGIN CERTIFICATE-----' 1024s + tail -n1 /tmp/sssd-softhsm2-wKxRAf/SSSD-child-7755.output 1024s + echo '-----END CERTIFICATE-----' 1024s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-wKxRAf/SSSD-child-7755.pem 1024s Certificate: 1024s Data: 1024s Version: 3 (0x2) 1024s Serial Number: 5 (0x5) 1024s Signature Algorithm: sha256WithRSAEncryption 1024s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 1024s Validity 1024s Not Before: Mar 10 09:32:47 2024 GMT 1024s Not After : Mar 10 09:32:47 2025 GMT 1024s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 1024s Subject Public Key Info: 1024s Public Key Algorithm: rsaEncryption 1024s Public-Key: (1024 bit) 1024s Modulus: 1024s 00:9f:ed:04:9d:54:cd:4e:8b:8a:0c:a9:7c:f6:5a: 1024s 6b:67:63:02:f8:6c:f2:68:92:3c:a2:24:df:eb:5e: 1024s 88:bd:ab:af:b2:7f:b9:2e:bb:18:db:66:63:80:bb: 1024s 2d:af:e0:35:64:4d:d4:69:24:58:a7:42:00:be:a4: 1024s c3:09:9b:0f:ec:b4:56:ee:4d:bc:62:43:2d:8d:2b: 1024s 29:14:7c:9c:eb:63:8b:56:28:e0:6e:b6:f2:6c:f5: 1024s 92:90:a6:d7:8b:7e:36:48:42:06:55:20:87:37:31: 1024s 60:bc:2c:dc:70:b7:7f:d5:b1:ef:c5:c5:d4:ac:29: 1024s c2:4d:9f:88:b6:dc:26:9b:4d 1024s Exponent: 65537 (0x10001) 1024s X509v3 extensions: 1024s X509v3 Authority Key Identifier: 1024s 4D:00:A7:25:2A:ED:11:13:81:A0:07:AB:53:9E:AE:AF:1F:BA:CA:42 1024s X509v3 Basic Constraints: 1024s CA:FALSE 1024s Netscape Cert Type: 1024s SSL Client, S/MIME 1024s Netscape Comment: 1024s Test Organization Sub Intermediate CA trusted Certificate 1024s X509v3 Subject Key Identifier: 1024s 2D:0A:D5:39:06:98:35:57:FD:E2:33:15:3F:26:DD:EF:72:5B:B1:C8 1024s X509v3 Key Usage: critical 1024s Digital Signature, Non Repudiation, Key Encipherment 1024s X509v3 Extended Key Usage: 1024s TLS Web Client Authentication, E-mail Protection 1024s X509v3 Subject Alternative Name: 1024s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 1024s Signature Algorithm: sha256WithRSAEncryption 1024s Signature Value: 1024s 40:f7:c9:c6:58:f4:f6:08:5b:c5:44:0f:07:c1:aa:c8:f4:66: 1024s 5d:7f:98:0c:7d:1b:0a:30:9b:83:f4:fb:bb:d1:e7:69:7b:43: 1024s e8:17:f2:ef:09:fe:f2:88:6d:04:61:f8:a7:d0:35:90:91:61: 1024s 76:42:ab:2c:91:5a:4b:4f:3e:17:61:8f:ba:ca:9f:41:2b:f3: 1024s ad:bd:c2:09:18:b7:fb:67:a4:ea:3f:f4:a7:d1:99:ae:fe:cb: 1024s e2:8b:de:cd:99:53:9f:c9:7c:42:7c:5c:ba:ac:a1:23:88:4b: 1024s 0f:aa:d2:78:22:69:ca:39:ce:9b:a4:c1:49:73:23:5e:53:e6: 1024s ac:2f 1024s + local found_md5 expected_md5 1024s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-trusted-certificate-0001.pem 1024s + expected_md5=Modulus=9FED049D54CD4E8B8A0CA97CF65A6B676302F86CF268923CA224DFEB5E88BDABAFB27FB92EBB18DB666380BB2DAFE035644DD4692458A74200BEA4C3099B0FECB456EE4DBC62432D8D2B29147C9CEB638B5628E06EB6F26CF59290A6D78B7E36484206552087373160BC2CDC70B77FD5B1EFC5C5D4AC29C24D9F88B6DC269B4D 1024s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-wKxRAf/SSSD-child-7755.pem 1024s + found_md5=Modulus=9FED049D54CD4E8B8A0CA97CF65A6B676302F86CF268923CA224DFEB5E88BDABAFB27FB92EBB18DB666380BB2DAFE035644DD4692458A74200BEA4C3099B0FECB456EE4DBC62432D8D2B29147C9CEB638B5628E06EB6F26CF59290A6D78B7E36484206552087373160BC2CDC70B77FD5B1EFC5C5D4AC29C24D9F88B6DC269B4D 1024s + '[' Modulus=9FED049D54CD4E8B8A0CA97CF65A6B676302F86CF268923CA224DFEB5E88BDABAFB27FB92EBB18DB666380BB2DAFE035644DD4692458A74200BEA4C3099B0FECB456EE4DBC62432D8D2B29147C9CEB638B5628E06EB6F26CF59290A6D78B7E36484206552087373160BC2CDC70B77FD5B1EFC5C5D4AC29C24D9F88B6DC269B4D '!=' Modulus=9FED049D54CD4E8B8A0CA97CF65A6B676302F86CF268923CA224DFEB5E88BDABAFB27FB92EBB18DB666380BB2DAFE035644DD4692458A74200BEA4C3099B0FECB456EE4DBC62432D8D2B29147C9CEB638B5628E06EB6F26CF59290A6D78B7E36484206552087373160BC2CDC70B77FD5B1EFC5C5D4AC29C24D9F88B6DC269B4D ']' 1024s + output_file=/tmp/sssd-softhsm2-wKxRAf/SSSD-child-7755-auth.output 1024s ++ basename /tmp/sssd-softhsm2-wKxRAf/SSSD-child-7755-auth.output .output 1024s + output_cert_file=/tmp/sssd-softhsm2-wKxRAf/SSSD-child-7755-auth.pem 1024s + echo -n 053350 1024s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-wKxRAf/test-full-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 '' --token_name 'Test Organization Sub Int Token' --module_name /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so 1024s [p11_child[2181]] [main] (0x0400): p11_child started. 1024s [p11_child[2181]] [main] (0x2000): Running in [auth] mode. 1024s [p11_child[2181]] [main] (0x2000): Running with effective IDs: [0][0]. 1024s [p11_child[2181]] [main] (0x2000): Running with real IDs [0][0]. 1024s [p11_child[2181]] [do_card] (0x4000): Module List: 1024s [p11_child[2181]] [do_card] (0x4000): common name: [softhsm2]. 1024s [p11_child[2181]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 1024s [p11_child[2181]] [do_card] (0x4000): Description [SoftHSM slot ID 0x60de579c] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 1024s [p11_child[2181]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 1024s [p11_child[2181]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x60de579c][1625184156] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 1024s [p11_child[2181]] [do_card] (0x4000): Login required. 1024s [p11_child[2181]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 1024s [p11_child[2181]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 1024s [p11_child[2181]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so Test Organization Sub Int Token Test Organization Sub Int Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 1024s [p11_child[2181]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x60de579c;slot-manufacturer=SoftHSM%20project;slot-id=1625184156;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=ab0ec2dfe0de579c;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 1024s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 1024s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 1024s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 1024s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 1024s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 1024s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 1024s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 1024s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 1024s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 1024s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 1024s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 1024s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 1024s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 1024s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 1024s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 1024s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 1024s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 1024s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 1024s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 1024s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 1024s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 1024s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 1024s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 1024s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 1024s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 1024s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 1024s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 1024s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 1024s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 1024s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 1024s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 1024s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 1024s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 1024s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 1024s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 1024s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 1024s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 1024s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 1024s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 1024s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 1024s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 1024s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 1024s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 1024s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 1024s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 1024s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 1024s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 1024s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 1024s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 1024s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 1024s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 1024s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 1024s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 1024s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 1024s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 1024s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 1024s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 1024s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 1024s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 1024s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 1024s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 1024s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 1024s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 1024s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 1024s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 1024s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 1024s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 1024s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 1024s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 1024s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 1024s [p11_child[2181]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 1024s [p11_child[2181]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 1024s [p11_child[2181]] [do_card] (0x4000): Certificate verified and validated. 1024s [p11_child[2181]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 1024s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-wKxRAf/SSSD-child-7755-auth.output 1024s + echo '-----BEGIN CERTIFICATE-----' 1024s + tail -n1 /tmp/sssd-softhsm2-wKxRAf/SSSD-child-7755-auth.output 1024s + echo '-----END CERTIFICATE-----' 1024s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-wKxRAf/SSSD-child-7755-auth.pem 1024s Certificate: 1024s Data: 1024s Version: 3 (0x2) 1024s Serial Number: 5 (0x5) 1024s Signature Algorithm: sha256WithRSAEncryption 1024s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 1024s Validity 1024s Not Before: Mar 10 09:32:47 2024 GMT 1024s Not After : Mar 10 09:32:47 2025 GMT 1024s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 1024s Subject Public Key Info: 1024s Public Key Algorithm: rsaEncryption 1024s Public-Key: (1024 bit) 1024s Modulus: 1024s 00:9f:ed:04:9d:54:cd:4e:8b:8a:0c:a9:7c:f6:5a: 1024s 6b:67:63:02:f8:6c:f2:68:92:3c:a2:24:df:eb:5e: 1024s 88:bd:ab:af:b2:7f:b9:2e:bb:18:db:66:63:80:bb: 1024s 2d:af:e0:35:64:4d:d4:69:24:58:a7:42:00:be:a4: 1024s c3:09:9b:0f:ec:b4:56:ee:4d:bc:62:43:2d:8d:2b: 1024s 29:14:7c:9c:eb:63:8b:56:28:e0:6e:b6:f2:6c:f5: 1024s 92:90:a6:d7:8b:7e:36:48:42:06:55:20:87:37:31: 1024s 60:bc:2c:dc:70:b7:7f:d5:b1:ef:c5:c5:d4:ac:29: 1024s c2:4d:9f:88:b6:dc:26:9b:4d 1024s Exponent: 65537 (0x10001) 1024s X509v3 extensions: 1024s X509v3 Authority Key Identifier: 1024s 4D:00:A7:25:2A:ED:11:13:81:A0:07:AB:53:9E:AE:AF:1F:BA:CA:42 1024s X509v3 Basic Constraints: 1024s CA:FALSE 1024s Netscape Cert Type: 1024s SSL Client, S/MIME 1024s Netscape Comment: 1024s Test Organization Sub Intermediate CA trusted Certificate 1024s X509v3 Subject Key Identifier: 1024s 2D:0A:D5:39:06:98:35:57:FD:E2:33:15:3F:26:DD:EF:72:5B:B1:C8 1024s X509v3 Key Usage: critical 1024s Digital Signature, Non Repudiation, Key Encipherment 1024s X509v3 Extended Key Usage: 1024s TLS Web Client Authentication, E-mail Protection 1024s X509v3 Subject Alternative Name: 1024s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 1024s Signature Algorithm: sha256WithRSAEncryption 1024s Signature Value: 1024s 40:f7:c9:c6:58:f4:f6:08:5b:c5:44:0f:07:c1:aa:c8:f4:66: 1024s 5d:7f:98:0c:7d:1b:0a:30:9b:83:f4:fb:bb:d1:e7:69:7b:43: 1024s e8:17:f2:ef:09:fe:f2:88:6d:04:61:f8:a7:d0:35:90:91:61: 1024s 76:42:ab:2c:91:5a:4b:4f:3e:17:61:8f:ba:ca:9f:41:2b:f3: 1024s ad:bd:c2:09:18:b7:fb:67:a4:ea:3f:f4:a7:d1:99:ae:fe:cb: 1024s e2:8b:de:cd:99:53:9f:c9:7c:42:7c:5c:ba:ac:a1:23:88:4b: 1024s 0f:aa:d2:78:22:69:ca:39:ce:9b:a4:c1:49:73:23:5e:53:e6: 1024s ac:2f 1024s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-wKxRAf/SSSD-child-7755-auth.pem 1024s + found_md5=Modulus=9FED049D54CD4E8B8A0CA97CF65A6B676302F86CF268923CA224DFEB5E88BDABAFB27FB92EBB18DB666380BB2DAFE035644DD4692458A74200BEA4C3099B0FECB456EE4DBC62432D8D2B29147C9CEB638B5628E06EB6F26CF59290A6D78B7E36484206552087373160BC2CDC70B77FD5B1EFC5C5D4AC29C24D9F88B6DC269B4D 1024s + '[' Modulus=9FED049D54CD4E8B8A0CA97CF65A6B676302F86CF268923CA224DFEB5E88BDABAFB27FB92EBB18DB666380BB2DAFE035644DD4692458A74200BEA4C3099B0FECB456EE4DBC62432D8D2B29147C9CEB638B5628E06EB6F26CF59290A6D78B7E36484206552087373160BC2CDC70B77FD5B1EFC5C5D4AC29C24D9F88B6DC269B4D '!=' Modulus=9FED049D54CD4E8B8A0CA97CF65A6B676302F86CF268923CA224DFEB5E88BDABAFB27FB92EBB18DB666380BB2DAFE035644DD4692458A74200BEA4C3099B0FECB456EE4DBC62432D8D2B29147C9CEB638B5628E06EB6F26CF59290A6D78B7E36484206552087373160BC2CDC70B77FD5B1EFC5C5D4AC29C24D9F88B6DC269B4D ']' 1024s + valid_certificate /tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-6081 /tmp/sssd-softhsm2-wKxRAf/test-full-chain-CA.pem partial_chain 1024s + check_certificate /tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-6081 /tmp/sssd-softhsm2-wKxRAf/test-full-chain-CA.pem partial_chain 1024s + local certificate=/tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-trusted-certificate-0001.pem 1024s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-6081 1024s + local key_ring=/tmp/sssd-softhsm2-wKxRAf/test-full-chain-CA.pem 1024s + local verify_option=partial_chain 1024s + prepare_softhsm2_card /tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-6081 1024s + local certificate=/tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-trusted-certificate-0001.pem 1024s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-6081 1024s + local key_cn 1024s + local key_name 1024s + local tokens_dir 1024s + local output_cert_file 1024s + token_name= 1024s ++ basename /tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 1024s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 1024s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-trusted-certificate-0001.pem 1024s ++ sed -n 's/ *commonName *= //p' 1024s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 1024s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 1024s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-wKxRAf/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 1024s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-wKxRAf/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 1024s ++ basename /tmp/sssd-softhsm2-wKxRAf/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 1024s Test Organization Sub Int Token 1024s + tokens_dir=/tmp/sssd-softhsm2-wKxRAf/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 1024s + token_name='Test Organization Sub Int Token' 1024s + '[' '!' -e /tmp/sssd-softhsm2-wKxRAf/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 1024s + '[' '!' -d /tmp/sssd-softhsm2-wKxRAf/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 1024s + echo 'Test Organization Sub Int Token' 1024s + '[' -n partial_chain ']' 1024s + local verify_arg=--verify=partial_chain 1024s + local output_base_name=SSSD-child-16149 1024s + local output_file=/tmp/sssd-softhsm2-wKxRAf/SSSD-child-16149.output 1024s + output_cert_file=/tmp/sssd-softhsm2-wKxRAf/SSSD-child-16149.pem 1024s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-wKxRAf/test-full-chain-CA.pem 1024s [p11_child[2191]] [main] (0x0400): p11_child started. 1024s [p11_child[2191]] [main] (0x2000): Running in [pre-auth] mode. 1024s [p11_child[2191]] [main] (0x2000): Running with effective IDs: [0][0]. 1024s [p11_child[2191]] [main] (0x2000): Running with real IDs [0][0]. 1024s [p11_child[2191]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 1024s [p11_child[2191]] [do_card] (0x4000): Module List: 1024s [p11_child[2191]] [do_card] (0x4000): common name: [softhsm2]. 1024s [p11_child[2191]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 1024s [p11_child[2191]] [do_card] (0x4000): Description [SoftHSM slot ID 0x60de579c] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 1024s [p11_child[2191]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 1024s [p11_child[2191]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x60de579c][1625184156] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 1024s [p11_child[2191]] [do_card] (0x4000): Login NOT required. 1024s [p11_child[2191]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 1024s [p11_child[2191]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 1024s [p11_child[2191]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Sub Int Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 1024s [p11_child[2191]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x60de579c;slot-manufacturer=SoftHSM%20project;slot-id=1625184156;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=ab0ec2dfe0de579c;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 1024s [p11_child[2191]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 1024s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-wKxRAf/SSSD-child-16149.output 1024s + echo '-----BEGIN CERTIFICATE-----' 1024s + tail -n1 /tmp/sssd-softhsm2-wKxRAf/SSSD-child-16149.output 1024s + echo '-----END CERTIFICATE-----' 1024s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-wKxRAf/SSSD-child-16149.pem 1024s Certificate: 1024s Data: 1024s Version: 3 (0x2) 1024s Serial Number: 5 (0x5) 1024s Signature Algorithm: sha256WithRSAEncryption 1024s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 1024s Validity 1024s Not Before: Mar 10 09:32:47 2024 GMT 1024s Not After : Mar 10 09:32:47 2025 GMT 1024s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 1024s Subject Public Key Info: 1024s Public Key Algorithm: rsaEncryption 1024s Public-Key: (1024 bit) 1024s Modulus: 1024s 00:9f:ed:04:9d:54:cd:4e:8b:8a:0c:a9:7c:f6:5a: 1024s 6b:67:63:02:f8:6c:f2:68:92:3c:a2:24:df:eb:5e: 1024s 88:bd:ab:af:b2:7f:b9:2e:bb:18:db:66:63:80:bb: 1024s 2d:af:e0:35:64:4d:d4:69:24:58:a7:42:00:be:a4: 1024s c3:09:9b:0f:ec:b4:56:ee:4d:bc:62:43:2d:8d:2b: 1024s 29:14:7c:9c:eb:63:8b:56:28:e0:6e:b6:f2:6c:f5: 1024s 92:90:a6:d7:8b:7e:36:48:42:06:55:20:87:37:31: 1024s 60:bc:2c:dc:70:b7:7f:d5:b1:ef:c5:c5:d4:ac:29: 1024s c2:4d:9f:88:b6:dc:26:9b:4d 1024s Exponent: 65537 (0x10001) 1024s X509v3 extensions: 1024s X509v3 Authority Key Identifier: 1024s 4D:00:A7:25:2A:ED:11:13:81:A0:07:AB:53:9E:AE:AF:1F:BA:CA:42 1024s X509v3 Basic Constraints: 1024s CA:FALSE 1024s Netscape Cert Type: 1024s SSL Client, S/MIME 1024s Netscape Comment: 1024s Test Organization Sub Intermediate CA trusted Certificate 1024s X509v3 Subject Key Identifier: 1024s 2D:0A:D5:39:06:98:35:57:FD:E2:33:15:3F:26:DD:EF:72:5B:B1:C8 1024s X509v3 Key Usage: critical 1024s Digital Signature, Non Repudiation, Key Encipherment 1024s X509v3 Extended Key Usage: 1024s TLS Web Client Authentication, E-mail Protection 1024s X509v3 Subject Alternative Name: 1024s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 1024s Signature Algorithm: sha256WithRSAEncryption 1024s Signature Value: 1024s 40:f7:c9:c6:58:f4:f6:08:5b:c5:44:0f:07:c1:aa:c8:f4:66: 1024s 5d:7f:98:0c:7d:1b:0a:30:9b:83:f4:fb:bb:d1:e7:69:7b:43: 1024s e8:17:f2:ef:09:fe:f2:88:6d:04:61:f8:a7:d0:35:90:91:61: 1024s 76:42:ab:2c:91:5a:4b:4f:3e:17:61:8f:ba:ca:9f:41:2b:f3: 1024s ad:bd:c2:09:18:b7:fb:67:a4:ea:3f:f4:a7:d1:99:ae:fe:cb: 1024s e2:8b:de:cd:99:53:9f:c9:7c:42:7c:5c:ba:ac:a1:23:88:4b: 1024s 0f:aa:d2:78:22:69:ca:39:ce:9b:a4:c1:49:73:23:5e:53:e6: 1024s ac:2f 1024s + local found_md5 expected_md5 1024s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-trusted-certificate-0001.pem 1024s + expected_md5=Modulus=9FED049D54CD4E8B8A0CA97CF65A6B676302F86CF268923CA224DFEB5E88BDABAFB27FB92EBB18DB666380BB2DAFE035644DD4692458A74200BEA4C3099B0FECB456EE4DBC62432D8D2B29147C9CEB638B5628E06EB6F26CF59290A6D78B7E36484206552087373160BC2CDC70B77FD5B1EFC5C5D4AC29C24D9F88B6DC269B4D 1024s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-wKxRAf/SSSD-child-16149.pem 1025s + found_md5=Modulus=9FED049D54CD4E8B8A0CA97CF65A6B676302F86CF268923CA224DFEB5E88BDABAFB27FB92EBB18DB666380BB2DAFE035644DD4692458A74200BEA4C3099B0FECB456EE4DBC62432D8D2B29147C9CEB638B5628E06EB6F26CF59290A6D78B7E36484206552087373160BC2CDC70B77FD5B1EFC5C5D4AC29C24D9F88B6DC269B4D 1025s + '[' Modulus=9FED049D54CD4E8B8A0CA97CF65A6B676302F86CF268923CA224DFEB5E88BDABAFB27FB92EBB18DB666380BB2DAFE035644DD4692458A74200BEA4C3099B0FECB456EE4DBC62432D8D2B29147C9CEB638B5628E06EB6F26CF59290A6D78B7E36484206552087373160BC2CDC70B77FD5B1EFC5C5D4AC29C24D9F88B6DC269B4D '!=' Modulus=9FED049D54CD4E8B8A0CA97CF65A6B676302F86CF268923CA224DFEB5E88BDABAFB27FB92EBB18DB666380BB2DAFE035644DD4692458A74200BEA4C3099B0FECB456EE4DBC62432D8D2B29147C9CEB638B5628E06EB6F26CF59290A6D78B7E36484206552087373160BC2CDC70B77FD5B1EFC5C5D4AC29C24D9F88B6DC269B4D ']' 1025s + output_file=/tmp/sssd-softhsm2-wKxRAf/SSSD-child-16149-auth.output 1025s ++ basename /tmp/sssd-softhsm2-wKxRAf/SSSD-child-16149-auth.output .output 1025s + output_cert_file=/tmp/sssd-softhsm2-wKxRAf/SSSD-child-16149-auth.pem 1025s + echo -n 053350 1025s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-wKxRAf/test-full-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Sub Int Token' --module_name /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so 1025s [p11_child[2199]] [main] (0x0400): p11_child started. 1025s [p11_child[2199]] [main] (0x2000): Running in [auth] mode. 1025s [p11_child[2199]] [main] (0x2000): Running with effective IDs: [0][0]. 1025s [p11_child[2199]] [main] (0x2000): Running with real IDs [0][0]. 1025s [p11_child[2199]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 1025s [p11_child[2199]] [do_card] (0x4000): Module List: 1025s [p11_child[2199]] [do_card] (0x4000): common name: [softhsm2]. 1025s [p11_child[2199]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 1025s [p11_child[2199]] [do_card] (0x4000): Description [SoftHSM slot ID 0x60de579c] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 1025s [p11_child[2199]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 1025s [p11_child[2199]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x60de579c][1625184156] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 1025s [p11_child[2199]] [do_card] (0x4000): Login required. 1025s [p11_child[2199]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 1025s [p11_child[2199]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 1025s [p11_child[2199]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so Test Organization Sub Int Token Test Organization Sub Int Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 1025s [p11_child[2199]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x60de579c;slot-manufacturer=SoftHSM%20project;slot-id=1625184156;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=ab0ec2dfe0de579c;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 1025s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 1025s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 1025s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 1025s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 1025s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 1025s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 1025s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 1025s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 1025s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 1025s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 1025s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 1025s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 1025s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 1025s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 1025s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 1025s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 1025s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 1025s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 1025s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 1025s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 1025s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 1025s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 1025s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 1025s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 1025s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 1025s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 1025s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 1025s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 1025s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 1025s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 1025s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 1025s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 1025s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 1025s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 1025s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 1025s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 1025s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 1025s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 1025s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 1025s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 1025s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 1025s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 1025s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 1025s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 1025s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 1025s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 1025s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 1025s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 1025s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 1025s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 1025s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 1025s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 1025s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 1025s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 1025s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 1025s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 1025s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 1025s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 1025s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 1025s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 1025s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 1025s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 1025s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 1025s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 1025s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 1025s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 1025s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 1025s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 1025s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 1025s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 1025s [p11_child[2199]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 1025s [p11_child[2199]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 1025s [p11_child[2199]] [do_card] (0x4000): Certificate verified and validated. 1025s [p11_child[2199]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 1025s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-wKxRAf/SSSD-child-16149-auth.output 1025s + echo '-----BEGIN CERTIFICATE-----' 1025s + tail -n1 /tmp/sssd-softhsm2-wKxRAf/SSSD-child-16149-auth.output 1025s + echo '-----END CERTIFICATE-----' 1025s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-wKxRAf/SSSD-child-16149-auth.pem 1025s Certificate: 1025s Data: 1025s Version: 3 (0x2) 1025s Serial Number: 5 (0x5) 1025s Signature Algorithm: sha256WithRSAEncryption 1025s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 1025s Validity 1025s Not Before: Mar 10 09:32:47 2024 GMT 1025s Not After : Mar 10 09:32:47 2025 GMT 1025s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 1025s Subject Public Key Info: 1025s Public Key Algorithm: rsaEncryption 1025s Public-Key: (1024 bit) 1025s Modulus: 1025s 00:9f:ed:04:9d:54:cd:4e:8b:8a:0c:a9:7c:f6:5a: 1025s 6b:67:63:02:f8:6c:f2:68:92:3c:a2:24:df:eb:5e: 1025s 88:bd:ab:af:b2:7f:b9:2e:bb:18:db:66:63:80:bb: 1025s 2d:af:e0:35:64:4d:d4:69:24:58:a7:42:00:be:a4: 1025s c3:09:9b:0f:ec:b4:56:ee:4d:bc:62:43:2d:8d:2b: 1025s 29:14:7c:9c:eb:63:8b:56:28:e0:6e:b6:f2:6c:f5: 1025s 92:90:a6:d7:8b:7e:36:48:42:06:55:20:87:37:31: 1025s 60:bc:2c:dc:70:b7:7f:d5:b1:ef:c5:c5:d4:ac:29: 1025s c2:4d:9f:88:b6:dc:26:9b:4d 1025s Exponent: 65537 (0x10001) 1025s X509v3 extensions: 1025s X509v3 Authority Key Identifier: 1025s 4D:00:A7:25:2A:ED:11:13:81:A0:07:AB:53:9E:AE:AF:1F:BA:CA:42 1025s X509v3 Basic Constraints: 1025s CA:FALSE 1025s Netscape Cert Type: 1025s SSL Client, S/MIME 1025s Netscape Comment: 1025s Test Organization Sub Intermediate CA trusted Certificate 1025s X509v3 Subject Key Identifier: 1025s 2D:0A:D5:39:06:98:35:57:FD:E2:33:15:3F:26:DD:EF:72:5B:B1:C8 1025s X509v3 Key Usage: critical 1025s Digital Signature, Non Repudiation, Key Encipherment 1025s X509v3 Extended Key Usage: 1025s TLS Web Client Authentication, E-mail Protection 1025s X509v3 Subject Alternative Name: 1025s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 1025s Signature Algorithm: sha256WithRSAEncryption 1025s Signature Value: 1025s 40:f7:c9:c6:58:f4:f6:08:5b:c5:44:0f:07:c1:aa:c8:f4:66: 1025s 5d:7f:98:0c:7d:1b:0a:30:9b:83:f4:fb:bb:d1:e7:69:7b:43: 1025s e8:17:f2:ef:09:fe:f2:88:6d:04:61:f8:a7:d0:35:90:91:61: 1025s 76:42:ab:2c:91:5a:4b:4f:3e:17:61:8f:ba:ca:9f:41:2b:f3: 1025s ad:bd:c2:09:18:b7:fb:67:a4:ea:3f:f4:a7:d1:99:ae:fe:cb: 1025s e2:8b:de:cd:99:53:9f:c9:7c:42:7c:5c:ba:ac:a1:23:88:4b: 1025s 0f:aa:d2:78:22:69:ca:39:ce:9b:a4:c1:49:73:23:5e:53:e6: 1025s ac:2f 1025s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-wKxRAf/SSSD-child-16149-auth.pem 1025s + found_md5=Modulus=9FED049D54CD4E8B8A0CA97CF65A6B676302F86CF268923CA224DFEB5E88BDABAFB27FB92EBB18DB666380BB2DAFE035644DD4692458A74200BEA4C3099B0FECB456EE4DBC62432D8D2B29147C9CEB638B5628E06EB6F26CF59290A6D78B7E36484206552087373160BC2CDC70B77FD5B1EFC5C5D4AC29C24D9F88B6DC269B4D 1025s + '[' Modulus=9FED049D54CD4E8B8A0CA97CF65A6B676302F86CF268923CA224DFEB5E88BDABAFB27FB92EBB18DB666380BB2DAFE035644DD4692458A74200BEA4C3099B0FECB456EE4DBC62432D8D2B29147C9CEB638B5628E06EB6F26CF59290A6D78B7E36484206552087373160BC2CDC70B77FD5B1EFC5C5D4AC29C24D9F88B6DC269B4D '!=' Modulus=9FED049D54CD4E8B8A0CA97CF65A6B676302F86CF268923CA224DFEB5E88BDABAFB27FB92EBB18DB666380BB2DAFE035644DD4692458A74200BEA4C3099B0FECB456EE4DBC62432D8D2B29147C9CEB638B5628E06EB6F26CF59290A6D78B7E36484206552087373160BC2CDC70B77FD5B1EFC5C5D4AC29C24D9F88B6DC269B4D ']' 1025s + invalid_certificate /tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-6081 /tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA.pem 1025s + check_certificate /tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-6081 /tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA.pem 1025s + local certificate=/tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-trusted-certificate-0001.pem 1025s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-6081 1025s + local key_ring=/tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA.pem 1025s + local verify_option= 1025s + prepare_softhsm2_card /tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-6081 1025s + local certificate=/tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-trusted-certificate-0001.pem 1025s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-6081 1025s + local key_cn 1025s + local key_name 1025s + local tokens_dir 1025s + local output_cert_file 1025s + token_name= 1025s ++ basename /tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 1025s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 1025s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-trusted-certificate-0001.pem 1025s ++ sed -n 's/ *commonName *= //p' 1025s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 1025s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 1025s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-wKxRAf/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 1025s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-wKxRAf/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 1025s ++ basename /tmp/sssd-softhsm2-wKxRAf/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 1025s + tokens_dir=/tmp/sssd-softhsm2-wKxRAf/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 1025s + token_name='Test Organization Sub Int Token' 1025s + '[' '!' -e /tmp/sssd-softhsm2-wKxRAf/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 1025s Test Organization Sub Int Token 1025s + '[' '!' -d /tmp/sssd-softhsm2-wKxRAf/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 1025s + echo 'Test Organization Sub Int Token' 1025s + '[' -n '' ']' 1025s + local output_base_name=SSSD-child-16292 1025s + local output_file=/tmp/sssd-softhsm2-wKxRAf/SSSD-child-16292.output 1025s + output_cert_file=/tmp/sssd-softhsm2-wKxRAf/SSSD-child-16292.pem 1025s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA.pem 1025s [p11_child[2209]] [main] (0x0400): p11_child started. 1025s [p11_child[2209]] [main] (0x2000): Running in [pre-auth] mode. 1025s [p11_child[2209]] [main] (0x2000): Running with effective IDs: [0][0]. 1025s [p11_child[2209]] [main] (0x2000): Running with real IDs [0][0]. 1025s [p11_child[2209]] [do_card] (0x4000): Module List: 1025s [p11_child[2209]] [do_card] (0x4000): common name: [softhsm2]. 1025s [p11_child[2209]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 1025s [p11_child[2209]] [do_card] (0x4000): Description [SoftHSM slot ID 0x60de579c] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 1025s [p11_child[2209]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 1025s [p11_child[2209]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x60de579c][1625184156] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 1025s [p11_child[2209]] [do_card] (0x4000): Login NOT required. 1025s [p11_child[2209]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 1025s [p11_child[2209]] [do_verification] (0x0040): X509_verify_cert failed [0]. 1025s [p11_child[2209]] [do_verification] (0x0040): X509_verify_cert failed [2][unable to get issuer certificate]. 1025s [p11_child[2209]] [read_certs] (0x0040): Certificate [Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] not valid, skipping. 1025s [p11_child[2209]] [do_card] (0x4000): No certificate found. 1025s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-wKxRAf/SSSD-child-16292.output 1025s + return 2 1025s + invalid_certificate /tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-6081 /tmp/sssd-softhsm2-wKxRAf/test-root-intermediate-chain-CA.pem partial_chain 1025s + check_certificate /tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-6081 /tmp/sssd-softhsm2-wKxRAf/test-root-intermediate-chain-CA.pem partial_chain 1025s + local certificate=/tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-trusted-certificate-0001.pem 1025s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-6081 1025s + local key_ring=/tmp/sssd-softhsm2-wKxRAf/test-root-intermediate-chain-CA.pem 1025s + local verify_option=partial_chain 1025s + prepare_softhsm2_card /tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-6081 1025s + local certificate=/tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-trusted-certificate-0001.pem 1025s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-6081 1025s + local key_cn 1025s + local key_name 1025s + local tokens_dir 1025s + local output_cert_file 1025s + token_name= 1025s ++ basename /tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 1025s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 1025s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-trusted-certificate-0001.pem 1025s ++ sed -n 's/ *commonName *= //p' 1025s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 1025s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 1025s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-wKxRAf/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 1025s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-wKxRAf/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 1025s ++ basename /tmp/sssd-softhsm2-wKxRAf/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 1025s + tokens_dir=/tmp/sssd-softhsm2-wKxRAf/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 1025s + token_name='Test Organization Sub Int Token' 1025s + '[' '!' -e /tmp/sssd-softhsm2-wKxRAf/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 1025s Test Organization Sub Int Token 1025s + '[' '!' -d /tmp/sssd-softhsm2-wKxRAf/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 1025s + echo 'Test Organization Sub Int Token' 1025s + '[' -n partial_chain ']' 1025s + local verify_arg=--verify=partial_chain 1025s + local output_base_name=SSSD-child-22864 1025s + local output_file=/tmp/sssd-softhsm2-wKxRAf/SSSD-child-22864.output 1025s + output_cert_file=/tmp/sssd-softhsm2-wKxRAf/SSSD-child-22864.pem 1025s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-wKxRAf/test-root-intermediate-chain-CA.pem 1025s [p11_child[2216]] [main] (0x0400): p11_child started. 1025s [p11_child[2216]] [main] (0x2000): Running in [pre-auth] mode. 1025s [p11_child[2216]] [main] (0x2000): Running with effective IDs: [0][0]. 1025s [p11_child[2216]] [main] (0x2000): Running with real IDs [0][0]. 1025s [p11_child[2216]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 1025s [p11_child[2216]] [do_card] (0x4000): Module List: 1025s [p11_child[2216]] [do_card] (0x4000): common name: [softhsm2]. 1025s [p11_child[2216]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 1025s [p11_child[2216]] [do_card] (0x4000): Description [SoftHSM slot ID 0x60de579c] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 1025s [p11_child[2216]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 1025s [p11_child[2216]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x60de579c][1625184156] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 1025s [p11_child[2216]] [do_card] (0x4000): Login NOT required. 1025s [p11_child[2216]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 1025s [p11_child[2216]] [do_verification] (0x0040): X509_verify_cert failed [0]. 1025s [p11_child[2216]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 1025s [p11_child[2216]] [read_certs] (0x0040): Certificate [Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] not valid, skipping. 1025s [p11_child[2216]] [do_card] (0x4000): No certificate found. 1025s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-wKxRAf/SSSD-child-22864.output 1025s + return 2 1025s + valid_certificate /tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-6081 /tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA.pem partial_chain 1025s + check_certificate /tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-6081 /tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA.pem partial_chain 1025s + local certificate=/tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-trusted-certificate-0001.pem 1025s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-6081 1025s + local key_ring=/tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA.pem 1025s + local verify_option=partial_chain 1025s + prepare_softhsm2_card /tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-6081 1025s + local certificate=/tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-trusted-certificate-0001.pem 1025s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-6081 1025s + local key_cn 1025s + local key_name 1025s + local tokens_dir 1025s + local output_cert_file 1025s + token_name= 1025s ++ basename /tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 1025s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 1025s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-trusted-certificate-0001.pem 1025s ++ sed -n 's/ *commonName *= //p' 1025s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 1025s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 1025s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-wKxRAf/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 1025s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-wKxRAf/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 1025s ++ basename /tmp/sssd-softhsm2-wKxRAf/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 1025s + tokens_dir=/tmp/sssd-softhsm2-wKxRAf/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 1025s + token_name='Test Organization Sub Int Token' 1025s Test Organization Sub Int Token 1025s + '[' '!' -e /tmp/sssd-softhsm2-wKxRAf/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 1025s + '[' '!' -d /tmp/sssd-softhsm2-wKxRAf/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 1025s + echo 'Test Organization Sub Int Token' 1025s + '[' -n partial_chain ']' 1025s + local verify_arg=--verify=partial_chain 1025s + local output_base_name=SSSD-child-1347 1025s + local output_file=/tmp/sssd-softhsm2-wKxRAf/SSSD-child-1347.output 1025s + output_cert_file=/tmp/sssd-softhsm2-wKxRAf/SSSD-child-1347.pem 1025s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA.pem 1025s [p11_child[2223]] [main] (0x0400): p11_child started. 1025s [p11_child[2223]] [main] (0x2000): Running in [pre-auth] mode. 1025s [p11_child[2223]] [main] (0x2000): Running with effective IDs: [0][0]. 1025s [p11_child[2223]] [main] (0x2000): Running with real IDs [0][0]. 1025s [p11_child[2223]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 1025s [p11_child[2223]] [do_card] (0x4000): Module List: 1025s [p11_child[2223]] [do_card] (0x4000): common name: [softhsm2]. 1025s [p11_child[2223]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 1025s [p11_child[2223]] [do_card] (0x4000): Description [SoftHSM slot ID 0x60de579c] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 1025s [p11_child[2223]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 1025s [p11_child[2223]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x60de579c][1625184156] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 1025s [p11_child[2223]] [do_card] (0x4000): Login NOT required. 1025s [p11_child[2223]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 1025s [p11_child[2223]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 1025s [p11_child[2223]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Sub Int Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 1025s [p11_child[2223]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x60de579c;slot-manufacturer=SoftHSM%20project;slot-id=1625184156;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=ab0ec2dfe0de579c;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 1025s [p11_child[2223]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 1025s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-wKxRAf/SSSD-child-1347.output 1025s + echo '-----BEGIN CERTIFICATE-----' 1025s + tail -n1 /tmp/sssd-softhsm2-wKxRAf/SSSD-child-1347.output 1025s + echo '-----END CERTIFICATE-----' 1025s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-wKxRAf/SSSD-child-1347.pem 1025s Certificate: 1025s Data: 1025s Version: 3 (0x2) 1025s Serial Number: 5 (0x5) 1025s Signature Algorithm: sha256WithRSAEncryption 1025s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 1025s Validity 1025s Not Before: Mar 10 09:32:47 2024 GMT 1025s Not After : Mar 10 09:32:47 2025 GMT 1025s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 1025s Subject Public Key Info: 1025s Public Key Algorithm: rsaEncryption 1025s Public-Key: (1024 bit) 1025s Modulus: 1025s 00:9f:ed:04:9d:54:cd:4e:8b:8a:0c:a9:7c:f6:5a: 1025s 6b:67:63:02:f8:6c:f2:68:92:3c:a2:24:df:eb:5e: 1025s 88:bd:ab:af:b2:7f:b9:2e:bb:18:db:66:63:80:bb: 1025s 2d:af:e0:35:64:4d:d4:69:24:58:a7:42:00:be:a4: 1025s c3:09:9b:0f:ec:b4:56:ee:4d:bc:62:43:2d:8d:2b: 1025s 29:14:7c:9c:eb:63:8b:56:28:e0:6e:b6:f2:6c:f5: 1025s 92:90:a6:d7:8b:7e:36:48:42:06:55:20:87:37:31: 1025s 60:bc:2c:dc:70:b7:7f:d5:b1:ef:c5:c5:d4:ac:29: 1025s c2:4d:9f:88:b6:dc:26:9b:4d 1025s Exponent: 65537 (0x10001) 1025s X509v3 extensions: 1025s X509v3 Authority Key Identifier: 1025s 4D:00:A7:25:2A:ED:11:13:81:A0:07:AB:53:9E:AE:AF:1F:BA:CA:42 1025s X509v3 Basic Constraints: 1025s CA:FALSE 1025s Netscape Cert Type: 1025s SSL Client, S/MIME 1025s Netscape Comment: 1025s Test Organization Sub Intermediate CA trusted Certificate 1025s X509v3 Subject Key Identifier: 1025s 2D:0A:D5:39:06:98:35:57:FD:E2:33:15:3F:26:DD:EF:72:5B:B1:C8 1025s X509v3 Key Usage: critical 1025s Digital Signature, Non Repudiation, Key Encipherment 1025s X509v3 Extended Key Usage: 1025s TLS Web Client Authentication, E-mail Protection 1025s X509v3 Subject Alternative Name: 1025s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 1025s Signature Algorithm: sha256WithRSAEncryption 1025s Signature Value: 1025s 40:f7:c9:c6:58:f4:f6:08:5b:c5:44:0f:07:c1:aa:c8:f4:66: 1025s 5d:7f:98:0c:7d:1b:0a:30:9b:83:f4:fb:bb:d1:e7:69:7b:43: 1025s e8:17:f2:ef:09:fe:f2:88:6d:04:61:f8:a7:d0:35:90:91:61: 1025s 76:42:ab:2c:91:5a:4b:4f:3e:17:61:8f:ba:ca:9f:41:2b:f3: 1025s ad:bd:c2:09:18:b7:fb:67:a4:ea:3f:f4:a7:d1:99:ae:fe:cb: 1025s e2:8b:de:cd:99:53:9f:c9:7c:42:7c:5c:ba:ac:a1:23:88:4b: 1025s 0f:aa:d2:78:22:69:ca:39:ce:9b:a4:c1:49:73:23:5e:53:e6: 1025s ac:2f 1025s + local found_md5 expected_md5 1025s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-trusted-certificate-0001.pem 1025s + expected_md5=Modulus=9FED049D54CD4E8B8A0CA97CF65A6B676302F86CF268923CA224DFEB5E88BDABAFB27FB92EBB18DB666380BB2DAFE035644DD4692458A74200BEA4C3099B0FECB456EE4DBC62432D8D2B29147C9CEB638B5628E06EB6F26CF59290A6D78B7E36484206552087373160BC2CDC70B77FD5B1EFC5C5D4AC29C24D9F88B6DC269B4D 1025s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-wKxRAf/SSSD-child-1347.pem 1025s + found_md5=Modulus=9FED049D54CD4E8B8A0CA97CF65A6B676302F86CF268923CA224DFEB5E88BDABAFB27FB92EBB18DB666380BB2DAFE035644DD4692458A74200BEA4C3099B0FECB456EE4DBC62432D8D2B29147C9CEB638B5628E06EB6F26CF59290A6D78B7E36484206552087373160BC2CDC70B77FD5B1EFC5C5D4AC29C24D9F88B6DC269B4D 1025s + '[' Modulus=9FED049D54CD4E8B8A0CA97CF65A6B676302F86CF268923CA224DFEB5E88BDABAFB27FB92EBB18DB666380BB2DAFE035644DD4692458A74200BEA4C3099B0FECB456EE4DBC62432D8D2B29147C9CEB638B5628E06EB6F26CF59290A6D78B7E36484206552087373160BC2CDC70B77FD5B1EFC5C5D4AC29C24D9F88B6DC269B4D '!=' Modulus=9FED049D54CD4E8B8A0CA97CF65A6B676302F86CF268923CA224DFEB5E88BDABAFB27FB92EBB18DB666380BB2DAFE035644DD4692458A74200BEA4C3099B0FECB456EE4DBC62432D8D2B29147C9CEB638B5628E06EB6F26CF59290A6D78B7E36484206552087373160BC2CDC70B77FD5B1EFC5C5D4AC29C24D9F88B6DC269B4D ']' 1025s + output_file=/tmp/sssd-softhsm2-wKxRAf/SSSD-child-1347-auth.output 1025s ++ basename /tmp/sssd-softhsm2-wKxRAf/SSSD-child-1347-auth.output .output 1025s + output_cert_file=/tmp/sssd-softhsm2-wKxRAf/SSSD-child-1347-auth.pem 1025s + echo -n 053350 1025s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Sub Int Token' --module_name /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so 1025s [p11_child[2231]] [main] (0x0400): p11_child started. 1025s [p11_child[2231]] [main] (0x2000): Running in [auth] mode. 1025s [p11_child[2231]] [main] (0x2000): Running with effective IDs: [0][0]. 1025s [p11_child[2231]] [main] (0x2000): Running with real IDs [0][0]. 1025s [p11_child[2231]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 1025s [p11_child[2231]] [do_card] (0x4000): Module List: 1025s [p11_child[2231]] [do_card] (0x4000): common name: [softhsm2]. 1025s [p11_child[2231]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 1025s [p11_child[2231]] [do_card] (0x4000): Description [SoftHSM slot ID 0x60de579c] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 1025s [p11_child[2231]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 1025s [p11_child[2231]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x60de579c][1625184156] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 1025s [p11_child[2231]] [do_card] (0x4000): Login required. 1025s [p11_child[2231]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 1025s [p11_child[2231]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 1025s [p11_child[2231]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so Test Organization Sub Int Token Test Organization Sub Int Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 1025s [p11_child[2231]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x60de579c;slot-manufacturer=SoftHSM%20project;slot-id=1625184156;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=ab0ec2dfe0de579c;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 1025s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 1025s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 1025s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 1025s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 1025s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 1025s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 1025s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 1025s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 1025s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 1025s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 1025s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 1025s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 1025s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 1025s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 1025s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 1025s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 1025s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 1025s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 1025s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 1025s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 1025s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 1025s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 1025s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 1025s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 1025s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 1025s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 1025s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 1025s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 1025s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 1025s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 1025s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 1025s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 1025s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 1025s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 1025s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 1025s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 1025s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 1025s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 1025s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 1025s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 1025s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 1025s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 1025s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 1025s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 1025s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 1025s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 1025s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 1025s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 1025s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 1025s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 1025s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 1025s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 1025s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 1025s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 1025s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 1025s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 1025s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 1025s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 1025s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 1025s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 1025s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 1025s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 1025s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 1025s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 1025s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 1025s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 1025s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 1025s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 1025s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 1025s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 1025s [p11_child[2231]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 1025s [p11_child[2231]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 1025s [p11_child[2231]] [do_card] (0x4000): Certificate verified and validated. 1025s [p11_child[2231]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 1025s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-wKxRAf/SSSD-child-1347-auth.output 1025s + echo '-----BEGIN CERTIFICATE-----' 1025s + tail -n1 /tmp/sssd-softhsm2-wKxRAf/SSSD-child-1347-auth.output 1025s + echo '-----END CERTIFICATE-----' 1025s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-wKxRAf/SSSD-child-1347-auth.pem 1025s Certificate: 1025s Data: 1025s Version: 3 (0x2) 1025s Serial Number: 5 (0x5) 1025s Signature Algorithm: sha256WithRSAEncryption 1025s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 1025s Validity 1025s Not Before: Mar 10 09:32:47 2024 GMT 1025s Not After : Mar 10 09:32:47 2025 GMT 1025s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 1025s Subject Public Key Info: 1025s Public Key Algorithm: rsaEncryption 1025s Public-Key: (1024 bit) 1025s Modulus: 1025s 00:9f:ed:04:9d:54:cd:4e:8b:8a:0c:a9:7c:f6:5a: 1025s 6b:67:63:02:f8:6c:f2:68:92:3c:a2:24:df:eb:5e: 1025s 88:bd:ab:af:b2:7f:b9:2e:bb:18:db:66:63:80:bb: 1025s 2d:af:e0:35:64:4d:d4:69:24:58:a7:42:00:be:a4: 1025s c3:09:9b:0f:ec:b4:56:ee:4d:bc:62:43:2d:8d:2b: 1025s 29:14:7c:9c:eb:63:8b:56:28:e0:6e:b6:f2:6c:f5: 1025s 92:90:a6:d7:8b:7e:36:48:42:06:55:20:87:37:31: 1025s 60:bc:2c:dc:70:b7:7f:d5:b1:ef:c5:c5:d4:ac:29: 1025s c2:4d:9f:88:b6:dc:26:9b:4d 1025s Exponent: 65537 (0x10001) 1025s X509v3 extensions: 1025s X509v3 Authority Key Identifier: 1025s 4D:00:A7:25:2A:ED:11:13:81:A0:07:AB:53:9E:AE:AF:1F:BA:CA:42 1025s X509v3 Basic Constraints: 1025s CA:FALSE 1025s Netscape Cert Type: 1025s SSL Client, S/MIME 1025s Netscape Comment: 1025s Test Organization Sub Intermediate CA trusted Certificate 1025s X509v3 Subject Key Identifier: 1025s 2D:0A:D5:39:06:98:35:57:FD:E2:33:15:3F:26:DD:EF:72:5B:B1:C8 1025s X509v3 Key Usage: critical 1025s Digital Signature, Non Repudiation, Key Encipherment 1025s X509v3 Extended Key Usage: 1025s TLS Web Client Authentication, E-mail Protection 1025s X509v3 Subject Alternative Name: 1025s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 1025s Signature Algorithm: sha256WithRSAEncryption 1025s Signature Value: 1025s 40:f7:c9:c6:58:f4:f6:08:5b:c5:44:0f:07:c1:aa:c8:f4:66: 1025s 5d:7f:98:0c:7d:1b:0a:30:9b:83:f4:fb:bb:d1:e7:69:7b:43: 1025s e8:17:f2:ef:09:fe:f2:88:6d:04:61:f8:a7:d0:35:90:91:61: 1025s 76:42:ab:2c:91:5a:4b:4f:3e:17:61:8f:ba:ca:9f:41:2b:f3: 1025s ad:bd:c2:09:18:b7:fb:67:a4:ea:3f:f4:a7:d1:99:ae:fe:cb: 1025s e2:8b:de:cd:99:53:9f:c9:7c:42:7c:5c:ba:ac:a1:23:88:4b: 1025s 0f:aa:d2:78:22:69:ca:39:ce:9b:a4:c1:49:73:23:5e:53:e6: 1025s ac:2f 1025s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-wKxRAf/SSSD-child-1347-auth.pem 1025s + found_md5=Modulus=9FED049D54CD4E8B8A0CA97CF65A6B676302F86CF268923CA224DFEB5E88BDABAFB27FB92EBB18DB666380BB2DAFE035644DD4692458A74200BEA4C3099B0FECB456EE4DBC62432D8D2B29147C9CEB638B5628E06EB6F26CF59290A6D78B7E36484206552087373160BC2CDC70B77FD5B1EFC5C5D4AC29C24D9F88B6DC269B4D 1025s + '[' Modulus=9FED049D54CD4E8B8A0CA97CF65A6B676302F86CF268923CA224DFEB5E88BDABAFB27FB92EBB18DB666380BB2DAFE035644DD4692458A74200BEA4C3099B0FECB456EE4DBC62432D8D2B29147C9CEB638B5628E06EB6F26CF59290A6D78B7E36484206552087373160BC2CDC70B77FD5B1EFC5C5D4AC29C24D9F88B6DC269B4D '!=' Modulus=9FED049D54CD4E8B8A0CA97CF65A6B676302F86CF268923CA224DFEB5E88BDABAFB27FB92EBB18DB666380BB2DAFE035644DD4692458A74200BEA4C3099B0FECB456EE4DBC62432D8D2B29147C9CEB638B5628E06EB6F26CF59290A6D78B7E36484206552087373160BC2CDC70B77FD5B1EFC5C5D4AC29C24D9F88B6DC269B4D ']' 1025s + valid_certificate /tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-6081 /tmp/sssd-softhsm2-wKxRAf/test-intermediate-sub-chain-CA.pem partial_chain 1025s + check_certificate /tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-6081 /tmp/sssd-softhsm2-wKxRAf/test-intermediate-sub-chain-CA.pem partial_chain 1025s + local certificate=/tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-trusted-certificate-0001.pem 1025s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-6081 1025s + local key_ring=/tmp/sssd-softhsm2-wKxRAf/test-intermediate-sub-chain-CA.pem 1025s + local verify_option=partial_chain 1025s + prepare_softhsm2_card /tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-6081 1025s + local certificate=/tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-trusted-certificate-0001.pem 1025s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-6081 1025s + local key_cn 1025s + local key_name 1025s + local tokens_dir 1025s + local output_cert_file 1025s + token_name= 1025s ++ basename /tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 1025s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 1025s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-trusted-certificate-0001.pem 1025s ++ sed -n 's/ *commonName *= //p' 1025s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 1025s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 1025s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-wKxRAf/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 1025s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-wKxRAf/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 1025s ++ basename /tmp/sssd-softhsm2-wKxRAf/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 1025s + tokens_dir=/tmp/sssd-softhsm2-wKxRAf/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 1025s + token_name='Test Organization Sub Int Token' 1025s + '[' '!' -e /tmp/sssd-softhsm2-wKxRAf/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 1025s + '[' '!' -d /tmp/sssd-softhsm2-wKxRAf/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 1025s + echo 'Test Organization Sub Int Token' 1025s + '[' -n partial_chain ']' 1025s Test Organization Sub Int Token 1025s + local verify_arg=--verify=partial_chain 1025s + local output_base_name=SSSD-child-20754 1025s + local output_file=/tmp/sssd-softhsm2-wKxRAf/SSSD-child-20754.output 1025s + output_cert_file=/tmp/sssd-softhsm2-wKxRAf/SSSD-child-20754.pem 1025s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-wKxRAf/test-intermediate-sub-chain-CA.pem 1025s [p11_child[2241]] [main] (0x0400): p11_child started. 1025s [p11_child[2241]] [main] (0x2000): Running in [pre-auth] mode. 1025s [p11_child[2241]] [main] (0x2000): Running with effective IDs: [0][0]. 1025s [p11_child[2241]] [main] (0x2000): Running with real IDs [0][0]. 1025s [p11_child[2241]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 1025s [p11_child[2241]] [do_card] (0x4000): Module List: 1025s [p11_child[2241]] [do_card] (0x4000): common name: [softhsm2]. 1025s [p11_child[2241]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 1025s [p11_child[2241]] [do_card] (0x4000): Description [SoftHSM slot ID 0x60de579c] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 1025s [p11_child[2241]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 1025s [p11_child[2241]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x60de579c][1625184156] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 1025s [p11_child[2241]] [do_card] (0x4000): Login NOT required. 1025s [p11_child[2241]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 1025s [p11_child[2241]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 1025s [p11_child[2241]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Sub Int Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 1025s [p11_child[2241]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x60de579c;slot-manufacturer=SoftHSM%20project;slot-id=1625184156;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=ab0ec2dfe0de579c;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 1025s [p11_child[2241]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 1025s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-wKxRAf/SSSD-child-20754.output 1025s + echo '-----BEGIN CERTIFICATE-----' 1025s + tail -n1 /tmp/sssd-softhsm2-wKxRAf/SSSD-child-20754.output 1025s + echo '-----END CERTIFICATE-----' 1025s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-wKxRAf/SSSD-child-20754.pem 1025s Certificate: 1025s Data: 1025s Version: 3 (0x2) 1025s Serial Number: 5 (0x5) 1025s Signature Algorithm: sha256WithRSAEncryption 1025s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 1025s Validity 1025s Not Before: Mar 10 09:32:47 2024 GMT 1025s Not After : Mar 10 09:32:47 2025 GMT 1025s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 1025s Subject Public Key Info: 1025s Public Key Algorithm: rsaEncryption 1025s Public-Key: (1024 bit) 1025s Modulus: 1025s 00:9f:ed:04:9d:54:cd:4e:8b:8a:0c:a9:7c:f6:5a: 1025s 6b:67:63:02:f8:6c:f2:68:92:3c:a2:24:df:eb:5e: 1025s 88:bd:ab:af:b2:7f:b9:2e:bb:18:db:66:63:80:bb: 1025s 2d:af:e0:35:64:4d:d4:69:24:58:a7:42:00:be:a4: 1025s c3:09:9b:0f:ec:b4:56:ee:4d:bc:62:43:2d:8d:2b: 1025s 29:14:7c:9c:eb:63:8b:56:28:e0:6e:b6:f2:6c:f5: 1025s 92:90:a6:d7:8b:7e:36:48:42:06:55:20:87:37:31: 1025s 60:bc:2c:dc:70:b7:7f:d5:b1:ef:c5:c5:d4:ac:29: 1025s c2:4d:9f:88:b6:dc:26:9b:4d 1025s Exponent: 65537 (0x10001) 1025s X509v3 extensions: 1025s X509v3 Authority Key Identifier: 1025s 4D:00:A7:25:2A:ED:11:13:81:A0:07:AB:53:9E:AE:AF:1F:BA:CA:42 1025s X509v3 Basic Constraints: 1025s CA:FALSE 1025s Netscape Cert Type: 1025s SSL Client, S/MIME 1025s Netscape Comment: 1025s Test Organization Sub Intermediate CA trusted Certificate 1025s X509v3 Subject Key Identifier: 1025s 2D:0A:D5:39:06:98:35:57:FD:E2:33:15:3F:26:DD:EF:72:5B:B1:C8 1025s X509v3 Key Usage: critical 1025s Digital Signature, Non Repudiation, Key Encipherment 1025s X509v3 Extended Key Usage: 1025s TLS Web Client Authentication, E-mail Protection 1025s X509v3 Subject Alternative Name: 1025s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 1025s Signature Algorithm: sha256WithRSAEncryption 1025s Signature Value: 1025s 40:f7:c9:c6:58:f4:f6:08:5b:c5:44:0f:07:c1:aa:c8:f4:66: 1025s 5d:7f:98:0c:7d:1b:0a:30:9b:83:f4:fb:bb:d1:e7:69:7b:43: 1025s e8:17:f2:ef:09:fe:f2:88:6d:04:61:f8:a7:d0:35:90:91:61: 1025s 76:42:ab:2c:91:5a:4b:4f:3e:17:61:8f:ba:ca:9f:41:2b:f3: 1025s ad:bd:c2:09:18:b7:fb:67:a4:ea:3f:f4:a7:d1:99:ae:fe:cb: 1025s e2:8b:de:cd:99:53:9f:c9:7c:42:7c:5c:ba:ac:a1:23:88:4b: 1025s 0f:aa:d2:78:22:69:ca:39:ce:9b:a4:c1:49:73:23:5e:53:e6: 1025s ac:2f 1025s + local found_md5 expected_md5 1025s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-wKxRAf/test-sub-intermediate-CA-trusted-certificate-0001.pem 1025s + expected_md5=Modulus=9FED049D54CD4E8B8A0CA97CF65A6B676302F86CF268923CA224DFEB5E88BDABAFB27FB92EBB18DB666380BB2DAFE035644DD4692458A74200BEA4C3099B0FECB456EE4DBC62432D8D2B29147C9CEB638B5628E06EB6F26CF59290A6D78B7E36484206552087373160BC2CDC70B77FD5B1EFC5C5D4AC29C24D9F88B6DC269B4D 1025s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-wKxRAf/SSSD-child-20754.pem 1025s + found_md5=Modulus=9FED049D54CD4E8B8A0CA97CF65A6B676302F86CF268923CA224DFEB5E88BDABAFB27FB92EBB18DB666380BB2DAFE035644DD4692458A74200BEA4C3099B0FECB456EE4DBC62432D8D2B29147C9CEB638B5628E06EB6F26CF59290A6D78B7E36484206552087373160BC2CDC70B77FD5B1EFC5C5D4AC29C24D9F88B6DC269B4D 1025s + '[' Modulus=9FED049D54CD4E8B8A0CA97CF65A6B676302F86CF268923CA224DFEB5E88BDABAFB27FB92EBB18DB666380BB2DAFE035644DD4692458A74200BEA4C3099B0FECB456EE4DBC62432D8D2B29147C9CEB638B5628E06EB6F26CF59290A6D78B7E36484206552087373160BC2CDC70B77FD5B1EFC5C5D4AC29C24D9F88B6DC269B4D '!=' Modulus=9FED049D54CD4E8B8A0CA97CF65A6B676302F86CF268923CA224DFEB5E88BDABAFB27FB92EBB18DB666380BB2DAFE035644DD4692458A74200BEA4C3099B0FECB456EE4DBC62432D8D2B29147C9CEB638B5628E06EB6F26CF59290A6D78B7E36484206552087373160BC2CDC70B77FD5B1EFC5C5D4AC29C24D9F88B6DC269B4D ']' 1025s + output_file=/tmp/sssd-softhsm2-wKxRAf/SSSD-child-20754-auth.output 1025s ++ basename /tmp/sssd-softhsm2-wKxRAf/SSSD-child-20754-auth.output .output 1025s + output_cert_file=/tmp/sssd-softhsm2-wKxRAf/SSSD-child-20754-auth.pem 1025s + echo -n 053350 1025s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-wKxRAf/test-intermediate-sub-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Sub Int Token' --module_name /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so 1025s [p11_child[2249]] [main] (0x0400): p11_child started. 1025s [p11_child[2249]] [main] (0x2000): Running in [auth] mode. 1025s [p11_child[2249]] [main] (0x2000): Running with effective IDs: [0][0]. 1025s [p11_child[2249]] [main] (0x2000): Running with real IDs [0][0]. 1025s [p11_child[2249]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 1025s [p11_child[2249]] [do_card] (0x4000): Module List: 1025s [p11_child[2249]] [do_card] (0x4000): common name: [softhsm2]. 1025s [p11_child[2249]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 1025s [p11_child[2249]] [do_card] (0x4000): Description [SoftHSM slot ID 0x60de579c] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 1025s [p11_child[2249]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 1025s [p11_child[2249]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x60de579c][1625184156] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 1025s [p11_child[2249]] [do_card] (0x4000): Login required. 1025s [p11_child[2249]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 1025s [p11_child[2249]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 1025s [p11_child[2249]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so Test Organization Sub Int Token Test Organization Sub Int Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 1025s [p11_child[2249]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x60de579c;slot-manufacturer=SoftHSM%20project;slot-id=1625184156;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=ab0ec2dfe0de579c;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 1025s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 1025s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 1025s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 1025s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 1025s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 1025s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 1025s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 1025s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 1025s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 1025s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 1025s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 1025s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 1025s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 1025s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 1025s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 1025s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 1025s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 1025s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 1025s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 1025s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 1025s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 1025s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 1025s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 1025s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 1025s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 1025s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 1025s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 1025s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 1025s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 1025s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 1025s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 1025s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 1025s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 1025s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 1025s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 1025s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 1025s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 1025s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 1025s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 1025s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 1025s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 1025s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 1025s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 1025s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 1025s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 1025s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 1025s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 1025s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 1025s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 1025s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 1025s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 1025s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 1025s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 1025s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 1025s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 1025s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 1025s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 1025s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 1025s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 1025s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 1025s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 1025s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 1025s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 1025s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 1025s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 1025s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 1025s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 1025s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 1025s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 1025s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 1025s [p11_child[2249]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 1025s [p11_child[2249]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 1025s [p11_child[2249]] [do_card] (0x4000): Certificate verified and validated. 1025s [p11_child[2249]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 1025s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-wKxRAf/SSSD-child-20754-auth.output 1025s + echo '-----BEGIN CERTIFICATE-----' 1025s + tail -n1 /tmp/sssd-softhsm2-wKxRAf/SSSD-child-20754-auth.output 1025s + echo '-----END CERTIFICATE-----' 1025s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-wKxRAf/SSSD-child-20754-auth.pem 1025s Certificate: 1025s Data: 1025s Version: 3 (0x2) 1025s Serial Number: 5 (0x5) 1025s Signature Algorithm: sha256WithRSAEncryption 1025s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 1025s Validity 1025s Not Before: Mar 10 09:32:47 2024 GMT 1025s Not After : Mar 10 09:32:47 2025 GMT 1025s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 1025s Subject Public Key Info: 1025s Public Key Algorithm: rsaEncryption 1025s Public-Key: (1024 bit) 1025s Modulus: 1025s 00:9f:ed:04:9d:54:cd:4e:8b:8a:0c:a9:7c:f6:5a: 1025s 6b:67:63:02:f8:6c:f2:68:92:3c:a2:24:df:eb:5e: 1025s 88:bd:ab:af:b2:7f:b9:2e:bb:18:db:66:63:80:bb: 1025s 2d:af:e0:35:64:4d:d4:69:24:58:a7:42:00:be:a4: 1025s c3:09:9b:0f:ec:b4:56:ee:4d:bc:62:43:2d:8d:2b: 1025s 29:14:7c:9c:eb:63:8b:56:28:e0:6e:b6:f2:6c:f5: 1025s 92:90:a6:d7:8b:7e:36:48:42:06:55:20:87:37:31: 1025s 60:bc:2c:dc:70:b7:7f:d5:b1:ef:c5:c5:d4:ac:29: 1025s c2:4d:9f:88:b6:dc:26:9b:4d 1025s Exponent: 65537 (0x10001) 1025s X509v3 extensions: 1025s X509v3 Authority Key Identifier: 1025s 4D:00:A7:25:2A:ED:11:13:81:A0:07:AB:53:9E:AE:AF:1F:BA:CA:42 1025s X509v3 Basic Constraints: 1025s CA:FALSE 1025s Netscape Cert Type: 1025s SSL Client, S/MIME 1025s Netscape Comment: 1025s Test Organization Sub Intermediate CA trusted Certificate 1025s X509v3 Subject Key Identifier: 1025s 2D:0A:D5:39:06:98:35:57:FD:E2:33:15:3F:26:DD:EF:72:5B:B1:C8 1025s X509v3 Key Usage: critical 1025s Digital Signature, Non Repudiation, Key Encipherment 1025s X509v3 Extended Key Usage: 1025s TLS Web Client Authentication, E-mail Protection 1025s X509v3 Subject Alternative Name: 1025s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 1025s Signature Algorithm: sha256WithRSAEncryption 1025s Signature Value: 1025s 40:f7:c9:c6:58:f4:f6:08:5b:c5:44:0f:07:c1:aa:c8:f4:66: 1025s 5d:7f:98:0c:7d:1b:0a:30:9b:83:f4:fb:bb:d1:e7:69:7b:43: 1025s e8:17:f2:ef:09:fe:f2:88:6d:04:61:f8:a7:d0:35:90:91:61: 1025s 76:42:ab:2c:91:5a:4b:4f:3e:17:61:8f:ba:ca:9f:41:2b:f3: 1025s ad:bd:c2:09:18:b7:fb:67:a4:ea:3f:f4:a7:d1:99:ae:fe:cb: 1025s e2:8b:de:cd:99:53:9f:c9:7c:42:7c:5c:ba:ac:a1:23:88:4b: 1025s 0f:aa:d2:78:22:69:ca:39:ce:9b:a4:c1:49:73:23:5e:53:e6: 1025s ac:2f 1025s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-wKxRAf/SSSD-child-20754-auth.pem 1025s + found_md5=Modulus=9FED049D54CD4E8B8A0CA97CF65A6B676302F86CF268923CA224DFEB5E88BDABAFB27FB92EBB18DB666380BB2DAFE035644DD4692458A74200BEA4C3099B0FECB456EE4DBC62432D8D2B29147C9CEB638B5628E06EB6F26CF59290A6D78B7E36484206552087373160BC2CDC70B77FD5B1EFC5C5D4AC29C24D9F88B6DC269B4D 1025s + '[' Modulus=9FED049D54CD4E8B8A0CA97CF65A6B676302F86CF268923CA224DFEB5E88BDABAFB27FB92EBB18DB666380BB2DAFE035644DD4692458A74200BEA4C3099B0FECB456EE4DBC62432D8D2B29147C9CEB638B5628E06EB6F26CF59290A6D78B7E36484206552087373160BC2CDC70B77FD5B1EFC5C5D4AC29C24D9F88B6DC269B4D '!=' Modulus=9FED049D54CD4E8B8A0CA97CF65A6B676302F86CF268923CA224DFEB5E88BDABAFB27FB92EBB18DB666380BB2DAFE035644DD4692458A74200BEA4C3099B0FECB456EE4DBC62432D8D2B29147C9CEB638B5628E06EB6F26CF59290A6D78B7E36484206552087373160BC2CDC70B77FD5B1EFC5C5D4AC29C24D9F88B6DC269B4D ']' 1025s + set +x 1025s 1025s Test completed, Root CA and intermediate issued certificates verified! 1025s autopkgtest [09:32:52]: test sssd-softhism2-certificates-tests.sh: -----------------------] 1026s autopkgtest [09:32:53]: test sssd-softhism2-certificates-tests.sh: - - - - - - - - - - results - - - - - - - - - - 1026s sssd-softhism2-certificates-tests.sh PASS 1027s autopkgtest [09:32:54]: test sssd-smart-card-pam-auth-configs: preparing testbed 1029s Reading package lists... 1030s Building dependency tree... 1030s Reading state information... 1030s Correcting dependencies...Starting pkgProblemResolver with broken count: 0 1030s Starting 2 pkgProblemResolver with broken count: 0 1030s Done 1030s Done 1030s Starting pkgProblemResolver with broken count: 0 1030s Starting 2 pkgProblemResolver with broken count: 0 1030s Done 1030s The following additional packages will be installed: 1030s pamtester 1030s The following NEW packages will be installed: 1030s pamtester 1031s 0 upgraded, 1 newly installed, 0 to remove and 0 not upgraded. 1031s 1 not fully installed or removed. 1031s Need to get 12.2 kB of archives. 1031s After this operation, 36.9 kB of additional disk space will be used. 1031s Get:1 http://ftpmaster.internal/ubuntu noble/universe s390x pamtester s390x 0.1.2-4 [12.2 kB] 1031s Fetched 12.2 kB in 0s (85.9 kB/s) 1031s Selecting previously unselected package pamtester. 1031s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 52347 files and directories currently installed.) 1031s Preparing to unpack .../pamtester_0.1.2-4_s390x.deb ... 1031s Unpacking pamtester (0.1.2-4) ... 1031s Setting up pamtester (0.1.2-4) ... 1031s Setting up autopkgtest-satdep (0) ... 1031s Processing triggers for man-db (2.12.0-3) ... 1034s (Reading database ... 52353 files and directories currently installed.) 1034s Removing autopkgtest-satdep (0) ... 1035s autopkgtest [09:33:02]: test sssd-smart-card-pam-auth-configs: env OFFLINE_MODE=1 bash debian/tests/sssd-smart-card-pam-auth-configs-tester.sh 1035s autopkgtest [09:33:02]: test sssd-smart-card-pam-auth-configs: [----------------------- 1035s + '[' -z ubuntu ']' 1035s + export DEBIAN_FRONTEND=noninteractive 1035s + DEBIAN_FRONTEND=noninteractive 1035s + required_tools=(pamtester softhsm2-util sssd) 1035s + [[ ! -v OFFLINE_MODE ]] 1035s + for cmd in "${required_tools[@]}" 1035s + command -v pamtester 1035s + for cmd in "${required_tools[@]}" 1035s + command -v softhsm2-util 1035s + for cmd in "${required_tools[@]}" 1035s + command -v sssd 1035s + PIN=123456 1035s ++ mktemp -d -t sssd-softhsm2-certs-XXXXXX 1035s + tmpdir=/tmp/sssd-softhsm2-certs-AS5UvA 1035s + backupsdir= 1035s + alternative_pam_configs=(sss-smart-card-optional sss-smart-card-required) 1035s + declare -a restore_paths 1035s + declare -a delete_paths 1035s + trap handle_exit EXIT 1035s ++ dirname debian/tests/sssd-smart-card-pam-auth-configs-tester.sh 1035s + tester=debian/tests/sssd-softhism2-certificates-tests.sh 1035s + '[' '!' -e debian/tests/sssd-softhism2-certificates-tests.sh ']' 1035s + '[' '!' -e debian/tests/sssd-softhism2-certificates-tests.sh ']' 1035s + export PIN TEST_TMPDIR=/tmp/sssd-softhsm2-certs-AS5UvA GENERATE_SMART_CARDS=1 KEEP_TEMPORARY_FILES=1 NO_SSSD_TESTS=1 1035s + TEST_TMPDIR=/tmp/sssd-softhsm2-certs-AS5UvA 1035s + GENERATE_SMART_CARDS=1 1035s + KEEP_TEMPORARY_FILES=1 1035s + NO_SSSD_TESTS=1 1035s + bash debian/tests/sssd-softhism2-certificates-tests.sh 1035s + '[' -z ubuntu ']' 1035s + required_tools=(p11tool openssl softhsm2-util) 1035s + for cmd in "${required_tools[@]}" 1035s + command -v p11tool 1035s + for cmd in "${required_tools[@]}" 1035s + command -v openssl 1035s + for cmd in "${required_tools[@]}" 1035s + command -v softhsm2-util 1035s + PIN=123456 1035s +++ find /usr/lib/softhsm/libsofthsm2.so 1035s +++ head -n 1 1035s ++ realpath /usr/lib/softhsm/libsofthsm2.so 1035s + SOFTHSM2_MODULE=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so 1035s + SSSD_P11_CHILD=/usr/libexec/sssd/p11_child 1035s + TOKEN_ID=00112233445566778899FFAABBCCDDEEFF012345 1035s + '[' '!' -v NO_SSSD_TESTS ']' 1035s + '[' '!' -e /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so ']' 1035s + tmpdir=/tmp/sssd-softhsm2-certs-AS5UvA 1035s + keys_size=1024 1035s + [[ ! -v KEEP_TEMPORARY_FILES ]] 1035s + trap 'set +x; echo -e "\nUnexpected failure!!!"' ERR 1035s + echo -n 01 1035s + touch /tmp/sssd-softhsm2-certs-AS5UvA/index.txt 1035s + mkdir -p /tmp/sssd-softhsm2-certs-AS5UvA/new_certs 1035s + cat 1035s + root_ca_key_pass=pass:random-root-CA-password-21324 1035s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-certs-AS5UvA/test-root-CA-key.pem -passout pass:random-root-CA-password-21324 1024 1035s + openssl req -passin pass:random-root-CA-password-21324 -batch -config /tmp/sssd-softhsm2-certs-AS5UvA/test-root-CA.config -x509 -new -nodes -key /tmp/sssd-softhsm2-certs-AS5UvA/test-root-CA-key.pem -sha256 -days 1024 -set_serial 0 -extensions v3_ca -out /tmp/sssd-softhsm2-certs-AS5UvA/test-root-CA.pem 1035s + openssl x509 -noout -in /tmp/sssd-softhsm2-certs-AS5UvA/test-root-CA.pem 1035s + cat 1035s + intermediate_ca_key_pass=pass:random-intermediate-CA-password-20195 1035s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-certs-AS5UvA/test-intermediate-CA-key.pem -passout pass:random-intermediate-CA-password-20195 1024 1035s + openssl req -batch -new -nodes -passin pass:random-intermediate-CA-password-20195 -config /tmp/sssd-softhsm2-certs-AS5UvA/test-intermediate-CA.config -key /tmp/sssd-softhsm2-certs-AS5UvA/test-intermediate-CA-key.pem -passout pass:random-root-CA-password-21324 -sha256 -extensions v3_ca -out /tmp/sssd-softhsm2-certs-AS5UvA/test-intermediate-CA-certificate-request.pem 1035s + openssl req -text -noout -in /tmp/sssd-softhsm2-certs-AS5UvA/test-intermediate-CA-certificate-request.pem 1035s Certificate Request: 1035s Data: 1035s Version: 1 (0x0) 1035s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 1035s Subject Public Key Info: 1035s Public Key Algorithm: rsaEncryption 1035s Public-Key: (1024 bit) 1035s Modulus: 1035s 00:b6:7c:ab:37:86:85:10:79:cc:e9:68:38:26:17: 1035s 37:16:c6:a5:c5:f1:cb:a6:ae:ca:b4:84:94:a3:80: 1035s 87:59:1c:ad:b7:ca:4e:7a:dc:a1:ea:07:53:b9:bb: 1035s aa:51:75:c2:5f:4d:6b:cd:66:8f:1e:f6:a4:cb:d7: 1035s f7:50:b5:4a:93:47:ff:2a:82:5d:47:26:73:cd:9a: 1035s 03:d9:a4:ed:d7:eb:b0:44:a2:84:69:21:94:99:27: 1035s 0f:78:b7:f8:68:c3:87:ab:6a:d7:9e:ce:b9:22:da: 1035s fe:63:48:6f:db:ff:28:72:8f:95:a4:b4:6b:11:a7: 1035s 58:7c:2b:d2:69:62:9a:b6:87 1035s Exponent: 65537 (0x10001) 1035s Attributes: 1035s (none) 1035s Requested Extensions: 1035s Signature Algorithm: sha256WithRSAEncryption 1035s Signature Value: 1035s 75:dc:22:f3:0f:49:ff:d3:7e:0c:c6:b1:a4:72:73:23:01:3f: 1035s a0:09:1d:5e:46:82:1f:20:c3:b7:11:35:4c:9d:3c:05:1e:5b: 1035s 65:c2:fc:ac:09:c5:e3:88:20:64:dd:90:4f:7b:9e:5c:33:e1: 1035s de:ff:f0:a1:2e:6e:ac:d6:35:ee:f8:c1:5a:05:a6:43:ac:20: 1035s 2e:80:18:f1:06:d6:ab:a0:39:1e:2d:da:ee:28:19:be:a7:f0: 1035s fb:d8:50:a7:80:5c:ba:d3:83:b8:0b:30:cc:d1:5c:8a:b8:91: 1035s 53:4e:dc:89:fa:da:32:de:88:e0:fd:82:5f:66:b0:57:c6:40: 1035s 29:1e 1035s + openssl ca -batch -notext -config /tmp/sssd-softhsm2-certs-AS5UvA/test-root-CA.config -passin pass:random-root-CA-password-21324 -keyfile /tmp/sssd-softhsm2-certs-AS5UvA/test-root-CA-key.pem -in /tmp/sssd-softhsm2-certs-AS5UvA/test-intermediate-CA-certificate-request.pem -days 365 -extensions v3_intermediate_ca -out /tmp/sssd-softhsm2-certs-AS5UvA/test-intermediate-CA.pem 1035s Using configuration from /tmp/sssd-softhsm2-certs-AS5UvA/test-root-CA.config 1035s Check that the request matches the signature 1035s Signature ok 1035s Certificate Details: 1035s Serial Number: 1 (0x1) 1035s Validity 1035s Not Before: Mar 10 09:33:02 2024 GMT 1035s Not After : Mar 10 09:33:02 2025 GMT 1035s Subject: 1035s organizationName = Test Organization 1035s organizationalUnitName = Test Organization Unit 1035s commonName = Test Organization Intermediate CA 1035s X509v3 extensions: 1035s X509v3 Subject Key Identifier: 1035s 84:25:1A:20:9E:D5:85:94:0F:25:38:43:BD:8C:90:65:2F:F7:02:17 1035s X509v3 Authority Key Identifier: 1035s keyid:E0:51:EB:35:19:5E:1B:36:C3:C5:63:09:56:01:CB:BF:C8:8E:87:D2 1035s DirName:/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root CA 1035s serial:00 1035s X509v3 Basic Constraints: 1035s CA:TRUE 1035s X509v3 Key Usage: critical 1035s Digital Signature, Certificate Sign, CRL Sign 1035s Certificate is to be certified until Mar 10 09:33:02 2025 GMT (365 days) 1035s 1035s Write out database with 1 new entries 1035s Database updated 1035s + openssl x509 -noout -in /tmp/sssd-softhsm2-certs-AS5UvA/test-intermediate-CA.pem 1035s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-AS5UvA/test-root-CA.pem /tmp/sssd-softhsm2-certs-AS5UvA/test-intermediate-CA.pem 1035s /tmp/sssd-softhsm2-certs-AS5UvA/test-intermediate-CA.pem: OK 1035s + cat 1035s + sub_intermediate_ca_key_pass=pass:random-sub-intermediate-CA-password-21923 1035s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-certs-AS5UvA/test-sub-intermediate-CA-key.pem -passout pass:random-sub-intermediate-CA-password-21923 1024 1035s + openssl req -batch -new -nodes -passin pass:random-sub-intermediate-CA-password-21923 -config /tmp/sssd-softhsm2-certs-AS5UvA/test-sub-intermediate-CA.config -key /tmp/sssd-softhsm2-certs-AS5UvA/test-sub-intermediate-CA-key.pem -passout pass:random-intermediate-CA-password-20195 -sha256 -extensions v3_ca -out /tmp/sssd-softhsm2-certs-AS5UvA/test-sub-intermediate-CA-certificate-request.pem 1035s + openssl req -text -noout -in /tmp/sssd-softhsm2-certs-AS5UvA/test-sub-intermediate-CA-certificate-request.pem 1035s Certificate Request: 1035s Data: 1035s Version: 1 (0x0) 1035s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 1035s Subject Public Key Info: 1035s Public Key Algorithm: rsaEncryption 1035s Public-Key: (1024 bit) 1035s Modulus: 1035s 00:bd:46:63:fb:10:a2:98:37:57:cf:ff:a1:9c:b0: 1035s 51:37:ac:0a:75:1e:be:31:65:5b:23:ed:99:1e:bf: 1035s e8:b7:c4:b2:11:36:05:b4:8f:2d:22:5f:97:b9:71: 1035s cc:9c:83:65:a0:c7:49:5a:68:3d:63:aa:1d:fd:c7: 1035s a3:7f:d1:11:cf:5a:02:cd:7c:cd:cc:68:8c:56:4c: 1035s a8:9a:b6:8d:87:ad:58:93:e5:0b:38:1e:48:04:a8: 1035s 0c:28:e1:dd:23:87:d6:87:c3:f7:ac:1e:a2:48:ec: 1035s 30:6c:18:bd:12:c2:33:b6:a3:6b:9c:b0:67:46:3e: 1035s ff:8f:62:98:9e:47:f8:33:6f 1035s Exponent: 65537 (0x10001) 1035s Attributes: 1035s (none) 1035s Requested Extensions: 1035s Signature Algorithm: sha256WithRSAEncryption 1035s Signature Value: 1035s b8:c2:87:2e:b6:c3:52:d1:88:5d:eb:2c:ac:cf:27:68:b3:b2: 1035s 4d:26:e5:14:7d:1e:9c:67:27:54:a6:f8:fd:8f:6f:42:c9:c2: 1035s 11:bd:21:50:d0:04:26:f1:7f:52:9c:32:da:93:d8:ca:e2:77: 1035s e7:84:c9:8d:82:08:e6:01:f6:ec:1e:84:cb:18:e8:cc:15:20: 1035s 31:49:24:8d:3f:05:69:fa:4a:45:e8:1b:a6:84:cd:d2:3b:64: 1035s 19:8d:68:51:84:4f:67:c3:9a:78:34:f6:f1:c7:e9:78:da:44: 1035s 67:33:d1:9f:86:71:0f:2d:45:b7:57:bc:a9:5b:0e:b1:eb:e9: 1035s d7:6a 1035s + openssl ca -batch -notext -config /tmp/sssd-softhsm2-certs-AS5UvA/test-intermediate-CA.config -passin pass:random-intermediate-CA-password-20195 -keyfile /tmp/sssd-softhsm2-certs-AS5UvA/test-intermediate-CA-key.pem -in /tmp/sssd-softhsm2-certs-AS5UvA/test-sub-intermediate-CA-certificate-request.pem -days 365 -extensions v3_intermediate_ca -out /tmp/sssd-softhsm2-certs-AS5UvA/test-sub-intermediate-CA.pem 1035s Using configuration from /tmp/sssd-softhsm2-certs-AS5UvA/test-intermediate-CA.config 1035s Check that the request matches the signature 1035s Signature ok 1035s Certificate Details: 1035s Serial Number: 2 (0x2) 1035s Validity 1035s Not Before: Mar 10 09:33:02 2024 GMT 1035s Not After : Mar 10 09:33:02 2025 GMT 1035s Subject: 1035s organizationName = Test Organization 1035s organizationalUnitName = Test Organization Unit 1035s commonName = Test Organization Sub Intermediate CA 1035s X509v3 extensions: 1035s X509v3 Subject Key Identifier: 1035s DF:9A:38:A8:0A:EE:FC:9F:E1:D5:3F:0C:5F:EE:9C:45:A1:D1:B4:CB 1035s X509v3 Authority Key Identifier: 1035s keyid:84:25:1A:20:9E:D5:85:94:0F:25:38:43:BD:8C:90:65:2F:F7:02:17 1035s DirName:/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root CA 1035s serial:01 1035s X509v3 Basic Constraints: 1035s CA:TRUE 1035s X509v3 Key Usage: critical 1035s Digital Signature, Certificate Sign, CRL Sign 1035s Certificate is to be certified until Mar 10 09:33:02 2025 GMT (365 days) 1035s 1035s Write out database with 1 new entries 1035s Database updated 1035s + openssl x509 -noout -in /tmp/sssd-softhsm2-certs-AS5UvA/test-sub-intermediate-CA.pem 1035s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-certs-AS5UvA/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-AS5UvA/test-sub-intermediate-CA.pem 1035s /tmp/sssd-softhsm2-certs-AS5UvA/test-sub-intermediate-CA.pem: OK 1035s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-certs-AS5UvA/test-root-CA.pem /tmp/sssd-softhsm2-certs-AS5UvA/test-sub-intermediate-CA.pem 1035s + local cmd=openssl 1035s + shift 1035s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-AS5UvA/test-root-CA.pem /tmp/sssd-softhsm2-certs-AS5UvA/test-sub-intermediate-CA.pem 1035s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 1035s error 20 at 0 depth lookup: unable to get local issuer certificate 1035s error /tmp/sssd-softhsm2-certs-AS5UvA/test-sub-intermediate-CA.pem: verification failed 1035s + cat 1035s + root_ca_trusted_cert_0001_key_pass=pass:random-root-ca-trusted-cert-0001-21540 1035s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-certs-AS5UvA/test-root-CA-trusted-certificate-0001-key.pem -passout pass:random-root-ca-trusted-cert-0001-21540 1024 1035s + openssl req -new -nodes -reqexts req_exts -passin pass:random-root-ca-trusted-cert-0001-21540 -key /tmp/sssd-softhsm2-certs-AS5UvA/test-root-CA-trusted-certificate-0001-key.pem -config /tmp/sssd-softhsm2-certs-AS5UvA/test-root-CA-trusted-certificate-0001.config -out /tmp/sssd-softhsm2-certs-AS5UvA/test-root-CA-trusted-certificate-0001-request.pem 1035s + openssl req -text -noout -in /tmp/sssd-softhsm2-certs-AS5UvA/test-root-CA-trusted-certificate-0001-request.pem 1035s Certificate Request: 1035s Data: 1035s Version: 1 (0x0) 1035s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 1035s Subject Public Key Info: 1035s Public Key Algorithm: rsaEncryption 1035s Public-Key: (1024 bit) 1035s Modulus: 1035s 00:d5:8f:73:31:8d:15:1b:4c:73:1b:1e:d7:cb:7c: 1035s 10:6d:c6:79:a3:d0:d7:cd:a9:12:20:0a:d7:3d:5d: 1035s fc:02:09:94:60:d0:94:f8:4d:d6:ec:5b:6a:e3:62: 1035s 58:1e:a0:29:3a:b0:9e:b0:15:dc:df:17:04:dd:52: 1035s f3:b0:ac:68:87:a7:47:30:f0:dd:8d:21:db:bb:75: 1035s e0:f6:50:0f:86:e9:93:ae:95:c7:fd:a1:3f:6b:c6: 1035s 99:4d:16:72:a9:e6:32:92:70:a2:b5:01:ac:94:9d: 1035s fa:c5:28:5f:ec:86:bd:cd:50:23:a7:b6:f0:13:e4: 1035s 5b:b5:57:18:33:c4:a2:f7:b3 1035s Exponent: 65537 (0x10001) 1035s Attributes: 1035s Requested Extensions: 1035s X509v3 Basic Constraints: 1035s CA:FALSE 1035s Netscape Cert Type: 1035s SSL Client, S/MIME 1035s Netscape Comment: 1035s Test Organization Root CA trusted Certificate 1035s X509v3 Subject Key Identifier: 1035s 59:C9:88:D3:70:4D:16:C1:94:62:FF:EB:CD:16:C7:AF:E6:9E:DD:F7 1035s X509v3 Key Usage: critical 1035s Digital Signature, Non Repudiation, Key Encipherment 1035s X509v3 Extended Key Usage: 1035s TLS Web Client Authentication, E-mail Protection 1035s X509v3 Subject Alternative Name: 1035s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 1035s Signature Algorithm: sha256WithRSAEncryption 1035s Signature Value: 1035s 2a:60:88:8f:5a:1f:f4:57:fd:60:d3:b8:73:28:2c:ab:49:63: 1035s 7e:57:7d:64:d3:00:4b:52:71:90:59:ac:43:d2:b8:1d:a7:30: 1035s a1:81:3b:c8:6a:97:72:41:f2:8d:77:f2:53:dd:c8:24:62:af: 1035s de:dc:d0:11:99:94:ad:29:eb:33:c9:84:c0:67:e7:96:f8:f7: 1035s 08:43:65:68:0e:1f:de:95:e9:e9:53:87:4a:2b:ee:f1:5e:4a: 1035s 00:bc:f5:9e:c1:f1:e5:13:71:59:f2:7c:50:04:53:45:19:14: 1035s df:3d:fa:8a:06:05:24:54:25:e9:0f:3f:92:c0:63:41:7c:43: 1035s f1:a4 1035s + openssl ca -batch -notext -config /tmp/sssd-softhsm2-certs-AS5UvA/test-root-CA.config -passin pass:random-root-CA-password-21324 -keyfile /tmp/sssd-softhsm2-certs-AS5UvA/test-root-CA-key.pem -in /tmp/sssd-softhsm2-certs-AS5UvA/test-root-CA-trusted-certificate-0001-request.pem -days 365 -extensions usr_cert -out /tmp/sssd-softhsm2-certs-AS5UvA/test-root-CA-trusted-certificate-0001.pem 1035s Using configuration from /tmp/sssd-softhsm2-certs-AS5UvA/test-root-CA.config 1035s Check that the request matches the signature 1035s Signature ok 1035s Certificate Details: 1035s Serial Number: 3 (0x3) 1035s Validity 1035s Not Before: Mar 10 09:33:02 2024 GMT 1035s Not After : Mar 10 09:33:02 2025 GMT 1035s Subject: 1035s organizationName = Test Organization 1035s organizationalUnitName = Test Organization Unit 1035s commonName = Test Organization Root Trusted Certificate 0001 1035s X509v3 extensions: 1035s X509v3 Authority Key Identifier: 1035s E0:51:EB:35:19:5E:1B:36:C3:C5:63:09:56:01:CB:BF:C8:8E:87:D2 1035s X509v3 Basic Constraints: 1035s CA:FALSE 1035s Netscape Cert Type: 1035s SSL Client, S/MIME 1035s Netscape Comment: 1035s Test Organization Root CA trusted Certificate 1035s X509v3 Subject Key Identifier: 1035s 59:C9:88:D3:70:4D:16:C1:94:62:FF:EB:CD:16:C7:AF:E6:9E:DD:F7 1035s X509v3 Key Usage: critical 1035s Digital Signature, Non Repudiation, Key Encipherment 1035s X509v3 Extended Key Usage: 1035s TLS Web Client Authentication, E-mail Protection 1035s X509v3 Subject Alternative Name: 1035s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 1035s Certificate is to be certified until Mar 10 09:33:02 2025 GMT (365 days) 1035s 1035s Write out database with 1 new entries 1035s Database updated 1035s + openssl x509 -noout -in /tmp/sssd-softhsm2-certs-AS5UvA/test-root-CA-trusted-certificate-0001.pem 1035s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-AS5UvA/test-root-CA.pem /tmp/sssd-softhsm2-certs-AS5UvA/test-root-CA-trusted-certificate-0001.pem 1035s /tmp/sssd-softhsm2-certs-AS5UvA/test-root-CA-trusted-certificate-0001.pem: OK 1035s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-certs-AS5UvA/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-AS5UvA/test-root-CA-trusted-certificate-0001.pem 1035s + local cmd=openssl 1035s + shift 1035s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-AS5UvA/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-AS5UvA/test-root-CA-trusted-certificate-0001.pem 1035s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 1035s error 20 at 0 depth lookup: unable to get local issuer certificate 1035s error /tmp/sssd-softhsm2-certs-AS5UvA/test-root-CA-trusted-certificate-0001.pem: verification failed 1035s + cat 1035s + intermediate_ca_trusted_cert_0001_key_pass=pass:random-intermediate-ca-trusted-cert-0001-3115 1035s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-certs-AS5UvA/test-intermediate-CA-trusted-certificate-0001-key.pem -passout pass:random-intermediate-ca-trusted-cert-0001-3115 1024 1035s + openssl req -new -nodes -reqexts req_exts -passin pass:random-intermediate-ca-trusted-cert-0001-3115 -key /tmp/sssd-softhsm2-certs-AS5UvA/test-intermediate-CA-trusted-certificate-0001-key.pem -config /tmp/sssd-softhsm2-certs-AS5UvA/test-intermediate-CA-trusted-certificate-0001.config -out /tmp/sssd-softhsm2-certs-AS5UvA/test-intermediate-CA-trusted-certificate-0001-request.pem 1035s + openssl req -text -noout -in /tmp/sssd-softhsm2-certs-AS5UvA/test-intermediate-CA-trusted-certificate-0001-request.pem 1035s Certificate Request: 1035s Data: 1035s Version: 1 (0x0) 1035s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 1035s Subject Public Key Info: 1035s Public Key Algorithm: rsaEncryption 1035s Public-Key: (1024 bit) 1035s Modulus: 1035s 00:dc:3f:a0:ee:15:94:2c:ce:27:7b:47:e6:75:fc: 1035s a0:5b:0e:11:93:6b:bd:31:15:90:2e:1d:ad:40:16: 1035s 0d:77:9a:85:03:aa:8c:43:f5:47:60:1f:52:1e:f3: 1035s 62:00:52:37:5f:92:3e:7c:ce:b0:e5:c2:4e:63:86: 1035s 7a:16:43:fe:d4:96:88:d1:a9:27:57:e4:f8:8f:8d: 1035s c6:4f:c1:6c:7d:5a:c0:0e:e0:dd:e5:f6:80:68:ed: 1035s 50:56:9e:82:e7:81:ea:26:5a:0f:39:1d:4b:5d:fc: 1035s b5:79:99:a5:44:e8:a8:c5:10:f1:e4:9c:f7:0d:6e: 1035s b2:f9:3a:c1:3e:a5:f7:da:0d 1035s Exponent: 65537 (0x10001) 1035s Attributes: 1035s Requested Extensions: 1035s X509v3 Basic Constraints: 1035s CA:FALSE 1035s Netscape Cert Type: 1035s SSL Client, S/MIME 1035s Netscape Comment: 1035s Test Organization Intermediate CA trusted Certificate 1035s X509v3 Subject Key Identifier: 1035s 81:8F:C9:EC:21:DF:82:2A:4A:BB:E0:25:C6:D2:B4:AE:8E:9D:8F:F2 1035s X509v3 Key Usage: critical 1035s Digital Signature, Non Repudiation, Key Encipherment 1035s X509v3 Extended Key Usage: 1035s TLS Web Client Authentication, E-mail Protection 1035s X509v3 Subject Alternative Name: 1035s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 1035s Signature Algorithm: sha256WithRSAEncryption 1035s Signature Value: 1035s b6:73:1c:4c:f1:24:70:84:a2:92:e6:f6:49:74:f0:e5:7d:f9: 1035s 86:df:0e:b4:d8:8c:87:34:a4:f1:74:f7:28:54:23:c5:6b:3a: 1035s a6:f1:3e:93:12:37:f4:fa:e9:34:02:2f:61:7f:6d:42:c9:75: 1035s 63:37:73:7d:91:f0:be:00:8c:3b:06:f0:2a:26:d6:24:e9:e7: 1035s bc:b2:07:2c:c3:14:c6:dc:51:73:b6:b9:98:9c:a7:64:fd:9e: 1035s 84:6c:a4:56:d3:d3:00:97:a1:b1:1d:b1:e6:1e:f9:e6:97:f3: 1035s c1:02:78:32:ce:63:9e:52:96:46:e9:ef:81:da:fe:90:46:83: 1035s 76:4e 1035s + openssl ca -passin pass:random-intermediate-CA-password-20195 -config /tmp/sssd-softhsm2-certs-AS5UvA/test-intermediate-CA.config -batch -notext -keyfile /tmp/sssd-softhsm2-certs-AS5UvA/test-intermediate-CA-key.pem -in /tmp/sssd-softhsm2-certs-AS5UvA/test-intermediate-CA-trusted-certificate-0001-request.pem -days 365 -extensions usr_cert -out /tmp/sssd-softhsm2-certs-AS5UvA/test-intermediate-CA-trusted-certificate-0001.pem 1035s Using configuration from /tmp/sssd-softhsm2-certs-AS5UvA/test-intermediate-CA.config 1035s Check that the request matches the signature 1035s Signature ok 1035s Certificate Details: 1035s Serial Number: 4 (0x4) 1035s Validity 1035s Not Before: Mar 10 09:33:02 2024 GMT 1035s Not After : Mar 10 09:33:02 2025 GMT 1035s Subject: 1035s organizationName = Test Organization 1035s organizationalUnitName = Test Organization Unit 1035s commonName = Test Organization Intermediate Trusted Certificate 0001 1035s X509v3 extensions: 1035s X509v3 Authority Key Identifier: 1035s 84:25:1A:20:9E:D5:85:94:0F:25:38:43:BD:8C:90:65:2F:F7:02:17 1035s X509v3 Basic Constraints: 1035s CA:FALSE 1035s Netscape Cert Type: 1035s SSL Client, S/MIME 1035s Netscape Comment: 1035s Test Organization Intermediate CA trusted Certificate 1035s X509v3 Subject Key Identifier: 1035s 81:8F:C9:EC:21:DF:82:2A:4A:BB:E0:25:C6:D2:B4:AE:8E:9D:8F:F2 1035s X509v3 Key Usage: critical 1035s Digital Signature, Non Repudiation, Key Encipherment 1035s X509v3 Extended Key Usage: 1035s TLS Web Client Authentication, E-mail Protection 1035s X509v3 Subject Alternative Name: 1035s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 1035s Certificate is to be certified until Mar 10 09:33:02 2025 GMT (365 days) 1035s 1035s Write out database with 1 new entries 1035s Database updated 1035s + openssl x509 -noout -in /tmp/sssd-softhsm2-certs-AS5UvA/test-intermediate-CA-trusted-certificate-0001.pem 1035s This certificate should not be trusted fully 1035s + echo 'This certificate should not be trusted fully' 1035s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-certs-AS5UvA/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-AS5UvA/test-intermediate-CA-trusted-certificate-0001.pem 1035s + local cmd=openssl 1035s + shift 1035s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-AS5UvA/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-AS5UvA/test-intermediate-CA-trusted-certificate-0001.pem 1035s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 1035s error 2 at 1 depth lookup: unable to get issuer certificate 1035s error /tmp/sssd-softhsm2-certs-AS5UvA/test-intermediate-CA-trusted-certificate-0001.pem: verification failed 1035s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-certs-AS5UvA/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-AS5UvA/test-intermediate-CA-trusted-certificate-0001.pem 1035s /tmp/sssd-softhsm2-certs-AS5UvA/test-intermediate-CA-trusted-certificate-0001.pem: OK 1035s + cat 1035s + sub_intermediate_ca_trusted_cert_0001_key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-29186 1035s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-certs-AS5UvA/test-sub-intermediate-CA-trusted-certificate-0001-key.pem -passout pass:random-sub-intermediate-ca-trusted-cert-0001-29186 1024 1035s + openssl req -new -nodes -reqexts req_exts -passin pass:random-sub-intermediate-ca-trusted-cert-0001-29186 -key /tmp/sssd-softhsm2-certs-AS5UvA/test-sub-intermediate-CA-trusted-certificate-0001-key.pem -config /tmp/sssd-softhsm2-certs-AS5UvA/test-sub-intermediate-CA-trusted-certificate-0001.config -out /tmp/sssd-softhsm2-certs-AS5UvA/test-sub-intermediate-CA-trusted-certificate-0001-request.pem 1035s + openssl req -text -noout -in /tmp/sssd-softhsm2-certs-AS5UvA/test-sub-intermediate-CA-trusted-certificate-0001-request.pem 1035s Certificate Request: 1035s Data: 1035s Version: 1 (0x0) 1035s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 1035s Subject Public Key Info: 1035s Public Key Algorithm: rsaEncryption 1035s Public-Key: (1024 bit) 1035s Modulus: 1035s 00:99:69:3c:d2:17:b9:e1:d3:bb:e4:c9:dc:d3:cb: 1035s fe:47:ff:4a:76:94:f1:fc:3e:bc:c5:45:79:c4:83: 1035s 09:cd:1b:9c:ef:e3:1b:49:00:3e:8d:0b:e6:2b:67: 1035s 99:73:41:bf:d5:4f:51:3f:6a:cb:e7:29:cf:72:cf: 1035s fb:86:5d:6a:15:d1:fb:49:92:e0:99:d2:7f:f7:12: 1035s 13:54:8c:27:c9:1c:0f:b6:60:97:31:60:a7:aa:de: 1035s 93:92:10:b6:f6:f3:a0:f7:fe:9a:2b:1e:52:4e:63: 1035s ac:e6:b6:16:1b:a1:87:52:49:0a:b8:88:cf:a0:f5: 1035s 2d:47:63:9d:be:66:a8:57:e3 1035s Exponent: 65537 (0x10001) 1035s Attributes: 1035s Requested Extensions: 1035s X509v3 Basic Constraints: 1035s CA:FALSE 1035s Netscape Cert Type: 1035s SSL Client, S/MIME 1035s Netscape Comment: 1035s Test Organization Sub Intermediate CA trusted Certificate 1035s X509v3 Subject Key Identifier: 1035s 59:59:F5:4E:81:69:22:D5:CE:0F:41:34:3C:B2:CE:FF:A3:74:73:2D 1035s X509v3 Key Usage: critical 1035s Digital Signature, Non Repudiation, Key Encipherment 1035s X509v3 Extended Key Usage: 1035s TLS Web Client Authentication, E-mail Protection 1035s X509v3 Subject Alternative Name: 1035s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 1035s Signature Algorithm: sha256WithRSAEncryption 1035s Signature Value: 1035s 5d:7b:d1:9c:34:a5:7b:99:82:a4:87:97:fb:56:2e:e6:6f:21: 1035s fd:22:3d:04:e2:b5:23:a8:3d:9f:1f:ad:64:68:ef:af:90:57: 1035s db:b5:4f:ba:bc:73:5b:b6:66:25:8b:6d:bc:b2:51:6c:99:4b: 1035s d9:25:75:8b:2e:65:af:31:dc:91:ad:e3:2d:1e:8a:75:64:b6: 1035s 2b:fa:07:52:ec:de:23:4a:7e:09:29:0b:83:c6:a1:b3:c2:69: 1035s 8c:9e:c4:2f:24:8a:4c:20:c5:c8:cc:cc:7f:35:c0:bb:01:d3: 1035s 8b:3e:3b:e5:ed:17:02:6c:5b:eb:d3:66:af:fe:af:73:a8:28: 1035s f2:3d 1035s + openssl ca -passin pass:random-sub-intermediate-CA-password-21923 -config /tmp/sssd-softhsm2-certs-AS5UvA/test-sub-intermediate-CA.config -batch -notext -keyfile /tmp/sssd-softhsm2-certs-AS5UvA/test-sub-intermediate-CA-key.pem -in /tmp/sssd-softhsm2-certs-AS5UvA/test-sub-intermediate-CA-trusted-certificate-0001-request.pem -days 365 -extensions usr_cert -out /tmp/sssd-softhsm2-certs-AS5UvA/test-sub-intermediate-CA-trusted-certificate-0001.pem 1035s Using configuration from /tmp/sssd-softhsm2-certs-AS5UvA/test-sub-intermediate-CA.config 1035s Check that the request matches the signature 1035s Signature ok 1035s Certificate Details: 1035s Serial Number: 5 (0x5) 1035s Validity 1035s Not Before: Mar 10 09:33:02 2024 GMT 1035s Not After : Mar 10 09:33:02 2025 GMT 1035s Subject: 1035s organizationName = Test Organization 1035s organizationalUnitName = Test Organization Unit 1035s commonName = Test Organization Sub Intermediate Trusted Certificate 0001 1035s X509v3 extensions: 1035s X509v3 Authority Key Identifier: 1035s DF:9A:38:A8:0A:EE:FC:9F:E1:D5:3F:0C:5F:EE:9C:45:A1:D1:B4:CB 1035s X509v3 Basic Constraints: 1035s CA:FALSE 1035s Netscape Cert Type: 1035s SSL Client, S/MIME 1035s Netscape Comment: 1035s Test Organization Sub Intermediate CA trusted Certificate 1035s X509v3 Subject Key Identifier: 1035s 59:59:F5:4E:81:69:22:D5:CE:0F:41:34:3C:B2:CE:FF:A3:74:73:2D 1035s X509v3 Key Usage: critical 1035s Digital Signature, Non Repudiation, Key Encipherment 1035s X509v3 Extended Key Usage: 1035s TLS Web Client Authentication, E-mail Protection 1035s X509v3 Subject Alternative Name: 1035s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 1035s Certificate is to be certified until Mar 10 09:33:02 2025 GMT (365 days) 1035s 1035s Write out database with 1 new entries 1035s Database updated 1035s + openssl x509 -noout -in /tmp/sssd-softhsm2-certs-AS5UvA/test-sub-intermediate-CA-trusted-certificate-0001.pem 1035s + echo 'This certificate should not be trusted fully' 1035s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-certs-AS5UvA/test-sub-intermediate-CA.pem /tmp/sssd-softhsm2-certs-AS5UvA/test-sub-intermediate-CA-trusted-certificate-0001.pem 1035s + local cmd=openssl 1035s + shift 1035s This certificate should not be trusted fully 1035s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-AS5UvA/test-sub-intermediate-CA.pem /tmp/sssd-softhsm2-certs-AS5UvA/test-sub-intermediate-CA-trusted-certificate-0001.pem 1035s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 1035s error 2 at 1 depth lookup: unable to get issuer certificate 1035s error /tmp/sssd-softhsm2-certs-AS5UvA/test-sub-intermediate-CA-trusted-certificate-0001.pem: verification failed 1035s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-certs-AS5UvA/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-AS5UvA/test-sub-intermediate-CA-trusted-certificate-0001.pem 1035s + local cmd=openssl 1035s + shift 1035s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-AS5UvA/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-AS5UvA/test-sub-intermediate-CA-trusted-certificate-0001.pem 1035s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 1035s error 20 at 0 depth lookup: unable to get local issuer certificate 1035s error /tmp/sssd-softhsm2-certs-AS5UvA/test-sub-intermediate-CA-trusted-certificate-0001.pem: verification failed 1035s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-certs-AS5UvA/test-sub-intermediate-CA.pem /tmp/sssd-softhsm2-certs-AS5UvA/test-sub-intermediate-CA-trusted-certificate-0001.pem 1035s /tmp/sssd-softhsm2-certs-AS5UvA/test-sub-intermediate-CA-trusted-certificate-0001.pem: OK 1035s + expect_fail openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-certs-AS5UvA/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-AS5UvA/test-sub-intermediate-CA-trusted-certificate-0001.pem 1035s + local cmd=openssl 1035s + shift 1035s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-certs-AS5UvA/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-AS5UvA/test-sub-intermediate-CA-trusted-certificate-0001.pem 1035s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 1035s error 20 at 0 depth lookup: unable to get local issuer certificate 1035s error /tmp/sssd-softhsm2-certs-AS5UvA/test-sub-intermediate-CA-trusted-certificate-0001.pem: verification failed 1035s + echo 'Building a the full-chain CA file...' 1035s + cat /tmp/sssd-softhsm2-certs-AS5UvA/test-root-CA.pem /tmp/sssd-softhsm2-certs-AS5UvA/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-AS5UvA/test-sub-intermediate-CA.pem 1035s Building a the full-chain CA file... 1035s + cat /tmp/sssd-softhsm2-certs-AS5UvA/test-root-CA.pem /tmp/sssd-softhsm2-certs-AS5UvA/test-intermediate-CA.pem 1035s + cat /tmp/sssd-softhsm2-certs-AS5UvA/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-AS5UvA/test-sub-intermediate-CA.pem 1035s + openssl crl2pkcs7 -nocrl -certfile /tmp/sssd-softhsm2-certs-AS5UvA/test-full-chain-CA.pem 1035s + openssl pkcs7 -print_certs -noout 1035s subject=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 1035s issuer=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 1035s 1035s subject=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 1035s issuer=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 1035s 1035s subject=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 1035s issuer=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 1035s 1035s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-AS5UvA/test-full-chain-CA.pem /tmp/sssd-softhsm2-certs-AS5UvA/test-intermediate-CA.pem 1035s /tmp/sssd-softhsm2-certs-AS5UvA/test-intermediate-CA.pem: OK 1035s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-AS5UvA/test-full-chain-CA.pem /tmp/sssd-softhsm2-certs-AS5UvA/test-root-CA-trusted-certificate-0001.pem 1035s /tmp/sssd-softhsm2-certs-AS5UvA/test-root-CA-trusted-certificate-0001.pem: OK 1035s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-AS5UvA/test-full-chain-CA.pem /tmp/sssd-softhsm2-certs-AS5UvA/test-intermediate-CA-trusted-certificate-0001.pem 1035s /tmp/sssd-softhsm2-certs-AS5UvA/test-intermediate-CA-trusted-certificate-0001.pem: OK 1035s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-AS5UvA/test-full-chain-CA.pem /tmp/sssd-softhsm2-certs-AS5UvA/test-root-intermediate-chain-CA.pem 1035s /tmp/sssd-softhsm2-certs-AS5UvA/test-root-intermediate-chain-CA.pem: OK 1035s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-AS5UvA/test-full-chain-CA.pem /tmp/sssd-softhsm2-certs-AS5UvA/test-sub-intermediate-CA-trusted-certificate-0001.pem 1035s /tmp/sssd-softhsm2-certs-AS5UvA/test-sub-intermediate-CA-trusted-certificate-0001.pem: OK 1035s Certificates generation completed! 1035s + echo 'Certificates generation completed!' 1035s + [[ -v NO_SSSD_TESTS ]] 1035s + [[ -v GENERATE_SMART_CARDS ]] 1035s + prepare_softhsm2_card /tmp/sssd-softhsm2-certs-AS5UvA/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-21540 1035s + local certificate=/tmp/sssd-softhsm2-certs-AS5UvA/test-root-CA-trusted-certificate-0001.pem 1035s + local key_pass=pass:random-root-ca-trusted-cert-0001-21540 1035s + local key_cn 1035s + local key_name 1035s + local tokens_dir 1035s + local output_cert_file 1035s + token_name= 1035s ++ basename /tmp/sssd-softhsm2-certs-AS5UvA/test-root-CA-trusted-certificate-0001.pem .pem 1035s + key_name=test-root-CA-trusted-certificate-0001 1035s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-certs-AS5UvA/test-root-CA-trusted-certificate-0001.pem 1035s ++ sed -n 's/ *commonName *= //p' 1035s + key_cn='Test Organization Root Trusted Certificate 0001' 1035s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 1035s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-certs-AS5UvA/softhsm2-test-root-CA-trusted-certificate-0001.conf 1035s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-certs-AS5UvA/softhsm2-test-root-CA-trusted-certificate-0001.conf 1035s ++ basename /tmp/sssd-softhsm2-certs-AS5UvA/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 1035s + tokens_dir=/tmp/sssd-softhsm2-certs-AS5UvA/softhsm2-test-root-CA-trusted-certificate-0001 1035s + token_name='Test Organization Root Tr Token' 1035s + '[' '!' -e /tmp/sssd-softhsm2-certs-AS5UvA/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 1035s + local key_file 1036s + local decrypted_key 1036s + mkdir -p /tmp/sssd-softhsm2-certs-AS5UvA/softhsm2-test-root-CA-trusted-certificate-0001 1036s + key_file=/tmp/sssd-softhsm2-certs-AS5UvA/test-root-CA-trusted-certificate-0001-key.pem 1036s + decrypted_key=/tmp/sssd-softhsm2-certs-AS5UvA/test-root-CA-trusted-certificate-0001-key-decrypted.pem 1036s + cat 1036s + softhsm2-util --init-token --label 'Test Organization Root Tr Token' --pin 123456 --so-pin 123456 --free 1036s Slot 0 has a free/uninitialized token. 1036s The token has been initialized and is reassigned to slot 1178328864 1036s + softhsm2-util --show-slots 1036s Available slots: 1036s Slot 1178328864 1036s Slot info: 1036s Description: SoftHSM slot ID 0x463bdf20 1036s Manufacturer ID: SoftHSM project 1036s Hardware version: 2.6 1036s Firmware version: 2.6 1036s Token present: yes 1036s Token info: 1036s Manufacturer ID: SoftHSM project 1036s Model: SoftHSM v2 1036s Hardware version: 2.6 1036s Firmware version: 2.6 1036s Serial number: 9d978c12463bdf20 1036s Initialized: yes 1036s User PIN init.: yes 1036s Label: Test Organization Root Tr Token 1036s Slot 1 1036s Slot info: 1036s Description: SoftHSM slot ID 0x1 1036s Manufacturer ID: SoftHSM project 1036s Hardware version: 2.6 1036s Firmware version: 2.6 1036s Token present: yes 1036s Token info: 1036s Manufacturer ID: SoftHSM project 1036s Model: SoftHSM v2 1036s Hardware version: 2.6 1036s Firmware version: 2.6 1036s Serial number: 1036s Initialized: no 1036s User PIN init.: no 1036s Label: 1036s + p11tool --provider=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --write --no-mark-private --load-certificate=/tmp/sssd-softhsm2-certs-AS5UvA/test-root-CA-trusted-certificate-0001.pem --login --set-pin=123456 --label 'Test Organization Root Trusted Certificate 0001' --id 00112233445566778899FFAABBCCDDEEFF012345 1036s + openssl rsa -passin pass:random-root-ca-trusted-cert-0001-21540 -in /tmp/sssd-softhsm2-certs-AS5UvA/test-root-CA-trusted-certificate-0001-key.pem -out /tmp/sssd-softhsm2-certs-AS5UvA/test-root-CA-trusted-certificate-0001-key-decrypted.pem 1036s writing RSA key 1036s + p11tool --provider=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --write --load-privkey=/tmp/sssd-softhsm2-certs-AS5UvA/test-root-CA-trusted-certificate-0001-key-decrypted.pem --login --set-pin=123456 --label 'Test Organization Root Trusted Certificate 0001 Key' --id 00112233445566778899FFAABBCCDDEEFF012345 1036s + rm /tmp/sssd-softhsm2-certs-AS5UvA/test-root-CA-trusted-certificate-0001-key-decrypted.pem 1036s + p11tool --provider=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --list-all 1036s Object 0: 1036s URL: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=9d978c12463bdf20;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert 1036s Type: X.509 Certificate (RSA-1024) 1036s Expires: Mon Mar 10 09:33:02 2025 1036s Label: Test Organization Root Trusted Certificate 0001 1036s ID: 00:11:22:33:44:55:66:77:88:99:ff:aa:bb:cc:dd:ee:ff:01:23:45 1036s 1036s Test Organization Root Tr Token 1036s + echo 'Test Organization Root Tr Token' 1036s + prepare_softhsm2_card /tmp/sssd-softhsm2-certs-AS5UvA/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-3115 1036s + local certificate=/tmp/sssd-softhsm2-certs-AS5UvA/test-intermediate-CA-trusted-certificate-0001.pem 1036s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-3115 1036s + local key_cn 1036s + local key_name 1036s + local tokens_dir 1036s + local output_cert_file 1036s + token_name= 1036s ++ basename /tmp/sssd-softhsm2-certs-AS5UvA/test-intermediate-CA-trusted-certificate-0001.pem .pem 1036s + key_name=test-intermediate-CA-trusted-certificate-0001 1036s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-certs-AS5UvA/test-intermediate-CA-trusted-certificate-0001.pem 1036s ++ sed -n 's/ *commonName *= //p' 1036s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 1036s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 1036s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-certs-AS5UvA/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 1036s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-certs-AS5UvA/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 1036s ++ basename /tmp/sssd-softhsm2-certs-AS5UvA/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 1036s + tokens_dir=/tmp/sssd-softhsm2-certs-AS5UvA/softhsm2-test-intermediate-CA-trusted-certificate-0001 1036s + token_name='Test Organization Interme Token' 1036s + '[' '!' -e /tmp/sssd-softhsm2-certs-AS5UvA/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 1036s + local key_file 1036s + local decrypted_key 1036s + mkdir -p /tmp/sssd-softhsm2-certs-AS5UvA/softhsm2-test-intermediate-CA-trusted-certificate-0001 1036s + key_file=/tmp/sssd-softhsm2-certs-AS5UvA/test-intermediate-CA-trusted-certificate-0001-key.pem 1036s + decrypted_key=/tmp/sssd-softhsm2-certs-AS5UvA/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 1036s + cat 1036s + softhsm2-util --init-token --label 'Test Organization Interme Token' --pin 123456 --so-pin 123456 --free 1036s Slot 0 has a free/uninitialized token. 1036s The token has been initialized and is reassigned to slot 206983203 1036s + softhsm2-util --show-slots 1036s Available slots: 1036s Slot 206983203 1036s Slot info: 1036s Description: SoftHSM slot ID 0xc565023 1036s Manufacturer ID: SoftHSM project 1036s Hardware version: 2.6 1036s Firmware version: 2.6 1036s Token present: yes 1036s Token info: 1036s Manufacturer ID: SoftHSM project 1036s Model: SoftHSM v2 1036s Hardware version: 2.6 1036s Firmware version: 2.6 1036s Serial number: 2220361c8c565023 1036s Initialized: yes 1036s User PIN init.: yes 1036s Label: Test Organization Interme Token 1036s Slot 1 1036s Slot info: 1036s Description: SoftHSM slot ID 0x1 1036s Manufacturer ID: SoftHSM project 1036s Hardware version: 2.6 1036s Firmware version: 2.6 1036s Token present: yes 1036s Token info: 1036s Manufacturer ID: SoftHSM project 1036s Model: SoftHSM v2 1036s Hardware version: 2.6 1036s Firmware version: 2.6 1036s Serial number: 1036s Initialized: no 1036s User PIN init.: no 1036s Label: 1036s + p11tool --provider=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --write --no-mark-private --load-certificate=/tmp/sssd-softhsm2-certs-AS5UvA/test-intermediate-CA-trusted-certificate-0001.pem --login --set-pin=123456 --label 'Test Organization Intermediate Trusted Certificate 0001' --id 00112233445566778899FFAABBCCDDEEFF012345 1036s + openssl rsa -passin pass:random-intermediate-ca-trusted-cert-0001-3115 -in /tmp/sssd-softhsm2-certs-AS5UvA/test-intermediate-CA-trusted-certificate-0001-key.pem -out /tmp/sssd-softhsm2-certs-AS5UvA/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 1036s writing RSA key 1036s + p11tool --provider=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --write --load-privkey=/tmp/sssd-softhsm2-certs-AS5UvA/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem --login --set-pin=123456 --label 'Test Organization Intermediate Trusted Certificate 0001 Key' --id 00112233445566778899FFAABBCCDDEEFF012345 1036s + rm /tmp/sssd-softhsm2-certs-AS5UvA/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 1036s + p11tool --provider=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --list-all 1036s Object 0: 1036s URL: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=2220361c8c565023;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert 1036s Type: X.509 Certificate (RSA-1024) 1036s Expires: Mon Mar 10 09:33:02 2025 1036s Label: Test Organization Intermediate Trusted Certificate 0001 1036s ID: 00:11:22:33:44:55:66:77:88:99:ff:aa:bb:cc:dd:ee:ff:01:23:45 1036s 1036s Test Organization Interme Token 1036s + echo 'Test Organization Interme Token' 1036s + prepare_softhsm2_card /tmp/sssd-softhsm2-certs-AS5UvA/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-29186 1036s + local certificate=/tmp/sssd-softhsm2-certs-AS5UvA/test-sub-intermediate-CA-trusted-certificate-0001.pem 1036s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-29186 1036s + local key_cn 1036s + local key_name 1036s + local tokens_dir 1036s + local output_cert_file 1036s + token_name= 1036s ++ basename /tmp/sssd-softhsm2-certs-AS5UvA/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 1036s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 1036s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-certs-AS5UvA/test-sub-intermediate-CA-trusted-certificate-0001.pem 1036s ++ sed -n 's/ *commonName *= //p' 1036s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 1036s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 1036s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-certs-AS5UvA/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 1036s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-certs-AS5UvA/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 1036s ++ basename /tmp/sssd-softhsm2-certs-AS5UvA/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 1036s + tokens_dir=/tmp/sssd-softhsm2-certs-AS5UvA/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 1036s + token_name='Test Organization Sub Int Token' 1036s + '[' '!' -e /tmp/sssd-softhsm2-certs-AS5UvA/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 1036s + local key_file 1036s + local decrypted_key 1036s + mkdir -p /tmp/sssd-softhsm2-certs-AS5UvA/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 1036s + key_file=/tmp/sssd-softhsm2-certs-AS5UvA/test-sub-intermediate-CA-trusted-certificate-0001-key.pem 1036s + decrypted_key=/tmp/sssd-softhsm2-certs-AS5UvA/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 1036s + cat 1036s + softhsm2-util --init-token --label 'Test Organization Sub Int Token' --pin 123456 --so-pin 123456 --free 1036s Slot 0 has a free/uninitialized token. 1036s The token has been initialized and is reassigned to slot 1300080667 1036s + softhsm2-util --show-slots 1036s Available slots: 1036s Slot 1300080667 1036s Slot info: 1036s Description: SoftHSM slot ID 0x4d7da81b 1036s Manufacturer ID: SoftHSM project 1036s Hardware version: 2.6 1036s Firmware version: 2.6 1036s Token present: yes 1036s Token info: 1036s Manufacturer ID: SoftHSM project 1036s Model: SoftHSM v2 1036s Hardware version: 2.6 1036s Firmware version: 2.6 1036s Serial number: 9ebf08dccd7da81b 1036s Initialized: yes 1036s User PIN init.: yes 1036s Label: Test Organization Sub Int Token 1036s Slot 1 1036s Slot info: 1036s Description: SoftHSM slot ID 0x1 1036s Manufacturer ID: SoftHSM project 1036s Hardware version: 2.6 1036s Firmware version: 2.6 1036s Token present: yes 1036s Token info: 1036s Manufacturer ID: SoftHSM project 1036s Model: SoftHSM v2 1036s Hardware version: 2.6 1036s Firmware version: 2.6 1036s Serial number: 1036s Initialized: no 1036s User PIN init.: no 1036s Label: 1036s + p11tool --provider=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --write --no-mark-private --load-certificate=/tmp/sssd-softhsm2-certs-AS5UvA/test-sub-intermediate-CA-trusted-certificate-0001.pem --login --set-pin=123456 --label 'Test Organization Sub Intermediate Trusted Certificate 0001' --id 00112233445566778899FFAABBCCDDEEFF012345 1036s + openssl rsa -passin pass:random-sub-intermediate-ca-trusted-cert-0001-29186 -in /tmp/sssd-softhsm2-certs-AS5UvA/test-sub-intermediate-CA-trusted-certificate-0001-key.pem -out /tmp/sssd-softhsm2-certs-AS5UvA/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 1036s writing RSA key 1036s + p11tool --provider=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --write --load-privkey=/tmp/sssd-softhsm2-certs-AS5UvA/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem --login --set-pin=123456 --label 'Test Organization Sub Intermediate Trusted Certificate 0001 Key' --id 00112233445566778899FFAABBCCDDEEFF012345 1036s + rm /tmp/sssd-softhsm2-certs-AS5UvA/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 1036s + p11tool --provider=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --list-all 1036s Object 0: 1036s URL: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=9ebf08dccd7da81b;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert 1036s Type: X.509 Certificate (RSA-1024) 1036s Expires: Mon Mar 10 09:33:02 2025 1036s Label: Test Organization Sub Intermediate Trusted Certificate 0001 1036s ID: 00:11:22:33:44:55:66:77:88:99:ff:aa:bb:cc:dd:ee:ff:01:23:45 1036s 1036s Test Organization Sub Int Token 1036s Certificates generation completed! 1036s + echo 'Test Organization Sub Int Token' 1036s + echo 'Certificates generation completed!' 1036s + exit 0 1036s + find /tmp/sssd-softhsm2-certs-AS5UvA -type d -exec chmod 777 '{}' ';' 1036s + find /tmp/sssd-softhsm2-certs-AS5UvA -type f -exec chmod 666 '{}' ';' 1036s + backup_file /etc/sssd/sssd.conf 1036s + '[' -z '' ']' 1036s ++ mktemp -d -t sssd-softhsm2-backups-XXXXXX 1036s + backupsdir=/tmp/sssd-softhsm2-backups-Rm5DpK 1036s + '[' -e /etc/sssd/sssd.conf ']' 1036s + delete_paths+=("$1") 1036s + rm -f /etc/sssd/sssd.conf 1036s ++ runuser -u ubuntu -- sh -c 'echo ~' 1036s + user_home=/home/ubuntu 1036s + mkdir -p /home/ubuntu 1036s + chown ubuntu:ubuntu /home/ubuntu 1036s ++ runuser -u ubuntu -- sh -c 'echo ${XDG_CONFIG_HOME:-~/.config}' 1036s + user_config=/home/ubuntu/.config 1036s + system_config=/etc 1036s + softhsm2_conf_paths=("${AUTOPKGTEST_NORMAL_USER}:$user_config/softhsm2/softhsm2.conf" "root:$system_config/softhsm/softhsm2.conf") 1036s + for path_pair in "${softhsm2_conf_paths[@]}" 1036s + IFS=: 1036s + read -r -a path 1036s + path=/home/ubuntu/.config/softhsm2/softhsm2.conf 1036s + backup_file /home/ubuntu/.config/softhsm2/softhsm2.conf 1036s + '[' -z /tmp/sssd-softhsm2-backups-Rm5DpK ']' 1036s + '[' -e /home/ubuntu/.config/softhsm2/softhsm2.conf ']' 1036s + delete_paths+=("$1") 1036s + rm -f /home/ubuntu/.config/softhsm2/softhsm2.conf 1036s + for path_pair in "${softhsm2_conf_paths[@]}" 1036s + IFS=: 1036s + read -r -a path 1036s + path=/etc/softhsm/softhsm2.conf 1036s + backup_file /etc/softhsm/softhsm2.conf 1036s + '[' -z /tmp/sssd-softhsm2-backups-Rm5DpK ']' 1036s + '[' -e /etc/softhsm/softhsm2.conf ']' 1036s ++ dirname /etc/softhsm/softhsm2.conf 1036s + local back_dir=/tmp/sssd-softhsm2-backups-Rm5DpK//etc/softhsm 1036s ++ basename /etc/softhsm/softhsm2.conf 1036s + local back_path=/tmp/sssd-softhsm2-backups-Rm5DpK//etc/softhsm/softhsm2.conf 1036s + '[' '!' -e /tmp/sssd-softhsm2-backups-Rm5DpK//etc/softhsm/softhsm2.conf ']' 1036s + mkdir -p /tmp/sssd-softhsm2-backups-Rm5DpK//etc/softhsm 1036s + cp -a /etc/softhsm/softhsm2.conf /tmp/sssd-softhsm2-backups-Rm5DpK//etc/softhsm/softhsm2.conf 1036s + restore_paths+=("$back_path") 1036s + rm -f /etc/softhsm/softhsm2.conf 1036s + test_authentication login /tmp/sssd-softhsm2-certs-AS5UvA/softhsm2-test-root-CA-trusted-certificate-0001.conf /tmp/sssd-softhsm2-certs-AS5UvA/test-full-chain-CA.pem 1036s + pam_service=login 1036s + certificate_config=/tmp/sssd-softhsm2-certs-AS5UvA/softhsm2-test-root-CA-trusted-certificate-0001.conf 1036s + ca_db=/tmp/sssd-softhsm2-certs-AS5UvA/test-full-chain-CA.pem 1036s + verification_options= 1036s + mkdir -p -m 700 /etc/sssd 1036s Using CA DB '/tmp/sssd-softhsm2-certs-AS5UvA/test-full-chain-CA.pem' with verification options: '' 1036s + echo 'Using CA DB '\''/tmp/sssd-softhsm2-certs-AS5UvA/test-full-chain-CA.pem'\'' with verification options: '\'''\''' 1036s + cat 1036s + chmod 600 /etc/sssd/sssd.conf 1036s + for path_pair in "${softhsm2_conf_paths[@]}" 1036s + IFS=: 1036s + read -r -a path 1036s + user=ubuntu 1036s + path=/home/ubuntu/.config/softhsm2/softhsm2.conf 1036s ++ dirname /home/ubuntu/.config/softhsm2/softhsm2.conf 1036s + runuser -u ubuntu -- mkdir -p /home/ubuntu/.config/softhsm2 1036s + runuser -u ubuntu -- ln -sf /tmp/sssd-softhsm2-certs-AS5UvA/softhsm2-test-root-CA-trusted-certificate-0001.conf /home/ubuntu/.config/softhsm2/softhsm2.conf 1036s + runuser -u ubuntu -- softhsm2-util --show-slots 1036s + grep 'Test Organization' 1036s Label: Test Organization Root Tr Token 1036s + for path_pair in "${softhsm2_conf_paths[@]}" 1036s + IFS=: 1036s + read -r -a path 1036s + user=root 1036s + path=/etc/softhsm/softhsm2.conf 1036s ++ dirname /etc/softhsm/softhsm2.conf 1036s + runuser -u root -- mkdir -p /etc/softhsm 1036s + runuser -u root -- ln -sf /tmp/sssd-softhsm2-certs-AS5UvA/softhsm2-test-root-CA-trusted-certificate-0001.conf /etc/softhsm/softhsm2.conf 1036s + runuser -u root -- softhsm2-util --show-slots 1036s + grep 'Test Organization' 1036s Label: Test Organization Root Tr Token 1036s + systemctl restart sssd 1036s + pam-auth-update --disable sss-smart-card-optional sss-smart-card-required 1036s + for alternative in "${alternative_pam_configs[@]}" 1036s + pam-auth-update --enable sss-smart-card-optional 1036s + cat /etc/pam.d/common-auth 1036s # 1036s # /etc/pam.d/common-auth - authentication settings common to all services 1036s # 1036s # This file is included from other service-specific PAM config files, 1036s # and should contain a list of the authentication modules that define 1036s # the central authentication scheme for use on the system 1036s # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the 1036s # traditional Unix authentication mechanisms. 1036s # 1036s # As of pam 1.0.1-6, this file is managed by pam-auth-update by default. 1036s # To take advantage of this, it is recommended that you configure any 1036s # local modules either before or after the default block, and use 1036s # pam-auth-update to manage selection of other modules. See 1036s # pam-auth-update(8) for details. 1036s 1036s # here are the per-package modules (the "Primary" block) 1036s auth [success=3 default=ignore] pam_sss.so allow_missing_name try_cert_auth 1036s auth [success=2 default=ignore] pam_unix.so nullok try_first_pass 1036s auth [success=1 default=ignore] pam_sss.so use_first_pass 1036s # here's the fallback if no module succeeds 1036s auth requisite pam_deny.so 1036s # prime the stack with a positive return value if there isn't one already; 1036s # this avoids us returning an error just because nothing sets a success code 1036s # since the modules above will each just jump around 1036s auth required pam_permit.so 1036s # and here are more per-package modules (the "Additional" block) 1036s auth optional pam_cap.so 1036s # end of pam-auth-update config 1036s + echo -n -e 123456 1036s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 1036s pamtester: invoking pam_start(login, ubuntu, ...) 1036s pamtester: performing operation - authenticate 1036s PIN for Test Organization Root Tr Token: pamtester: successfully authenticated 1036s + echo -n -e 123456 1036s + runuser -u ubuntu -- pamtester -v login '' authenticate 1036s pamtester: invoking pam_start(login, , ...) 1036s pamtester: performing operation - authenticate 1036s PIN for Test Organization Root Tr Token: pamtester: successfully authenticated 1036s + echo -n -e wrong123456 1036s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 1036s pamtester: invoking pam_start(login, ubuntu, ...) 1036s pamtester: performing operation - authenticate 1039s PIN for Test Organization Root Tr Token: Password: pamtester: Authentication failure 1039s + echo -n -e wrong123456 1039s + runuser -u ubuntu -- pamtester -v login '' authenticate 1039s pamtester: invoking pam_start(login, , ...) 1039s pamtester: performing operation - authenticate 1042s PIN for Test Organization Root Tr Token: Password: pamtester: Authentication failure 1042s + echo -n -e 123456 1042s + pamtester -v login root authenticate 1042s pamtester: invoking pam_start(login, root, ...) 1042s pamtester: performing operation - authenticate 1046s Password: pamtester: Authentication failure 1046s + for alternative in "${alternative_pam_configs[@]}" 1046s + pam-auth-update --enable sss-smart-card-required 1046s PAM configuration 1046s ----------------- 1046s 1046s Incompatible PAM profiles selected. 1046s 1046s The following PAM profiles cannot be used together: 1046s 1046s SSS required smart card authentication, SSS optional smart card 1046s authentication 1046s 1046s Please select a different set of modules to enable. 1046s 1046s + cat /etc/pam.d/common-auth 1046s # 1046s # /etc/pam.d/common-auth - authentication settings common to all services 1046s # 1046s # This file is included from other service-specific PAM config files, 1046s # and should contain a list of the authentication modules that define 1046s # the central authentication scheme for use on the system 1046s # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the 1046s # traditional Unix authentication mechanisms. 1046s # 1046s # As of pam 1.0.1-6, this file is managed by pam-auth-update by default. 1046s # To take advantage of this, it is recommended that you configure any 1046s # local modules either before or after the default block, and use 1046s # pam-auth-update to manage selection of other modules. See 1046s # pam-auth-update(8) for details. 1046s 1046s # here are the per-package modules (the "Primary" block) 1046s auth [success=3 ignore=ignore default=die] pam_sss.so allow_missing_name require_cert_auth 1046s auth [success=2 default=ignore] pam_unix.so nullok try_first_pass 1046s auth [success=1 default=ignore] pam_sss.so use_first_pass 1046s # here's the fallback if no module succeeds 1046s auth requisite pam_deny.so 1046s # prime the stack with a positive return value if there isn't one already; 1046s # this avoids us returning an error just because nothing sets a success code 1046s # since the modules above will each just jump around 1046s auth required pam_permit.so 1046s # and here are more per-package modules (the "Additional" block) 1046s auth optional pam_cap.so 1046s # end of pam-auth-update config 1046s + echo -n -e 123456 1046s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 1046s pamtester: invoking pam_start(login, ubuntu, ...) 1046s pamtester: performing operation - authenticate 1046s PIN for Test Organization Root Tr Token: pamtester: successfully authenticated 1046s + echo -n -e 123456 1046s + runuser -u ubuntu -- pamtester -v login '' authenticate 1046s pamtester: invoking pam_start(login, , ...) 1046s pamtester: performing operation - authenticate 1046s PIN for Test Organization Root Tr Token: pamtester: successfully authenticated 1046s + echo -n -e wrong123456 1046s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 1046s pamtester: invoking pam_start(login, ubuntu, ...) 1046s pamtester: performing operation - authenticate 1050s PIN for Test Organization Root Tr Token: pamtester: Authentication failure 1050s + echo -n -e wrong123456 1050s + runuser -u ubuntu -- pamtester -v login '' authenticate 1050s pamtester: invoking pam_start(login, , ...) 1050s pamtester: performing operation - authenticate 1053s PIN for Test Organization Root Tr Token: pamtester: Authentication failure 1053s + echo -n -e 123456 1053s + pamtester -v login root authenticate 1053s pamtester: invoking pam_start(login, root, ...) 1053s pamtester: performing operation - authenticate 1056s pamtester: Authentication service cannot retrieve authentication info 1056s + test_authentication login /tmp/sssd-softhsm2-certs-AS5UvA/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf /tmp/sssd-softhsm2-certs-AS5UvA/test-full-chain-CA.pem 1056s + pam_service=login 1056s + certificate_config=/tmp/sssd-softhsm2-certs-AS5UvA/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 1056s + ca_db=/tmp/sssd-softhsm2-certs-AS5UvA/test-full-chain-CA.pem 1056s + verification_options= 1056s + mkdir -p -m 700 /etc/sssd 1056s Using CA DB '/tmp/sssd-softhsm2-certs-AS5UvA/test-full-chain-CA.pem' with verification options: '' 1056s + echo 'Using CA DB '\''/tmp/sssd-softhsm2-certs-AS5UvA/test-full-chain-CA.pem'\'' with verification options: '\'''\''' 1056s + cat 1056s + chmod 600 /etc/sssd/sssd.conf 1056s + for path_pair in "${softhsm2_conf_paths[@]}" 1056s + IFS=: 1056s + read -r -a path 1056s + user=ubuntu 1056s Label: Test Organization Sub Int Token 1056s Label: Test Organization Sub Int Token 1056s + path=/home/ubuntu/.config/softhsm2/softhsm2.conf 1056s ++ dirname /home/ubuntu/.config/softhsm2/softhsm2.conf 1056s + runuser -u ubuntu -- mkdir -p /home/ubuntu/.config/softhsm2 1056s + runuser -u ubuntu -- ln -sf /tmp/sssd-softhsm2-certs-AS5UvA/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf /home/ubuntu/.config/softhsm2/softhsm2.conf 1056s + grep 'Test Organization' 1056s + runuser -u ubuntu -- softhsm2-util --show-slots 1056s + for path_pair in "${softhsm2_conf_paths[@]}" 1056s + IFS=: 1056s + read -r -a path 1056s + user=root 1056s + path=/etc/softhsm/softhsm2.conf 1056s ++ dirname /etc/softhsm/softhsm2.conf 1056s + runuser -u root -- mkdir -p /etc/softhsm 1056s + runuser -u root -- ln -sf /tmp/sssd-softhsm2-certs-AS5UvA/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf /etc/softhsm/softhsm2.conf 1056s + runuser -u root -- softhsm2-util --show-slots 1056s + grep 'Test Organization' 1056s + systemctl restart sssd 1056s + pam-auth-update --disable sss-smart-card-optional sss-smart-card-required 1056s + for alternative in "${alternative_pam_configs[@]}" 1056s + pam-auth-update --enable sss-smart-card-optional 1057s + cat /etc/pam.d/common-auth 1057s # 1057s # /etc/pam.d/common-auth - authentication settings common to all services 1057s # 1057s # This file is included from other service-specific PAM config files, 1057s # and should contain a list of the authentication modules that define 1057s # the central authentication scheme for use on the system 1057s # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the 1057s # traditional Unix authentication mechanisms. 1057s # 1057s # As of pam 1.0.1-6, this file is managed by pam-auth-update by default. 1057s # To take advantage of this, it is recommended that you configure any 1057s # local modules either before or after the default block, and use 1057s # pam-auth-update to manage selection of other modules. See 1057s # pam-auth-update(8) for details. 1057s 1057s # here are the per-package modules (the "Primary" block) 1057s auth [success=3 default=ignore] pam_sss.so allow_missing_name try_cert_auth 1057s auth [success=2 default=ignore] pam_unix.so nullok try_first_pass 1057s auth [success=1 default=ignore] pam_sss.so use_first_pass 1057s # here's the fallback if no module succeeds 1057s auth requisite pam_deny.so 1057s # prime the stack with a positive return value if there isn't one already; 1057s # this avoids us returning an error just because nothing sets a success code 1057s # since the modules above will each just jump around 1057s auth required pam_permit.so 1057s # and here are more per-package modules (the "Additional" block) 1057s auth optional pam_cap.so 1057s # end of pam-auth-update config 1057s + echo -n -e 123456 1057s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 1057s pamtester: invoking pam_start(login, ubuntu, ...) 1057s pamtester: performing operation - authenticate 1057s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 1057s + echo -n -e 123456 1057s + runuser -u ubuntu -- pamtester -v login '' authenticate 1057s pamtester: invoking pam_start(login, , ...) 1057s pamtester: performing operation - authenticate 1057s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 1057s + echo -n -e wrong123456 1057s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 1057s pamtester: invoking pam_start(login, ubuntu, ...) 1057s pamtester: performing operation - authenticate 1060s PIN for Test Organization Sub Int Token: Password: pamtester: Authentication failure 1060s + echo -n -e wrong123456 1060s + runuser -u ubuntu -- pamtester -v login '' authenticate 1060s pamtester: invoking pam_start(login, , ...) 1060s pamtester: performing operation - authenticate 1062s PIN for Test Organization Sub Int Token: Password: pamtester: Authentication failure 1062s + echo -n -e 123456 1062s + pamtester -v login root authenticate 1062s pamtester: invoking pam_start(login, root, ...) 1062s pamtester: performing operation - authenticate 1066s Password: pamtester: Authentication failure 1066s + for alternative in "${alternative_pam_configs[@]}" 1066s + pam-auth-update --enable sss-smart-card-required 1066s PAM configuration 1066s ----------------- 1066s 1066s Incompatible PAM profiles selected. 1066s 1066s The following PAM profiles cannot be used together: 1066s 1066s SSS required smart card authentication, SSS optional smart card 1066s authentication 1066s 1066s Please select a different set of modules to enable. 1066s 1066s + cat /etc/pam.d/common-auth 1066s # 1066s # /etc/pam.d/common-auth - authentication settings common to all services 1066s # 1066s # This file is included from other service-specific PAM config files, 1066s # and should contain a list of the authentication modules that define 1066s # the central authentication scheme for use on the system 1066s # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the 1066s # traditional Unix authentication mechanisms. 1066s # 1066s # As of pam 1.0.1-6, this file is managed by pam-auth-update by default. 1066s # To take advantage of this, it is recommended that you configure any 1066s # local modules either before or after the default block, and use 1066s # pam-auth-update to manage selection of other modules. See 1066s # pam-auth-update(8) for details. 1066s 1066s # here are the per-package modules (the "Primary" block) 1066s auth [success=3 ignore=ignore default=die] pam_sss.so allow_missing_name require_cert_auth 1066s auth [success=2 default=ignore] pam_unix.so nullok try_first_pass 1066s auth [success=1 default=ignore] pam_sss.so use_first_pass 1066s # here's the fallback if no module succeeds 1066s auth requisite pam_deny.so 1066s # prime the stack with a positive return value if there isn't one already; 1066s # this avoids us returning an error just because nothing sets a success code 1066s # since the modules above will each just jump around 1066s auth required pam_permit.so 1066s # and here are more per-package modules (the "Additional" block) 1066s auth optional pam_cap.so 1066s # end of pam-auth-update config 1066s + echo -n -e 123456 1066s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 1066s pamtester: invoking pam_start(login, ubuntu, ...) 1066s pamtester: performing operation - authenticate 1066s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 1066s pamtester: successfully authenticated 1066s + echo -n -e 123456 1066s + runuser -u ubuntu -- pamtester -v login '' authenticate 1066s pamtester: invoking pam_start(login, , ...) 1066s pamtester: performing operation - authenticate 1066s PIN for Test Organization Sub Int Token: + echo -n -e wrong123456 1066s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 1066s pamtester: invoking pam_start(login, ubuntu, ...) 1066s pamtester: performing operation - authenticate 1069s PIN for Test Organization Sub Int Token: pamtester: Authentication failure 1069s + echo -n -e wrong123456 1069s + runuser -u ubuntu -- pamtester -v login '' authenticate 1069s pamtester: invoking pam_start(login, , ...) 1069s pamtester: performing operation - authenticate 1073s PIN for Test Organization Sub Int Token: pamtester: Authentication failure 1073s + echo -n -e 123456 1073s + pamtester -v login root authenticate 1073s pamtester: invoking pam_start(login, root, ...) 1073s pamtester: performing operation - authenticate 1076s pamtester: Authentication service cannot retrieve authentication info 1076s + test_authentication login /tmp/sssd-softhsm2-certs-AS5UvA/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf /tmp/sssd-softhsm2-certs-AS5UvA/test-sub-intermediate-CA.pem partial_chain 1076s + pam_service=login 1076s + certificate_config=/tmp/sssd-softhsm2-certs-AS5UvA/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 1076s + ca_db=/tmp/sssd-softhsm2-certs-AS5UvA/test-sub-intermediate-CA.pem 1076s + verification_options=partial_chain 1076s + mkdir -p -m 700 /etc/sssd 1076s Using CA DB '/tmp/sssd-softhsm2-certs-AS5UvA/test-sub-intermediate-CA.pem' with verification options: 'partial_chain' 1076s + echo 'Using CA DB '\''/tmp/sssd-softhsm2-certs-AS5UvA/test-sub-intermediate-CA.pem'\'' with verification options: '\''partial_chain'\''' 1076s + cat 1076s Label: Test Organization Sub Int Token 1076s Label: Test Organization Sub Int Token 1076s + chmod 600 /etc/sssd/sssd.conf 1076s + for path_pair in "${softhsm2_conf_paths[@]}" 1076s + IFS=: 1076s + read -r -a path 1076s + user=ubuntu 1076s + path=/home/ubuntu/.config/softhsm2/softhsm2.conf 1076s ++ dirname /home/ubuntu/.config/softhsm2/softhsm2.conf 1076s + runuser -u ubuntu -- mkdir -p /home/ubuntu/.config/softhsm2 1076s + runuser -u ubuntu -- ln -sf /tmp/sssd-softhsm2-certs-AS5UvA/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf /home/ubuntu/.config/softhsm2/softhsm2.conf 1076s + runuser -u ubuntu -- softhsm2-util --show-slots 1076s + grep 'Test Organization' 1076s + for path_pair in "${softhsm2_conf_paths[@]}" 1076s + IFS=: 1076s + read -r -a path 1076s + user=root 1076s + path=/etc/softhsm/softhsm2.conf 1076s ++ dirname /etc/softhsm/softhsm2.conf 1076s + runuser -u root -- mkdir -p /etc/softhsm 1076s + runuser -u root -- ln -sf /tmp/sssd-softhsm2-certs-AS5UvA/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf /etc/softhsm/softhsm2.conf 1076s + grep 'Test Organization' 1076s + runuser -u root -- softhsm2-util --show-slots 1076s + systemctl restart sssd 1076s + pam-auth-update --disable sss-smart-card-optional sss-smart-card-required 1077s + for alternative in "${alternative_pam_configs[@]}" 1077s + pam-auth-update --enable sss-smart-card-optional 1077s + cat /etc/pam.d/common-auth 1077s # 1077s # /etc/pam.d/common-auth - authentication settings common to all services 1077s # 1077s # This file is included from other service-specific PAM config files, 1077s # and should contain a list of the authentication modules that define 1077s # the central authentication scheme for use on the system 1077s # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the 1077s # traditional Unix authentication mechanisms. 1077s # 1077s # As of pam 1.0.1-6, this file is managed by pam-auth-update by default. 1077s # To take advantage of this, it is recommended that you configure any 1077s # local modules either before or after the default block, and use 1077s # pam-auth-update to manage selection of other modules. See 1077s # pam-auth-update(8) for details. 1077s 1077s # here are the per-package modules (the "Primary" block) 1077s auth [success=3 default=ignore] pam_sss.so allow_missing_name try_cert_auth 1077s auth [success=2 default=ignore] pam_unix.so nullok try_first_pass 1077s auth [success=1 default=ignore] pam_sss.so use_first_pass 1077s # here's the fallback if no module succeeds 1077s auth requisite pam_deny.so 1077s # prime the stack with a positive return value if there isn't one already; 1077s # this avoids us returning an error just because nothing sets a success code 1077s # since the modules above will each just jump around 1077s auth required pam_permit.so 1077s # and here are more per-package modules (the "Additional" block) 1077s auth optional pam_cap.so 1077s # end of pam-auth-update config 1077s + echo -n -e 123456 1077s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 1077s pamtester: invoking pam_start(login, ubuntu, ...) 1077s pamtester: performing operation - authenticate 1077s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 1077s + echo -n -e 123456 1077s + runuser -u ubuntu -- pamtester -v login '' authenticate 1077s pamtester: invoking pam_start(login, , ...) 1077s pamtester: performing operation - authenticate 1077s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 1077s + echo -n -e wrong123456 1077s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 1077s pamtester: invoking pam_start(login, ubuntu, ...) 1077s pamtester: performing operation - authenticate 1080s PIN for Test Organization Sub Int Token: Password: pamtester: Authentication failure 1080s + echo -n -e wrong123456 1080s + runuser -u ubuntu -- pamtester -v login '' authenticate 1080s pamtester: invoking pam_start(login, , ...) 1080s pamtester: performing operation - authenticate 1083s PIN for Test Organization Sub Int Token: Password: pamtester: Authentication failure 1083s + echo -n -e 123456 1083s + pamtester -v login root authenticate 1083s pamtester: invoking pam_start(login, root, ...) 1083s pamtester: performing operation - authenticate 1085s Password: pamtester: Authentication failure 1085s + for alternative in "${alternative_pam_configs[@]}" 1085s + pam-auth-update --enable sss-smart-card-required 1085s PAM configuration 1085s ----------------- 1085s 1085s Incompatible PAM profiles selected. 1085s 1085s The following PAM profiles cannot be used together: 1085s 1085s SSS required smart card authentication, SSS optional smart card 1085s authentication 1085s 1085s Please select a different set of modules to enable. 1085s 1085s + cat /etc/pam.d/common-auth 1085s # 1085s # /etc/pam.d/common-auth - authentication settings common to all services 1085s # 1085s # This file is included from other service-specific PAM config files, 1085s # and should contain a list of the authentication modules that define 1085s # the central authentication scheme for use on the system 1085s # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the 1085s # traditional Unix authentication mechanisms. 1085s # 1085s # As of pam 1.0.1-6, this file is managed by pam-auth-update by default. 1085s # To take advantage of this, it is recommended that you configure any 1085s # local modules either before or after the default block, and use 1085s # pam-auth-update to manage selection of other modules. See 1085s # pam-auth-update(8) for details. 1085s 1085s # here are the per-package modules (the "Primary" block) 1085s auth [success=3 ignore=ignore default=die] pam_sss.so allow_missing_name require_cert_auth 1085s auth [success=2 default=ignore] pam_unix.so nullok try_first_pass 1085s auth [success=1 default=ignore] pam_sss.so use_first_pass 1085s # here's the fallback if no module succeeds 1085s auth requisite pam_deny.so 1085s # prime the stack with a positive return value if there isn't one already; 1085s # this avoids us returning an error just because nothing sets a success code 1085s # since the modules above will each just jump around 1085s auth required pam_permit.so 1085s # and here are more per-package modules (the "Additional" block) 1085s auth optional pam_cap.so 1085s # end of pam-auth-update config 1085s + echo -n -e 123456 1085s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 1085s pamtester: invoking pam_start(login, ubuntu, ...) 1085s pamtester: performing operation - authenticate 1085s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 1085s + echo -n -e 123456 1085s + runuser -u ubuntu -- pamtester -v login '' authenticate 1085s pamtester: invoking pam_start(login, , ...) 1085s pamtester: performing operation - authenticate 1085s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 1085s + echo -n -e wrong123456 1085s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 1085s pamtester: invoking pam_start(login, ubuntu, ...) 1085s pamtester: performing operation - authenticate 1089s PIN for Test Organization Sub Int Token: pamtester: Authentication failure 1089s + echo -n -e wrong123456 1089s + runuser -u ubuntu -- pamtester -v login '' authenticate 1089s pamtester: invoking pam_start(login, , ...) 1089s pamtester: performing operation - authenticate 1092s PIN for Test Organization Sub Int Token: pamtester: Authentication failure 1092s + echo -n -e 123456 1092s + pamtester -v login root authenticate 1092s pamtester: invoking pam_start(login, root, ...) 1092s pamtester: performing operation - authenticate 1095s pamtester: Authentication service cannot retrieve authentication info 1095s + handle_exit 1095s + exit_code=0 1095s + restore_changes 1095s + for path in "${restore_paths[@]}" 1095s + local original_path 1095s ++ realpath --strip --relative-base=/tmp/sssd-softhsm2-backups-Rm5DpK /tmp/sssd-softhsm2-backups-Rm5DpK//etc/softhsm/softhsm2.conf 1095s + original_path=/etc/softhsm/softhsm2.conf 1095s + rm /etc/softhsm/softhsm2.conf 1095s + mv /tmp/sssd-softhsm2-backups-Rm5DpK//etc/softhsm/softhsm2.conf /etc/softhsm/softhsm2.conf 1095s + for path in "${delete_paths[@]}" 1095s + rm -f /etc/sssd/sssd.conf 1095s + for path in "${delete_paths[@]}" 1095s + rm -f /home/ubuntu/.config/softhsm2/softhsm2.conf 1095s + pam-auth-update --disable sss-smart-card-optional sss-smart-card-required 1095s + '[' -e /etc/sssd/sssd.conf ']' 1095s + systemctl stop sssd 1095s + '[' -e /etc/softhsm/softhsm2.conf ']' 1095s + chmod 600 /etc/softhsm/softhsm2.conf 1095s + rm -rf /tmp/sssd-softhsm2-certs-AS5UvA 1095s + '[' 0 = 0 ']' 1095s + rm -rf /tmp/sssd-softhsm2-backups-Rm5DpK 1095s Script completed successfully! 1095s + set +x 1095s autopkgtest [09:34:02]: test sssd-smart-card-pam-auth-configs: -----------------------] 1096s sssd-smart-card-pam-auth-configs PASS 1096s autopkgtest [09:34:03]: test sssd-smart-card-pam-auth-configs: - - - - - - - - - - results - - - - - - - - - - 1096s autopkgtest [09:34:03]: @@@@@@@@@@@@@@@@@@@@ summary 1096s ldap-user-group-ldap-auth PASS 1096s ldap-user-group-krb5-auth PASS 1096s sssd-softhism2-certificates-tests.sh PASS 1096s sssd-smart-card-pam-auth-configs PASS 1116s Creating nova instance adt-noble-s390x-sssd-20240310-091547-juju-7f2275-prod-proposed-migration-environment-2 from image adt/ubuntu-noble-s390x-server-20240309.img (UUID 15f62ec0-c004-41c2-ab66-72a4ef6796cc)... 1116s Creating nova instance adt-noble-s390x-sssd-20240310-091547-juju-7f2275-prod-proposed-migration-environment-2 from image adt/ubuntu-noble-s390x-server-20240309.img (UUID 15f62ec0-c004-41c2-ab66-72a4ef6796cc)...