0s autopkgtest [23:57:36]: starting date and time: 2025-07-03 23:57:36+0000 0s autopkgtest [23:57:36]: git checkout: 508d4a25 a-v-ssh wait_for_ssh: demote "ssh connection failed" to a debug message 0s autopkgtest [23:57:36]: host juju-7f2275-prod-proposed-migration-environment-21; command line: /home/ubuntu/autopkgtest/runner/autopkgtest --output-dir /tmp/autopkgtest-work.bws22mzl/out --timeout-copy=6000 --setup-commands /home/ubuntu/autopkgtest-cloud/worker-config-production/setup-canonical.sh --apt-pocket=proposed=src:systemd,src:netplan.io,src:openssh,src:samba --apt-upgrade sssd --timeout-short=300 --timeout-copy=20000 --timeout-build=20000 '--env=ADT_TEST_TRIGGERS=systemd/255.4-1ubuntu8.10 netplan.io/1.1.2-2~ubuntu24.04.2 openssh/1:9.6p1-3ubuntu13.13 samba/2:4.19.5+dfsg-4ubuntu9.2' -- ssh -s /home/ubuntu/autopkgtest/ssh-setup/nova -- --flavor autopkgtest-s390x --security-groups autopkgtest-juju-7f2275-prod-proposed-migration-environment-21@bos03-s390x-5.secgroup --name adt-noble-s390x-sssd-20250703-235735-juju-7f2275-prod-proposed-migration-environment-21-ea157941-59c5-40d0-8951-c70dd33955da --image adt/ubuntu-noble-s390x-server --keyname testbed-juju-7f2275-prod-proposed-migration-environment-21 --net-id=net_prod-proposed-migration-s390x -e TERM=linux --mirror=http://ftpmaster.internal/ubuntu/ 3s Creating nova instance adt-noble-s390x-sssd-20250703-235735-juju-7f2275-prod-proposed-migration-environment-21-ea157941-59c5-40d0-8951-c70dd33955da from image adt/ubuntu-noble-s390x-server-20250703.img (UUID b4c76a43-004c-4cc1-b99b-b9be5033b9ed)... 41s autopkgtest [23:58:17]: testbed dpkg architecture: s390x 41s autopkgtest [23:58:17]: testbed apt version: 2.8.3 41s autopkgtest [23:58:17]: @@@@@@@@@@@@@@@@@@@@ test bed setup 42s autopkgtest [23:58:18]: testbed release detected to be: None 42s autopkgtest [23:58:18]: updating testbed package index (apt update) 42s Get:1 http://ftpmaster.internal/ubuntu noble-proposed InRelease [265 kB] 43s Hit:2 http://ftpmaster.internal/ubuntu noble InRelease 43s Hit:3 http://ftpmaster.internal/ubuntu noble-updates InRelease 43s Hit:4 http://ftpmaster.internal/ubuntu noble-security InRelease 43s Get:5 http://ftpmaster.internal/ubuntu noble-proposed/main Sources [64.5 kB] 43s Get:6 http://ftpmaster.internal/ubuntu noble-proposed/multiverse Sources [3948 B] 43s Get:7 http://ftpmaster.internal/ubuntu noble-proposed/restricted Sources [28.9 kB] 43s Get:8 http://ftpmaster.internal/ubuntu noble-proposed/universe Sources [63.8 kB] 43s Get:9 http://ftpmaster.internal/ubuntu noble-proposed/main s390x Packages [111 kB] 43s Get:10 http://ftpmaster.internal/ubuntu noble-proposed/main s390x c-n-f Metadata [2172 B] 43s Get:11 http://ftpmaster.internal/ubuntu noble-proposed/restricted s390x Packages [2720 B] 43s Get:12 http://ftpmaster.internal/ubuntu noble-proposed/restricted s390x c-n-f Metadata [116 B] 43s Get:13 http://ftpmaster.internal/ubuntu noble-proposed/universe s390x Packages [284 kB] 43s Get:14 http://ftpmaster.internal/ubuntu noble-proposed/universe s390x c-n-f Metadata [2500 B] 43s Get:15 http://ftpmaster.internal/ubuntu noble-proposed/multiverse s390x Packages [752 B] 43s Get:16 http://ftpmaster.internal/ubuntu noble-proposed/multiverse s390x c-n-f Metadata [116 B] 45s Fetched 829 kB in 1s (1088 kB/s) 46s Reading package lists... 46s autopkgtest [23:58:22]: upgrading testbed (apt dist-upgrade and autopurge) 47s Reading package lists... 47s Building dependency tree... 47s Reading state information... 47s Calculating upgrade...Starting pkgProblemResolver with broken count: 0 47s Starting 2 pkgProblemResolver with broken count: 0 47s Done 47s Entering ResolveByKeep 47s 47s The following packages will be upgraded: 47s gzip libnetplan1 libnss-systemd libpam-systemd libsystemd-shared libsystemd0 47s libudev1 netplan-generator netplan.io openssh-client openssh-server 47s openssh-sftp-server python3-netplan systemd systemd-dev systemd-resolved 47s systemd-sysv systemd-timesyncd udev 47s 19 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 47s Need to get 10.9 MB of archives. 47s After this operation, 34.8 kB of additional disk space will be used. 47s Get:1 http://ftpmaster.internal/ubuntu noble-updates/main s390x gzip s390x 1.12-1ubuntu3.1 [106 kB] 48s Get:2 http://ftpmaster.internal/ubuntu noble-proposed/main s390x libnss-systemd s390x 255.4-1ubuntu8.10 [165 kB] 48s Get:3 http://ftpmaster.internal/ubuntu noble-proposed/main s390x systemd-dev all 255.4-1ubuntu8.10 [105 kB] 48s Get:4 http://ftpmaster.internal/ubuntu noble-proposed/main s390x systemd-timesyncd s390x 255.4-1ubuntu8.10 [35.1 kB] 48s Get:5 http://ftpmaster.internal/ubuntu noble-proposed/main s390x systemd-resolved s390x 255.4-1ubuntu8.10 [302 kB] 48s Get:6 http://ftpmaster.internal/ubuntu noble-proposed/main s390x libsystemd-shared s390x 255.4-1ubuntu8.10 [2127 kB] 48s Get:7 http://ftpmaster.internal/ubuntu noble-proposed/main s390x libsystemd0 s390x 255.4-1ubuntu8.10 [444 kB] 48s Get:8 http://ftpmaster.internal/ubuntu noble-proposed/main s390x systemd-sysv s390x 255.4-1ubuntu8.10 [11.9 kB] 48s Get:9 http://ftpmaster.internal/ubuntu noble-proposed/main s390x libpam-systemd s390x 255.4-1ubuntu8.10 [241 kB] 48s Get:10 http://ftpmaster.internal/ubuntu noble-proposed/main s390x systemd s390x 255.4-1ubuntu8.10 [3534 kB] 49s Get:11 http://ftpmaster.internal/ubuntu noble-proposed/main s390x udev s390x 255.4-1ubuntu8.10 [1883 kB] 49s Get:12 http://ftpmaster.internal/ubuntu noble-proposed/main s390x libudev1 s390x 255.4-1ubuntu8.10 [180 kB] 49s Get:13 http://ftpmaster.internal/ubuntu noble-proposed/main s390x openssh-sftp-server s390x 1:9.6p1-3ubuntu13.13 [38.6 kB] 49s Get:14 http://ftpmaster.internal/ubuntu noble-proposed/main s390x openssh-server s390x 1:9.6p1-3ubuntu13.13 [526 kB] 49s Get:15 http://ftpmaster.internal/ubuntu noble-proposed/main s390x openssh-client s390x 1:9.6p1-3ubuntu13.13 [931 kB] 49s Get:16 http://ftpmaster.internal/ubuntu noble-proposed/main s390x python3-netplan s390x 1.1.2-2~ubuntu24.04.2 [24.4 kB] 49s Get:17 http://ftpmaster.internal/ubuntu noble-proposed/main s390x netplan-generator s390x 1.1.2-2~ubuntu24.04.2 [61.2 kB] 49s Get:18 http://ftpmaster.internal/ubuntu noble-proposed/main s390x netplan.io s390x 1.1.2-2~ubuntu24.04.2 [69.6 kB] 49s Get:19 http://ftpmaster.internal/ubuntu noble-proposed/main s390x libnetplan1 s390x 1.1.2-2~ubuntu24.04.2 [135 kB] 49s Preconfiguring packages ... 49s Fetched 10.9 MB in 2s (6059 kB/s) 49s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 78336 files and directories currently installed.) 49s Preparing to unpack .../gzip_1.12-1ubuntu3.1_s390x.deb ... 49s Unpacking gzip (1.12-1ubuntu3.1) over (1.12-1ubuntu3) ... 49s Setting up gzip (1.12-1ubuntu3.1) ... 49s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 78336 files and directories currently installed.) 49s Preparing to unpack .../0-libnss-systemd_255.4-1ubuntu8.10_s390x.deb ... 49s Unpacking libnss-systemd:s390x (255.4-1ubuntu8.10) over (255.4-1ubuntu8.8) ... 50s Preparing to unpack .../1-systemd-dev_255.4-1ubuntu8.10_all.deb ... 50s Unpacking systemd-dev (255.4-1ubuntu8.10) over (255.4-1ubuntu8.8) ... 50s Preparing to unpack .../2-systemd-timesyncd_255.4-1ubuntu8.10_s390x.deb ... 50s Unpacking systemd-timesyncd (255.4-1ubuntu8.10) over (255.4-1ubuntu8.8) ... 50s Preparing to unpack .../3-systemd-resolved_255.4-1ubuntu8.10_s390x.deb ... 50s Unpacking systemd-resolved (255.4-1ubuntu8.10) over (255.4-1ubuntu8.8) ... 50s Preparing to unpack .../4-libsystemd-shared_255.4-1ubuntu8.10_s390x.deb ... 50s Unpacking libsystemd-shared:s390x (255.4-1ubuntu8.10) over (255.4-1ubuntu8.8) ... 50s Preparing to unpack .../5-libsystemd0_255.4-1ubuntu8.10_s390x.deb ... 50s Unpacking libsystemd0:s390x (255.4-1ubuntu8.10) over (255.4-1ubuntu8.8) ... 50s Setting up libsystemd0:s390x (255.4-1ubuntu8.10) ... 50s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 78336 files and directories currently installed.) 50s Preparing to unpack .../systemd-sysv_255.4-1ubuntu8.10_s390x.deb ... 50s Unpacking systemd-sysv (255.4-1ubuntu8.10) over (255.4-1ubuntu8.8) ... 50s Preparing to unpack .../libpam-systemd_255.4-1ubuntu8.10_s390x.deb ... 50s Unpacking libpam-systemd:s390x (255.4-1ubuntu8.10) over (255.4-1ubuntu8.8) ... 50s Preparing to unpack .../systemd_255.4-1ubuntu8.10_s390x.deb ... 50s Unpacking systemd (255.4-1ubuntu8.10) over (255.4-1ubuntu8.8) ... 50s Preparing to unpack .../udev_255.4-1ubuntu8.10_s390x.deb ... 50s Unpacking udev (255.4-1ubuntu8.10) over (255.4-1ubuntu8.8) ... 50s Preparing to unpack .../libudev1_255.4-1ubuntu8.10_s390x.deb ... 50s Unpacking libudev1:s390x (255.4-1ubuntu8.10) over (255.4-1ubuntu8.8) ... 50s Setting up libudev1:s390x (255.4-1ubuntu8.10) ... 50s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 78336 files and directories currently installed.) 50s Preparing to unpack .../0-openssh-sftp-server_1%3a9.6p1-3ubuntu13.13_s390x.deb ... 50s Unpacking openssh-sftp-server (1:9.6p1-3ubuntu13.13) over (1:9.6p1-3ubuntu13.12) ... 50s Preparing to unpack .../1-openssh-server_1%3a9.6p1-3ubuntu13.13_s390x.deb ... 50s Unpacking openssh-server (1:9.6p1-3ubuntu13.13) over (1:9.6p1-3ubuntu13.12) ... 50s Preparing to unpack .../2-openssh-client_1%3a9.6p1-3ubuntu13.13_s390x.deb ... 50s Unpacking openssh-client (1:9.6p1-3ubuntu13.13) over (1:9.6p1-3ubuntu13.12) ... 50s Preparing to unpack .../3-python3-netplan_1.1.2-2~ubuntu24.04.2_s390x.deb ... 50s Unpacking python3-netplan (1.1.2-2~ubuntu24.04.2) over (1.1.2-2~ubuntu24.04.1) ... 50s Preparing to unpack .../4-netplan-generator_1.1.2-2~ubuntu24.04.2_s390x.deb ... 50s Adding 'diversion of /lib/systemd/system-generators/netplan to /lib/systemd/system-generators/netplan.usr-is-merged by netplan-generator' 50s Unpacking netplan-generator (1.1.2-2~ubuntu24.04.2) over (1.1.2-2~ubuntu24.04.1) ... 50s Preparing to unpack .../5-netplan.io_1.1.2-2~ubuntu24.04.2_s390x.deb ... 50s Unpacking netplan.io (1.1.2-2~ubuntu24.04.2) over (1.1.2-2~ubuntu24.04.1) ... 50s Preparing to unpack .../6-libnetplan1_1.1.2-2~ubuntu24.04.2_s390x.deb ... 50s Unpacking libnetplan1:s390x (1.1.2-2~ubuntu24.04.2) over (1.1.2-2~ubuntu24.04.1) ... 50s Setting up openssh-client (1:9.6p1-3ubuntu13.13) ... 50s Setting up systemd-dev (255.4-1ubuntu8.10) ... 50s Setting up libnetplan1:s390x (1.1.2-2~ubuntu24.04.2) ... 50s Setting up libsystemd-shared:s390x (255.4-1ubuntu8.10) ... 50s Setting up python3-netplan (1.1.2-2~ubuntu24.04.2) ... 50s Setting up openssh-sftp-server (1:9.6p1-3ubuntu13.13) ... 50s Setting up openssh-server (1:9.6p1-3ubuntu13.13) ... 51s Setting up systemd (255.4-1ubuntu8.10) ... 52s Setting up systemd-timesyncd (255.4-1ubuntu8.10) ... 52s Setting up udev (255.4-1ubuntu8.10) ... 52s Setting up netplan-generator (1.1.2-2~ubuntu24.04.2) ... 52s Removing 'diversion of /lib/systemd/system-generators/netplan to /lib/systemd/system-generators/netplan.usr-is-merged by netplan-generator' 53s Setting up systemd-resolved (255.4-1ubuntu8.10) ... 53s Setting up systemd-sysv (255.4-1ubuntu8.10) ... 53s Setting up libnss-systemd:s390x (255.4-1ubuntu8.10) ... 53s Setting up netplan.io (1.1.2-2~ubuntu24.04.2) ... 53s Setting up libpam-systemd:s390x (255.4-1ubuntu8.10) ... 53s Processing triggers for initramfs-tools (0.142ubuntu25.5) ... 53s update-initramfs: Generating /boot/initrd.img-6.8.0-63-generic 55s Using config file '/etc/zipl.conf' 55s Building bootmap in '/boot' 55s Adding IPL section 'ubuntu' (default) 55s Preparing boot device for LD-IPL: vda (0000). 55s Done. 55s Processing triggers for libc-bin (2.39-0ubuntu8.4) ... 55s Processing triggers for ufw (0.36.2-6) ... 55s Processing triggers for man-db (2.12.0-4build2) ... 55s Processing triggers for dbus (1.14.10-4ubuntu4.1) ... 55s Processing triggers for install-info (7.1-3build2) ... 56s Reading package lists... 56s Building dependency tree... 56s Reading state information... 56s Starting pkgProblemResolver with broken count: 0 56s Starting 2 pkgProblemResolver with broken count: 0 56s Done 56s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 56s autopkgtest [23:58:32]: rebooting testbed after setup commands that affected boot 70s autopkgtest [23:58:46]: testbed running kernel: Linux 6.8.0-63-generic #66-Ubuntu SMP Fri Jun 13 19:31:49 UTC 2025 72s autopkgtest [23:58:48]: @@@@@@@@@@@@@@@@@@@@ apt-source sssd 86s Get:1 http://ftpmaster.internal/ubuntu noble-updates/main sssd 2.9.4-1.1ubuntu6.2 (dsc) [5064 B] 86s Get:2 http://ftpmaster.internal/ubuntu noble-updates/main sssd 2.9.4-1.1ubuntu6.2 (tar) [7983 kB] 86s Get:3 http://ftpmaster.internal/ubuntu noble-updates/main sssd 2.9.4-1.1ubuntu6.2 (diff) [52.0 kB] 86s gpgv: Signature made Thu Nov 7 02:57:42 2024 UTC 86s gpgv: using RSA key 8987D8E45F339310CE661A2E64C469BE59C0DEA2 86s gpgv: Can't check signature: No public key 86s dpkg-source: warning: cannot verify inline signature for ./sssd_2.9.4-1.1ubuntu6.2.dsc: no acceptable signature found 87s autopkgtest [23:59:03]: testing package sssd version 2.9.4-1.1ubuntu6.2 91s autopkgtest [23:59:07]: build not needed 100s autopkgtest [23:59:16]: test ldap-user-group-ldap-auth: preparing testbed 101s Reading package lists... 101s Building dependency tree... 101s Reading state information... 101s Starting pkgProblemResolver with broken count: 0 101s Starting 2 pkgProblemResolver with broken count: 0 101s Done 101s The following NEW packages will be installed: 101s expect ldap-utils libavahi-client3 libavahi-common-data libavahi-common3 101s libbasicobjects0t64 libcares2 libcollection4t64 libcrack2 libdhash1t64 101s libevent-2.1-7t64 libini-config5t64 libipa-hbac-dev libipa-hbac0t64 libjose0 101s libkrad0 libldb2 libltdl7 libnfsidmap1 libnss-sss libnss-sudo libodbc2 101s libpam-pwquality libpam-sss libpath-utils1t64 libpwquality-common 101s libpwquality1 libref-array1t64 libsmbclient0 libsss-certmap-dev 101s libsss-certmap0 libsss-idmap-dev libsss-idmap0 libsss-nss-idmap-dev 101s libsss-nss-idmap0 libsss-sudo libtalloc2 libtcl8.6 libtdb1 libtevent0t64 101s libverto-libevent1t64 libverto1t64 libwbclient0 python3-libipa-hbac 101s python3-libsss-nss-idmap python3-sss samba-libs slapd sssd sssd-ad 101s sssd-ad-common sssd-common sssd-dbus sssd-idp sssd-ipa sssd-kcm sssd-krb5 101s sssd-krb5-common sssd-ldap sssd-passkey sssd-proxy sssd-tools tcl-expect 101s tcl8.6 101s 0 upgraded, 64 newly installed, 0 to remove and 0 not upgraded. 101s Need to get 13.0 MB of archives. 101s After this operation, 49.5 MB of additional disk space will be used. 101s Get:1 http://ftpmaster.internal/ubuntu noble/main s390x libltdl7 s390x 2.4.7-7build1 [41.8 kB] 101s Get:2 http://ftpmaster.internal/ubuntu noble-updates/main s390x libodbc2 s390x 2.3.12-1ubuntu0.24.04.1 [164 kB] 102s Get:3 http://ftpmaster.internal/ubuntu noble-updates/main s390x slapd s390x 2.6.7+dfsg-1~exp1ubuntu8.2 [1604 kB] 102s Get:4 http://ftpmaster.internal/ubuntu noble/main s390x libtcl8.6 s390x 8.6.14+dfsg-1build1 [1038 kB] 103s Get:5 http://ftpmaster.internal/ubuntu noble/main s390x tcl8.6 s390x 8.6.14+dfsg-1build1 [14.7 kB] 103s Get:6 http://ftpmaster.internal/ubuntu noble/universe s390x tcl-expect s390x 5.45.4-3 [115 kB] 103s Get:7 http://ftpmaster.internal/ubuntu noble/universe s390x expect s390x 5.45.4-3 [137 kB] 103s Get:8 http://ftpmaster.internal/ubuntu noble-updates/main s390x ldap-utils s390x 2.6.7+dfsg-1~exp1ubuntu8.2 [165 kB] 103s Get:9 http://ftpmaster.internal/ubuntu noble/main s390x libavahi-common-data s390x 0.8-13ubuntu6 [29.7 kB] 103s Get:10 http://ftpmaster.internal/ubuntu noble/main s390x libavahi-common3 s390x 0.8-13ubuntu6 [24.1 kB] 103s Get:11 http://ftpmaster.internal/ubuntu noble/main s390x libavahi-client3 s390x 0.8-13ubuntu6 [27.2 kB] 103s Get:12 http://ftpmaster.internal/ubuntu noble/main s390x libbasicobjects0t64 s390x 0.6.2-2.1build1 [5838 B] 103s Get:13 http://ftpmaster.internal/ubuntu noble/main s390x libcares2 s390x 1.27.0-1.0ubuntu1 [79.2 kB] 103s Get:14 http://ftpmaster.internal/ubuntu noble/main s390x libcollection4t64 s390x 0.6.2-2.1build1 [23.9 kB] 103s Get:15 http://ftpmaster.internal/ubuntu noble/main s390x libcrack2 s390x 2.9.6-5.1build2 [30.0 kB] 103s Get:16 http://ftpmaster.internal/ubuntu noble/main s390x libdhash1t64 s390x 0.6.2-2.1build1 [9126 B] 103s Get:17 http://ftpmaster.internal/ubuntu noble/main s390x libevent-2.1-7t64 s390x 2.1.12-stable-9ubuntu2 [147 kB] 103s Get:18 http://ftpmaster.internal/ubuntu noble/main s390x libpath-utils1t64 s390x 0.6.2-2.1build1 [9394 B] 103s Get:19 http://ftpmaster.internal/ubuntu noble/main s390x libref-array1t64 s390x 0.6.2-2.1build1 [7226 B] 103s Get:20 http://ftpmaster.internal/ubuntu noble/main s390x libini-config5t64 s390x 0.6.2-2.1build1 [46.6 kB] 103s Get:21 http://ftpmaster.internal/ubuntu noble-updates/main s390x libipa-hbac0t64 s390x 2.9.4-1.1ubuntu6.2 [17.6 kB] 103s Get:22 http://ftpmaster.internal/ubuntu noble/universe s390x libjose0 s390x 13-1 [45.7 kB] 103s Get:23 http://ftpmaster.internal/ubuntu noble/main s390x libverto-libevent1t64 s390x 0.3.1-1.2ubuntu3 [6384 B] 103s Get:24 http://ftpmaster.internal/ubuntu noble/main s390x libverto1t64 s390x 0.3.1-1.2ubuntu3 [11.0 kB] 103s Get:25 http://ftpmaster.internal/ubuntu noble-updates/main s390x libkrad0 s390x 1.20.1-6ubuntu2.6 [23.2 kB] 103s Get:26 http://ftpmaster.internal/ubuntu noble/main s390x libtalloc2 s390x 2.4.2-1build2 [28.4 kB] 103s Get:27 http://ftpmaster.internal/ubuntu noble/main s390x libtdb1 s390x 1.4.10-1build1 [50.0 kB] 103s Get:28 http://ftpmaster.internal/ubuntu noble/main s390x libtevent0t64 s390x 0.16.1-2build1 [43.4 kB] 103s Get:29 http://ftpmaster.internal/ubuntu noble-proposed/main s390x libldb2 s390x 2:2.8.0+samba4.19.5+dfsg-4ubuntu9.2 [191 kB] 103s Get:30 http://ftpmaster.internal/ubuntu noble-updates/main s390x libnfsidmap1 s390x 1:2.6.4-3ubuntu5.1 [49.8 kB] 103s Get:31 http://ftpmaster.internal/ubuntu noble-updates/universe s390x libnss-sudo all 1.9.15p5-3ubuntu5.24.04.1 [15.3 kB] 103s Get:32 http://ftpmaster.internal/ubuntu noble/main s390x libpwquality-common all 1.4.5-3build1 [7748 B] 103s Get:33 http://ftpmaster.internal/ubuntu noble/main s390x libpwquality1 s390x 1.4.5-3build1 [14.8 kB] 103s Get:34 http://ftpmaster.internal/ubuntu noble/main s390x libpam-pwquality s390x 1.4.5-3build1 [11.5 kB] 103s Get:35 http://ftpmaster.internal/ubuntu noble-proposed/main s390x libwbclient0 s390x 2:4.19.5+dfsg-4ubuntu9.2 [71.1 kB] 103s Get:36 http://ftpmaster.internal/ubuntu noble-proposed/main s390x samba-libs s390x 2:4.19.5+dfsg-4ubuntu9.2 [6165 kB] 104s Get:37 http://ftpmaster.internal/ubuntu noble-proposed/main s390x libsmbclient0 s390x 2:4.19.5+dfsg-4ubuntu9.2 [64.3 kB] 104s Get:38 http://ftpmaster.internal/ubuntu noble-updates/main s390x libnss-sss s390x 2.9.4-1.1ubuntu6.2 [33.0 kB] 104s Get:39 http://ftpmaster.internal/ubuntu noble-updates/main s390x libpam-sss s390x 2.9.4-1.1ubuntu6.2 [52.1 kB] 104s Get:40 http://ftpmaster.internal/ubuntu noble-updates/main s390x python3-sss s390x 2.9.4-1.1ubuntu6.2 [47.0 kB] 104s Get:41 http://ftpmaster.internal/ubuntu noble-updates/main s390x libsss-certmap0 s390x 2.9.4-1.1ubuntu6.2 [47.0 kB] 104s Get:42 http://ftpmaster.internal/ubuntu noble-updates/main s390x libsss-idmap0 s390x 2.9.4-1.1ubuntu6.2 [22.5 kB] 104s Get:43 http://ftpmaster.internal/ubuntu noble-updates/main s390x libsss-nss-idmap0 s390x 2.9.4-1.1ubuntu6.2 [31.6 kB] 104s Get:44 http://ftpmaster.internal/ubuntu noble-updates/main s390x sssd-common s390x 2.9.4-1.1ubuntu6.2 [1116 kB] 104s Get:45 http://ftpmaster.internal/ubuntu noble-updates/universe s390x sssd-idp s390x 2.9.4-1.1ubuntu6.2 [26.9 kB] 104s Get:46 http://ftpmaster.internal/ubuntu noble-updates/universe s390x sssd-passkey s390x 2.9.4-1.1ubuntu6.2 [32.0 kB] 104s Get:47 http://ftpmaster.internal/ubuntu noble-updates/main s390x libipa-hbac-dev s390x 2.9.4-1.1ubuntu6.2 [6672 B] 104s Get:48 http://ftpmaster.internal/ubuntu noble-updates/main s390x libsss-certmap-dev s390x 2.9.4-1.1ubuntu6.2 [5734 B] 104s Get:49 http://ftpmaster.internal/ubuntu noble-updates/main s390x libsss-idmap-dev s390x 2.9.4-1.1ubuntu6.2 [8380 B] 104s Get:50 http://ftpmaster.internal/ubuntu noble-updates/main s390x libsss-nss-idmap-dev s390x 2.9.4-1.1ubuntu6.2 [6710 B] 104s Get:51 http://ftpmaster.internal/ubuntu noble-updates/universe s390x libsss-sudo s390x 2.9.4-1.1ubuntu6.2 [21.8 kB] 104s Get:52 http://ftpmaster.internal/ubuntu noble-updates/universe s390x python3-libipa-hbac s390x 2.9.4-1.1ubuntu6.2 [16.9 kB] 104s Get:53 http://ftpmaster.internal/ubuntu noble-updates/universe s390x python3-libsss-nss-idmap s390x 2.9.4-1.1ubuntu6.2 [9080 B] 105s Get:54 http://ftpmaster.internal/ubuntu noble-updates/main s390x sssd-ad-common s390x 2.9.4-1.1ubuntu6.2 [73.8 kB] 105s Get:55 http://ftpmaster.internal/ubuntu noble-updates/main s390x sssd-krb5-common s390x 2.9.4-1.1ubuntu6.2 [88.6 kB] 105s Get:56 http://ftpmaster.internal/ubuntu noble-updates/main s390x sssd-ad s390x 2.9.4-1.1ubuntu6.2 [133 kB] 105s Get:57 http://ftpmaster.internal/ubuntu noble-updates/main s390x sssd-ipa s390x 2.9.4-1.1ubuntu6.2 [214 kB] 105s Get:58 http://ftpmaster.internal/ubuntu noble-updates/main s390x sssd-krb5 s390x 2.9.4-1.1ubuntu6.2 [14.3 kB] 105s Get:59 http://ftpmaster.internal/ubuntu noble-updates/main s390x sssd-ldap s390x 2.9.4-1.1ubuntu6.2 [31.0 kB] 105s Get:60 http://ftpmaster.internal/ubuntu noble-updates/main s390x sssd-proxy s390x 2.9.4-1.1ubuntu6.2 [43.5 kB] 105s Get:61 http://ftpmaster.internal/ubuntu noble-updates/main s390x sssd s390x 2.9.4-1.1ubuntu6.2 [4124 B] 105s Get:62 http://ftpmaster.internal/ubuntu noble-updates/main s390x sssd-dbus s390x 2.9.4-1.1ubuntu6.2 [99.8 kB] 105s Get:63 http://ftpmaster.internal/ubuntu noble-updates/universe s390x sssd-kcm s390x 2.9.4-1.1ubuntu6.2 [135 kB] 105s Get:64 http://ftpmaster.internal/ubuntu noble-updates/main s390x sssd-tools s390x 2.9.4-1.1ubuntu6.2 [97.0 kB] 105s Preconfiguring packages ... 105s Fetched 13.0 MB in 4s (3561 kB/s) 105s Selecting previously unselected package libltdl7:s390x. 105s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 78336 files and directories currently installed.) 105s Preparing to unpack .../00-libltdl7_2.4.7-7build1_s390x.deb ... 105s Unpacking libltdl7:s390x (2.4.7-7build1) ... 105s Selecting previously unselected package libodbc2:s390x. 105s Preparing to unpack .../01-libodbc2_2.3.12-1ubuntu0.24.04.1_s390x.deb ... 105s Unpacking libodbc2:s390x (2.3.12-1ubuntu0.24.04.1) ... 105s Selecting previously unselected package slapd. 105s Preparing to unpack .../02-slapd_2.6.7+dfsg-1~exp1ubuntu8.2_s390x.deb ... 105s Unpacking slapd (2.6.7+dfsg-1~exp1ubuntu8.2) ... 105s Selecting previously unselected package libtcl8.6:s390x. 105s Preparing to unpack .../03-libtcl8.6_8.6.14+dfsg-1build1_s390x.deb ... 105s Unpacking libtcl8.6:s390x (8.6.14+dfsg-1build1) ... 105s Selecting previously unselected package tcl8.6. 105s Preparing to unpack .../04-tcl8.6_8.6.14+dfsg-1build1_s390x.deb ... 105s Unpacking tcl8.6 (8.6.14+dfsg-1build1) ... 105s Selecting previously unselected package tcl-expect:s390x. 105s Preparing to unpack .../05-tcl-expect_5.45.4-3_s390x.deb ... 105s Unpacking tcl-expect:s390x (5.45.4-3) ... 105s Selecting previously unselected package expect. 105s Preparing to unpack .../06-expect_5.45.4-3_s390x.deb ... 105s Unpacking expect (5.45.4-3) ... 105s Selecting previously unselected package ldap-utils. 105s Preparing to unpack .../07-ldap-utils_2.6.7+dfsg-1~exp1ubuntu8.2_s390x.deb ... 105s Unpacking ldap-utils (2.6.7+dfsg-1~exp1ubuntu8.2) ... 105s Selecting previously unselected package libavahi-common-data:s390x. 105s Preparing to unpack .../08-libavahi-common-data_0.8-13ubuntu6_s390x.deb ... 105s Unpacking libavahi-common-data:s390x (0.8-13ubuntu6) ... 105s Selecting previously unselected package libavahi-common3:s390x. 105s Preparing to unpack .../09-libavahi-common3_0.8-13ubuntu6_s390x.deb ... 105s Unpacking libavahi-common3:s390x (0.8-13ubuntu6) ... 105s Selecting previously unselected package libavahi-client3:s390x. 105s Preparing to unpack .../10-libavahi-client3_0.8-13ubuntu6_s390x.deb ... 105s Unpacking libavahi-client3:s390x (0.8-13ubuntu6) ... 105s Selecting previously unselected package libbasicobjects0t64:s390x. 105s Preparing to unpack .../11-libbasicobjects0t64_0.6.2-2.1build1_s390x.deb ... 105s Unpacking libbasicobjects0t64:s390x (0.6.2-2.1build1) ... 105s Selecting previously unselected package libcares2:s390x. 105s Preparing to unpack .../12-libcares2_1.27.0-1.0ubuntu1_s390x.deb ... 105s Unpacking libcares2:s390x (1.27.0-1.0ubuntu1) ... 105s Selecting previously unselected package libcollection4t64:s390x. 105s Preparing to unpack .../13-libcollection4t64_0.6.2-2.1build1_s390x.deb ... 105s Unpacking libcollection4t64:s390x (0.6.2-2.1build1) ... 105s Selecting previously unselected package libcrack2:s390x. 105s Preparing to unpack .../14-libcrack2_2.9.6-5.1build2_s390x.deb ... 105s Unpacking libcrack2:s390x (2.9.6-5.1build2) ... 105s Selecting previously unselected package libdhash1t64:s390x. 105s Preparing to unpack .../15-libdhash1t64_0.6.2-2.1build1_s390x.deb ... 105s Unpacking libdhash1t64:s390x (0.6.2-2.1build1) ... 105s Selecting previously unselected package libevent-2.1-7t64:s390x. 105s Preparing to unpack .../16-libevent-2.1-7t64_2.1.12-stable-9ubuntu2_s390x.deb ... 105s Unpacking libevent-2.1-7t64:s390x (2.1.12-stable-9ubuntu2) ... 105s Selecting previously unselected package libpath-utils1t64:s390x. 105s Preparing to unpack .../17-libpath-utils1t64_0.6.2-2.1build1_s390x.deb ... 105s Unpacking libpath-utils1t64:s390x (0.6.2-2.1build1) ... 105s Selecting previously unselected package libref-array1t64:s390x. 105s Preparing to unpack .../18-libref-array1t64_0.6.2-2.1build1_s390x.deb ... 105s Unpacking libref-array1t64:s390x (0.6.2-2.1build1) ... 105s Selecting previously unselected package libini-config5t64:s390x. 105s Preparing to unpack .../19-libini-config5t64_0.6.2-2.1build1_s390x.deb ... 105s Unpacking libini-config5t64:s390x (0.6.2-2.1build1) ... 105s Selecting previously unselected package libipa-hbac0t64. 105s Preparing to unpack .../20-libipa-hbac0t64_2.9.4-1.1ubuntu6.2_s390x.deb ... 105s Unpacking libipa-hbac0t64 (2.9.4-1.1ubuntu6.2) ... 105s Selecting previously unselected package libjose0:s390x. 105s Preparing to unpack .../21-libjose0_13-1_s390x.deb ... 105s Unpacking libjose0:s390x (13-1) ... 106s Selecting previously unselected package libverto-libevent1t64:s390x. 106s Preparing to unpack .../22-libverto-libevent1t64_0.3.1-1.2ubuntu3_s390x.deb ... 106s Unpacking libverto-libevent1t64:s390x (0.3.1-1.2ubuntu3) ... 106s Selecting previously unselected package libverto1t64:s390x. 106s Preparing to unpack .../23-libverto1t64_0.3.1-1.2ubuntu3_s390x.deb ... 106s Unpacking libverto1t64:s390x (0.3.1-1.2ubuntu3) ... 106s Selecting previously unselected package libkrad0:s390x. 106s Preparing to unpack .../24-libkrad0_1.20.1-6ubuntu2.6_s390x.deb ... 106s Unpacking libkrad0:s390x (1.20.1-6ubuntu2.6) ... 106s Selecting previously unselected package libtalloc2:s390x. 106s Preparing to unpack .../25-libtalloc2_2.4.2-1build2_s390x.deb ... 106s Unpacking libtalloc2:s390x (2.4.2-1build2) ... 106s Selecting previously unselected package libtdb1:s390x. 106s Preparing to unpack .../26-libtdb1_1.4.10-1build1_s390x.deb ... 106s Unpacking libtdb1:s390x (1.4.10-1build1) ... 106s Selecting previously unselected package libtevent0t64:s390x. 106s Preparing to unpack .../27-libtevent0t64_0.16.1-2build1_s390x.deb ... 106s Unpacking libtevent0t64:s390x (0.16.1-2build1) ... 106s Selecting previously unselected package libldb2:s390x. 106s Preparing to unpack .../28-libldb2_2%3a2.8.0+samba4.19.5+dfsg-4ubuntu9.2_s390x.deb ... 106s Unpacking libldb2:s390x (2:2.8.0+samba4.19.5+dfsg-4ubuntu9.2) ... 106s Selecting previously unselected package libnfsidmap1:s390x. 106s Preparing to unpack .../29-libnfsidmap1_1%3a2.6.4-3ubuntu5.1_s390x.deb ... 106s Unpacking libnfsidmap1:s390x (1:2.6.4-3ubuntu5.1) ... 106s Selecting previously unselected package libnss-sudo. 106s Preparing to unpack .../30-libnss-sudo_1.9.15p5-3ubuntu5.24.04.1_all.deb ... 106s Unpacking libnss-sudo (1.9.15p5-3ubuntu5.24.04.1) ... 106s Selecting previously unselected package libpwquality-common. 106s Preparing to unpack .../31-libpwquality-common_1.4.5-3build1_all.deb ... 106s Unpacking libpwquality-common (1.4.5-3build1) ... 106s Selecting previously unselected package libpwquality1:s390x. 106s Preparing to unpack .../32-libpwquality1_1.4.5-3build1_s390x.deb ... 106s Unpacking libpwquality1:s390x (1.4.5-3build1) ... 106s Selecting previously unselected package libpam-pwquality:s390x. 106s Preparing to unpack .../33-libpam-pwquality_1.4.5-3build1_s390x.deb ... 106s Unpacking libpam-pwquality:s390x (1.4.5-3build1) ... 106s Selecting previously unselected package libwbclient0:s390x. 106s Preparing to unpack .../34-libwbclient0_2%3a4.19.5+dfsg-4ubuntu9.2_s390x.deb ... 106s Unpacking libwbclient0:s390x (2:4.19.5+dfsg-4ubuntu9.2) ... 106s Selecting previously unselected package samba-libs:s390x. 106s Preparing to unpack .../35-samba-libs_2%3a4.19.5+dfsg-4ubuntu9.2_s390x.deb ... 106s Unpacking samba-libs:s390x (2:4.19.5+dfsg-4ubuntu9.2) ... 106s Selecting previously unselected package libsmbclient0:s390x. 106s Preparing to unpack .../36-libsmbclient0_2%3a4.19.5+dfsg-4ubuntu9.2_s390x.deb ... 106s Unpacking libsmbclient0:s390x (2:4.19.5+dfsg-4ubuntu9.2) ... 106s Selecting previously unselected package libnss-sss:s390x. 106s Preparing to unpack .../37-libnss-sss_2.9.4-1.1ubuntu6.2_s390x.deb ... 106s Unpacking libnss-sss:s390x (2.9.4-1.1ubuntu6.2) ... 106s Selecting previously unselected package libpam-sss:s390x. 106s Preparing to unpack .../38-libpam-sss_2.9.4-1.1ubuntu6.2_s390x.deb ... 106s Unpacking libpam-sss:s390x (2.9.4-1.1ubuntu6.2) ... 106s Selecting previously unselected package python3-sss. 106s Preparing to unpack .../39-python3-sss_2.9.4-1.1ubuntu6.2_s390x.deb ... 106s Unpacking python3-sss (2.9.4-1.1ubuntu6.2) ... 106s Selecting previously unselected package libsss-certmap0. 106s Preparing to unpack .../40-libsss-certmap0_2.9.4-1.1ubuntu6.2_s390x.deb ... 106s Unpacking libsss-certmap0 (2.9.4-1.1ubuntu6.2) ... 106s Selecting previously unselected package libsss-idmap0. 106s Preparing to unpack .../41-libsss-idmap0_2.9.4-1.1ubuntu6.2_s390x.deb ... 106s Unpacking libsss-idmap0 (2.9.4-1.1ubuntu6.2) ... 106s Selecting previously unselected package libsss-nss-idmap0. 106s Preparing to unpack .../42-libsss-nss-idmap0_2.9.4-1.1ubuntu6.2_s390x.deb ... 106s Unpacking libsss-nss-idmap0 (2.9.4-1.1ubuntu6.2) ... 106s Selecting previously unselected package sssd-common. 106s Preparing to unpack .../43-sssd-common_2.9.4-1.1ubuntu6.2_s390x.deb ... 106s Unpacking sssd-common (2.9.4-1.1ubuntu6.2) ... 106s Selecting previously unselected package sssd-idp. 106s Preparing to unpack .../44-sssd-idp_2.9.4-1.1ubuntu6.2_s390x.deb ... 106s Unpacking sssd-idp (2.9.4-1.1ubuntu6.2) ... 106s Selecting previously unselected package sssd-passkey. 106s Preparing to unpack .../45-sssd-passkey_2.9.4-1.1ubuntu6.2_s390x.deb ... 106s Unpacking sssd-passkey (2.9.4-1.1ubuntu6.2) ... 106s Selecting previously unselected package libipa-hbac-dev. 106s Preparing to unpack .../46-libipa-hbac-dev_2.9.4-1.1ubuntu6.2_s390x.deb ... 106s Unpacking libipa-hbac-dev (2.9.4-1.1ubuntu6.2) ... 106s Selecting previously unselected package libsss-certmap-dev. 106s Preparing to unpack .../47-libsss-certmap-dev_2.9.4-1.1ubuntu6.2_s390x.deb ... 106s Unpacking libsss-certmap-dev (2.9.4-1.1ubuntu6.2) ... 106s Selecting previously unselected package libsss-idmap-dev. 106s Preparing to unpack .../48-libsss-idmap-dev_2.9.4-1.1ubuntu6.2_s390x.deb ... 106s Unpacking libsss-idmap-dev (2.9.4-1.1ubuntu6.2) ... 106s Selecting previously unselected package libsss-nss-idmap-dev. 106s Preparing to unpack .../49-libsss-nss-idmap-dev_2.9.4-1.1ubuntu6.2_s390x.deb ... 106s Unpacking libsss-nss-idmap-dev (2.9.4-1.1ubuntu6.2) ... 106s Selecting previously unselected package libsss-sudo. 106s Preparing to unpack .../50-libsss-sudo_2.9.4-1.1ubuntu6.2_s390x.deb ... 106s Unpacking libsss-sudo (2.9.4-1.1ubuntu6.2) ... 106s Selecting previously unselected package python3-libipa-hbac. 106s Preparing to unpack .../51-python3-libipa-hbac_2.9.4-1.1ubuntu6.2_s390x.deb ... 106s Unpacking python3-libipa-hbac (2.9.4-1.1ubuntu6.2) ... 106s Selecting previously unselected package python3-libsss-nss-idmap. 106s Preparing to unpack .../52-python3-libsss-nss-idmap_2.9.4-1.1ubuntu6.2_s390x.deb ... 106s Unpacking python3-libsss-nss-idmap (2.9.4-1.1ubuntu6.2) ... 106s Selecting previously unselected package sssd-ad-common. 106s Preparing to unpack .../53-sssd-ad-common_2.9.4-1.1ubuntu6.2_s390x.deb ... 106s Unpacking sssd-ad-common (2.9.4-1.1ubuntu6.2) ... 106s Selecting previously unselected package sssd-krb5-common. 106s Preparing to unpack .../54-sssd-krb5-common_2.9.4-1.1ubuntu6.2_s390x.deb ... 106s Unpacking sssd-krb5-common (2.9.4-1.1ubuntu6.2) ... 106s Selecting previously unselected package sssd-ad. 106s Preparing to unpack .../55-sssd-ad_2.9.4-1.1ubuntu6.2_s390x.deb ... 106s Unpacking sssd-ad (2.9.4-1.1ubuntu6.2) ... 106s Selecting previously unselected package sssd-ipa. 106s Preparing to unpack .../56-sssd-ipa_2.9.4-1.1ubuntu6.2_s390x.deb ... 106s Unpacking sssd-ipa (2.9.4-1.1ubuntu6.2) ... 106s Selecting previously unselected package sssd-krb5. 106s Preparing to unpack .../57-sssd-krb5_2.9.4-1.1ubuntu6.2_s390x.deb ... 106s Unpacking sssd-krb5 (2.9.4-1.1ubuntu6.2) ... 106s Selecting previously unselected package sssd-ldap. 106s Preparing to unpack .../58-sssd-ldap_2.9.4-1.1ubuntu6.2_s390x.deb ... 106s Unpacking sssd-ldap (2.9.4-1.1ubuntu6.2) ... 106s Selecting previously unselected package sssd-proxy. 106s Preparing to unpack .../59-sssd-proxy_2.9.4-1.1ubuntu6.2_s390x.deb ... 106s Unpacking sssd-proxy (2.9.4-1.1ubuntu6.2) ... 106s Selecting previously unselected package sssd. 106s Preparing to unpack .../60-sssd_2.9.4-1.1ubuntu6.2_s390x.deb ... 106s Unpacking sssd (2.9.4-1.1ubuntu6.2) ... 106s Selecting previously unselected package sssd-dbus. 106s Preparing to unpack .../61-sssd-dbus_2.9.4-1.1ubuntu6.2_s390x.deb ... 106s Unpacking sssd-dbus (2.9.4-1.1ubuntu6.2) ... 106s Selecting previously unselected package sssd-kcm. 106s Preparing to unpack .../62-sssd-kcm_2.9.4-1.1ubuntu6.2_s390x.deb ... 106s Unpacking sssd-kcm (2.9.4-1.1ubuntu6.2) ... 106s Selecting previously unselected package sssd-tools. 106s Preparing to unpack .../63-sssd-tools_2.9.4-1.1ubuntu6.2_s390x.deb ... 106s Unpacking sssd-tools (2.9.4-1.1ubuntu6.2) ... 106s Setting up libpwquality-common (1.4.5-3build1) ... 106s Setting up libnfsidmap1:s390x (1:2.6.4-3ubuntu5.1) ... 106s Setting up libsss-idmap0 (2.9.4-1.1ubuntu6.2) ... 106s Setting up libbasicobjects0t64:s390x (0.6.2-2.1build1) ... 106s Setting up libipa-hbac0t64 (2.9.4-1.1ubuntu6.2) ... 106s Setting up libsss-idmap-dev (2.9.4-1.1ubuntu6.2) ... 106s Setting up libref-array1t64:s390x (0.6.2-2.1build1) ... 106s Setting up libipa-hbac-dev (2.9.4-1.1ubuntu6.2) ... 106s Setting up libtdb1:s390x (1.4.10-1build1) ... 106s Setting up libcollection4t64:s390x (0.6.2-2.1build1) ... 106s Setting up libevent-2.1-7t64:s390x (2.1.12-stable-9ubuntu2) ... 106s Setting up ldap-utils (2.6.7+dfsg-1~exp1ubuntu8.2) ... 106s Setting up libjose0:s390x (13-1) ... 106s Setting up libwbclient0:s390x (2:4.19.5+dfsg-4ubuntu9.2) ... 106s Setting up libtalloc2:s390x (2.4.2-1build2) ... 106s Setting up libpath-utils1t64:s390x (0.6.2-2.1build1) ... 106s Setting up libavahi-common-data:s390x (0.8-13ubuntu6) ... 106s Setting up libcares2:s390x (1.27.0-1.0ubuntu1) ... 106s Setting up libdhash1t64:s390x (0.6.2-2.1build1) ... 106s Setting up libtcl8.6:s390x (8.6.14+dfsg-1build1) ... 106s Setting up libltdl7:s390x (2.4.7-7build1) ... 106s Setting up libcrack2:s390x (2.9.6-5.1build2) ... 106s Setting up libodbc2:s390x (2.3.12-1ubuntu0.24.04.1) ... 106s Setting up python3-libipa-hbac (2.9.4-1.1ubuntu6.2) ... 106s Setting up libnss-sudo (1.9.15p5-3ubuntu5.24.04.1) ... 106s Setting up libsss-nss-idmap0 (2.9.4-1.1ubuntu6.2) ... 106s Setting up libini-config5t64:s390x (0.6.2-2.1build1) ... 106s Setting up libtevent0t64:s390x (0.16.1-2build1) ... 106s Setting up libnss-sss:s390x (2.9.4-1.1ubuntu6.2) ... 106s Setting up slapd (2.6.7+dfsg-1~exp1ubuntu8.2) ... 106s Creating new user openldap... done. 106s Creating initial configuration... done. 106s Creating LDAP directory... done. 107s Setting up tcl8.6 (8.6.14+dfsg-1build1) ... 107s Setting up libsss-sudo (2.9.4-1.1ubuntu6.2) ... 107s Setting up libsss-nss-idmap-dev (2.9.4-1.1ubuntu6.2) ... 107s Setting up libavahi-common3:s390x (0.8-13ubuntu6) ... 107s Setting up tcl-expect:s390x (5.45.4-3) ... 107s Setting up libsss-certmap0 (2.9.4-1.1ubuntu6.2) ... 107s Setting up libpwquality1:s390x (1.4.5-3build1) ... 107s Setting up python3-libsss-nss-idmap (2.9.4-1.1ubuntu6.2) ... 107s Setting up libldb2:s390x (2:2.8.0+samba4.19.5+dfsg-4ubuntu9.2) ... 107s Setting up libavahi-client3:s390x (0.8-13ubuntu6) ... 107s Setting up expect (5.45.4-3) ... 107s Setting up libpam-pwquality:s390x (1.4.5-3build1) ... 107s Setting up samba-libs:s390x (2:4.19.5+dfsg-4ubuntu9.2) ... 107s Setting up libsss-certmap-dev (2.9.4-1.1ubuntu6.2) ... 107s Setting up python3-sss (2.9.4-1.1ubuntu6.2) ... 107s Setting up libsmbclient0:s390x (2:4.19.5+dfsg-4ubuntu9.2) ... 107s Setting up libpam-sss:s390x (2.9.4-1.1ubuntu6.2) ... 107s Setting up sssd-common (2.9.4-1.1ubuntu6.2) ... 107s Creating SSSD system user & group... 107s warn: The home directory `/var/lib/sss' already exists. Not touching this directory. 107s warn: Warning: The home directory `/var/lib/sss' does not belong to the user you are currently creating. 107s Warning: found usr.sbin.sssd in /etc/apparmor.d/force-complain, forcing complain mode 107s Warning from /etc/apparmor.d/usr.sbin.sssd (/etc/apparmor.d/usr.sbin.sssd line 63): Caching disabled for: 'usr.sbin.sssd' due to force complain 107s Created symlink /etc/systemd/system/sssd.service.wants/sssd-autofs.socket → /usr/lib/systemd/system/sssd-autofs.socket. 108s Created symlink /etc/systemd/system/sssd.service.wants/sssd-nss.socket → /usr/lib/systemd/system/sssd-nss.socket. 108s Created symlink /etc/systemd/system/sssd.service.wants/sssd-pam-priv.socket → /usr/lib/systemd/system/sssd-pam-priv.socket. 108s Created symlink /etc/systemd/system/sssd.service.wants/sssd-pam.socket → /usr/lib/systemd/system/sssd-pam.socket. 108s Created symlink /etc/systemd/system/sssd.service.wants/sssd-ssh.socket → /usr/lib/systemd/system/sssd-ssh.socket. 108s Created symlink /etc/systemd/system/sssd.service.wants/sssd-sudo.socket → /usr/lib/systemd/system/sssd-sudo.socket. 108s Created symlink /etc/systemd/system/multi-user.target.wants/sssd.service → /usr/lib/systemd/system/sssd.service. 109s sssd-autofs.service is a disabled or a static unit, not starting it. 109s sssd-nss.service is a disabled or a static unit, not starting it. 109s sssd-pam.service is a disabled or a static unit, not starting it. 109s sssd-ssh.service is a disabled or a static unit, not starting it. 109s sssd-sudo.service is a disabled or a static unit, not starting it. 109s Could not execute systemctl: at /usr/bin/deb-systemd-invoke line 148. 109s Setting up sssd-proxy (2.9.4-1.1ubuntu6.2) ... 109s Setting up sssd-kcm (2.9.4-1.1ubuntu6.2) ... 109s Created symlink /etc/systemd/system/sockets.target.wants/sssd-kcm.socket → /usr/lib/systemd/system/sssd-kcm.socket. 109s sssd-kcm.service is a disabled or a static unit, not starting it. 109s Setting up sssd-dbus (2.9.4-1.1ubuntu6.2) ... 109s sssd-ifp.service is a disabled or a static unit, not starting it. 109s Setting up sssd-ad-common (2.9.4-1.1ubuntu6.2) ... 109s Created symlink /etc/systemd/system/sssd.service.wants/sssd-pac.socket → /usr/lib/systemd/system/sssd-pac.socket. 110s sssd-pac.service is a disabled or a static unit, not starting it. 110s Could not execute systemctl: at /usr/bin/deb-systemd-invoke line 148. 110s Setting up sssd-krb5-common (2.9.4-1.1ubuntu6.2) ... 110s Setting up sssd-krb5 (2.9.4-1.1ubuntu6.2) ... 110s Setting up sssd-ldap (2.9.4-1.1ubuntu6.2) ... 110s Setting up sssd-ad (2.9.4-1.1ubuntu6.2) ... 110s Setting up sssd-tools (2.9.4-1.1ubuntu6.2) ... 110s Setting up sssd-ipa (2.9.4-1.1ubuntu6.2) ... 110s Setting up sssd (2.9.4-1.1ubuntu6.2) ... 110s Setting up libverto-libevent1t64:s390x (0.3.1-1.2ubuntu3) ... 110s Setting up libverto1t64:s390x (0.3.1-1.2ubuntu3) ... 110s Setting up libkrad0:s390x (1.20.1-6ubuntu2.6) ... 110s Setting up sssd-passkey (2.9.4-1.1ubuntu6.2) ... 110s Setting up sssd-idp (2.9.4-1.1ubuntu6.2) ... 110s Processing triggers for libc-bin (2.39-0ubuntu8.4) ... 110s Processing triggers for ufw (0.36.2-6) ... 110s Processing triggers for man-db (2.12.0-4build2) ... 110s Processing triggers for dbus (1.14.10-4ubuntu4.1) ... 116s autopkgtest [23:59:32]: test ldap-user-group-ldap-auth: [----------------------- 116s + . debian/tests/util 116s + . debian/tests/common-tests 116s + mydomain=example.com 116s + myhostname=ldap.example.com 116s + mysuffix=dc=example,dc=com 116s + admin_dn=cn=admin,dc=example,dc=com 116s + admin_pw=secret 116s + ldap_user=testuser1 116s + ldap_user_pw=testuser1secret 116s + ldap_group=ldapusers 116s + adjust_hostname ldap.example.com 116s + local myhostname=ldap.example.com 116s + echo ldap.example.com 116s + hostname ldap.example.com 116s + grep -qE ldap.example.com /etc/hosts 116s + echo 127.0.1.10 ldap.example.com 116s + reconfigure_slapd 116s + debconf-set-selections 116s + rm -rf /var/backups/*slapd* /var/backups/unknown*ldapdb 116s + dpkg-reconfigure -fnoninteractive -pcritical slapd 116s Backing up /etc/ldap/slapd.d in /var/backups/slapd-2.6.7+dfsg-1~exp1ubuntu8.2... done. 116s Moving old database directory to /var/backups: 116s - directory unknown... done. 116s Creating initial configuration... done. 116s Creating LDAP directory... done. 117s + generate_certs ldap.example.com 117s + local cn=ldap.example.com 117s + local cert=/etc/ldap/server.pem 117s + local key=/etc/ldap/server.key 117s + local cnf=/etc/ldap/openssl.cnf 117s + cat 117s + openssl req -new -x509 -nodes -out /etc/ldap/server.pem -keyout /etc/ldap/server.key -config /etc/ldap/openssl.cnf 117s .............++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ 117s .......................................................++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ 117s ----- 117s + chmod 0640 /etc/ldap/server.key 117s + chgrp openldap /etc/ldap/server.key 117s + [ ! -f /etc/ldap/server.pem ] 117s + [ ! -f /etc/ldap/server.key ] 117s + enable_ldap_ssl 117s + cat 117s + cat 117s + ldapmodify -H ldapi:/// -Y EXTERNAL -Q 117s + populate_ldap_rfc2307 117s + cat 117s + ldapadd -x -D cn=admin,dc=example,dc=com -w secret 117s modifying entry "cn=config" 117s 117s + configure_sssd_ldap_rfc2307 117s + cat 117s + chmod 0600 /etc/sssd/sssd.conf 117s + systemctl restart sssd 117s adding new entry "ou=People,dc=example,dc=com" 117s 117s adding new entry "ou=Group,dc=example,dc=com" 117s 117s adding new entry "uid=testuser1,ou=People,dc=example,dc=com" 117s 117s adding new entry "cn=testuser1,ou=Group,dc=example,dc=com" 117s 117s adding new entry "cn=ldapusers,ou=Group,dc=example,dc=com" 117s 117s + enable_pam_mkhomedir 117s + grep -qE ^session.*pam_mkhomedir\.so /etc/pam.d/common-session 117s + echo session optional pam_mkhomedir.so 117s + run_common_tests 117s + echo Assert local user databases do not have our LDAP test data 117s + check_local_user testuser1 117s + local local_user=testuser1 117s + grep -q ^testuser1 /etc/passwd 117s + check_local_group testuser1 117s + local local_group=testuser1 117s + grep -q ^testuser1 /etc/group 117s Assert local user databases do not have our LDAP test data 117s + check_local_group ldapusers 117s + local local_group=ldapusers 117s + grep -q ^ldapusers /etc/group 117s + echo The LDAP user is known to the system via getent 117s + check_getent_user testuser1 117s + local getent_user=testuser1 117s + local output 117s + The LDAP user is known to the system via getent 117s getent passwd testuser1 117s + output=testuser1:*:10001:10001:testuser1:/home/testuser1:/bin/bash 117s + [ -z testuser1:*:10001:10001:testuser1:/home/testuser1:/bin/bash ] 117s + echo The LDAP user's private group is known to the system via getent 117s + check_getent_group testuser1 117s + local getent_group=testuser1 117s + local output 117s + getent group testuser1 117s The LDAP user's private group is known to the system via getent 117s + output=testuser1:*:10001:testuser1 117s + [ -z testuser1:*:10001:testuser1 ] 117s + echo The LDAP group ldapusers is known to the system via getent 117s + check_getent_group ldapusers 117s + local getent_group=ldapusers 117s + local output 117s + getent group ldapusers 117s The LDAP group ldapusers is known to the system via getent 117s + output=ldapusers:*:10100:testuser1 117s + [ -z ldapusers:*:10100:testuser1 ] 117s + echo The id(1) command can resolve the group membership of the LDAP user 117s + id -Gn testuser1 117s The id(1) command can resolve the group membership of the LDAP user 117s + output=testuser1 ldapusers 117s + [ testuser1 ldapusers != testuser1 ldapusers ] 117s + echo The LDAP user can login on a terminal 117s + /usr/bin/expect -f debian/tests/login.exp testuser1 testuser1secret 117s The LDAP user can login on a terminal 117s spawn login 117s ldap.example.com login: testuser1 117s Password: 117s Welcome to Ubuntu 24.04.2 LTS (GNU/Linux 6.8.0-63-generic s390x) 117s 117s * Documentation: https://help.ubuntu.com 117s * Management: https://landscape.canonical.com 117s * Support: https://ubuntu.com/pro 117s 117s 117s The programs included with the Ubuntu system are free software; 117s the exact distribution terms for each program are described in the 117s individual files in /usr/share/doc/*/copyright. 117s 117s Ubuntu comes with ABSOLUTELY NO WARRANTY, to the extent permitted by 117s applicable law. 117s 117s 117s The programs included with the Ubuntu system are free software; 117s the exact distribution terms for each program are described in the 117s individual files in /usr/share/doc/*/copyright. 117s 117s Ubuntu comes with ABSOLUTELY NO WARRANTY, to the extent permitted by 117s applicable law. 117s 117s Creating directory '/home/testuser1'. 117s [?2004htestuser1@ldap:~$ id -un 117s [?2004l testuser1 117s [?2004htestuser1@ldap:~$ autopkgtest [23:59:33]: test ldap-user-group-ldap-auth: -----------------------] 118s autopkgtest [23:59:34]: test ldap-user-group-ldap-auth: - - - - - - - - - - results - - - - - - - - - - 118s ldap-user-group-ldap-auth PASS 118s autopkgtest [23:59:34]: test ldap-user-group-krb5-auth: preparing testbed 118s Reading package lists... 118s Building dependency tree... 118s Reading state information... 118s Starting pkgProblemResolver with broken count: 0 118s Starting 2 pkgProblemResolver with broken count: 0 118s Done 119s The following NEW packages will be installed: 119s krb5-admin-server krb5-config krb5-kdc krb5-user libgssrpc4t64 119s libkadm5clnt-mit12 libkadm5srv-mit12 libkdb5-10t64 119s 0 upgraded, 8 newly installed, 0 to remove and 0 not upgraded. 119s Need to get 614 kB of archives. 119s After this operation, 2089 kB of additional disk space will be used. 119s Get:1 http://ftpmaster.internal/ubuntu noble/main s390x krb5-config all 2.7 [22.0 kB] 119s Get:2 http://ftpmaster.internal/ubuntu noble-updates/main s390x libgssrpc4t64 s390x 1.20.1-6ubuntu2.6 [59.3 kB] 119s Get:3 http://ftpmaster.internal/ubuntu noble-updates/main s390x libkadm5clnt-mit12 s390x 1.20.1-6ubuntu2.6 [40.6 kB] 119s Get:4 http://ftpmaster.internal/ubuntu noble-updates/main s390x libkdb5-10t64 s390x 1.20.1-6ubuntu2.6 [41.8 kB] 119s Get:5 http://ftpmaster.internal/ubuntu noble-updates/main s390x libkadm5srv-mit12 s390x 1.20.1-6ubuntu2.6 [55.4 kB] 119s Get:6 http://ftpmaster.internal/ubuntu noble-updates/universe s390x krb5-user s390x 1.20.1-6ubuntu2.6 [110 kB] 119s Get:7 http://ftpmaster.internal/ubuntu noble-updates/universe s390x krb5-kdc s390x 1.20.1-6ubuntu2.6 [189 kB] 119s Get:8 http://ftpmaster.internal/ubuntu noble-updates/universe s390x krb5-admin-server s390x 1.20.1-6ubuntu2.6 [95.8 kB] 119s Preconfiguring packages ... 120s Fetched 614 kB in 1s (1169 kB/s) 120s Selecting previously unselected package krb5-config. 120s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 79627 files and directories currently installed.) 120s Preparing to unpack .../0-krb5-config_2.7_all.deb ... 120s Unpacking krb5-config (2.7) ... 120s Selecting previously unselected package libgssrpc4t64:s390x. 120s Preparing to unpack .../1-libgssrpc4t64_1.20.1-6ubuntu2.6_s390x.deb ... 120s Unpacking libgssrpc4t64:s390x (1.20.1-6ubuntu2.6) ... 120s Selecting previously unselected package libkadm5clnt-mit12:s390x. 120s Preparing to unpack .../2-libkadm5clnt-mit12_1.20.1-6ubuntu2.6_s390x.deb ... 120s Unpacking libkadm5clnt-mit12:s390x (1.20.1-6ubuntu2.6) ... 120s Selecting previously unselected package libkdb5-10t64:s390x. 120s Preparing to unpack .../3-libkdb5-10t64_1.20.1-6ubuntu2.6_s390x.deb ... 120s Unpacking libkdb5-10t64:s390x (1.20.1-6ubuntu2.6) ... 120s Selecting previously unselected package libkadm5srv-mit12:s390x. 120s Preparing to unpack .../4-libkadm5srv-mit12_1.20.1-6ubuntu2.6_s390x.deb ... 120s Unpacking libkadm5srv-mit12:s390x (1.20.1-6ubuntu2.6) ... 120s Selecting previously unselected package krb5-user. 120s Preparing to unpack .../5-krb5-user_1.20.1-6ubuntu2.6_s390x.deb ... 120s Unpacking krb5-user (1.20.1-6ubuntu2.6) ... 120s Selecting previously unselected package krb5-kdc. 120s Preparing to unpack .../6-krb5-kdc_1.20.1-6ubuntu2.6_s390x.deb ... 120s Unpacking krb5-kdc (1.20.1-6ubuntu2.6) ... 120s Selecting previously unselected package krb5-admin-server. 120s Preparing to unpack .../7-krb5-admin-server_1.20.1-6ubuntu2.6_s390x.deb ... 120s Unpacking krb5-admin-server (1.20.1-6ubuntu2.6) ... 120s Setting up libgssrpc4t64:s390x (1.20.1-6ubuntu2.6) ... 120s Setting up krb5-config (2.7) ... 120s Setting up libkadm5clnt-mit12:s390x (1.20.1-6ubuntu2.6) ... 120s Setting up libkdb5-10t64:s390x (1.20.1-6ubuntu2.6) ... 120s Setting up libkadm5srv-mit12:s390x (1.20.1-6ubuntu2.6) ... 120s Setting up krb5-user (1.20.1-6ubuntu2.6) ... 120s update-alternatives: using /usr/bin/kinit.mit to provide /usr/bin/kinit (kinit) in auto mode 120s update-alternatives: using /usr/bin/klist.mit to provide /usr/bin/klist (klist) in auto mode 120s update-alternatives: using /usr/bin/kswitch.mit to provide /usr/bin/kswitch (kswitch) in auto mode 120s update-alternatives: using /usr/bin/ksu.mit to provide /usr/bin/ksu (ksu) in auto mode 120s update-alternatives: using /usr/bin/kpasswd.mit to provide /usr/bin/kpasswd (kpasswd) in auto mode 120s update-alternatives: using /usr/bin/kdestroy.mit to provide /usr/bin/kdestroy (kdestroy) in auto mode 120s update-alternatives: using /usr/bin/kadmin.mit to provide /usr/bin/kadmin (kadmin) in auto mode 120s update-alternatives: using /usr/bin/ktutil.mit to provide /usr/bin/ktutil (ktutil) in auto mode 120s Setting up krb5-kdc (1.20.1-6ubuntu2.6) ... 120s Created symlink /etc/systemd/system/multi-user.target.wants/krb5-kdc.service → /usr/lib/systemd/system/krb5-kdc.service. 120s Could not execute systemctl: at /usr/bin/deb-systemd-invoke line 148. 120s Setting up krb5-admin-server (1.20.1-6ubuntu2.6) ... 121s Created symlink /etc/systemd/system/multi-user.target.wants/krb5-admin-server.service → /usr/lib/systemd/system/krb5-admin-server.service. 121s Processing triggers for man-db (2.12.0-4build2) ... 121s Processing triggers for libc-bin (2.39-0ubuntu8.4) ... 127s autopkgtest [23:59:43]: test ldap-user-group-krb5-auth: [----------------------- 128s + . debian/tests/util 128s + . debian/tests/common-tests 128s + mydomain=example.com 128s + myhostname=ldap.example.com 128s + mysuffix=dc=example,dc=com 128s + myrealm=EXAMPLE.COM 128s + admin_dn=cn=admin,dc=example,dc=com 128s + admin_pw=secret 128s + ldap_user=testuser1 128s + ldap_user_pw=testuser1secret 128s + kerberos_principal_pw=testuser1kerberos 128s + ldap_group=ldapusers 128s + adjust_hostname ldap.example.com 128s + local myhostname=ldap.example.com 128s + echo ldap.example.com 128s + hostname ldap.example.com 128s + grep -qE ldap.example.com /etc/hosts 128s + reconfigure_slapd 128s + debconf-set-selections 128s + rm -rf /var/backups/slapd-2.6.7+dfsg-1~exp1ubuntu8.2 /var/backups/unknown-2.6.7+dfsg-1~exp1ubuntu8.2-20250703-235932.ldapdb 128s + dpkg-reconfigure -fnoninteractive -pcritical slapd 128s Backing up /etc/ldap/slapd.d in /var/backups/slapd-2.6.7+dfsg-1~exp1ubuntu8.2... done. 128s Moving old database directory to /var/backups: 128s - directory unknown... done. 128s Creating initial configuration... done. 128s Creating LDAP directory... done. 128s + generate_certs ldap.example.com 128s + local cn=ldap.example.com 128s + local cert=/etc/ldap/server.pem 128s + local key=/etc/ldap/server.key 128s + local cnf=/etc/ldap/openssl.cnf 128s + cat 128s + openssl req -new -x509 -nodes -out /etc/ldap/server.pem -keyout /etc/ldap/server.key -config /etc/ldap/openssl.cnf 128s .++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ 128s ....................................................++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ 128s ----- 128s + chmod 0640 /etc/ldap/server.key 128s + chgrp openldap /etc/ldap/server.key 128s + [ ! -f /etc/ldap/server.pem ] 128s + [ ! -f /etc/ldap/server.key ] 128s + enable_ldap_ssl 128s + cat 128s + cat 128s + ldapmodify -H ldapi:/// -Y EXTERNAL -Q 128s + populate_ldap_rfc2307 128s + ldapadd -x -D cn=admin,dc=example,dc=com -w secret 128s + cat 128s + create_realm EXAMPLE.COM ldap.example.com 128s + local realm_name=EXAMPLE.COM 128s + local kerberos_server=ldap.example.com 128s + rm -rf /var/lib/krb5kdc/* 128s + rm -rf /etc/krb5kdc/kdc.conf 128s + rm -f /etc/krb5.keytab 128s + cat 128s + cat 128s + echo # */admin * 128s + kdb5_util create -s -P secretpassword 128s + systemctl restart krb5-kdc.service krb5-admin-server.service 128s modifying entry "cn=config" 128s 128s adding new entry "ou=People,dc=example,dc=com" 128s 128s adding new entry "ou=Group,dc=example,dc=com" 128s 128s adding new entry "uid=testuser1,ou=People,dc=example,dc=com" 128s 128s adding new entry "cn=testuser1,ou=Group,dc=example,dc=com" 128s 128s adding new entry "cn=ldapusers,ou=Group,dc=example,dc=com" 128s 128s Initializing database '/var/lib/krb5kdc/principal' for realm 'EXAMPLE.COM', 128s master key name 'K/M@EXAMPLE.COM' 128s + create_krb_principal testuser1 testuser1kerberos 128s + local principal=testuser1 128s + local password=testuser1kerberos 128s + kadmin.local -q addprinc -pw testuser1kerberos testuser1 128s No policy specified for testuser1@EXAMPLE.COM; defaulting to no policy 128s Authenticating as principal root/admin@EXAMPLE.COM with password. 128s Principal "testuser1@EXAMPLE.COM" created. 128s + configure_sssd_ldap_rfc2307_krb5_auth 128s + cat 128s + chmod 0600 /etc/sssd/sssd.conf 128s + systemctl restart sssd 129s Assert local user databases do not have our LDAP test data 129s + enable_pam_mkhomedir 129s + grep -qE ^session.*pam_mkhomedir\.so /etc/pam.d/common-session 129s + run_common_tests 129s + echo Assert local user databases do not have our LDAP test data 129s + check_local_user testuser1 129s + local local_user=testuser1 129s + grep -q ^testuser1 /etc/passwd 129s The LDAP user is known to the system via getent 129s + check_local_group testuser1 129s + local local_group=testuser1 129s + grep -q ^testuser1 /etc/group 129s + check_local_group ldapusers 129s + local local_group=ldapusers 129s + grep -q ^ldapusers /etc/group 129s + echo The LDAP user is known to the system via getent 129s + check_getent_user testuser1 129s + local getent_user=testuser1 129s + local output 129s + getent passwd testuser1 129s + output=testuser1:*:10001:10001:testuser1:/home/testuser1:/bin/bash 129s + [ -z testuser1:*:10001:10001:testuser1:/home/testuser1:/bin/bash ] 129s + echo The LDAP user's private group is known to the system via getent 129s + check_getent_group testuser1 129s + local getent_group=testuser1 129s + local output 129s + getent group testuser1 129s The LDAP user's private group is known to the system via getent 129s The LDAP group ldapusers is known to the system via getent 129s + output=testuser1:*:10001:testuser1 129s + [ -z testuser1:*:10001:testuser1 ] 129s + echo The LDAP group ldapusers is known to the system via getent 129s + check_getent_group ldapusers 129s + local getent_group=ldapusers 129s + local output 129s + getent group ldapusers 129s The id(1) command can resolve the group membership of the LDAP user 129s + output=ldapusers:*:10100:testuser1 129s + [ -z ldapusers:*:10100:testuser1 ] 129s + echo The id(1) command can resolve the group membership of the LDAP user 129s + id -Gn testuser1 129s The Kerberos principal can login on a terminal 129s + output=testuser1 ldapusers 129s + [ testuser1 ldapusers != testuser1 ldapusers ] 129s + echo The Kerberos principal can login on a terminal 129s + kdestroy 129s + /usr/bin/expect -f debian/tests/login.exp testuser1 testuser1kerberos testuser1@EXAMPLE.COM 129s spawn login 129s ldap.example.com login: testuser1 129s Password: 129s Welcome to Ubuntu 24.04.2 LTS (GNU/Linux 6.8.0-63-generic s390x) 129s 129s * Documentation: https://help.ubuntu.com 129s * Management: https://landscape.canonical.com 129s * Support: https://ubuntu.com/pro 129s 129s 129s The programs included with the Ubuntu system are free software; 129s the exact distribution terms for each program are described in the 129s individual files in /usr/share/doc/*/copyright. 129s 129s Ubuntu comes with ABSOLUTELY NO WARRANTY, to the extent permitted by 129s applicable law. 129s 129s [?2004htestuser1@ldap:~$ id -un 129s [?2004l testuser1 129s [?2004htestuser1@ldap:~$ klist 129s [?2004l Ticket cache: FILE:/tmp/krb5cc_10001_xDyGRx 129s Default principal: testuser1@EXAMPLE.COM 129s 129s Valid starting Expires Service principal 129s 07/03/25 23:59:45 07/04/25 09:59:45 krbtgt/EXAMPLE.COM@EXAMPLE.COM 129s renew until 07/04/25 23:59:45 129s autopkgtest [23:59:45]: test ldap-user-group-krb5-auth: -----------------------] 130s autopkgtest [23:59:46]: test ldap-user-group-krb5-auth: - - - - - - - - - - results - - - - - - - - - - 130s ldap-user-group-krb5-auth PASS 130s autopkgtest [23:59:46]: test sssd-softhism2-certificates-tests.sh: preparing testbed 167s Creating nova instance adt-noble-s390x-sssd-20250703-235735-juju-7f2275-prod-proposed-migration-environment-21-ea157941-59c5-40d0-8951-c70dd33955da from image adt/ubuntu-noble-s390x-server-20250703.img (UUID b4c76a43-004c-4cc1-b99b-b9be5033b9ed)... 206s autopkgtest [00:01:02]: testbed dpkg architecture: s390x 206s autopkgtest [00:01:02]: testbed apt version: 2.8.3 206s autopkgtest [00:01:02]: @@@@@@@@@@@@@@@@@@@@ test bed setup 206s autopkgtest [00:01:02]: testbed release detected to be: noble 207s autopkgtest [00:01:03]: updating testbed package index (apt update) 207s Get:1 http://ftpmaster.internal/ubuntu noble-proposed InRelease [265 kB] 208s Hit:2 http://ftpmaster.internal/ubuntu noble InRelease 208s Hit:3 http://ftpmaster.internal/ubuntu noble-updates InRelease 208s Hit:4 http://ftpmaster.internal/ubuntu noble-security InRelease 208s Get:5 http://ftpmaster.internal/ubuntu noble-proposed/universe Sources [63.8 kB] 208s Get:6 http://ftpmaster.internal/ubuntu noble-proposed/restricted Sources [28.9 kB] 208s Get:7 http://ftpmaster.internal/ubuntu noble-proposed/multiverse Sources [3948 B] 208s Get:8 http://ftpmaster.internal/ubuntu noble-proposed/main Sources [64.5 kB] 208s Get:9 http://ftpmaster.internal/ubuntu noble-proposed/main s390x Packages [111 kB] 208s Get:10 http://ftpmaster.internal/ubuntu noble-proposed/main s390x c-n-f Metadata [2172 B] 208s Get:11 http://ftpmaster.internal/ubuntu noble-proposed/restricted s390x Packages [2720 B] 208s Get:12 http://ftpmaster.internal/ubuntu noble-proposed/restricted s390x c-n-f Metadata [116 B] 208s Get:13 http://ftpmaster.internal/ubuntu noble-proposed/universe s390x Packages [284 kB] 208s Get:14 http://ftpmaster.internal/ubuntu noble-proposed/universe s390x c-n-f Metadata [2500 B] 208s Get:15 http://ftpmaster.internal/ubuntu noble-proposed/multiverse s390x Packages [752 B] 208s Get:16 http://ftpmaster.internal/ubuntu noble-proposed/multiverse s390x c-n-f Metadata [116 B] 210s Fetched 829 kB in 1s (871 kB/s) 211s Reading package lists... 212s autopkgtest [00:01:08]: upgrading testbed (apt dist-upgrade and autopurge) 212s Reading package lists... 212s Building dependency tree... 212s Reading state information... 212s Calculating upgrade...Starting pkgProblemResolver with broken count: 0 212s Starting 2 pkgProblemResolver with broken count: 0 212s Done 212s Entering ResolveByKeep 212s 213s The following packages will be upgraded: 213s gzip libnetplan1 libnss-systemd libpam-systemd libsystemd-shared libsystemd0 213s libudev1 netplan-generator netplan.io openssh-client openssh-server 213s openssh-sftp-server python3-netplan systemd systemd-dev systemd-resolved 213s systemd-sysv systemd-timesyncd udev 213s 19 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 213s Need to get 10.9 MB of archives. 213s After this operation, 34.8 kB of additional disk space will be used. 213s Get:1 http://ftpmaster.internal/ubuntu noble-updates/main s390x gzip s390x 1.12-1ubuntu3.1 [106 kB] 213s Get:2 http://ftpmaster.internal/ubuntu noble-proposed/main s390x libnss-systemd s390x 255.4-1ubuntu8.10 [165 kB] 213s Get:3 http://ftpmaster.internal/ubuntu noble-proposed/main s390x systemd-dev all 255.4-1ubuntu8.10 [105 kB] 213s Get:4 http://ftpmaster.internal/ubuntu noble-proposed/main s390x systemd-timesyncd s390x 255.4-1ubuntu8.10 [35.1 kB] 213s Get:5 http://ftpmaster.internal/ubuntu noble-proposed/main s390x systemd-resolved s390x 255.4-1ubuntu8.10 [302 kB] 213s Get:6 http://ftpmaster.internal/ubuntu noble-proposed/main s390x libsystemd-shared s390x 255.4-1ubuntu8.10 [2127 kB] 214s Get:7 http://ftpmaster.internal/ubuntu noble-proposed/main s390x libsystemd0 s390x 255.4-1ubuntu8.10 [444 kB] 214s Get:8 http://ftpmaster.internal/ubuntu noble-proposed/main s390x systemd-sysv s390x 255.4-1ubuntu8.10 [11.9 kB] 214s Get:9 http://ftpmaster.internal/ubuntu noble-proposed/main s390x libpam-systemd s390x 255.4-1ubuntu8.10 [241 kB] 214s Get:10 http://ftpmaster.internal/ubuntu noble-proposed/main s390x systemd s390x 255.4-1ubuntu8.10 [3534 kB] 215s Get:11 http://ftpmaster.internal/ubuntu noble-proposed/main s390x udev s390x 255.4-1ubuntu8.10 [1883 kB] 215s Get:12 http://ftpmaster.internal/ubuntu noble-proposed/main s390x libudev1 s390x 255.4-1ubuntu8.10 [180 kB] 215s Get:13 http://ftpmaster.internal/ubuntu noble-proposed/main s390x openssh-sftp-server s390x 1:9.6p1-3ubuntu13.13 [38.6 kB] 215s Get:14 http://ftpmaster.internal/ubuntu noble-proposed/main s390x openssh-server s390x 1:9.6p1-3ubuntu13.13 [526 kB] 215s Get:15 http://ftpmaster.internal/ubuntu noble-proposed/main s390x openssh-client s390x 1:9.6p1-3ubuntu13.13 [931 kB] 216s Get:16 http://ftpmaster.internal/ubuntu noble-proposed/main s390x python3-netplan s390x 1.1.2-2~ubuntu24.04.2 [24.4 kB] 216s Get:17 http://ftpmaster.internal/ubuntu noble-proposed/main s390x netplan-generator s390x 1.1.2-2~ubuntu24.04.2 [61.2 kB] 216s Get:18 http://ftpmaster.internal/ubuntu noble-proposed/main s390x netplan.io s390x 1.1.2-2~ubuntu24.04.2 [69.6 kB] 216s Get:19 http://ftpmaster.internal/ubuntu noble-proposed/main s390x libnetplan1 s390x 1.1.2-2~ubuntu24.04.2 [135 kB] 216s Preconfiguring packages ... 216s Fetched 10.9 MB in 3s (3662 kB/s) 216s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 78336 files and directories currently installed.) 216s Preparing to unpack .../gzip_1.12-1ubuntu3.1_s390x.deb ... 216s Unpacking gzip (1.12-1ubuntu3.1) over (1.12-1ubuntu3) ... 216s Setting up gzip (1.12-1ubuntu3.1) ... 216s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 78336 files and directories currently installed.) 216s Preparing to unpack .../0-libnss-systemd_255.4-1ubuntu8.10_s390x.deb ... 216s Unpacking libnss-systemd:s390x (255.4-1ubuntu8.10) over (255.4-1ubuntu8.8) ... 216s Preparing to unpack .../1-systemd-dev_255.4-1ubuntu8.10_all.deb ... 216s Unpacking systemd-dev (255.4-1ubuntu8.10) over (255.4-1ubuntu8.8) ... 216s Preparing to unpack .../2-systemd-timesyncd_255.4-1ubuntu8.10_s390x.deb ... 216s Unpacking systemd-timesyncd (255.4-1ubuntu8.10) over (255.4-1ubuntu8.8) ... 216s Preparing to unpack .../3-systemd-resolved_255.4-1ubuntu8.10_s390x.deb ... 216s Unpacking systemd-resolved (255.4-1ubuntu8.10) over (255.4-1ubuntu8.8) ... 216s Preparing to unpack .../4-libsystemd-shared_255.4-1ubuntu8.10_s390x.deb ... 216s Unpacking libsystemd-shared:s390x (255.4-1ubuntu8.10) over (255.4-1ubuntu8.8) ... 216s Preparing to unpack .../5-libsystemd0_255.4-1ubuntu8.10_s390x.deb ... 216s Unpacking libsystemd0:s390x (255.4-1ubuntu8.10) over (255.4-1ubuntu8.8) ... 216s Setting up libsystemd0:s390x (255.4-1ubuntu8.10) ... 216s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 78336 files and directories currently installed.) 216s Preparing to unpack .../systemd-sysv_255.4-1ubuntu8.10_s390x.deb ... 216s Unpacking systemd-sysv (255.4-1ubuntu8.10) over (255.4-1ubuntu8.8) ... 216s Preparing to unpack .../libpam-systemd_255.4-1ubuntu8.10_s390x.deb ... 216s Unpacking libpam-systemd:s390x (255.4-1ubuntu8.10) over (255.4-1ubuntu8.8) ... 216s Preparing to unpack .../systemd_255.4-1ubuntu8.10_s390x.deb ... 216s Unpacking systemd (255.4-1ubuntu8.10) over (255.4-1ubuntu8.8) ... 216s Preparing to unpack .../udev_255.4-1ubuntu8.10_s390x.deb ... 216s Unpacking udev (255.4-1ubuntu8.10) over (255.4-1ubuntu8.8) ... 216s Preparing to unpack .../libudev1_255.4-1ubuntu8.10_s390x.deb ... 216s Unpacking libudev1:s390x (255.4-1ubuntu8.10) over (255.4-1ubuntu8.8) ... 216s Setting up libudev1:s390x (255.4-1ubuntu8.10) ... 216s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 78336 files and directories currently installed.) 216s Preparing to unpack .../0-openssh-sftp-server_1%3a9.6p1-3ubuntu13.13_s390x.deb ... 216s Unpacking openssh-sftp-server (1:9.6p1-3ubuntu13.13) over (1:9.6p1-3ubuntu13.12) ... 216s Preparing to unpack .../1-openssh-server_1%3a9.6p1-3ubuntu13.13_s390x.deb ... 217s Unpacking openssh-server (1:9.6p1-3ubuntu13.13) over (1:9.6p1-3ubuntu13.12) ... 217s Preparing to unpack .../2-openssh-client_1%3a9.6p1-3ubuntu13.13_s390x.deb ... 217s Unpacking openssh-client (1:9.6p1-3ubuntu13.13) over (1:9.6p1-3ubuntu13.12) ... 217s Preparing to unpack .../3-python3-netplan_1.1.2-2~ubuntu24.04.2_s390x.deb ... 217s Unpacking python3-netplan (1.1.2-2~ubuntu24.04.2) over (1.1.2-2~ubuntu24.04.1) ... 217s Preparing to unpack .../4-netplan-generator_1.1.2-2~ubuntu24.04.2_s390x.deb ... 217s Adding 'diversion of /lib/systemd/system-generators/netplan to /lib/systemd/system-generators/netplan.usr-is-merged by netplan-generator' 217s Unpacking netplan-generator (1.1.2-2~ubuntu24.04.2) over (1.1.2-2~ubuntu24.04.1) ... 217s Preparing to unpack .../5-netplan.io_1.1.2-2~ubuntu24.04.2_s390x.deb ... 217s Unpacking netplan.io (1.1.2-2~ubuntu24.04.2) over (1.1.2-2~ubuntu24.04.1) ... 217s Preparing to unpack .../6-libnetplan1_1.1.2-2~ubuntu24.04.2_s390x.deb ... 217s Unpacking libnetplan1:s390x (1.1.2-2~ubuntu24.04.2) over (1.1.2-2~ubuntu24.04.1) ... 217s Setting up openssh-client (1:9.6p1-3ubuntu13.13) ... 217s Setting up systemd-dev (255.4-1ubuntu8.10) ... 217s Setting up libnetplan1:s390x (1.1.2-2~ubuntu24.04.2) ... 217s Setting up libsystemd-shared:s390x (255.4-1ubuntu8.10) ... 217s Setting up python3-netplan (1.1.2-2~ubuntu24.04.2) ... 217s Setting up openssh-sftp-server (1:9.6p1-3ubuntu13.13) ... 217s Setting up openssh-server (1:9.6p1-3ubuntu13.13) ... 218s Setting up systemd (255.4-1ubuntu8.10) ... 218s Setting up systemd-timesyncd (255.4-1ubuntu8.10) ... 218s Setting up udev (255.4-1ubuntu8.10) ... 219s Setting up netplan-generator (1.1.2-2~ubuntu24.04.2) ... 219s Removing 'diversion of /lib/systemd/system-generators/netplan to /lib/systemd/system-generators/netplan.usr-is-merged by netplan-generator' 219s Setting up systemd-resolved (255.4-1ubuntu8.10) ... 219s Setting up systemd-sysv (255.4-1ubuntu8.10) ... 219s Setting up libnss-systemd:s390x (255.4-1ubuntu8.10) ... 219s Setting up netplan.io (1.1.2-2~ubuntu24.04.2) ... 219s Setting up libpam-systemd:s390x (255.4-1ubuntu8.10) ... 219s Processing triggers for initramfs-tools (0.142ubuntu25.5) ... 219s update-initramfs: Generating /boot/initrd.img-6.8.0-63-generic 221s Using config file '/etc/zipl.conf' 221s Building bootmap in '/boot' 221s Adding IPL section 'ubuntu' (default) 221s Preparing boot device for LD-IPL: vda (0000). 221s Done. 221s Processing triggers for libc-bin (2.39-0ubuntu8.4) ... 221s Processing triggers for ufw (0.36.2-6) ... 221s Processing triggers for man-db (2.12.0-4build2) ... 222s Processing triggers for dbus (1.14.10-4ubuntu4.1) ... 222s Processing triggers for install-info (7.1-3build2) ... 222s Reading package lists... 222s Building dependency tree... 222s Reading state information... 222s Starting pkgProblemResolver with broken count: 0 222s Starting 2 pkgProblemResolver with broken count: 0 222s Done 223s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 223s autopkgtest [00:01:19]: rebooting testbed after setup commands that affected boot 240s Reading package lists... 240s Building dependency tree... 240s Reading state information... 240s Starting pkgProblemResolver with broken count: 0 240s Starting 2 pkgProblemResolver with broken count: 0 240s Done 241s The following NEW packages will be installed: 241s gnutls-bin libavahi-client3 libavahi-common-data libavahi-common3 241s libbasicobjects0t64 libcares2 libcollection4t64 libcrack2 libdhash1t64 241s libevent-2.1-7t64 libgnutls-dane0t64 libini-config5t64 libipa-hbac0t64 241s libldb2 libnfsidmap1 libnss-sss libpam-pwquality libpam-sss 241s libpath-utils1t64 libpwquality-common libpwquality1 libref-array1t64 241s libsmbclient0 libsofthsm2 libsss-certmap0 libsss-idmap0 libsss-nss-idmap0 241s libtalloc2 libtdb1 libtevent0t64 libunbound8 libwbclient0 python3-sss 241s samba-libs softhsm2 softhsm2-common sssd sssd-ad sssd-ad-common sssd-common 241s sssd-ipa sssd-krb5 sssd-krb5-common sssd-ldap sssd-proxy 241s 0 upgraded, 45 newly installed, 0 to remove and 0 not upgraded. 241s Need to get 10.3 MB of archives. 241s After this operation, 39.9 MB of additional disk space will be used. 241s Get:1 http://ftpmaster.internal/ubuntu noble/main s390x libevent-2.1-7t64 s390x 2.1.12-stable-9ubuntu2 [147 kB] 241s Get:2 http://ftpmaster.internal/ubuntu noble-updates/main s390x libunbound8 s390x 1.19.2-1ubuntu3.4 [452 kB] 241s Get:3 http://ftpmaster.internal/ubuntu noble-updates/main s390x libgnutls-dane0t64 s390x 3.8.3-1.1ubuntu3.3 [23.6 kB] 241s Get:4 http://ftpmaster.internal/ubuntu noble-updates/universe s390x gnutls-bin s390x 3.8.3-1.1ubuntu3.3 [283 kB] 241s Get:5 http://ftpmaster.internal/ubuntu noble/main s390x libavahi-common-data s390x 0.8-13ubuntu6 [29.7 kB] 241s Get:6 http://ftpmaster.internal/ubuntu noble/main s390x libavahi-common3 s390x 0.8-13ubuntu6 [24.1 kB] 241s Get:7 http://ftpmaster.internal/ubuntu noble/main s390x libavahi-client3 s390x 0.8-13ubuntu6 [27.2 kB] 241s Get:8 http://ftpmaster.internal/ubuntu noble/main s390x libbasicobjects0t64 s390x 0.6.2-2.1build1 [5838 B] 241s Get:9 http://ftpmaster.internal/ubuntu noble/main s390x libcares2 s390x 1.27.0-1.0ubuntu1 [79.2 kB] 241s Get:10 http://ftpmaster.internal/ubuntu noble/main s390x libcollection4t64 s390x 0.6.2-2.1build1 [23.9 kB] 241s Get:11 http://ftpmaster.internal/ubuntu noble/main s390x libcrack2 s390x 2.9.6-5.1build2 [30.0 kB] 241s Get:12 http://ftpmaster.internal/ubuntu noble/main s390x libdhash1t64 s390x 0.6.2-2.1build1 [9126 B] 241s Get:13 http://ftpmaster.internal/ubuntu noble/main s390x libpath-utils1t64 s390x 0.6.2-2.1build1 [9394 B] 241s Get:14 http://ftpmaster.internal/ubuntu noble/main s390x libref-array1t64 s390x 0.6.2-2.1build1 [7226 B] 241s Get:15 http://ftpmaster.internal/ubuntu noble/main s390x libini-config5t64 s390x 0.6.2-2.1build1 [46.6 kB] 241s Get:16 http://ftpmaster.internal/ubuntu noble-updates/main s390x libipa-hbac0t64 s390x 2.9.4-1.1ubuntu6.2 [17.6 kB] 241s Get:17 http://ftpmaster.internal/ubuntu noble/main s390x libtalloc2 s390x 2.4.2-1build2 [28.4 kB] 241s Get:18 http://ftpmaster.internal/ubuntu noble/main s390x libtdb1 s390x 1.4.10-1build1 [50.0 kB] 241s Get:19 http://ftpmaster.internal/ubuntu noble/main s390x libtevent0t64 s390x 0.16.1-2build1 [43.4 kB] 241s Get:20 http://ftpmaster.internal/ubuntu noble-proposed/main s390x libldb2 s390x 2:2.8.0+samba4.19.5+dfsg-4ubuntu9.2 [191 kB] 241s Get:21 http://ftpmaster.internal/ubuntu noble-updates/main s390x libnfsidmap1 s390x 1:2.6.4-3ubuntu5.1 [49.8 kB] 241s Get:22 http://ftpmaster.internal/ubuntu noble/main s390x libpwquality-common all 1.4.5-3build1 [7748 B] 241s Get:23 http://ftpmaster.internal/ubuntu noble/main s390x libpwquality1 s390x 1.4.5-3build1 [14.8 kB] 241s Get:24 http://ftpmaster.internal/ubuntu noble/main s390x libpam-pwquality s390x 1.4.5-3build1 [11.5 kB] 241s Get:25 http://ftpmaster.internal/ubuntu noble-proposed/main s390x libwbclient0 s390x 2:4.19.5+dfsg-4ubuntu9.2 [71.1 kB] 241s Get:26 http://ftpmaster.internal/ubuntu noble-proposed/main s390x samba-libs s390x 2:4.19.5+dfsg-4ubuntu9.2 [6165 kB] 242s Get:27 http://ftpmaster.internal/ubuntu noble-proposed/main s390x libsmbclient0 s390x 2:4.19.5+dfsg-4ubuntu9.2 [64.3 kB] 242s Get:28 http://ftpmaster.internal/ubuntu noble-updates/main s390x libnss-sss s390x 2.9.4-1.1ubuntu6.2 [33.0 kB] 242s Get:29 http://ftpmaster.internal/ubuntu noble-updates/main s390x libpam-sss s390x 2.9.4-1.1ubuntu6.2 [52.1 kB] 242s Get:30 http://ftpmaster.internal/ubuntu noble/universe s390x softhsm2-common s390x 2.6.1-2.2ubuntu3 [6196 B] 242s Get:31 http://ftpmaster.internal/ubuntu noble/universe s390x libsofthsm2 s390x 2.6.1-2.2ubuntu3 [267 kB] 242s Get:32 http://ftpmaster.internal/ubuntu noble-updates/main s390x libsss-certmap0 s390x 2.9.4-1.1ubuntu6.2 [47.0 kB] 242s Get:33 http://ftpmaster.internal/ubuntu noble-updates/main s390x libsss-idmap0 s390x 2.9.4-1.1ubuntu6.2 [22.5 kB] 242s Get:34 http://ftpmaster.internal/ubuntu noble-updates/main s390x libsss-nss-idmap0 s390x 2.9.4-1.1ubuntu6.2 [31.6 kB] 242s Get:35 http://ftpmaster.internal/ubuntu noble-updates/main s390x python3-sss s390x 2.9.4-1.1ubuntu6.2 [47.0 kB] 242s Get:36 http://ftpmaster.internal/ubuntu noble/universe s390x softhsm2 s390x 2.6.1-2.2ubuntu3 [176 kB] 242s Get:37 http://ftpmaster.internal/ubuntu noble-updates/main s390x sssd-common s390x 2.9.4-1.1ubuntu6.2 [1116 kB] 243s Get:38 http://ftpmaster.internal/ubuntu noble-updates/main s390x sssd-ad-common s390x 2.9.4-1.1ubuntu6.2 [73.8 kB] 243s Get:39 http://ftpmaster.internal/ubuntu noble-updates/main s390x sssd-krb5-common s390x 2.9.4-1.1ubuntu6.2 [88.6 kB] 243s Get:40 http://ftpmaster.internal/ubuntu noble-updates/main s390x sssd-ad s390x 2.9.4-1.1ubuntu6.2 [133 kB] 243s Get:41 http://ftpmaster.internal/ubuntu noble-updates/main s390x sssd-ipa s390x 2.9.4-1.1ubuntu6.2 [214 kB] 243s Get:42 http://ftpmaster.internal/ubuntu noble-updates/main s390x sssd-krb5 s390x 2.9.4-1.1ubuntu6.2 [14.3 kB] 243s Get:43 http://ftpmaster.internal/ubuntu noble-updates/main s390x sssd-ldap s390x 2.9.4-1.1ubuntu6.2 [31.0 kB] 243s Get:44 http://ftpmaster.internal/ubuntu noble-updates/main s390x sssd-proxy s390x 2.9.4-1.1ubuntu6.2 [43.5 kB] 243s Get:45 http://ftpmaster.internal/ubuntu noble-updates/main s390x sssd s390x 2.9.4-1.1ubuntu6.2 [4124 B] 243s Fetched 10.3 MB in 2s (5148 kB/s) 243s Selecting previously unselected package libevent-2.1-7t64:s390x. 243s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 78336 files and directories currently installed.) 243s Preparing to unpack .../00-libevent-2.1-7t64_2.1.12-stable-9ubuntu2_s390x.deb ... 243s Unpacking libevent-2.1-7t64:s390x (2.1.12-stable-9ubuntu2) ... 243s Selecting previously unselected package libunbound8:s390x. 243s Preparing to unpack .../01-libunbound8_1.19.2-1ubuntu3.4_s390x.deb ... 243s Unpacking libunbound8:s390x (1.19.2-1ubuntu3.4) ... 243s Selecting previously unselected package libgnutls-dane0t64:s390x. 243s Preparing to unpack .../02-libgnutls-dane0t64_3.8.3-1.1ubuntu3.3_s390x.deb ... 243s Unpacking libgnutls-dane0t64:s390x (3.8.3-1.1ubuntu3.3) ... 243s Selecting previously unselected package gnutls-bin. 243s Preparing to unpack .../03-gnutls-bin_3.8.3-1.1ubuntu3.3_s390x.deb ... 243s Unpacking gnutls-bin (3.8.3-1.1ubuntu3.3) ... 243s Selecting previously unselected package libavahi-common-data:s390x. 243s Preparing to unpack .../04-libavahi-common-data_0.8-13ubuntu6_s390x.deb ... 243s Unpacking libavahi-common-data:s390x (0.8-13ubuntu6) ... 243s Selecting previously unselected package libavahi-common3:s390x. 243s Preparing to unpack .../05-libavahi-common3_0.8-13ubuntu6_s390x.deb ... 243s Unpacking libavahi-common3:s390x (0.8-13ubuntu6) ... 243s Selecting previously unselected package libavahi-client3:s390x. 243s Preparing to unpack .../06-libavahi-client3_0.8-13ubuntu6_s390x.deb ... 243s Unpacking libavahi-client3:s390x (0.8-13ubuntu6) ... 243s Selecting previously unselected package libbasicobjects0t64:s390x. 243s Preparing to unpack .../07-libbasicobjects0t64_0.6.2-2.1build1_s390x.deb ... 243s Unpacking libbasicobjects0t64:s390x (0.6.2-2.1build1) ... 243s Selecting previously unselected package libcares2:s390x. 243s Preparing to unpack .../08-libcares2_1.27.0-1.0ubuntu1_s390x.deb ... 243s Unpacking libcares2:s390x (1.27.0-1.0ubuntu1) ... 243s Selecting previously unselected package libcollection4t64:s390x. 243s Preparing to unpack .../09-libcollection4t64_0.6.2-2.1build1_s390x.deb ... 243s Unpacking libcollection4t64:s390x (0.6.2-2.1build1) ... 243s Selecting previously unselected package libcrack2:s390x. 243s Preparing to unpack .../10-libcrack2_2.9.6-5.1build2_s390x.deb ... 243s Unpacking libcrack2:s390x (2.9.6-5.1build2) ... 243s Selecting previously unselected package libdhash1t64:s390x. 243s Preparing to unpack .../11-libdhash1t64_0.6.2-2.1build1_s390x.deb ... 243s Unpacking libdhash1t64:s390x (0.6.2-2.1build1) ... 243s Selecting previously unselected package libpath-utils1t64:s390x. 243s Preparing to unpack .../12-libpath-utils1t64_0.6.2-2.1build1_s390x.deb ... 243s Unpacking libpath-utils1t64:s390x (0.6.2-2.1build1) ... 243s Selecting previously unselected package libref-array1t64:s390x. 243s Preparing to unpack .../13-libref-array1t64_0.6.2-2.1build1_s390x.deb ... 243s Unpacking libref-array1t64:s390x (0.6.2-2.1build1) ... 243s Selecting previously unselected package libini-config5t64:s390x. 243s Preparing to unpack .../14-libini-config5t64_0.6.2-2.1build1_s390x.deb ... 243s Unpacking libini-config5t64:s390x (0.6.2-2.1build1) ... 243s Selecting previously unselected package libipa-hbac0t64. 243s Preparing to unpack .../15-libipa-hbac0t64_2.9.4-1.1ubuntu6.2_s390x.deb ... 243s Unpacking libipa-hbac0t64 (2.9.4-1.1ubuntu6.2) ... 243s Selecting previously unselected package libtalloc2:s390x. 243s Preparing to unpack .../16-libtalloc2_2.4.2-1build2_s390x.deb ... 243s Unpacking libtalloc2:s390x (2.4.2-1build2) ... 243s Selecting previously unselected package libtdb1:s390x. 243s Preparing to unpack .../17-libtdb1_1.4.10-1build1_s390x.deb ... 243s Unpacking libtdb1:s390x (1.4.10-1build1) ... 243s Selecting previously unselected package libtevent0t64:s390x. 243s Preparing to unpack .../18-libtevent0t64_0.16.1-2build1_s390x.deb ... 243s Unpacking libtevent0t64:s390x (0.16.1-2build1) ... 243s Selecting previously unselected package libldb2:s390x. 243s Preparing to unpack .../19-libldb2_2%3a2.8.0+samba4.19.5+dfsg-4ubuntu9.2_s390x.deb ... 243s Unpacking libldb2:s390x (2:2.8.0+samba4.19.5+dfsg-4ubuntu9.2) ... 243s Selecting previously unselected package libnfsidmap1:s390x. 243s Preparing to unpack .../20-libnfsidmap1_1%3a2.6.4-3ubuntu5.1_s390x.deb ... 243s Unpacking libnfsidmap1:s390x (1:2.6.4-3ubuntu5.1) ... 243s Selecting previously unselected package libpwquality-common. 243s Preparing to unpack .../21-libpwquality-common_1.4.5-3build1_all.deb ... 243s Unpacking libpwquality-common (1.4.5-3build1) ... 243s Selecting previously unselected package libpwquality1:s390x. 243s Preparing to unpack .../22-libpwquality1_1.4.5-3build1_s390x.deb ... 243s Unpacking libpwquality1:s390x (1.4.5-3build1) ... 243s Selecting previously unselected package libpam-pwquality:s390x. 243s Preparing to unpack .../23-libpam-pwquality_1.4.5-3build1_s390x.deb ... 243s Unpacking libpam-pwquality:s390x (1.4.5-3build1) ... 243s Selecting previously unselected package libwbclient0:s390x. 243s Preparing to unpack .../24-libwbclient0_2%3a4.19.5+dfsg-4ubuntu9.2_s390x.deb ... 243s Unpacking libwbclient0:s390x (2:4.19.5+dfsg-4ubuntu9.2) ... 243s Selecting previously unselected package samba-libs:s390x. 243s Preparing to unpack .../25-samba-libs_2%3a4.19.5+dfsg-4ubuntu9.2_s390x.deb ... 243s Unpacking samba-libs:s390x (2:4.19.5+dfsg-4ubuntu9.2) ... 243s Selecting previously unselected package libsmbclient0:s390x. 243s Preparing to unpack .../26-libsmbclient0_2%3a4.19.5+dfsg-4ubuntu9.2_s390x.deb ... 243s Unpacking libsmbclient0:s390x (2:4.19.5+dfsg-4ubuntu9.2) ... 243s Selecting previously unselected package libnss-sss:s390x. 243s Preparing to unpack .../27-libnss-sss_2.9.4-1.1ubuntu6.2_s390x.deb ... 243s Unpacking libnss-sss:s390x (2.9.4-1.1ubuntu6.2) ... 243s Selecting previously unselected package libpam-sss:s390x. 243s Preparing to unpack .../28-libpam-sss_2.9.4-1.1ubuntu6.2_s390x.deb ... 243s Unpacking libpam-sss:s390x (2.9.4-1.1ubuntu6.2) ... 243s Selecting previously unselected package softhsm2-common. 243s Preparing to unpack .../29-softhsm2-common_2.6.1-2.2ubuntu3_s390x.deb ... 243s Unpacking softhsm2-common (2.6.1-2.2ubuntu3) ... 243s Selecting previously unselected package libsofthsm2. 243s Preparing to unpack .../30-libsofthsm2_2.6.1-2.2ubuntu3_s390x.deb ... 243s Unpacking libsofthsm2 (2.6.1-2.2ubuntu3) ... 243s Selecting previously unselected package libsss-certmap0. 243s Preparing to unpack .../31-libsss-certmap0_2.9.4-1.1ubuntu6.2_s390x.deb ... 243s Unpacking libsss-certmap0 (2.9.4-1.1ubuntu6.2) ... 243s Selecting previously unselected package libsss-idmap0. 243s Preparing to unpack .../32-libsss-idmap0_2.9.4-1.1ubuntu6.2_s390x.deb ... 243s Unpacking libsss-idmap0 (2.9.4-1.1ubuntu6.2) ... 244s Selecting previously unselected package libsss-nss-idmap0. 244s Preparing to unpack .../33-libsss-nss-idmap0_2.9.4-1.1ubuntu6.2_s390x.deb ... 244s Unpacking libsss-nss-idmap0 (2.9.4-1.1ubuntu6.2) ... 244s Selecting previously unselected package python3-sss. 244s Preparing to unpack .../34-python3-sss_2.9.4-1.1ubuntu6.2_s390x.deb ... 244s Unpacking python3-sss (2.9.4-1.1ubuntu6.2) ... 244s Selecting previously unselected package softhsm2. 244s Preparing to unpack .../35-softhsm2_2.6.1-2.2ubuntu3_s390x.deb ... 244s Unpacking softhsm2 (2.6.1-2.2ubuntu3) ... 244s Selecting previously unselected package sssd-common. 244s Preparing to unpack .../36-sssd-common_2.9.4-1.1ubuntu6.2_s390x.deb ... 244s Unpacking sssd-common (2.9.4-1.1ubuntu6.2) ... 244s Selecting previously unselected package sssd-ad-common. 244s Preparing to unpack .../37-sssd-ad-common_2.9.4-1.1ubuntu6.2_s390x.deb ... 244s Unpacking sssd-ad-common (2.9.4-1.1ubuntu6.2) ... 244s Selecting previously unselected package sssd-krb5-common. 244s Preparing to unpack .../38-sssd-krb5-common_2.9.4-1.1ubuntu6.2_s390x.deb ... 244s Unpacking sssd-krb5-common (2.9.4-1.1ubuntu6.2) ... 244s Selecting previously unselected package sssd-ad. 244s Preparing to unpack .../39-sssd-ad_2.9.4-1.1ubuntu6.2_s390x.deb ... 244s Unpacking sssd-ad (2.9.4-1.1ubuntu6.2) ... 244s Selecting previously unselected package sssd-ipa. 244s Preparing to unpack .../40-sssd-ipa_2.9.4-1.1ubuntu6.2_s390x.deb ... 244s Unpacking sssd-ipa (2.9.4-1.1ubuntu6.2) ... 244s Selecting previously unselected package sssd-krb5. 244s Preparing to unpack .../41-sssd-krb5_2.9.4-1.1ubuntu6.2_s390x.deb ... 244s Unpacking sssd-krb5 (2.9.4-1.1ubuntu6.2) ... 244s Selecting previously unselected package sssd-ldap. 244s Preparing to unpack .../42-sssd-ldap_2.9.4-1.1ubuntu6.2_s390x.deb ... 244s Unpacking sssd-ldap (2.9.4-1.1ubuntu6.2) ... 244s Selecting previously unselected package sssd-proxy. 244s Preparing to unpack .../43-sssd-proxy_2.9.4-1.1ubuntu6.2_s390x.deb ... 244s Unpacking sssd-proxy (2.9.4-1.1ubuntu6.2) ... 244s Selecting previously unselected package sssd. 244s Preparing to unpack .../44-sssd_2.9.4-1.1ubuntu6.2_s390x.deb ... 244s Unpacking sssd (2.9.4-1.1ubuntu6.2) ... 244s Setting up libpwquality-common (1.4.5-3build1) ... 244s Setting up softhsm2-common (2.6.1-2.2ubuntu3) ... 244s 244s Creating config file /etc/softhsm/softhsm2.conf with new version 244s Setting up libnfsidmap1:s390x (1:2.6.4-3ubuntu5.1) ... 244s Setting up libsss-idmap0 (2.9.4-1.1ubuntu6.2) ... 244s Setting up libbasicobjects0t64:s390x (0.6.2-2.1build1) ... 244s Setting up libipa-hbac0t64 (2.9.4-1.1ubuntu6.2) ... 244s Setting up libref-array1t64:s390x (0.6.2-2.1build1) ... 244s Setting up libtdb1:s390x (1.4.10-1build1) ... 244s Setting up libcollection4t64:s390x (0.6.2-2.1build1) ... 244s Setting up libevent-2.1-7t64:s390x (2.1.12-stable-9ubuntu2) ... 244s Setting up libwbclient0:s390x (2:4.19.5+dfsg-4ubuntu9.2) ... 244s Setting up libtalloc2:s390x (2.4.2-1build2) ... 244s Setting up libpath-utils1t64:s390x (0.6.2-2.1build1) ... 244s Setting up libunbound8:s390x (1.19.2-1ubuntu3.4) ... 244s Setting up libgnutls-dane0t64:s390x (3.8.3-1.1ubuntu3.3) ... 244s Setting up libavahi-common-data:s390x (0.8-13ubuntu6) ... 244s Setting up libcares2:s390x (1.27.0-1.0ubuntu1) ... 244s Setting up libdhash1t64:s390x (0.6.2-2.1build1) ... 244s Setting up libcrack2:s390x (2.9.6-5.1build2) ... 244s Setting up libsss-nss-idmap0 (2.9.4-1.1ubuntu6.2) ... 244s Setting up libini-config5t64:s390x (0.6.2-2.1build1) ... 244s Setting up libtevent0t64:s390x (0.16.1-2build1) ... 244s Setting up libnss-sss:s390x (2.9.4-1.1ubuntu6.2) ... 244s Setting up gnutls-bin (3.8.3-1.1ubuntu3.3) ... 244s Setting up libsofthsm2 (2.6.1-2.2ubuntu3) ... 244s Setting up softhsm2 (2.6.1-2.2ubuntu3) ... 244s Setting up libavahi-common3:s390x (0.8-13ubuntu6) ... 244s Setting up libsss-certmap0 (2.9.4-1.1ubuntu6.2) ... 244s Setting up libpwquality1:s390x (1.4.5-3build1) ... 244s Setting up libldb2:s390x (2:2.8.0+samba4.19.5+dfsg-4ubuntu9.2) ... 244s Setting up libavahi-client3:s390x (0.8-13ubuntu6) ... 244s Setting up libpam-pwquality:s390x (1.4.5-3build1) ... 244s Setting up samba-libs:s390x (2:4.19.5+dfsg-4ubuntu9.2) ... 244s Setting up python3-sss (2.9.4-1.1ubuntu6.2) ... 244s Setting up libsmbclient0:s390x (2:4.19.5+dfsg-4ubuntu9.2) ... 244s Setting up libpam-sss:s390x (2.9.4-1.1ubuntu6.2) ... 244s Setting up sssd-common (2.9.4-1.1ubuntu6.2) ... 244s Creating SSSD system user & group... 244s warn: The home directory `/var/lib/sss' already exists. Not touching this directory. 244s warn: Warning: The home directory `/var/lib/sss' does not belong to the user you are currently creating. 244s Warning: found usr.sbin.sssd in /etc/apparmor.d/force-complain, forcing complain mode 244s Warning from /etc/apparmor.d/usr.sbin.sssd (/etc/apparmor.d/usr.sbin.sssd line 63): Caching disabled for: 'usr.sbin.sssd' due to force complain 245s Created symlink /etc/systemd/system/sssd.service.wants/sssd-autofs.socket → /usr/lib/systemd/system/sssd-autofs.socket. 245s Created symlink /etc/systemd/system/sssd.service.wants/sssd-nss.socket → /usr/lib/systemd/system/sssd-nss.socket. 245s Created symlink /etc/systemd/system/sssd.service.wants/sssd-pam-priv.socket → /usr/lib/systemd/system/sssd-pam-priv.socket. 245s Created symlink /etc/systemd/system/sssd.service.wants/sssd-pam.socket → /usr/lib/systemd/system/sssd-pam.socket. 245s Created symlink /etc/systemd/system/sssd.service.wants/sssd-ssh.socket → /usr/lib/systemd/system/sssd-ssh.socket. 245s Created symlink /etc/systemd/system/sssd.service.wants/sssd-sudo.socket → /usr/lib/systemd/system/sssd-sudo.socket. 245s Created symlink /etc/systemd/system/multi-user.target.wants/sssd.service → /usr/lib/systemd/system/sssd.service. 246s sssd-autofs.service is a disabled or a static unit, not starting it. 246s sssd-nss.service is a disabled or a static unit, not starting it. 246s sssd-pam.service is a disabled or a static unit, not starting it. 246s sssd-ssh.service is a disabled or a static unit, not starting it. 246s sssd-sudo.service is a disabled or a static unit, not starting it. 246s Could not execute systemctl: at /usr/bin/deb-systemd-invoke line 148. 246s Setting up sssd-proxy (2.9.4-1.1ubuntu6.2) ... 246s Setting up sssd-ad-common (2.9.4-1.1ubuntu6.2) ... 246s Created symlink /etc/systemd/system/sssd.service.wants/sssd-pac.socket → /usr/lib/systemd/system/sssd-pac.socket. 246s sssd-pac.service is a disabled or a static unit, not starting it. 246s Could not execute systemctl: at /usr/bin/deb-systemd-invoke line 148. 246s Setting up sssd-krb5-common (2.9.4-1.1ubuntu6.2) ... 246s Setting up sssd-krb5 (2.9.4-1.1ubuntu6.2) ... 246s Setting up sssd-ldap (2.9.4-1.1ubuntu6.2) ... 246s Setting up sssd-ad (2.9.4-1.1ubuntu6.2) ... 246s Setting up sssd-ipa (2.9.4-1.1ubuntu6.2) ... 246s Setting up sssd (2.9.4-1.1ubuntu6.2) ... 246s Processing triggers for man-db (2.12.0-4build2) ... 247s Processing triggers for libc-bin (2.39-0ubuntu8.4) ... 254s autopkgtest [00:01:50]: test sssd-softhism2-certificates-tests.sh: [----------------------- 254s + '[' -z ubuntu ']' 254s + required_tools=(p11tool openssl softhsm2-util) 254s + for cmd in "${required_tools[@]}" 254s + command -v p11tool 254s + for cmd in "${required_tools[@]}" 254s + command -v openssl 254s + for cmd in "${required_tools[@]}" 254s + command -v softhsm2-util 254s + PIN=053350 254s +++ find /usr/lib/softhsm/libsofthsm2.so 254s +++ head -n 1 254s ++ realpath /usr/lib/softhsm/libsofthsm2.so 254s + SOFTHSM2_MODULE=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so 254s + SSSD_P11_CHILD=/usr/libexec/sssd/p11_child 254s + TOKEN_ID=00112233445566778899FFAABBCCDDEEFF012345 254s + '[' '!' -v NO_SSSD_TESTS ']' 254s + '[' '!' -x /usr/libexec/sssd/p11_child ']' 254s + ca_db_arg=ca_db 254s ++ /usr/libexec/sssd/p11_child --help 254s + p11_child_help='Usage: p11_child [OPTION...] 254s -d, --debug-level=INT Debug level 254s --debug-timestamps=INT Add debug timestamps 254s --debug-microseconds=INT Show timestamps with microseconds 254s --dumpable=INT Allow core dumps 254s --debug-fd=INT An open file descriptor for the debug 254s logs 254s --logger=stderr|files|journald Set logger 254s --auth Run in auth mode 254s --pre Run in pre-auth mode 254s --wait_for_card Wait until card is available 254s --verification Run in verification mode 254s --pin Expect PIN on stdin 254s --keypad Expect PIN on keypad 254s --verify=STRING Tune validation 254s --ca_db=STRING CA DB to use 254s --module_name=STRING Module name for authentication 254s --token_name=STRING Token name for authentication 254s --key_id=STRING Key ID for authentication 254s --label=STRING Label for authentication 254s --certificate=STRING certificate to verify, base64 encoded 254s --uri=STRING PKCS#11 URI to restrict selection 254s --chain-id=LONG Tevent chain ID used for logging 254s purposes 254s 254s Help options: 254s -?, --help Show this help message 254s --usage Display brief usage message' 254s + echo 'Usage: p11_child [OPTION...] 254s -d, --debug-level=INT Debug level 254s --debug-timestamps=INT Add debug timestamps 254s --debug-microseconds=INT Show timestamps with microseconds 254s --dumpable=INT Allow core dumps 254s --debug-fd=INT An open file descriptor for the debug 254s logs 254s --logger=stderr|files|journald Set logger 254s --auth Run in auth mode 254s --pre Run in pre-auth mode 254s --wait_for_card Wait until card is available 254s --verification Run in verification mode 254s --pin Expect PIN on stdin 254s --keypad Expect PIN on keypad 254s --verify=STRING Tune validation 254s --ca_db=STRING CA DB to use 254s --module_name=STRING Module name for authentication 254s --token_name=STRING Token name for authentication 254s --key_id=STRING Key ID for authentication 254s --label=STRING Label for authentication 254s --certificate=STRING certificate to verify, base64 encoded 254s --uri=STRING PKCS#11 URI to restrict selection 254s --chain-id=LONG Tevent chain ID used for logging 254s purposes 254s 254s Help options: 254s -?, --help Show this help message 254s --usage Display brief usage message' 254s + grep nssdb -qs 254s + echo 'Usage: p11_child [OPTION...] 254s -d, --debug-level=INT Debug level 254s --debug-timestamps=INT Add debug timestamps 254s --debug-microseconds=INT Show timestamps with microseconds 254s --dumpable=INT Allow core dumps 254s --debug-fd=INT An open file descriptor for the debug 254s logs 254s --logger=stderr|files|journald Set logger 254s --auth Run in auth mode 254s --pre Run in pre-auth mode 254s --wait_for_card Wait until card is available 254s --verification Run in verification mode 254s --pin Expect PIN on stdin 254s --keypad Expect PIN on keypad 254s --verify=STRING Tune validation 254s --ca_db=STRING CA DB to use 254s --module_name=STRING Module name for authentication 254s --token_name=STRING Token name for authentication 254s --key_id=STRING Key ID for authentication 254s --label=STRING Label for authentication 254s --certificate=STRING certificate to verify, base64 encoded 254s --uri=STRING PKCS#11 URI to restrict selection 254s --chain-id=LONG Tevent chain ID used for logging 254s purposes 254s 254s Help options: 254s -?, --help Show this help message 254s --usage Display brief usage message' 254s + grep -qs -- --ca_db 254s + '[' '!' -e /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so ']' 254s ++ mktemp -d -t sssd-softhsm2-XXXXXX 254s + tmpdir=/tmp/sssd-softhsm2-00o6YG 254s + keys_size=1024 254s + [[ ! -v KEEP_TEMPORARY_FILES ]] 254s + trap 'rm -rf "$tmpdir"' EXIT 254s + trap 'set +x; echo -e "\nUnexpected failure!!!"' ERR 254s + echo -n 01 254s + touch /tmp/sssd-softhsm2-00o6YG/index.txt 254s + mkdir -p /tmp/sssd-softhsm2-00o6YG/new_certs 254s + cat 254s + root_ca_key_pass=pass:random-root-CA-password-5364 254s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-00o6YG/test-root-CA-key.pem -passout pass:random-root-CA-password-5364 1024 254s + openssl req -passin pass:random-root-CA-password-5364 -batch -config /tmp/sssd-softhsm2-00o6YG/test-root-CA.config -x509 -new -nodes -key /tmp/sssd-softhsm2-00o6YG/test-root-CA-key.pem -sha256 -days 1024 -set_serial 0 -extensions v3_ca -out /tmp/sssd-softhsm2-00o6YG/test-root-CA.pem 254s + openssl x509 -noout -in /tmp/sssd-softhsm2-00o6YG/test-root-CA.pem 254s + cat 254s + intermediate_ca_key_pass=pass:random-intermediate-CA-password-32555 254s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA-key.pem -passout pass:random-intermediate-CA-password-32555 1024 254s + openssl req -batch -new -nodes -passin pass:random-intermediate-CA-password-32555 -config /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA.config -key /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA-key.pem -passout pass:random-root-CA-password-5364 -sha256 -extensions v3_ca -out /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA-certificate-request.pem 254s + openssl req -text -noout -in /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA-certificate-request.pem 254s + openssl ca -batch -notext -config /tmp/sssd-softhsm2-00o6YG/test-root-CA.config -passin pass:random-root-CA-password-5364 -keyfile /tmp/sssd-softhsm2-00o6YG/test-root-CA-key.pem -in /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA-certificate-request.pem -days 365 -extensions v3_intermediate_ca -out /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA.pem 254s Certificate Request: 254s Data: 254s Version: 1 (0x0) 254s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 254s Subject Public Key Info: 254s Public Key Algorithm: rsaEncryption 254s Public-Key: (1024 bit) 254s Modulus: 254s 00:dc:62:45:00:04:ac:6a:d3:30:ba:c9:c3:92:e3: 254s a2:c5:39:fd:6f:56:1c:57:fd:db:14:2e:09:b9:f8: 254s f8:8d:5c:87:5f:ac:69:27:01:58:02:97:93:f0:36: 254s 09:4e:5b:59:d4:10:36:a0:59:bd:34:04:c2:3f:d3: 254s d0:f5:66:13:56:88:33:d3:a8:ab:e4:5c:58:bf:06: 254s dd:eb:45:1a:7f:c3:d5:a2:87:38:67:1c:19:1a:2d: 254s 06:dc:17:1e:92:69:e5:b9:ec:e9:e3:20:dd:93:32: 254s 94:3c:67:6a:0b:a2:c8:6c:a8:c9:05:15:69:d1:a5: 254s 0e:34:c2:70:14:41:dd:31:91 254s Exponent: 65537 (0x10001) 254s Attributes: 254s (none) 254s Requested Extensions: 254s Signature Algorithm: sha256WithRSAEncryption 254s Signature Value: 254s 9f:fd:8c:c1:4f:50:a0:b5:a0:7c:67:7f:1a:b2:51:47:64:76: 254s cf:b1:c3:4b:90:af:e7:90:1d:e2:92:b3:3a:3c:0c:90:bf:0a: 254s 7e:3e:5e:07:38:d7:e4:7c:bd:71:11:0a:89:45:4d:32:7c:40: 254s e7:5d:f7:1f:37:1b:bc:79:01:7d:d9:e2:dc:8e:61:aa:29:aa: 254s 7f:fa:af:cd:ca:3f:8e:f2:7e:d5:1a:97:ad:68:82:31:9e:50: 254s 3a:42:35:7f:e8:bc:83:be:26:f2:39:2a:b5:06:eb:51:60:92: 254s 35:5a:14:26:50:88:34:7b:81:eb:92:1e:41:00:a9:10:3d:7a: 254s 38:bf 254s Using configuration from /tmp/sssd-softhsm2-00o6YG/test-root-CA.config 254s Check that the request matches the signature 254s Signature ok 254s Certificate Details: 254s Serial Number: 1 (0x1) 254s Validity 254s Not Before: Jul 4 00:03:15 2025 GMT 254s Not After : Jul 4 00:03:15 2026 GMT 254s Subject: 254s organizationName = Test Organization 254s organizationalUnitName = Test Organization Unit 254s commonName = Test Organization Intermediate CA 254s X509v3 extensions: 254s X509v3 Subject Key Identifier: 254s B2:3D:49:62:5C:A2:E5:1E:99:C6:58:55:C5:D5:FA:DE:2A:FC:9B:11 254s X509v3 Authority Key Identifier: 254s keyid:04:1F:6C:C2:5A:A4:9A:2F:59:FF:AA:BE:E8:4F:AC:F7:20:28:BA:9E 254s DirName:/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root CA 254s serial:00 254s X509v3 Basic Constraints: 254s CA:TRUE 254s X509v3 Key Usage: critical 254s Digital Signature, Certificate Sign, CRL Sign 254s Certificate is to be certified until Jul 4 00:03:15 2026 GMT (365 days) 254s 254s Write out database with 1 new entries 254s Database updated 254s + openssl x509 -noout -in /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA.pem 254s + openssl verify -CAfile /tmp/sssd-softhsm2-00o6YG/test-root-CA.pem /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA.pem 254s /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA.pem: OK 254s + cat 254s + sub_intermediate_ca_key_pass=pass:random-sub-intermediate-CA-password-221 254s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-key.pem -passout pass:random-sub-intermediate-CA-password-221 1024 254s + openssl req -batch -new -nodes -passin pass:random-sub-intermediate-CA-password-221 -config /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA.config -key /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-key.pem -passout pass:random-intermediate-CA-password-32555 -sha256 -extensions v3_ca -out /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-certificate-request.pem 254s Certificate Request: 254s Data: 254s Version: 1 (0x0) 254s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 254s Subject Public Key Info: 254s Public Key Algorithm: rsaEncryption 254s Public-Key: (1024 bit) 254s Modulus: 254s 00:d6:40:f0:81:43:b2:26:13:4e:a4:0b:f4:96:aa: 254s 7b:24:0e:00:03:0b:b5:99:a9:02:4b:d4:82:b1:2d: 254s 06:e8:85:66:7e:9b:85:c7:17:0e:dc:c1:18:e6:b0: 254s 38:0e:2e:44:d9:66:f0:a5:13:1c:c9:15:56:d8:9f: 254s 98:d5:18:af:ae:dc:47:77:a3:53:2b:a7:b9:c9:7b: 254s 5e:59:a5:0e:6e:56:43:80:5a:0e:5d:2e:77:e8:91: 254s eb:78:96:d1:0b:d9:da:b9:2f:6b:ec:52:a4:3a:dd: 254s 5f:9e:77:c2:35:b9:0c:3a:42:9c:05:bc:b0:40:8d: 254s 77:02:f4:48:1c:75:73:58:df 254s Exponent: 65537 (0x10001) 254s Attributes: 254s (none) 254s Requested Extensions: 254s Signature Algorithm: sha256WithRSAEncryption 254s Signature Value: 254s 4a:1f:7e:68:2a:75:cf:f1:68:98:b5:c4:c9:16:87:f4:13:25: 254s 1a:c4:70:99:75:29:ad:c2:f4:83:3d:7f:38:a6:41:f6:76:0f: 254s 3c:04:f4:89:ed:a7:e2:c3:1c:e9:f3:fd:4e:9a:07:9b:cb:c3: 254s 3a:f8:74:35:7d:0c:2b:eb:5d:0c:b8:bd:e9:77:d9:42:e0:27: 254s 0b:4b:d3:ab:e9:9f:d5:58:a6:0f:29:3c:2e:59:ac:54:f5:b7: 254s 01:67:ec:81:84:62:cd:8b:9d:88:fd:a5:1a:be:b2:28:50:1c: 254s 10:c9:12:21:ae:a7:28:85:e3:38:db:2c:4b:bb:a5:ef:fd:c7: 254s 8e:93 254s + openssl req -text -noout -in /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-certificate-request.pem 254s + openssl ca -batch -notext -config /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA.config -passin pass:random-intermediate-CA-password-32555 -keyfile /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA-key.pem -in /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-certificate-request.pem -days 365 -extensions v3_intermediate_ca -out /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA.pem 254s Using configuration from /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA.config 254s Check that the request matches the signature 254s Signature ok 254s Certificate Details: 254s Serial Number: 2 (0x2) 254s Validity 254s Not Before: Jul 4 00:03:15 2025 GMT 254s Not After : Jul 4 00:03:15 2026 GMT 254s Subject: 254s organizationName = Test Organization 254s organizationalUnitName = Test Organization Unit 254s commonName = Test Organization Sub Intermediate CA 254s X509v3 extensions: 254s X509v3 Subject Key Identifier: 254s FD:9D:53:80:40:64:D4:EF:1D:5B:C4:4C:2D:E6:69:C8:70:9F:44:59 254s X509v3 Authority Key Identifier: 254s keyid:B2:3D:49:62:5C:A2:E5:1E:99:C6:58:55:C5:D5:FA:DE:2A:FC:9B:11 254s DirName:/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root CA 254s serial:01 254s X509v3 Basic Constraints: 254s CA:TRUE 254s X509v3 Key Usage: critical 254s Digital Signature, Certificate Sign, CRL Sign 254s Certificate is to be certified until Jul 4 00:03:15 2026 GMT (365 days) 254s 254s Write out database with 1 new entries 254s Database updated 254s + openssl x509 -noout -in /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA.pem 254s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA.pem /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA.pem 254s /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA.pem: OK 254s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-00o6YG/test-root-CA.pem /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA.pem 254s + local cmd=openssl 254s + shift 254s + openssl verify -CAfile /tmp/sssd-softhsm2-00o6YG/test-root-CA.pem /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA.pem 254s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 254s error 20 at 0 depth lookup: unable to get local issuer certificate 254s error /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA.pem: verification failed 254s + cat 254s + root_ca_trusted_cert_0001_key_pass=pass:random-root-ca-trusted-cert-0001-783 254s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-00o6YG/test-root-CA-trusted-certificate-0001-key.pem -passout pass:random-root-ca-trusted-cert-0001-783 1024 254s + openssl req -new -nodes -reqexts req_exts -passin pass:random-root-ca-trusted-cert-0001-783 -key /tmp/sssd-softhsm2-00o6YG/test-root-CA-trusted-certificate-0001-key.pem -config /tmp/sssd-softhsm2-00o6YG/test-root-CA-trusted-certificate-0001.config -out /tmp/sssd-softhsm2-00o6YG/test-root-CA-trusted-certificate-0001-request.pem 254s + openssl req -text -noout -in /tmp/sssd-softhsm2-00o6YG/test-root-CA-trusted-certificate-0001-request.pem 254s + openssl ca -batch -notext -config /tmp/sssd-softhsm2-00o6YG/test-root-CA.config -passin pass:random-root-CA-password-5364 -keyfile /tmp/sssd-softhsm2-00o6YG/test-root-CA-key.pem -in /tmp/sssd-softhsm2-00o6YG/test-root-CA-trusted-certificate-0001-request.pem -days 365 -extensions usr_cert -out /tmp/sssd-softhsm2-00o6YG/test-root-CA-trusted-certificate-0001.pem 254s Using configuration from /tmp/sssd-softhsm2-00o6YG/test-root-CA.config 254s Certificate Request: 254s Data: 254s Version: 1 (0x0) 254s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 254s Subject Public Key Info: 254s Public Key Algorithm: rsaEncryption 254s Public-Key: (1024 bit) 254s Modulus: 254s 00:c4:7f:4b:f2:c0:6d:5f:35:d4:f1:28:51:77:cd: 254s 96:36:08:17:a4:a7:8a:bc:fc:76:42:1b:75:b8:b9: 254s 55:c8:86:45:37:69:75:1a:27:1d:41:cb:a7:56:48: 254s 03:13:ea:e9:f9:c7:1d:40:c3:74:9a:96:e0:b0:7a: 254s 63:bb:9b:83:b5:f5:6e:5e:1a:50:5a:d4:32:71:89: 254s 91:09:36:12:1a:65:b5:83:dc:ac:ed:28:0b:ff:32: 254s af:f5:ca:29:1b:af:bf:df:a2:1c:7b:08:00:06:b1: 254s 2a:19:1e:94:24:47:a4:8a:f1:2e:95:8b:67:02:ea: 254s 0b:96:27:7b:86:d0:28:a6:b7 254s Exponent: 65537 (0x10001) 254s Attributes: 254s Requested Extensions: 254s X509v3 Basic Constraints: 254s CA:FALSE 254s Netscape Cert Type: 254s SSL Client, S/MIME 254s Netscape Comment: 254s Test Organization Root CA trusted Certificate 254s X509v3 Subject Key Identifier: 254s 57:35:97:ED:4A:D7:67:53:5C:C7:FD:84:46:50:8B:53:57:35:1B:58 254s X509v3 Key Usage: critical 254s Digital Signature, Non Repudiation, Key Encipherment 254s X509v3 Extended Key Usage: 254s TLS Web Client Authentication, E-mail Protection 254s X509v3 Subject Alternative Name: 254s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 254s Signature Algorithm: sha256WithRSAEncryption 254s Signature Value: 254s 83:78:85:9d:89:a0:2e:a2:b0:68:29:7d:36:c8:3b:c5:ba:4f: 254s a7:a7:a6:40:12:0d:57:11:60:4b:d4:b3:a9:6e:2e:9d:52:f8: 254s cc:e8:a0:1f:67:78:1a:48:f0:18:51:04:3b:f0:84:00:72:10: 254s ab:7a:cd:03:ea:ea:8b:24:1b:d3:c0:2e:c1:fb:3d:12:d8:05: 254s 29:69:4e:f2:38:3b:10:16:10:c0:cb:74:e2:28:21:f7:d8:5e: 254s ae:2a:dd:e1:65:71:ed:0e:74:b6:37:7b:40:63:ea:92:bd:eb: 254s 38:67:7a:cc:fa:b7:4f:9e:6c:7b:f5:d8:7a:fb:45:66:3a:93: 254s ce:26 254s Check that the request matches the signature 254s Signature ok 254s Certificate Details: 254s Serial Number: 3 (0x3) 254s Validity 254s Not Before: Jul 4 00:03:15 2025 GMT 254s Not After : Jul 4 00:03:15 2026 GMT 254s Subject: 254s organizationName = Test Organization 254s organizationalUnitName = Test Organization Unit 254s commonName = Test Organization Root Trusted Certificate 0001 254s X509v3 extensions: 254s X509v3 Authority Key Identifier: 254s 04:1F:6C:C2:5A:A4:9A:2F:59:FF:AA:BE:E8:4F:AC:F7:20:28:BA:9E 254s X509v3 Basic Constraints: 254s CA:FALSE 254s Netscape Cert Type: 254s SSL Client, S/MIME 254s Netscape Comment: 254s Test Organization Root CA trusted Certificate 254s X509v3 Subject Key Identifier: 254s 57:35:97:ED:4A:D7:67:53:5C:C7:FD:84:46:50:8B:53:57:35:1B:58 254s X509v3 Key Usage: critical 254s Digital Signature, Non Repudiation, Key Encipherment 254s X509v3 Extended Key Usage: 254s TLS Web Client Authentication, E-mail Protection 254s X509v3 Subject Alternative Name: 254s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 254s Certificate is to be certified until Jul 4 00:03:15 2026 GMT (365 days) 254s 254s Write out database with 1 new entries 254s Database updated 254s + openssl x509 -noout -in /tmp/sssd-softhsm2-00o6YG/test-root-CA-trusted-certificate-0001.pem 254s + openssl verify -CAfile /tmp/sssd-softhsm2-00o6YG/test-root-CA.pem /tmp/sssd-softhsm2-00o6YG/test-root-CA-trusted-certificate-0001.pem 254s /tmp/sssd-softhsm2-00o6YG/test-root-CA-trusted-certificate-0001.pem: OK 254s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA.pem /tmp/sssd-softhsm2-00o6YG/test-root-CA-trusted-certificate-0001.pem 254s + local cmd=openssl 254s + shift 254s + openssl verify -CAfile /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA.pem /tmp/sssd-softhsm2-00o6YG/test-root-CA-trusted-certificate-0001.pem 254s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 254s error 20 at 0 depth lookup: unable to get local issuer certificate 254s error /tmp/sssd-softhsm2-00o6YG/test-root-CA-trusted-certificate-0001.pem: verification failed 254s + cat 254s + intermediate_ca_trusted_cert_0001_key_pass=pass:random-intermediate-ca-trusted-cert-0001-16416 254s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA-trusted-certificate-0001-key.pem -passout pass:random-intermediate-ca-trusted-cert-0001-16416 1024 254s + openssl req -new -nodes -reqexts req_exts -passin pass:random-intermediate-ca-trusted-cert-0001-16416 -key /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA-trusted-certificate-0001-key.pem -config /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA-trusted-certificate-0001.config -out /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA-trusted-certificate-0001-request.pem 254s + openssl req -text -noout -in /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA-trusted-certificate-0001-request.pem 254s Certificate Request: 254s Data: 254s Version: 1 (0x0) 254s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 254s Subject Public Key Info: 254s Public Key Algorithm: rsaEncryption 254s Public-Key: (1024 bit) 254s Modulus: 254s 00:da:5f:0c:0c:a5:84:8d:ce:8c:3f:52:8f:0e:20: 254s c8:2b:7e:c6:26:21:9b:b0:4d:c0:23:06:6b:34:ff: 254s 50:85:9c:fb:0d:3d:dd:32:48:72:04:98:57:56:f2: 254s 81:4f:e4:f6:7f:07:62:cd:c6:13:09:b9:7e:98:b8: 254s 9b:aa:f0:89:f9:21:93:89:74:17:10:72:05:0f:8d: 254s d5:69:a0:5b:fa:e8:df:bf:37:a6:61:78:6c:70:41: 254s 98:ee:eb:5d:8b:1b:0c:78:eb:72:7c:c3:06:40:17: 254s 38:e2:9e:22:3c:a6:cc:86:d1:fd:2b:2a:85:cb:33: 254s 80:04:5e:79:31:ee:97:65:d7 254s Exponent: 65537 (0x10001) 254s Attributes: 254s Requested Extensions: 254s X509v3 Basic Constraints: 254s CA:FALSE 254s Netscape Cert Type: 254s SSL Client, S/MIME 254s Netscape Comment: 254s Test Organization Intermediate CA trusted Certificate 254s X509v3 Subject Key Identifier: 254s AD:E1:BD:A6:DA:BC:FF:92:6A:C1:C7:EF:3F:FF:05:23:1E:F4:E2:2F 254s X509v3 Key Usage: critical 254s Digital Signature, Non Repudiation, Key Encipherment 254s X509v3 Extended Key Usage: 254s TLS Web Client Authentication, E-mail Protection 254s X509v3 Subject Alternative Name: 254s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 254s Signature Algorithm: sha256WithRSAEncryption 254s Signature Value: 254s 0a:95:a1:90:f8:a9:24:98:a6:25:15:74:33:de:56:7c:eb:81: 254s fd:e5:19:b2:7b:3b:2f:39:0a:f2:2b:1b:d1:a2:39:b7:5a:fe: 254s ad:40:47:49:01:55:87:59:01:bb:9c:6a:f9:65:0e:8b:58:a1: 254s 39:64:13:32:34:54:b7:83:34:21:ed:1e:0b:50:a2:89:99:d7: 254s 2f:39:87:a1:df:fd:24:5e:20:34:af:3f:f1:61:e3:65:23:20: 254s a6:fe:d2:41:99:63:f9:9d:ed:f2:1b:62:ff:fe:ab:a1:8f:74: 254s ad:1d:1f:40:90:7e:1b:38:6e:1b:99:4a:4a:56:40:3a:c0:f5: 254s ac:ba 254s + openssl ca -passin pass:random-intermediate-CA-password-32555 -config /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA.config -batch -notext -keyfile /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA-key.pem -in /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA-trusted-certificate-0001-request.pem -days 365 -extensions usr_cert -out /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA-trusted-certificate-0001.pem 254s Using configuration from /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA.config 254s Check that the request matches the signature 254s Signature ok 254s Certificate Details: 254s Serial Number: 4 (0x4) 254s Validity 254s Not Before: Jul 4 00:03:15 2025 GMT 254s Not After : Jul 4 00:03:15 2026 GMT 254s Subject: 254s organizationName = Test Organization 254s organizationalUnitName = Test Organization Unit 254s commonName = Test Organization Intermediate Trusted Certificate 0001 254s X509v3 extensions: 254s X509v3 Authority Key Identifier: 254s B2:3D:49:62:5C:A2:E5:1E:99:C6:58:55:C5:D5:FA:DE:2A:FC:9B:11 254s X509v3 Basic Constraints: 254s CA:FALSE 254s Netscape Cert Type: 254s SSL Client, S/MIME 254s Netscape Comment: 254s Test Organization Intermediate CA trusted Certificate 254s X509v3 Subject Key Identifier: 254s AD:E1:BD:A6:DA:BC:FF:92:6A:C1:C7:EF:3F:FF:05:23:1E:F4:E2:2F 254s X509v3 Key Usage: critical 254s Digital Signature, Non Repudiation, Key Encipherment 254s X509v3 Extended Key Usage: 254s TLS Web Client Authentication, E-mail Protection 254s X509v3 Subject Alternative Name: 254s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 254s Certificate is to be certified until Jul 4 00:03:15 2026 GMT (365 days) 254s 254s Write out database with 1 new entries 254s Database updated 254s + openssl x509 -noout -in /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA-trusted-certificate-0001.pem 254s This certificate should not be trusted fully 254s + echo 'This certificate should not be trusted fully' 254s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA.pem /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA-trusted-certificate-0001.pem 254s + local cmd=openssl 254s + shift 254s + openssl verify -CAfile /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA.pem /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA-trusted-certificate-0001.pem 254s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 254s error 2 at 1 depth lookup: unable to get issuer certificate 254s error /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA-trusted-certificate-0001.pem: verification failed 254s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA.pem /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA-trusted-certificate-0001.pem 254s /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA-trusted-certificate-0001.pem: OK 254s + cat 254s + sub_intermediate_ca_trusted_cert_0001_key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-1604 254s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-trusted-certificate-0001-key.pem -passout pass:random-sub-intermediate-ca-trusted-cert-0001-1604 1024 254s + openssl req -new -nodes -reqexts req_exts -passin pass:random-sub-intermediate-ca-trusted-cert-0001-1604 -key /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-trusted-certificate-0001-key.pem -config /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-trusted-certificate-0001.config -out /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-trusted-certificate-0001-request.pem 254s Certificate Request: 254s Data: 254s Version: 1 (0x0) 254s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 254s Subject Public Key Info: 254s Public Key Algorithm: rsaEncryption 254s Public-Key: (1024 bit) 254s Modulus: 254s 00:d4:0c:95:d7:a3:e4:f3:c8:19:73:db:bf:fb:f9: 254s b6:a3:92:95:77:42:60:51:0e:73:d9:24:36:22:c6: 254s bd:87:9e:3f:83:23:c0:39:3a:3c:9c:21:ba:dd:d4: 254s 65:24:3a:9d:8f:88:d9:35:c3:41:47:0f:be:5f:39: 254s c1:7f:f0:f5:32:56:42:24:d7:85:6e:55:a6:01:5f: 254s 7b:c6:ce:15:5c:5d:e8:b8:05:96:9e:2c:52:e4:b8: 254s af:44:f3:0a:23:d4:e2:28:5b:09:dd:47:1c:c5:b4: 254s d6:34:b7:58:1d:58:9a:0e:1e:05:81:19:b4:51:0e: 254s 7a:5d:ab:4f:e2:d1:a3:a0:59 254s Exponent: 65537 (0x10001) 254s Attributes: 254s Requested Extensions: 254s X509v3 Basic Constraints: 254s CA:FALSE 254s Netscape Cert Type: 254s SSL Client, S/MIME 254s Netscape Comment: 254s Test Organization Sub Intermediate CA trusted Certificate 254s X509v3 Subject Key Identifier: 254s E4:53:95:2C:D5:4C:87:C8:13:D7:92:83:65:4F:70:86:8F:0F:AE:29 254s X509v3 Key Usage: critical 254s Digital Signature, Non Repudiation, Key Encipherment 254s X509v3 Extended Key Usage: 254s TLS Web Client Authentication, E-mail Protection 254s X509v3 Subject Alternative Name: 254s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 254s Signature Algorithm: sha256WithRSAEncryption 254s Signature Value: 254s 3f:bc:b8:dd:da:8f:40:64:f8:1c:09:1d:8f:1d:4e:e0:ba:43: 254s 6b:b6:fc:10:89:74:b8:89:df:e7:46:50:b7:85:f6:e1:4b:07: 254s 6b:6f:37:d0:6b:73:7e:4c:22:8e:9c:26:64:b2:0b:97:dc:ae: 254s 1c:d1:3d:14:48:36:76:e3:e7:ab:a5:3d:9f:26:45:b2:ce:b4: 254s 26:48:d5:6a:7a:36:f5:c3:bf:67:4a:fc:96:3b:4d:e9:49:08: 254s b1:f4:b6:62:ea:cb:f6:3c:2d:9c:e3:7c:72:06:b3:68:3d:93: 254s d3:38:68:94:7c:b6:0f:6b:52:fe:01:b3:95:30:e7:32:0b:ac: 254s 3c:48 254s + openssl req -text -noout -in /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-trusted-certificate-0001-request.pem 254s + openssl ca -passin pass:random-sub-intermediate-CA-password-221 -config /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA.config -batch -notext -keyfile /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-key.pem -in /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-trusted-certificate-0001-request.pem -days 365 -extensions usr_cert -out /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-trusted-certificate-0001.pem 254s Using configuration from /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA.config 254s Check that the request matches the signature 254s Signature ok 254s Certificate Details: 254s Serial Number: 5 (0x5) 254s Validity 254s Not Before: Jul 4 00:03:15 2025 GMT 254s Not After : Jul 4 00:03:15 2026 GMT 254s Subject: 254s organizationName = Test Organization 254s organizationalUnitName = Test Organization Unit 254s commonName = Test Organization Sub Intermediate Trusted Certificate 0001 254s X509v3 extensions: 254s X509v3 Authority Key Identifier: 254s FD:9D:53:80:40:64:D4:EF:1D:5B:C4:4C:2D:E6:69:C8:70:9F:44:59 254s X509v3 Basic Constraints: 254s CA:FALSE 254s Netscape Cert Type: 254s SSL Client, S/MIME 254s Netscape Comment: 254s Test Organization Sub Intermediate CA trusted Certificate 254s X509v3 Subject Key Identifier: 254s E4:53:95:2C:D5:4C:87:C8:13:D7:92:83:65:4F:70:86:8F:0F:AE:29 254s X509v3 Key Usage: critical 254s Digital Signature, Non Repudiation, Key Encipherment 254s X509v3 Extended Key Usage: 254s TLS Web Client Authentication, E-mail Protection 254s X509v3 Subject Alternative Name: 254s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 254s Certificate is to be certified until Jul 4 00:03:15 2026 GMT (365 days) 254s 254s Write out database with 1 new entries 254s Database updated 254s + openssl x509 -noout -in /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-trusted-certificate-0001.pem 254s This certificate should not be trusted fully 254s + echo 'This certificate should not be trusted fully' 254s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA.pem /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-trusted-certificate-0001.pem 254s + local cmd=openssl 254s + shift 254s + openssl verify -CAfile /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA.pem /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-trusted-certificate-0001.pem 254s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 254s error 2 at 1 depth lookup: unable to get issuer certificate 254s error /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-trusted-certificate-0001.pem: verification failed 254s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA.pem /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-trusted-certificate-0001.pem 254s + local cmd=openssl 254s + shift 254s + openssl verify -CAfile /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA.pem /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-trusted-certificate-0001.pem 254s /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-trusted-certificate-0001.pem: OK 254s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 254s error 20 at 0 depth lookup: unable to get local issuer certificate 254s error /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-trusted-certificate-0001.pem: verification failed 254s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA.pem /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-trusted-certificate-0001.pem 254s Building a the full-chain CA file... 254s + expect_fail openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA.pem /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-trusted-certificate-0001.pem 254s + local cmd=openssl 254s + shift 254s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA.pem /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-trusted-certificate-0001.pem 254s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 254s error 20 at 0 depth lookup: unable to get local issuer certificate 254s error /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-trusted-certificate-0001.pem: verification failed 254s + echo 'Building a the full-chain CA file...' 254s + cat /tmp/sssd-softhsm2-00o6YG/test-root-CA.pem /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA.pem /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA.pem 254s + cat /tmp/sssd-softhsm2-00o6YG/test-root-CA.pem /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA.pem 254s subject=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 254s issuer=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 254s 254s subject=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 254s issuer=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 254s 254s subject=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 254s issuer=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 254s 254s /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA.pem: OK 254s /tmp/sssd-softhsm2-00o6YG/test-root-CA-trusted-certificate-0001.pem: OK 254s + cat /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA.pem /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA.pem 254s + openssl crl2pkcs7 -nocrl -certfile /tmp/sssd-softhsm2-00o6YG/test-full-chain-CA.pem 254s + openssl pkcs7 -print_certs -noout 254s + openssl verify -CAfile /tmp/sssd-softhsm2-00o6YG/test-full-chain-CA.pem /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA.pem 254s + openssl verify -CAfile /tmp/sssd-softhsm2-00o6YG/test-full-chain-CA.pem /tmp/sssd-softhsm2-00o6YG/test-root-CA-trusted-certificate-0001.pem 254s + openssl verify -CAfile /tmp/sssd-softhsm2-00o6YG/test-full-chain-CA.pem /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA-trusted-certificate-0001.pem 254s /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA-trusted-certificate-0001.pem: OK 254s /tmp/sssd-softhsm2-00o6YG/test-root-intermediate-chain-CA.pem: OK 254s /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-trusted-certificate-0001.pem: OK 254s Certificates generation completed! 254s + openssl verify -CAfile /tmp/sssd-softhsm2-00o6YG/test-full-chain-CA.pem /tmp/sssd-softhsm2-00o6YG/test-root-intermediate-chain-CA.pem 254s + openssl verify -CAfile /tmp/sssd-softhsm2-00o6YG/test-full-chain-CA.pem /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-trusted-certificate-0001.pem 254s + echo 'Certificates generation completed!' 254s + [[ -v NO_SSSD_TESTS ]] 254s + invalid_certificate /tmp/sssd-softhsm2-00o6YG/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-783 /dev/null 254s + check_certificate /tmp/sssd-softhsm2-00o6YG/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-783 /dev/null 254s + local certificate=/tmp/sssd-softhsm2-00o6YG/test-root-CA-trusted-certificate-0001.pem 254s + local key_pass=pass:random-root-ca-trusted-cert-0001-783 254s + local key_ring=/dev/null 254s + local verify_option= 254s + prepare_softhsm2_card /tmp/sssd-softhsm2-00o6YG/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-783 254s + local certificate=/tmp/sssd-softhsm2-00o6YG/test-root-CA-trusted-certificate-0001.pem 254s + local key_pass=pass:random-root-ca-trusted-cert-0001-783 254s + local key_cn 254s + local key_name 254s + local tokens_dir 254s + local output_cert_file 254s + token_name= 254s ++ basename /tmp/sssd-softhsm2-00o6YG/test-root-CA-trusted-certificate-0001.pem .pem 254s + key_name=test-root-CA-trusted-certificate-0001 254s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-00o6YG/test-root-CA-trusted-certificate-0001.pem 254s ++ sed -n 's/ *commonName *= //p' 255s + key_cn='Test Organization Root Trusted Certificate 0001' 255s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 255s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-00o6YG/softhsm2-test-root-CA-trusted-certificate-0001.conf 255s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-00o6YG/softhsm2-test-root-CA-trusted-certificate-0001.conf 255s ++ basename /tmp/sssd-softhsm2-00o6YG/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 255s + tokens_dir=/tmp/sssd-softhsm2-00o6YG/softhsm2-test-root-CA-trusted-certificate-0001 255s + token_name='Test Organization Root Tr Token' 255s + '[' '!' -e /tmp/sssd-softhsm2-00o6YG/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 255s + local key_file 255s + local decrypted_key 255s + mkdir -p /tmp/sssd-softhsm2-00o6YG/softhsm2-test-root-CA-trusted-certificate-0001 255s + key_file=/tmp/sssd-softhsm2-00o6YG/test-root-CA-trusted-certificate-0001-key.pem 255s + decrypted_key=/tmp/sssd-softhsm2-00o6YG/test-root-CA-trusted-certificate-0001-key-decrypted.pem 255s + cat 255s + softhsm2-util --init-token --label 'Test Organization Root Tr Token' --pin 053350 --so-pin 053350 --free 255s Slot 0 has a free/uninitialized token. 255s The token has been initialized and is reassigned to slot 747127516 255s + softhsm2-util --show-slots 255s Available slots: 255s Slot 747127516 255s Slot info: 255s Description: SoftHSM slot ID 0x2c8842dc 255s Manufacturer ID: SoftHSM project 255s Hardware version: 2.6 255s Firmware version: 2.6 255s Token present: yes 255s Token info: 255s Manufacturer ID: SoftHSM project 255s Model: SoftHSM v2 255s Hardware version: 2.6 255s Firmware version: 2.6 255s Serial number: d56039852c8842dc 255s Initialized: yes 255s User PIN init.: yes 255s Label: Test Organization Root Tr Token 255s Slot 1 255s Slot info: 255s Description: SoftHSM slot ID 0x1 255s Manufacturer ID: SoftHSM project 255s Hardware version: 2.6 255s Firmware version: 2.6 255s Token present: yes 255s Token info: 255s Manufacturer ID: SoftHSM project 255s Model: SoftHSM v2 255s Hardware version: 2.6 255s Firmware version: 2.6 255s Serial number: 255s Initialized: no 255s User PIN init.: no 255s Label: 255s + p11tool --provider=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --write --no-mark-private --load-certificate=/tmp/sssd-softhsm2-00o6YG/test-root-CA-trusted-certificate-0001.pem --login --set-pin=053350 --label 'Test Organization Root Trusted Certificate 0001' --id 00112233445566778899FFAABBCCDDEEFF012345 255s + openssl rsa -passin pass:random-root-ca-trusted-cert-0001-783 -in /tmp/sssd-softhsm2-00o6YG/test-root-CA-trusted-certificate-0001-key.pem -out /tmp/sssd-softhsm2-00o6YG/test-root-CA-trusted-certificate-0001-key-decrypted.pem 255s writing RSA key 255s + p11tool --provider=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --write --load-privkey=/tmp/sssd-softhsm2-00o6YG/test-root-CA-trusted-certificate-0001-key-decrypted.pem --login --set-pin=053350 --label 'Test Organization Root Trusted Certificate 0001 Key' --id 00112233445566778899FFAABBCCDDEEFF012345 255s + rm /tmp/sssd-softhsm2-00o6YG/test-root-CA-trusted-certificate-0001-key-decrypted.pem 255s + p11tool --provider=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --list-all 255s Object 0: 255s URL: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=d56039852c8842dc;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert 255s Type: X.509 Certificate (RSA-1024) 255s Expires: Sat Jul 4 00:03:15 2026 255s Label: Test Organization Root Trusted Certificate 0001 255s ID: 00:11:22:33:44:55:66:77:88:99:ff:aa:bb:cc:dd:ee:ff:01:23:45 255s 255s Test Organization Root Tr Token 255s + echo 'Test Organization Root Tr Token' 255s + '[' -n '' ']' 255s + local output_base_name=SSSD-child-18673 255s + local output_file=/tmp/sssd-softhsm2-00o6YG/SSSD-child-18673.output 255s + output_cert_file=/tmp/sssd-softhsm2-00o6YG/SSSD-child-18673.pem 255s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/dev/null 255s [p11_child[2088]] [main] (0x0400): p11_child started. 255s [p11_child[2088]] [main] (0x2000): Running in [pre-auth] mode. 255s [p11_child[2088]] [main] (0x2000): Running with effective IDs: [0][0]. 255s [p11_child[2088]] [main] (0x2000): Running with real IDs [0][0]. 255s [p11_child[2088]] [init_verification] (0x0040): X509_LOOKUP_load_file [/dev/null] failed [92274824][error:05800088:x509 certificate routines::no certificate or crl found]. 255s [p11_child[2088]] [do_work] (0x0040): init_verification failed. 255s [p11_child[2088]] [main] (0x0020): p11_child failed (5) 255s + return 2 255s + valid_certificate /tmp/sssd-softhsm2-00o6YG/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-783 /dev/null no_verification 255s + check_certificate /tmp/sssd-softhsm2-00o6YG/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-783 /dev/null no_verification 255s + local certificate=/tmp/sssd-softhsm2-00o6YG/test-root-CA-trusted-certificate-0001.pem 255s + local key_pass=pass:random-root-ca-trusted-cert-0001-783 255s + local key_ring=/dev/null 255s + local verify_option=no_verification 255s + prepare_softhsm2_card /tmp/sssd-softhsm2-00o6YG/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-783 255s + local certificate=/tmp/sssd-softhsm2-00o6YG/test-root-CA-trusted-certificate-0001.pem 255s + local key_pass=pass:random-root-ca-trusted-cert-0001-783 255s + local key_cn 255s + local key_name 255s + local tokens_dir 255s + local output_cert_file 255s + token_name= 255s ++ basename /tmp/sssd-softhsm2-00o6YG/test-root-CA-trusted-certificate-0001.pem .pem 255s + key_name=test-root-CA-trusted-certificate-0001 255s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-00o6YG/test-root-CA-trusted-certificate-0001.pem 255s ++ sed -n 's/ *commonName *= //p' 255s Test Organization Root Tr Token 255s + key_cn='Test Organization Root Trusted Certificate 0001' 255s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 255s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-00o6YG/softhsm2-test-root-CA-trusted-certificate-0001.conf 255s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-00o6YG/softhsm2-test-root-CA-trusted-certificate-0001.conf 255s ++ basename /tmp/sssd-softhsm2-00o6YG/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 255s + tokens_dir=/tmp/sssd-softhsm2-00o6YG/softhsm2-test-root-CA-trusted-certificate-0001 255s + token_name='Test Organization Root Tr Token' 255s + '[' '!' -e /tmp/sssd-softhsm2-00o6YG/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 255s + '[' '!' -d /tmp/sssd-softhsm2-00o6YG/softhsm2-test-root-CA-trusted-certificate-0001 ']' 255s + echo 'Test Organization Root Tr Token' 255s + '[' -n no_verification ']' 255s + local verify_arg=--verify=no_verification 255s + local output_base_name=SSSD-child-8745 255s + local output_file=/tmp/sssd-softhsm2-00o6YG/SSSD-child-8745.output 255s + output_cert_file=/tmp/sssd-softhsm2-00o6YG/SSSD-child-8745.pem 255s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --verify=no_verification --ca_db=/dev/null 255s [p11_child[2094]] [main] (0x0400): p11_child started. 255s [p11_child[2094]] [main] (0x2000): Running in [pre-auth] mode. 255s [p11_child[2094]] [main] (0x2000): Running with effective IDs: [0][0]. 255s [p11_child[2094]] [main] (0x2000): Running with real IDs [0][0]. 255s [p11_child[2094]] [parse_cert_verify_opts] (0x0020): Found 'no_verification' option, disabling verification completely. This should not be used in production. 255s [p11_child[2094]] [do_card] (0x4000): Module List: 255s [p11_child[2094]] [do_card] (0x4000): common name: [softhsm2]. 255s [p11_child[2094]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 255s [p11_child[2094]] [do_card] (0x4000): Description [SoftHSM slot ID 0x2c8842dc] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 255s [p11_child[2094]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 255s [p11_child[2094]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x2c8842dc][747127516] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 255s [p11_child[2094]] [do_card] (0x4000): Login NOT required. 255s [p11_child[2094]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 255s [p11_child[2094]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Root Tr Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 255s [p11_child[2094]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x2c8842dc;slot-manufacturer=SoftHSM%20project;slot-id=747127516;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=d56039852c8842dc;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 255s [p11_child[2094]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 255s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-00o6YG/SSSD-child-8745.output 255s + echo '-----BEGIN CERTIFICATE-----' 255s + tail -n1 /tmp/sssd-softhsm2-00o6YG/SSSD-child-8745.output 255s + echo '-----END CERTIFICATE-----' 255s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-00o6YG/SSSD-child-8745.pem 255s + local found_md5 expected_md5 255s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-00o6YG/test-root-CA-trusted-certificate-0001.pem 255s Certificate: 255s Data: 255s Version: 3 (0x2) 255s Serial Number: 3 (0x3) 255s Signature Algorithm: sha256WithRSAEncryption 255s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 255s Validity 255s Not Before: Jul 4 00:03:15 2025 GMT 255s Not After : Jul 4 00:03:15 2026 GMT 255s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 255s Subject Public Key Info: 255s Public Key Algorithm: rsaEncryption 255s Public-Key: (1024 bit) 255s Modulus: 255s 00:c4:7f:4b:f2:c0:6d:5f:35:d4:f1:28:51:77:cd: 255s 96:36:08:17:a4:a7:8a:bc:fc:76:42:1b:75:b8:b9: 255s 55:c8:86:45:37:69:75:1a:27:1d:41:cb:a7:56:48: 255s 03:13:ea:e9:f9:c7:1d:40:c3:74:9a:96:e0:b0:7a: 255s 63:bb:9b:83:b5:f5:6e:5e:1a:50:5a:d4:32:71:89: 255s 91:09:36:12:1a:65:b5:83:dc:ac:ed:28:0b:ff:32: 255s af:f5:ca:29:1b:af:bf:df:a2:1c:7b:08:00:06:b1: 255s 2a:19:1e:94:24:47:a4:8a:f1:2e:95:8b:67:02:ea: 255s 0b:96:27:7b:86:d0:28:a6:b7 255s Exponent: 65537 (0x10001) 255s X509v3 extensions: 255s X509v3 Authority Key Identifier: 255s 04:1F:6C:C2:5A:A4:9A:2F:59:FF:AA:BE:E8:4F:AC:F7:20:28:BA:9E 255s X509v3 Basic Constraints: 255s CA:FALSE 255s Netscape Cert Type: 255s SSL Client, S/MIME 255s Netscape Comment: 255s Test Organization Root CA trusted Certificate 255s X509v3 Subject Key Identifier: 255s 57:35:97:ED:4A:D7:67:53:5C:C7:FD:84:46:50:8B:53:57:35:1B:58 255s X509v3 Key Usage: critical 255s Digital Signature, Non Repudiation, Key Encipherment 255s X509v3 Extended Key Usage: 255s TLS Web Client Authentication, E-mail Protection 255s X509v3 Subject Alternative Name: 255s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 255s Signature Algorithm: sha256WithRSAEncryption 255s Signature Value: 255s 87:49:1b:74:4d:11:c2:05:84:17:ad:72:89:fc:07:e9:bd:0b: 255s e0:ef:ad:c0:2d:1c:dd:a1:2d:f1:eb:b0:f6:96:20:7c:06:16: 255s 18:02:52:64:60:75:f2:b2:fe:32:8c:5c:33:82:71:b1:08:c4: 255s 7a:a2:d2:71:9a:1d:ca:a8:4c:3c:72:46:03:25:01:27:8a:9a: 255s a4:ae:39:2c:8e:25:14:79:ca:c2:21:d4:11:2f:6a:02:64:fc: 255s 64:d8:97:84:4e:63:45:e6:77:77:f2:ba:bd:1c:c4:1b:f5:04: 255s b8:36:9d:53:f3:8c:41:28:45:51:d5:79:ec:32:34:6f:f7:e8: 255s 31:d0 255s + expected_md5=Modulus=C47F4BF2C06D5F35D4F1285177CD96360817A4A78ABCFC76421B75B8B955C886453769751A271D41CBA756480313EAE9F9C71D40C3749A96E0B07A63BB9B83B5F56E5E1A505AD4327189910936121A65B583DCACED280BFF32AFF5CA291BAFBFDFA21C7B080006B12A191E942447A48AF12E958B6702EA0B96277B86D028A6B7 255s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-00o6YG/SSSD-child-8745.pem 255s + found_md5=Modulus=C47F4BF2C06D5F35D4F1285177CD96360817A4A78ABCFC76421B75B8B955C886453769751A271D41CBA756480313EAE9F9C71D40C3749A96E0B07A63BB9B83B5F56E5E1A505AD4327189910936121A65B583DCACED280BFF32AFF5CA291BAFBFDFA21C7B080006B12A191E942447A48AF12E958B6702EA0B96277B86D028A6B7 255s + '[' Modulus=C47F4BF2C06D5F35D4F1285177CD96360817A4A78ABCFC76421B75B8B955C886453769751A271D41CBA756480313EAE9F9C71D40C3749A96E0B07A63BB9B83B5F56E5E1A505AD4327189910936121A65B583DCACED280BFF32AFF5CA291BAFBFDFA21C7B080006B12A191E942447A48AF12E958B6702EA0B96277B86D028A6B7 '!=' Modulus=C47F4BF2C06D5F35D4F1285177CD96360817A4A78ABCFC76421B75B8B955C886453769751A271D41CBA756480313EAE9F9C71D40C3749A96E0B07A63BB9B83B5F56E5E1A505AD4327189910936121A65B583DCACED280BFF32AFF5CA291BAFBFDFA21C7B080006B12A191E942447A48AF12E958B6702EA0B96277B86D028A6B7 ']' 255s + output_file=/tmp/sssd-softhsm2-00o6YG/SSSD-child-8745-auth.output 255s ++ basename /tmp/sssd-softhsm2-00o6YG/SSSD-child-8745-auth.output .output 255s + output_cert_file=/tmp/sssd-softhsm2-00o6YG/SSSD-child-8745-auth.pem 255s + echo -n 053350 255s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/dev/null --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=no_verification --token_name 'Test Organization Root Tr Token' --module_name /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so 255s [p11_child[2102]] [main] (0x0400): p11_child started. 255s [p11_child[2102]] [main] (0x2000): Running in [auth] mode. 255s [p11_child[2102]] [main] (0x2000): Running with effective IDs: [0][0]. 255s [p11_child[2102]] [main] (0x2000): Running with real IDs [0][0]. 255s [p11_child[2102]] [parse_cert_verify_opts] (0x0020): Found 'no_verification' option, disabling verification completely. This should not be used in production. 255s [p11_child[2102]] [do_card] (0x4000): Module List: 255s [p11_child[2102]] [do_card] (0x4000): common name: [softhsm2]. 255s [p11_child[2102]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 255s [p11_child[2102]] [do_card] (0x4000): Description [SoftHSM slot ID 0x2c8842dc] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 255s [p11_child[2102]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 255s [p11_child[2102]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x2c8842dc][747127516] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 255s [p11_child[2102]] [do_card] (0x4000): Login required. 255s [p11_child[2102]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 255s [p11_child[2102]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so Test Organization Root Tr Token Test Organization Root Tr Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 255s [p11_child[2102]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x2c8842dc;slot-manufacturer=SoftHSM%20project;slot-id=747127516;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=d56039852c8842dc;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 255s [p11_child[2102]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 255s [p11_child[2102]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 255s [p11_child[2102]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 255s [p11_child[2102]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 255s [p11_child[2102]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 255s [p11_child[2102]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 255s [p11_child[2102]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 255s [p11_child[2102]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 255s [p11_child[2102]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 255s [p11_child[2102]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 255s [p11_child[2102]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 255s [p11_child[2102]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 255s [p11_child[2102]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 255s [p11_child[2102]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 255s [p11_child[2102]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 255s [p11_child[2102]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 255s [p11_child[2102]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 255s [p11_child[2102]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 255s [p11_child[2102]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 255s [p11_child[2102]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 255s [p11_child[2102]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 255s [p11_child[2102]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 255s [p11_child[2102]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 255s [p11_child[2102]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 255s [p11_child[2102]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 255s [p11_child[2102]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 255s [p11_child[2102]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 255s [p11_child[2102]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 255s [p11_child[2102]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 255s [p11_child[2102]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 255s [p11_child[2102]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 255s [p11_child[2102]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 255s [p11_child[2102]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 255s [p11_child[2102]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 255s [p11_child[2102]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 255s [p11_child[2102]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 255s [p11_child[2102]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 255s [p11_child[2102]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 255s [p11_child[2102]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 255s [p11_child[2102]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 255s [p11_child[2102]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 255s [p11_child[2102]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 255s [p11_child[2102]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 255s [p11_child[2102]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 255s [p11_child[2102]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 255s [p11_child[2102]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 255s [p11_child[2102]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 255s [p11_child[2102]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 255s [p11_child[2102]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 255s [p11_child[2102]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 255s [p11_child[2102]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 255s [p11_child[2102]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 255s [p11_child[2102]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 255s [p11_child[2102]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 255s [p11_child[2102]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 255s [p11_child[2102]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 255s [p11_child[2102]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 255s [p11_child[2102]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 255s [p11_child[2102]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 255s [p11_child[2102]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 255s [p11_child[2102]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 255s [p11_child[2102]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 255s [p11_child[2102]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 255s [p11_child[2102]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 255s [p11_child[2102]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 255s [p11_child[2102]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 255s [p11_child[2102]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 255s [p11_child[2102]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 255s [p11_child[2102]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 255s [p11_child[2102]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 255s [p11_child[2102]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 255s [p11_child[2102]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 255s [p11_child[2102]] [do_card] (0x4000): Certificate verified and validated. 255s [p11_child[2102]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 255s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-00o6YG/SSSD-child-8745-auth.output 255s + echo '-----BEGIN CERTIFICATE-----' 255s + tail -n1 /tmp/sssd-softhsm2-00o6YG/SSSD-child-8745-auth.output 255s + echo '-----END CERTIFICATE-----' 255s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-00o6YG/SSSD-child-8745-auth.pem 255s Certificate: 255s Data: 255s Version: 3 (0x2) 255s Serial Number: 3 (0x3) 255s Signature Algorithm: sha256WithRSAEncryption 255s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 255s Validity 255s Not Before: Jul 4 00:03:15 2025 GMT 255s Not After : Jul 4 00:03:15 2026 GMT 255s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 255s Subject Public Key Info: 255s Public Key Algorithm: rsaEncryption 255s Public-Key: (1024 bit) 255s Modulus: 255s 00:c4:7f:4b:f2:c0:6d:5f:35:d4:f1:28:51:77:cd: 255s 96:36:08:17:a4:a7:8a:bc:fc:76:42:1b:75:b8:b9: 255s 55:c8:86:45:37:69:75:1a:27:1d:41:cb:a7:56:48: 255s 03:13:ea:e9:f9:c7:1d:40:c3:74:9a:96:e0:b0:7a: 255s 63:bb:9b:83:b5:f5:6e:5e:1a:50:5a:d4:32:71:89: 255s 91:09:36:12:1a:65:b5:83:dc:ac:ed:28:0b:ff:32: 255s af:f5:ca:29:1b:af:bf:df:a2:1c:7b:08:00:06:b1: 255s 2a:19:1e:94:24:47:a4:8a:f1:2e:95:8b:67:02:ea: 255s 0b:96:27:7b:86:d0:28:a6:b7 255s Exponent: 65537 (0x10001) 255s X509v3 extensions: 255s X509v3 Authority Key Identifier: 255s 04:1F:6C:C2:5A:A4:9A:2F:59:FF:AA:BE:E8:4F:AC:F7:20:28:BA:9E 255s X509v3 Basic Constraints: 255s CA:FALSE 255s Netscape Cert Type: 255s SSL Client, S/MIME 255s Netscape Comment: 255s Test Organization Root CA trusted Certificate 255s X509v3 Subject Key Identifier: 255s 57:35:97:ED:4A:D7:67:53:5C:C7:FD:84:46:50:8B:53:57:35:1B:58 255s X509v3 Key Usage: critical 255s Digital Signature, Non Repudiation, Key Encipherment 255s X509v3 Extended Key Usage: 255s TLS Web Client Authentication, E-mail Protection 255s X509v3 Subject Alternative Name: 255s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 255s Signature Algorithm: sha256WithRSAEncryption 255s Signature Value: 255s 87:49:1b:74:4d:11:c2:05:84:17:ad:72:89:fc:07:e9:bd:0b: 255s e0:ef:ad:c0:2d:1c:dd:a1:2d:f1:eb:b0:f6:96:20:7c:06:16: 255s 18:02:52:64:60:75:f2:b2:fe:32:8c:5c:33:82:71:b1:08:c4: 255s 7a:a2:d2:71:9a:1d:ca:a8:4c:3c:72:46:03:25:01:27:8a:9a: 255s a4:ae:39:2c:8e:25:14:79:ca:c2:21:d4:11:2f:6a:02:64:fc: 255s 64:d8:97:84:4e:63:45:e6:77:77:f2:ba:bd:1c:c4:1b:f5:04: 255s b8:36:9d:53:f3:8c:41:28:45:51:d5:79:ec:32:34:6f:f7:e8: 255s 31:d0 255s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-00o6YG/SSSD-child-8745-auth.pem 255s + found_md5=Modulus=C47F4BF2C06D5F35D4F1285177CD96360817A4A78ABCFC76421B75B8B955C886453769751A271D41CBA756480313EAE9F9C71D40C3749A96E0B07A63BB9B83B5F56E5E1A505AD4327189910936121A65B583DCACED280BFF32AFF5CA291BAFBFDFA21C7B080006B12A191E942447A48AF12E958B6702EA0B96277B86D028A6B7 255s + '[' Modulus=C47F4BF2C06D5F35D4F1285177CD96360817A4A78ABCFC76421B75B8B955C886453769751A271D41CBA756480313EAE9F9C71D40C3749A96E0B07A63BB9B83B5F56E5E1A505AD4327189910936121A65B583DCACED280BFF32AFF5CA291BAFBFDFA21C7B080006B12A191E942447A48AF12E958B6702EA0B96277B86D028A6B7 '!=' Modulus=C47F4BF2C06D5F35D4F1285177CD96360817A4A78ABCFC76421B75B8B955C886453769751A271D41CBA756480313EAE9F9C71D40C3749A96E0B07A63BB9B83B5F56E5E1A505AD4327189910936121A65B583DCACED280BFF32AFF5CA291BAFBFDFA21C7B080006B12A191E942447A48AF12E958B6702EA0B96277B86D028A6B7 ']' 255s + valid_certificate /tmp/sssd-softhsm2-00o6YG/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-783 /tmp/sssd-softhsm2-00o6YG/test-root-CA.pem 255s + check_certificate /tmp/sssd-softhsm2-00o6YG/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-783 /tmp/sssd-softhsm2-00o6YG/test-root-CA.pem 255s + local certificate=/tmp/sssd-softhsm2-00o6YG/test-root-CA-trusted-certificate-0001.pem 255s + local key_pass=pass:random-root-ca-trusted-cert-0001-783 255s + local key_ring=/tmp/sssd-softhsm2-00o6YG/test-root-CA.pem 255s + local verify_option= 255s + prepare_softhsm2_card /tmp/sssd-softhsm2-00o6YG/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-783 255s + local certificate=/tmp/sssd-softhsm2-00o6YG/test-root-CA-trusted-certificate-0001.pem 255s + local key_pass=pass:random-root-ca-trusted-cert-0001-783 255s + local key_cn 255s + local key_name 255s + local tokens_dir 255s + local output_cert_file 255s + token_name= 255s ++ basename /tmp/sssd-softhsm2-00o6YG/test-root-CA-trusted-certificate-0001.pem .pem 255s + key_name=test-root-CA-trusted-certificate-0001 255s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-00o6YG/test-root-CA-trusted-certificate-0001.pem 255s ++ sed -n 's/ *commonName *= //p' 255s + key_cn='Test Organization Root Trusted Certificate 0001' 255s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 255s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-00o6YG/softhsm2-test-root-CA-trusted-certificate-0001.conf 255s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-00o6YG/softhsm2-test-root-CA-trusted-certificate-0001.conf 255s ++ basename /tmp/sssd-softhsm2-00o6YG/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 255s + tokens_dir=/tmp/sssd-softhsm2-00o6YG/softhsm2-test-root-CA-trusted-certificate-0001 255s Test Organization Root Tr Token 255s + token_name='Test Organization Root Tr Token' 255s + '[' '!' -e /tmp/sssd-softhsm2-00o6YG/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 255s + '[' '!' -d /tmp/sssd-softhsm2-00o6YG/softhsm2-test-root-CA-trusted-certificate-0001 ']' 255s + echo 'Test Organization Root Tr Token' 255s + '[' -n '' ']' 255s + local output_base_name=SSSD-child-2567 255s + local output_file=/tmp/sssd-softhsm2-00o6YG/SSSD-child-2567.output 255s + output_cert_file=/tmp/sssd-softhsm2-00o6YG/SSSD-child-2567.pem 255s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-00o6YG/test-root-CA.pem 255s [p11_child[2112]] [main] (0x0400): p11_child started. 255s [p11_child[2112]] [main] (0x2000): Running in [pre-auth] mode. 255s [p11_child[2112]] [main] (0x2000): Running with effective IDs: [0][0]. 255s [p11_child[2112]] [main] (0x2000): Running with real IDs [0][0]. 255s [p11_child[2112]] [do_card] (0x4000): Module List: 255s [p11_child[2112]] [do_card] (0x4000): common name: [softhsm2]. 255s [p11_child[2112]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 255s [p11_child[2112]] [do_card] (0x4000): Description [SoftHSM slot ID 0x2c8842dc] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 255s [p11_child[2112]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 255s [p11_child[2112]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x2c8842dc][747127516] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 255s [p11_child[2112]] [do_card] (0x4000): Login NOT required. 255s [p11_child[2112]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 255s [p11_child[2112]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 255s [p11_child[2112]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Root Tr Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 255s [p11_child[2112]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x2c8842dc;slot-manufacturer=SoftHSM%20project;slot-id=747127516;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=d56039852c8842dc;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 255s [p11_child[2112]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 255s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-00o6YG/SSSD-child-2567.output 255s + echo '-----BEGIN CERTIFICATE-----' 255s + tail -n1 /tmp/sssd-softhsm2-00o6YG/SSSD-child-2567.output 255s + echo '-----END CERTIFICATE-----' 255s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-00o6YG/SSSD-child-2567.pem 255s + local found_md5 expected_md5 255s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-00o6YG/test-root-CA-trusted-certificate-0001.pem 255s Certificate: 255s Data: 255s Version: 3 (0x2) 255s Serial Number: 3 (0x3) 255s Signature Algorithm: sha256WithRSAEncryption 255s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 255s Validity 255s Not Before: Jul 4 00:03:15 2025 GMT 255s Not After : Jul 4 00:03:15 2026 GMT 255s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 255s Subject Public Key Info: 255s Public Key Algorithm: rsaEncryption 255s Public-Key: (1024 bit) 255s Modulus: 255s 00:c4:7f:4b:f2:c0:6d:5f:35:d4:f1:28:51:77:cd: 255s 96:36:08:17:a4:a7:8a:bc:fc:76:42:1b:75:b8:b9: 255s 55:c8:86:45:37:69:75:1a:27:1d:41:cb:a7:56:48: 255s 03:13:ea:e9:f9:c7:1d:40:c3:74:9a:96:e0:b0:7a: 255s 63:bb:9b:83:b5:f5:6e:5e:1a:50:5a:d4:32:71:89: 255s 91:09:36:12:1a:65:b5:83:dc:ac:ed:28:0b:ff:32: 255s af:f5:ca:29:1b:af:bf:df:a2:1c:7b:08:00:06:b1: 255s 2a:19:1e:94:24:47:a4:8a:f1:2e:95:8b:67:02:ea: 255s 0b:96:27:7b:86:d0:28:a6:b7 255s Exponent: 65537 (0x10001) 255s X509v3 extensions: 255s X509v3 Authority Key Identifier: 255s 04:1F:6C:C2:5A:A4:9A:2F:59:FF:AA:BE:E8:4F:AC:F7:20:28:BA:9E 255s X509v3 Basic Constraints: 255s CA:FALSE 255s Netscape Cert Type: 255s SSL Client, S/MIME 255s Netscape Comment: 255s Test Organization Root CA trusted Certificate 255s X509v3 Subject Key Identifier: 255s 57:35:97:ED:4A:D7:67:53:5C:C7:FD:84:46:50:8B:53:57:35:1B:58 255s X509v3 Key Usage: critical 255s Digital Signature, Non Repudiation, Key Encipherment 255s X509v3 Extended Key Usage: 255s TLS Web Client Authentication, E-mail Protection 255s X509v3 Subject Alternative Name: 255s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 255s Signature Algorithm: sha256WithRSAEncryption 255s Signature Value: 255s 87:49:1b:74:4d:11:c2:05:84:17:ad:72:89:fc:07:e9:bd:0b: 255s e0:ef:ad:c0:2d:1c:dd:a1:2d:f1:eb:b0:f6:96:20:7c:06:16: 255s 18:02:52:64:60:75:f2:b2:fe:32:8c:5c:33:82:71:b1:08:c4: 255s 7a:a2:d2:71:9a:1d:ca:a8:4c:3c:72:46:03:25:01:27:8a:9a: 255s a4:ae:39:2c:8e:25:14:79:ca:c2:21:d4:11:2f:6a:02:64:fc: 255s 64:d8:97:84:4e:63:45:e6:77:77:f2:ba:bd:1c:c4:1b:f5:04: 255s b8:36:9d:53:f3:8c:41:28:45:51:d5:79:ec:32:34:6f:f7:e8: 255s 31:d0 255s + expected_md5=Modulus=C47F4BF2C06D5F35D4F1285177CD96360817A4A78ABCFC76421B75B8B955C886453769751A271D41CBA756480313EAE9F9C71D40C3749A96E0B07A63BB9B83B5F56E5E1A505AD4327189910936121A65B583DCACED280BFF32AFF5CA291BAFBFDFA21C7B080006B12A191E942447A48AF12E958B6702EA0B96277B86D028A6B7 255s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-00o6YG/SSSD-child-2567.pem 255s + found_md5=Modulus=C47F4BF2C06D5F35D4F1285177CD96360817A4A78ABCFC76421B75B8B955C886453769751A271D41CBA756480313EAE9F9C71D40C3749A96E0B07A63BB9B83B5F56E5E1A505AD4327189910936121A65B583DCACED280BFF32AFF5CA291BAFBFDFA21C7B080006B12A191E942447A48AF12E958B6702EA0B96277B86D028A6B7 255s + '[' Modulus=C47F4BF2C06D5F35D4F1285177CD96360817A4A78ABCFC76421B75B8B955C886453769751A271D41CBA756480313EAE9F9C71D40C3749A96E0B07A63BB9B83B5F56E5E1A505AD4327189910936121A65B583DCACED280BFF32AFF5CA291BAFBFDFA21C7B080006B12A191E942447A48AF12E958B6702EA0B96277B86D028A6B7 '!=' Modulus=C47F4BF2C06D5F35D4F1285177CD96360817A4A78ABCFC76421B75B8B955C886453769751A271D41CBA756480313EAE9F9C71D40C3749A96E0B07A63BB9B83B5F56E5E1A505AD4327189910936121A65B583DCACED280BFF32AFF5CA291BAFBFDFA21C7B080006B12A191E942447A48AF12E958B6702EA0B96277B86D028A6B7 ']' 255s + output_file=/tmp/sssd-softhsm2-00o6YG/SSSD-child-2567-auth.output 255s ++ basename /tmp/sssd-softhsm2-00o6YG/SSSD-child-2567-auth.output .output 255s + output_cert_file=/tmp/sssd-softhsm2-00o6YG/SSSD-child-2567-auth.pem 255s + echo -n 053350 255s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-00o6YG/test-root-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 '' --token_name 'Test Organization Root Tr Token' --module_name /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so 255s [p11_child[2120]] [main] (0x0400): p11_child started. 255s [p11_child[2120]] [main] (0x2000): Running in [auth] mode. 255s [p11_child[2120]] [main] (0x2000): Running with effective IDs: [0][0]. 255s [p11_child[2120]] [main] (0x2000): Running with real IDs [0][0]. 255s [p11_child[2120]] [do_card] (0x4000): Module List: 255s [p11_child[2120]] [do_card] (0x4000): common name: [softhsm2]. 255s [p11_child[2120]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 255s [p11_child[2120]] [do_card] (0x4000): Description [SoftHSM slot ID 0x2c8842dc] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 255s [p11_child[2120]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 255s [p11_child[2120]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x2c8842dc][747127516] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 255s [p11_child[2120]] [do_card] (0x4000): Login required. 255s [p11_child[2120]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 255s [p11_child[2120]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 255s [p11_child[2120]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so Test Organization Root Tr Token Test Organization Root Tr Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 255s [p11_child[2120]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x2c8842dc;slot-manufacturer=SoftHSM%20project;slot-id=747127516;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=d56039852c8842dc;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 255s [p11_child[2120]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 255s [p11_child[2120]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 255s [p11_child[2120]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 255s [p11_child[2120]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 255s [p11_child[2120]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 255s [p11_child[2120]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 255s [p11_child[2120]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 255s [p11_child[2120]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 255s [p11_child[2120]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 255s [p11_child[2120]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 255s [p11_child[2120]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 255s [p11_child[2120]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 255s [p11_child[2120]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 255s [p11_child[2120]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 255s [p11_child[2120]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 255s [p11_child[2120]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 255s [p11_child[2120]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 255s [p11_child[2120]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 255s [p11_child[2120]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 255s [p11_child[2120]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 255s [p11_child[2120]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 255s [p11_child[2120]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 255s [p11_child[2120]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 255s [p11_child[2120]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 255s [p11_child[2120]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 255s [p11_child[2120]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 255s [p11_child[2120]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 255s [p11_child[2120]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 255s [p11_child[2120]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 255s [p11_child[2120]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 255s [p11_child[2120]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 255s [p11_child[2120]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 255s [p11_child[2120]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 255s [p11_child[2120]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 255s [p11_child[2120]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 255s [p11_child[2120]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 255s [p11_child[2120]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 255s [p11_child[2120]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 255s [p11_child[2120]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 255s [p11_child[2120]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 255s [p11_child[2120]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 255s [p11_child[2120]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 255s [p11_child[2120]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 255s [p11_child[2120]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 255s [p11_child[2120]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 255s [p11_child[2120]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 255s [p11_child[2120]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 255s [p11_child[2120]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 255s [p11_child[2120]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 255s [p11_child[2120]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 255s [p11_child[2120]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 255s [p11_child[2120]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 255s [p11_child[2120]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 255s [p11_child[2120]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 255s [p11_child[2120]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 255s [p11_child[2120]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 255s [p11_child[2120]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 255s [p11_child[2120]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 255s [p11_child[2120]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 255s [p11_child[2120]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 255s [p11_child[2120]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 255s [p11_child[2120]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 255s [p11_child[2120]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 255s [p11_child[2120]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 255s [p11_child[2120]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 255s [p11_child[2120]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 255s [p11_child[2120]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 255s [p11_child[2120]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 255s [p11_child[2120]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 255s [p11_child[2120]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 255s [p11_child[2120]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 255s [p11_child[2120]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 255s [p11_child[2120]] [do_card] (0x4000): Certificate verified and validated. 255s [p11_child[2120]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 255s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-00o6YG/SSSD-child-2567-auth.output 255s + echo '-----BEGIN CERTIFICATE-----' 255s + tail -n1 /tmp/sssd-softhsm2-00o6YG/SSSD-child-2567-auth.output 255s + echo '-----END CERTIFICATE-----' 255s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-00o6YG/SSSD-child-2567-auth.pem 255s Certificate: 255s Data: 255s Version: 3 (0x2) 255s Serial Number: 3 (0x3) 255s Signature Algorithm: sha256WithRSAEncryption 255s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 255s Validity 255s Not Before: Jul 4 00:03:15 2025 GMT 255s Not After : Jul 4 00:03:15 2026 GMT 255s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 255s Subject Public Key Info: 255s Public Key Algorithm: rsaEncryption 255s Public-Key: (1024 bit) 255s Modulus: 255s 00:c4:7f:4b:f2:c0:6d:5f:35:d4:f1:28:51:77:cd: 255s 96:36:08:17:a4:a7:8a:bc:fc:76:42:1b:75:b8:b9: 255s 55:c8:86:45:37:69:75:1a:27:1d:41:cb:a7:56:48: 255s 03:13:ea:e9:f9:c7:1d:40:c3:74:9a:96:e0:b0:7a: 255s 63:bb:9b:83:b5:f5:6e:5e:1a:50:5a:d4:32:71:89: 255s 91:09:36:12:1a:65:b5:83:dc:ac:ed:28:0b:ff:32: 255s af:f5:ca:29:1b:af:bf:df:a2:1c:7b:08:00:06:b1: 255s 2a:19:1e:94:24:47:a4:8a:f1:2e:95:8b:67:02:ea: 255s 0b:96:27:7b:86:d0:28:a6:b7 255s Exponent: 65537 (0x10001) 255s X509v3 extensions: 255s X509v3 Authority Key Identifier: 255s 04:1F:6C:C2:5A:A4:9A:2F:59:FF:AA:BE:E8:4F:AC:F7:20:28:BA:9E 255s X509v3 Basic Constraints: 255s CA:FALSE 255s Netscape Cert Type: 255s SSL Client, S/MIME 255s Netscape Comment: 255s Test Organization Root CA trusted Certificate 255s X509v3 Subject Key Identifier: 255s 57:35:97:ED:4A:D7:67:53:5C:C7:FD:84:46:50:8B:53:57:35:1B:58 255s X509v3 Key Usage: critical 255s Digital Signature, Non Repudiation, Key Encipherment 255s X509v3 Extended Key Usage: 255s TLS Web Client Authentication, E-mail Protection 255s X509v3 Subject Alternative Name: 255s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 255s Signature Algorithm: sha256WithRSAEncryption 255s Signature Value: 255s 87:49:1b:74:4d:11:c2:05:84:17:ad:72:89:fc:07:e9:bd:0b: 255s e0:ef:ad:c0:2d:1c:dd:a1:2d:f1:eb:b0:f6:96:20:7c:06:16: 255s 18:02:52:64:60:75:f2:b2:fe:32:8c:5c:33:82:71:b1:08:c4: 255s 7a:a2:d2:71:9a:1d:ca:a8:4c:3c:72:46:03:25:01:27:8a:9a: 255s a4:ae:39:2c:8e:25:14:79:ca:c2:21:d4:11:2f:6a:02:64:fc: 255s 64:d8:97:84:4e:63:45:e6:77:77:f2:ba:bd:1c:c4:1b:f5:04: 255s b8:36:9d:53:f3:8c:41:28:45:51:d5:79:ec:32:34:6f:f7:e8: 255s 31:d0 255s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-00o6YG/SSSD-child-2567-auth.pem 255s + found_md5=Modulus=C47F4BF2C06D5F35D4F1285177CD96360817A4A78ABCFC76421B75B8B955C886453769751A271D41CBA756480313EAE9F9C71D40C3749A96E0B07A63BB9B83B5F56E5E1A505AD4327189910936121A65B583DCACED280BFF32AFF5CA291BAFBFDFA21C7B080006B12A191E942447A48AF12E958B6702EA0B96277B86D028A6B7 255s + '[' Modulus=C47F4BF2C06D5F35D4F1285177CD96360817A4A78ABCFC76421B75B8B955C886453769751A271D41CBA756480313EAE9F9C71D40C3749A96E0B07A63BB9B83B5F56E5E1A505AD4327189910936121A65B583DCACED280BFF32AFF5CA291BAFBFDFA21C7B080006B12A191E942447A48AF12E958B6702EA0B96277B86D028A6B7 '!=' Modulus=C47F4BF2C06D5F35D4F1285177CD96360817A4A78ABCFC76421B75B8B955C886453769751A271D41CBA756480313EAE9F9C71D40C3749A96E0B07A63BB9B83B5F56E5E1A505AD4327189910936121A65B583DCACED280BFF32AFF5CA291BAFBFDFA21C7B080006B12A191E942447A48AF12E958B6702EA0B96277B86D028A6B7 ']' 255s + valid_certificate /tmp/sssd-softhsm2-00o6YG/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-783 /tmp/sssd-softhsm2-00o6YG/test-root-CA.pem partial_chain 255s + check_certificate /tmp/sssd-softhsm2-00o6YG/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-783 /tmp/sssd-softhsm2-00o6YG/test-root-CA.pem partial_chain 255s + local certificate=/tmp/sssd-softhsm2-00o6YG/test-root-CA-trusted-certificate-0001.pem 255s + local key_pass=pass:random-root-ca-trusted-cert-0001-783 255s + local key_ring=/tmp/sssd-softhsm2-00o6YG/test-root-CA.pem 255s + local verify_option=partial_chain 255s + prepare_softhsm2_card /tmp/sssd-softhsm2-00o6YG/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-783 255s + local certificate=/tmp/sssd-softhsm2-00o6YG/test-root-CA-trusted-certificate-0001.pem 255s + local key_pass=pass:random-root-ca-trusted-cert-0001-783 255s + local key_cn 255s + local key_name 255s + local tokens_dir 255s + local output_cert_file 255s + token_name= 255s ++ basename /tmp/sssd-softhsm2-00o6YG/test-root-CA-trusted-certificate-0001.pem .pem 255s + key_name=test-root-CA-trusted-certificate-0001 255s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-00o6YG/test-root-CA-trusted-certificate-0001.pem 255s ++ sed -n 's/ *commonName *= //p' 255s + key_cn='Test Organization Root Trusted Certificate 0001' 255s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 255s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-00o6YG/softhsm2-test-root-CA-trusted-certificate-0001.conf 255s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-00o6YG/softhsm2-test-root-CA-trusted-certificate-0001.conf 255s ++ basename /tmp/sssd-softhsm2-00o6YG/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 255s Test Organization Root Tr Token 255s + tokens_dir=/tmp/sssd-softhsm2-00o6YG/softhsm2-test-root-CA-trusted-certificate-0001 255s + token_name='Test Organization Root Tr Token' 255s + '[' '!' -e /tmp/sssd-softhsm2-00o6YG/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 255s + '[' '!' -d /tmp/sssd-softhsm2-00o6YG/softhsm2-test-root-CA-trusted-certificate-0001 ']' 255s + echo 'Test Organization Root Tr Token' 255s + '[' -n partial_chain ']' 255s + local verify_arg=--verify=partial_chain 255s + local output_base_name=SSSD-child-22241 255s + local output_file=/tmp/sssd-softhsm2-00o6YG/SSSD-child-22241.output 255s + output_cert_file=/tmp/sssd-softhsm2-00o6YG/SSSD-child-22241.pem 255s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-00o6YG/test-root-CA.pem 255s [p11_child[2130]] [main] (0x0400): p11_child started. 255s [p11_child[2130]] [main] (0x2000): Running in [pre-auth] mode. 255s [p11_child[2130]] [main] (0x2000): Running with effective IDs: [0][0]. 255s [p11_child[2130]] [main] (0x2000): Running with real IDs [0][0]. 255s [p11_child[2130]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 255s [p11_child[2130]] [do_card] (0x4000): Module List: 255s [p11_child[2130]] [do_card] (0x4000): common name: [softhsm2]. 255s [p11_child[2130]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 255s [p11_child[2130]] [do_card] (0x4000): Description [SoftHSM slot ID 0x2c8842dc] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 255s [p11_child[2130]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 255s [p11_child[2130]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x2c8842dc][747127516] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 255s [p11_child[2130]] [do_card] (0x4000): Login NOT required. 255s [p11_child[2130]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 255s [p11_child[2130]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 255s [p11_child[2130]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Root Tr Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 255s [p11_child[2130]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x2c8842dc;slot-manufacturer=SoftHSM%20project;slot-id=747127516;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=d56039852c8842dc;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 255s [p11_child[2130]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 255s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-00o6YG/SSSD-child-22241.output 255s + echo '-----BEGIN CERTIFICATE-----' 255s + tail -n1 /tmp/sssd-softhsm2-00o6YG/SSSD-child-22241.output 255s + echo '-----END CERTIFICATE-----' 255s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-00o6YG/SSSD-child-22241.pem 255s Certificate: 255s Data: 255s Version: 3 (0x2) 255s Serial Number: 3 (0x3) 255s Signature Algorithm: sha256WithRSAEncryption 255s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 255s Validity 255s Not Before: Jul 4 00:03:15 2025 GMT 255s Not After : Jul 4 00:03:15 2026 GMT 255s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 255s Subject Public Key Info: 255s Public Key Algorithm: rsaEncryption 255s Public-Key: (1024 bit) 255s Modulus: 255s 00:c4:7f:4b:f2:c0:6d:5f:35:d4:f1:28:51:77:cd: 255s 96:36:08:17:a4:a7:8a:bc:fc:76:42:1b:75:b8:b9: 255s 55:c8:86:45:37:69:75:1a:27:1d:41:cb:a7:56:48: 255s 03:13:ea:e9:f9:c7:1d:40:c3:74:9a:96:e0:b0:7a: 255s 63:bb:9b:83:b5:f5:6e:5e:1a:50:5a:d4:32:71:89: 255s 91:09:36:12:1a:65:b5:83:dc:ac:ed:28:0b:ff:32: 255s af:f5:ca:29:1b:af:bf:df:a2:1c:7b:08:00:06:b1: 255s 2a:19:1e:94:24:47:a4:8a:f1:2e:95:8b:67:02:ea: 255s 0b:96:27:7b:86:d0:28:a6:b7 255s Exponent: 65537 (0x10001) 255s X509v3 extensions: 255s X509v3 Authority Key Identifier: 255s 04:1F:6C:C2:5A:A4:9A:2F:59:FF:AA:BE:E8:4F:AC:F7:20:28:BA:9E 255s X509v3 Basic Constraints: 255s CA:FALSE 255s Netscape Cert Type: 255s SSL Client, S/MIME 255s Netscape Comment: 255s Test Organization Root CA trusted Certificate 255s X509v3 Subject Key Identifier: 255s 57:35:97:ED:4A:D7:67:53:5C:C7:FD:84:46:50:8B:53:57:35:1B:58 255s X509v3 Key Usage: critical 255s Digital Signature, Non Repudiation, Key Encipherment 255s X509v3 Extended Key Usage: 255s TLS Web Client Authentication, E-mail Protection 255s X509v3 Subject Alternative Name: 255s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 255s Signature Algorithm: sha256WithRSAEncryption 255s Signature Value: 255s 87:49:1b:74:4d:11:c2:05:84:17:ad:72:89:fc:07:e9:bd:0b: 255s e0:ef:ad:c0:2d:1c:dd:a1:2d:f1:eb:b0:f6:96:20:7c:06:16: 255s 18:02:52:64:60:75:f2:b2:fe:32:8c:5c:33:82:71:b1:08:c4: 255s 7a:a2:d2:71:9a:1d:ca:a8:4c:3c:72:46:03:25:01:27:8a:9a: 255s a4:ae:39:2c:8e:25:14:79:ca:c2:21:d4:11:2f:6a:02:64:fc: 255s 64:d8:97:84:4e:63:45:e6:77:77:f2:ba:bd:1c:c4:1b:f5:04: 255s b8:36:9d:53:f3:8c:41:28:45:51:d5:79:ec:32:34:6f:f7:e8: 255s 31:d0 255s + local found_md5 expected_md5 255s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-00o6YG/test-root-CA-trusted-certificate-0001.pem 255s + expected_md5=Modulus=C47F4BF2C06D5F35D4F1285177CD96360817A4A78ABCFC76421B75B8B955C886453769751A271D41CBA756480313EAE9F9C71D40C3749A96E0B07A63BB9B83B5F56E5E1A505AD4327189910936121A65B583DCACED280BFF32AFF5CA291BAFBFDFA21C7B080006B12A191E942447A48AF12E958B6702EA0B96277B86D028A6B7 255s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-00o6YG/SSSD-child-22241.pem 255s + found_md5=Modulus=C47F4BF2C06D5F35D4F1285177CD96360817A4A78ABCFC76421B75B8B955C886453769751A271D41CBA756480313EAE9F9C71D40C3749A96E0B07A63BB9B83B5F56E5E1A505AD4327189910936121A65B583DCACED280BFF32AFF5CA291BAFBFDFA21C7B080006B12A191E942447A48AF12E958B6702EA0B96277B86D028A6B7 255s + '[' Modulus=C47F4BF2C06D5F35D4F1285177CD96360817A4A78ABCFC76421B75B8B955C886453769751A271D41CBA756480313EAE9F9C71D40C3749A96E0B07A63BB9B83B5F56E5E1A505AD4327189910936121A65B583DCACED280BFF32AFF5CA291BAFBFDFA21C7B080006B12A191E942447A48AF12E958B6702EA0B96277B86D028A6B7 '!=' Modulus=C47F4BF2C06D5F35D4F1285177CD96360817A4A78ABCFC76421B75B8B955C886453769751A271D41CBA756480313EAE9F9C71D40C3749A96E0B07A63BB9B83B5F56E5E1A505AD4327189910936121A65B583DCACED280BFF32AFF5CA291BAFBFDFA21C7B080006B12A191E942447A48AF12E958B6702EA0B96277B86D028A6B7 ']' 255s + output_file=/tmp/sssd-softhsm2-00o6YG/SSSD-child-22241-auth.output 255s ++ basename /tmp/sssd-softhsm2-00o6YG/SSSD-child-22241-auth.output .output 255s + output_cert_file=/tmp/sssd-softhsm2-00o6YG/SSSD-child-22241-auth.pem 255s + echo -n 053350 255s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-00o6YG/test-root-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Root Tr Token' --module_name /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so 255s [p11_child[2138]] [main] (0x0400): p11_child started. 255s [p11_child[2138]] [main] (0x2000): Running in [auth] mode. 255s [p11_child[2138]] [main] (0x2000): Running with effective IDs: [0][0]. 255s [p11_child[2138]] [main] (0x2000): Running with real IDs [0][0]. 255s [p11_child[2138]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 255s [p11_child[2138]] [do_card] (0x4000): Module List: 255s [p11_child[2138]] [do_card] (0x4000): common name: [softhsm2]. 255s [p11_child[2138]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 255s [p11_child[2138]] [do_card] (0x4000): Description [SoftHSM slot ID 0x2c8842dc] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 255s [p11_child[2138]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 255s [p11_child[2138]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x2c8842dc][747127516] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 255s [p11_child[2138]] [do_card] (0x4000): Login required. 255s [p11_child[2138]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 255s [p11_child[2138]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 255s [p11_child[2138]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so Test Organization Root Tr Token Test Organization Root Tr Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 255s [p11_child[2138]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x2c8842dc;slot-manufacturer=SoftHSM%20project;slot-id=747127516;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=d56039852c8842dc;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 255s [p11_child[2138]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 255s [p11_child[2138]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 255s [p11_child[2138]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 255s [p11_child[2138]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 255s [p11_child[2138]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 255s [p11_child[2138]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 255s [p11_child[2138]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 255s [p11_child[2138]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 255s [p11_child[2138]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 255s [p11_child[2138]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 255s [p11_child[2138]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 255s [p11_child[2138]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 255s [p11_child[2138]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 255s [p11_child[2138]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 255s [p11_child[2138]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 255s [p11_child[2138]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 255s [p11_child[2138]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 255s [p11_child[2138]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 255s [p11_child[2138]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 255s [p11_child[2138]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 255s [p11_child[2138]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 255s [p11_child[2138]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 255s [p11_child[2138]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 255s [p11_child[2138]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 255s [p11_child[2138]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 255s [p11_child[2138]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 255s [p11_child[2138]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 255s [p11_child[2138]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 255s [p11_child[2138]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 255s [p11_child[2138]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 255s [p11_child[2138]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 255s [p11_child[2138]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 255s [p11_child[2138]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 255s [p11_child[2138]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 255s [p11_child[2138]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 255s [p11_child[2138]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 255s [p11_child[2138]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 255s [p11_child[2138]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 255s [p11_child[2138]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 255s [p11_child[2138]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 255s [p11_child[2138]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 255s [p11_child[2138]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 255s [p11_child[2138]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 255s [p11_child[2138]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 255s [p11_child[2138]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 255s [p11_child[2138]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 255s [p11_child[2138]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 255s [p11_child[2138]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 255s [p11_child[2138]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 255s [p11_child[2138]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 255s [p11_child[2138]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 255s [p11_child[2138]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 255s [p11_child[2138]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 255s [p11_child[2138]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 255s [p11_child[2138]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 255s [p11_child[2138]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 255s [p11_child[2138]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 255s [p11_child[2138]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 255s [p11_child[2138]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 255s [p11_child[2138]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 255s [p11_child[2138]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 255s [p11_child[2138]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 255s [p11_child[2138]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 255s [p11_child[2138]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 255s [p11_child[2138]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 255s [p11_child[2138]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 255s [p11_child[2138]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 255s [p11_child[2138]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 255s [p11_child[2138]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 255s [p11_child[2138]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 255s [p11_child[2138]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 255s [p11_child[2138]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 255s [p11_child[2138]] [do_card] (0x4000): Certificate verified and validated. 255s [p11_child[2138]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 255s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-00o6YG/SSSD-child-22241-auth.output 255s + echo '-----BEGIN CERTIFICATE-----' 255s + tail -n1 /tmp/sssd-softhsm2-00o6YG/SSSD-child-22241-auth.output 255s + echo '-----END CERTIFICATE-----' 255s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-00o6YG/SSSD-child-22241-auth.pem 255s Certificate: 255s Data: 255s Version: 3 (0x2) 255s Serial Number: 3 (0x3) 255s Signature Algorithm: sha256WithRSAEncryption 255s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 255s Validity 255s Not Before: Jul 4 00:03:15 2025 GMT 255s Not After : Jul 4 00:03:15 2026 GMT 255s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 255s Subject Public Key Info: 255s Public Key Algorithm: rsaEncryption 255s Public-Key: (1024 bit) 255s Modulus: 255s 00:c4:7f:4b:f2:c0:6d:5f:35:d4:f1:28:51:77:cd: 255s 96:36:08:17:a4:a7:8a:bc:fc:76:42:1b:75:b8:b9: 255s 55:c8:86:45:37:69:75:1a:27:1d:41:cb:a7:56:48: 255s 03:13:ea:e9:f9:c7:1d:40:c3:74:9a:96:e0:b0:7a: 255s 63:bb:9b:83:b5:f5:6e:5e:1a:50:5a:d4:32:71:89: 255s 91:09:36:12:1a:65:b5:83:dc:ac:ed:28:0b:ff:32: 255s af:f5:ca:29:1b:af:bf:df:a2:1c:7b:08:00:06:b1: 255s 2a:19:1e:94:24:47:a4:8a:f1:2e:95:8b:67:02:ea: 255s 0b:96:27:7b:86:d0:28:a6:b7 255s Exponent: 65537 (0x10001) 255s X509v3 extensions: 255s X509v3 Authority Key Identifier: 255s 04:1F:6C:C2:5A:A4:9A:2F:59:FF:AA:BE:E8:4F:AC:F7:20:28:BA:9E 255s X509v3 Basic Constraints: 255s CA:FALSE 255s Netscape Cert Type: 255s SSL Client, S/MIME 255s Netscape Comment: 255s Test Organization Root CA trusted Certificate 255s X509v3 Subject Key Identifier: 255s 57:35:97:ED:4A:D7:67:53:5C:C7:FD:84:46:50:8B:53:57:35:1B:58 255s X509v3 Key Usage: critical 255s Digital Signature, Non Repudiation, Key Encipherment 255s X509v3 Extended Key Usage: 255s TLS Web Client Authentication, E-mail Protection 255s X509v3 Subject Alternative Name: 255s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 255s Signature Algorithm: sha256WithRSAEncryption 255s Signature Value: 255s 87:49:1b:74:4d:11:c2:05:84:17:ad:72:89:fc:07:e9:bd:0b: 255s e0:ef:ad:c0:2d:1c:dd:a1:2d:f1:eb:b0:f6:96:20:7c:06:16: 255s 18:02:52:64:60:75:f2:b2:fe:32:8c:5c:33:82:71:b1:08:c4: 255s 7a:a2:d2:71:9a:1d:ca:a8:4c:3c:72:46:03:25:01:27:8a:9a: 255s a4:ae:39:2c:8e:25:14:79:ca:c2:21:d4:11:2f:6a:02:64:fc: 255s 64:d8:97:84:4e:63:45:e6:77:77:f2:ba:bd:1c:c4:1b:f5:04: 255s b8:36:9d:53:f3:8c:41:28:45:51:d5:79:ec:32:34:6f:f7:e8: 255s 31:d0 255s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-00o6YG/SSSD-child-22241-auth.pem 255s + found_md5=Modulus=C47F4BF2C06D5F35D4F1285177CD96360817A4A78ABCFC76421B75B8B955C886453769751A271D41CBA756480313EAE9F9C71D40C3749A96E0B07A63BB9B83B5F56E5E1A505AD4327189910936121A65B583DCACED280BFF32AFF5CA291BAFBFDFA21C7B080006B12A191E942447A48AF12E958B6702EA0B96277B86D028A6B7 255s + '[' Modulus=C47F4BF2C06D5F35D4F1285177CD96360817A4A78ABCFC76421B75B8B955C886453769751A271D41CBA756480313EAE9F9C71D40C3749A96E0B07A63BB9B83B5F56E5E1A505AD4327189910936121A65B583DCACED280BFF32AFF5CA291BAFBFDFA21C7B080006B12A191E942447A48AF12E958B6702EA0B96277B86D028A6B7 '!=' Modulus=C47F4BF2C06D5F35D4F1285177CD96360817A4A78ABCFC76421B75B8B955C886453769751A271D41CBA756480313EAE9F9C71D40C3749A96E0B07A63BB9B83B5F56E5E1A505AD4327189910936121A65B583DCACED280BFF32AFF5CA291BAFBFDFA21C7B080006B12A191E942447A48AF12E958B6702EA0B96277B86D028A6B7 ']' 255s + valid_certificate /tmp/sssd-softhsm2-00o6YG/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-783 /tmp/sssd-softhsm2-00o6YG/test-full-chain-CA.pem 255s + check_certificate /tmp/sssd-softhsm2-00o6YG/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-783 /tmp/sssd-softhsm2-00o6YG/test-full-chain-CA.pem 255s + local certificate=/tmp/sssd-softhsm2-00o6YG/test-root-CA-trusted-certificate-0001.pem 255s + local key_pass=pass:random-root-ca-trusted-cert-0001-783 255s + local key_ring=/tmp/sssd-softhsm2-00o6YG/test-full-chain-CA.pem 255s + local verify_option= 255s + prepare_softhsm2_card /tmp/sssd-softhsm2-00o6YG/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-783 255s + local certificate=/tmp/sssd-softhsm2-00o6YG/test-root-CA-trusted-certificate-0001.pem 255s + local key_pass=pass:random-root-ca-trusted-cert-0001-783 255s + local key_cn 255s + local key_name 255s + local tokens_dir 255s + local output_cert_file 255s + token_name= 255s ++ basename /tmp/sssd-softhsm2-00o6YG/test-root-CA-trusted-certificate-0001.pem .pem 255s + key_name=test-root-CA-trusted-certificate-0001 255s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-00o6YG/test-root-CA-trusted-certificate-0001.pem 255s ++ sed -n 's/ *commonName *= //p' 255s + key_cn='Test Organization Root Trusted Certificate 0001' 255s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 255s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-00o6YG/softhsm2-test-root-CA-trusted-certificate-0001.conf 255s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-00o6YG/softhsm2-test-root-CA-trusted-certificate-0001.conf 255s ++ basename /tmp/sssd-softhsm2-00o6YG/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 255s + tokens_dir=/tmp/sssd-softhsm2-00o6YG/softhsm2-test-root-CA-trusted-certificate-0001 255s + token_name='Test Organization Root Tr Token' 255s + '[' '!' -e /tmp/sssd-softhsm2-00o6YG/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 255s + '[' '!' -d /tmp/sssd-softhsm2-00o6YG/softhsm2-test-root-CA-trusted-certificate-0001 ']' 255s + echo 'Test Organization Root Tr Token' 255s Test Organization Root Tr Token 255s + '[' -n '' ']' 255s + local output_base_name=SSSD-child-20764 255s + local output_file=/tmp/sssd-softhsm2-00o6YG/SSSD-child-20764.output 255s + output_cert_file=/tmp/sssd-softhsm2-00o6YG/SSSD-child-20764.pem 255s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-00o6YG/test-full-chain-CA.pem 255s [p11_child[2148]] [main] (0x0400): p11_child started. 255s [p11_child[2148]] [main] (0x2000): Running in [pre-auth] mode. 255s [p11_child[2148]] [main] (0x2000): Running with effective IDs: [0][0]. 255s [p11_child[2148]] [main] (0x2000): Running with real IDs [0][0]. 255s [p11_child[2148]] [do_card] (0x4000): Module List: 255s [p11_child[2148]] [do_card] (0x4000): common name: [softhsm2]. 255s [p11_child[2148]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 255s [p11_child[2148]] [do_card] (0x4000): Description [SoftHSM slot ID 0x2c8842dc] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 255s [p11_child[2148]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 255s [p11_child[2148]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x2c8842dc][747127516] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 255s [p11_child[2148]] [do_card] (0x4000): Login NOT required. 255s [p11_child[2148]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 255s [p11_child[2148]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 255s [p11_child[2148]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Root Tr Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 255s [p11_child[2148]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x2c8842dc;slot-manufacturer=SoftHSM%20project;slot-id=747127516;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=d56039852c8842dc;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 255s [p11_child[2148]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 255s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-00o6YG/SSSD-child-20764.output 255s + echo '-----BEGIN CERTIFICATE-----' 255s + tail -n1 /tmp/sssd-softhsm2-00o6YG/SSSD-child-20764.output 255s + echo '-----END CERTIFICATE-----' 255s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-00o6YG/SSSD-child-20764.pem 255s Certificate: 255s Data: 255s Version: 3 (0x2) 255s Serial Number: 3 (0x3) 255s Signature Algorithm: sha256WithRSAEncryption 255s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 255s Validity 255s Not Before: Jul 4 00:03:15 2025 GMT 255s Not After : Jul 4 00:03:15 2026 GMT 255s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 255s Subject Public Key Info: 255s Public Key Algorithm: rsaEncryption 255s Public-Key: (1024 bit) 255s Modulus: 255s 00:c4:7f:4b:f2:c0:6d:5f:35:d4:f1:28:51:77:cd: 255s 96:36:08:17:a4:a7:8a:bc:fc:76:42:1b:75:b8:b9: 255s 55:c8:86:45:37:69:75:1a:27:1d:41:cb:a7:56:48: 255s 03:13:ea:e9:f9:c7:1d:40:c3:74:9a:96:e0:b0:7a: 255s 63:bb:9b:83:b5:f5:6e:5e:1a:50:5a:d4:32:71:89: 255s 91:09:36:12:1a:65:b5:83:dc:ac:ed:28:0b:ff:32: 255s af:f5:ca:29:1b:af:bf:df:a2:1c:7b:08:00:06:b1: 255s 2a:19:1e:94:24:47:a4:8a:f1:2e:95:8b:67:02:ea: 255s 0b:96:27:7b:86:d0:28:a6:b7 255s Exponent: 65537 (0x10001) 255s X509v3 extensions: 255s X509v3 Authority Key Identifier: 255s 04:1F:6C:C2:5A:A4:9A:2F:59:FF:AA:BE:E8:4F:AC:F7:20:28:BA:9E 255s X509v3 Basic Constraints: 255s CA:FALSE 255s Netscape Cert Type: 255s SSL Client, S/MIME 255s Netscape Comment: 255s Test Organization Root CA trusted Certificate 255s X509v3 Subject Key Identifier: 255s 57:35:97:ED:4A:D7:67:53:5C:C7:FD:84:46:50:8B:53:57:35:1B:58 255s X509v3 Key Usage: critical 255s Digital Signature, Non Repudiation, Key Encipherment 255s X509v3 Extended Key Usage: 255s TLS Web Client Authentication, E-mail Protection 255s X509v3 Subject Alternative Name: 255s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 255s Signature Algorithm: sha256WithRSAEncryption 255s Signature Value: 255s 87:49:1b:74:4d:11:c2:05:84:17:ad:72:89:fc:07:e9:bd:0b: 255s e0:ef:ad:c0:2d:1c:dd:a1:2d:f1:eb:b0:f6:96:20:7c:06:16: 255s 18:02:52:64:60:75:f2:b2:fe:32:8c:5c:33:82:71:b1:08:c4: 255s 7a:a2:d2:71:9a:1d:ca:a8:4c:3c:72:46:03:25:01:27:8a:9a: 255s a4:ae:39:2c:8e:25:14:79:ca:c2:21:d4:11:2f:6a:02:64:fc: 255s 64:d8:97:84:4e:63:45:e6:77:77:f2:ba:bd:1c:c4:1b:f5:04: 255s b8:36:9d:53:f3:8c:41:28:45:51:d5:79:ec:32:34:6f:f7:e8: 255s 31:d0 255s + local found_md5 expected_md5 255s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-00o6YG/test-root-CA-trusted-certificate-0001.pem 255s + expected_md5=Modulus=C47F4BF2C06D5F35D4F1285177CD96360817A4A78ABCFC76421B75B8B955C886453769751A271D41CBA756480313EAE9F9C71D40C3749A96E0B07A63BB9B83B5F56E5E1A505AD4327189910936121A65B583DCACED280BFF32AFF5CA291BAFBFDFA21C7B080006B12A191E942447A48AF12E958B6702EA0B96277B86D028A6B7 255s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-00o6YG/SSSD-child-20764.pem 255s + found_md5=Modulus=C47F4BF2C06D5F35D4F1285177CD96360817A4A78ABCFC76421B75B8B955C886453769751A271D41CBA756480313EAE9F9C71D40C3749A96E0B07A63BB9B83B5F56E5E1A505AD4327189910936121A65B583DCACED280BFF32AFF5CA291BAFBFDFA21C7B080006B12A191E942447A48AF12E958B6702EA0B96277B86D028A6B7 255s + '[' Modulus=C47F4BF2C06D5F35D4F1285177CD96360817A4A78ABCFC76421B75B8B955C886453769751A271D41CBA756480313EAE9F9C71D40C3749A96E0B07A63BB9B83B5F56E5E1A505AD4327189910936121A65B583DCACED280BFF32AFF5CA291BAFBFDFA21C7B080006B12A191E942447A48AF12E958B6702EA0B96277B86D028A6B7 '!=' Modulus=C47F4BF2C06D5F35D4F1285177CD96360817A4A78ABCFC76421B75B8B955C886453769751A271D41CBA756480313EAE9F9C71D40C3749A96E0B07A63BB9B83B5F56E5E1A505AD4327189910936121A65B583DCACED280BFF32AFF5CA291BAFBFDFA21C7B080006B12A191E942447A48AF12E958B6702EA0B96277B86D028A6B7 ']' 255s + output_file=/tmp/sssd-softhsm2-00o6YG/SSSD-child-20764-auth.output 255s ++ basename /tmp/sssd-softhsm2-00o6YG/SSSD-child-20764-auth.output .output 255s + output_cert_file=/tmp/sssd-softhsm2-00o6YG/SSSD-child-20764-auth.pem 255s + echo -n 053350 255s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-00o6YG/test-full-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 '' --token_name 'Test Organization Root Tr Token' --module_name /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so 255s [p11_child[2156]] [main] (0x0400): p11_child started. 255s [p11_child[2156]] [main] (0x2000): Running in [auth] mode. 255s [p11_child[2156]] [main] (0x2000): Running with effective IDs: [0][0]. 255s [p11_child[2156]] [main] (0x2000): Running with real IDs [0][0]. 255s [p11_child[2156]] [do_card] (0x4000): Module List: 255s [p11_child[2156]] [do_card] (0x4000): common name: [softhsm2]. 255s [p11_child[2156]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 255s [p11_child[2156]] [do_card] (0x4000): Description [SoftHSM slot ID 0x2c8842dc] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 255s [p11_child[2156]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 255s [p11_child[2156]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x2c8842dc][747127516] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 255s [p11_child[2156]] [do_card] (0x4000): Login required. 255s [p11_child[2156]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 255s [p11_child[2156]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 255s [p11_child[2156]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so Test Organization Root Tr Token Test Organization Root Tr Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 255s [p11_child[2156]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x2c8842dc;slot-manufacturer=SoftHSM%20project;slot-id=747127516;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=d56039852c8842dc;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 255s [p11_child[2156]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 255s [p11_child[2156]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 255s [p11_child[2156]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 255s [p11_child[2156]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 255s [p11_child[2156]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 255s [p11_child[2156]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 255s [p11_child[2156]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 255s [p11_child[2156]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 255s [p11_child[2156]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 255s [p11_child[2156]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 255s [p11_child[2156]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 255s [p11_child[2156]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 255s [p11_child[2156]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 255s [p11_child[2156]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 255s [p11_child[2156]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 255s [p11_child[2156]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 255s [p11_child[2156]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 255s [p11_child[2156]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 255s [p11_child[2156]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 255s [p11_child[2156]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 255s [p11_child[2156]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 255s [p11_child[2156]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 255s [p11_child[2156]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 255s [p11_child[2156]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 255s [p11_child[2156]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 255s [p11_child[2156]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 255s [p11_child[2156]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 255s [p11_child[2156]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 255s [p11_child[2156]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 255s [p11_child[2156]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 255s [p11_child[2156]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 255s [p11_child[2156]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 255s [p11_child[2156]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 255s [p11_child[2156]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 255s [p11_child[2156]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 255s [p11_child[2156]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 255s [p11_child[2156]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 255s [p11_child[2156]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 255s [p11_child[2156]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 255s [p11_child[2156]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 255s [p11_child[2156]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 255s [p11_child[2156]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 255s [p11_child[2156]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 255s [p11_child[2156]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 255s [p11_child[2156]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 255s [p11_child[2156]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 255s [p11_child[2156]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 255s [p11_child[2156]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 255s [p11_child[2156]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 255s [p11_child[2156]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 255s [p11_child[2156]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 255s [p11_child[2156]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 255s [p11_child[2156]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 255s [p11_child[2156]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 255s [p11_child[2156]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 255s [p11_child[2156]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 255s [p11_child[2156]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 255s [p11_child[2156]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 255s [p11_child[2156]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 255s [p11_child[2156]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 255s [p11_child[2156]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 255s [p11_child[2156]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 255s [p11_child[2156]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 255s [p11_child[2156]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 255s [p11_child[2156]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 255s [p11_child[2156]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 255s [p11_child[2156]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 255s [p11_child[2156]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 255s [p11_child[2156]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 255s [p11_child[2156]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 255s [p11_child[2156]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 255s [p11_child[2156]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 255s [p11_child[2156]] [do_card] (0x4000): Certificate verified and validated. 255s [p11_child[2156]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 255s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-00o6YG/SSSD-child-20764-auth.output 255s + echo '-----BEGIN CERTIFICATE-----' 255s + tail -n1 /tmp/sssd-softhsm2-00o6YG/SSSD-child-20764-auth.output 255s + echo '-----END CERTIFICATE-----' 255s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-00o6YG/SSSD-child-20764-auth.pem 255s Certificate: 255s Data: 255s Version: 3 (0x2) 255s Serial Number: 3 (0x3) 255s Signature Algorithm: sha256WithRSAEncryption 255s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 255s Validity 255s Not Before: Jul 4 00:03:15 2025 GMT 255s Not After : Jul 4 00:03:15 2026 GMT 255s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 255s Subject Public Key Info: 255s Public Key Algorithm: rsaEncryption 255s Public-Key: (1024 bit) 255s Modulus: 255s 00:c4:7f:4b:f2:c0:6d:5f:35:d4:f1:28:51:77:cd: 255s 96:36:08:17:a4:a7:8a:bc:fc:76:42:1b:75:b8:b9: 255s 55:c8:86:45:37:69:75:1a:27:1d:41:cb:a7:56:48: 255s 03:13:ea:e9:f9:c7:1d:40:c3:74:9a:96:e0:b0:7a: 255s 63:bb:9b:83:b5:f5:6e:5e:1a:50:5a:d4:32:71:89: 255s 91:09:36:12:1a:65:b5:83:dc:ac:ed:28:0b:ff:32: 255s af:f5:ca:29:1b:af:bf:df:a2:1c:7b:08:00:06:b1: 255s 2a:19:1e:94:24:47:a4:8a:f1:2e:95:8b:67:02:ea: 255s 0b:96:27:7b:86:d0:28:a6:b7 255s Exponent: 65537 (0x10001) 255s X509v3 extensions: 255s X509v3 Authority Key Identifier: 255s 04:1F:6C:C2:5A:A4:9A:2F:59:FF:AA:BE:E8:4F:AC:F7:20:28:BA:9E 255s X509v3 Basic Constraints: 255s CA:FALSE 255s Netscape Cert Type: 255s SSL Client, S/MIME 255s Netscape Comment: 255s Test Organization Root CA trusted Certificate 255s X509v3 Subject Key Identifier: 255s 57:35:97:ED:4A:D7:67:53:5C:C7:FD:84:46:50:8B:53:57:35:1B:58 255s X509v3 Key Usage: critical 255s Digital Signature, Non Repudiation, Key Encipherment 255s X509v3 Extended Key Usage: 255s TLS Web Client Authentication, E-mail Protection 255s X509v3 Subject Alternative Name: 255s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 255s Signature Algorithm: sha256WithRSAEncryption 255s Signature Value: 255s 87:49:1b:74:4d:11:c2:05:84:17:ad:72:89:fc:07:e9:bd:0b: 255s e0:ef:ad:c0:2d:1c:dd:a1:2d:f1:eb:b0:f6:96:20:7c:06:16: 255s 18:02:52:64:60:75:f2:b2:fe:32:8c:5c:33:82:71:b1:08:c4: 255s 7a:a2:d2:71:9a:1d:ca:a8:4c:3c:72:46:03:25:01:27:8a:9a: 255s a4:ae:39:2c:8e:25:14:79:ca:c2:21:d4:11:2f:6a:02:64:fc: 255s 64:d8:97:84:4e:63:45:e6:77:77:f2:ba:bd:1c:c4:1b:f5:04: 255s b8:36:9d:53:f3:8c:41:28:45:51:d5:79:ec:32:34:6f:f7:e8: 255s 31:d0 255s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-00o6YG/SSSD-child-20764-auth.pem 255s + found_md5=Modulus=C47F4BF2C06D5F35D4F1285177CD96360817A4A78ABCFC76421B75B8B955C886453769751A271D41CBA756480313EAE9F9C71D40C3749A96E0B07A63BB9B83B5F56E5E1A505AD4327189910936121A65B583DCACED280BFF32AFF5CA291BAFBFDFA21C7B080006B12A191E942447A48AF12E958B6702EA0B96277B86D028A6B7 255s + '[' Modulus=C47F4BF2C06D5F35D4F1285177CD96360817A4A78ABCFC76421B75B8B955C886453769751A271D41CBA756480313EAE9F9C71D40C3749A96E0B07A63BB9B83B5F56E5E1A505AD4327189910936121A65B583DCACED280BFF32AFF5CA291BAFBFDFA21C7B080006B12A191E942447A48AF12E958B6702EA0B96277B86D028A6B7 '!=' Modulus=C47F4BF2C06D5F35D4F1285177CD96360817A4A78ABCFC76421B75B8B955C886453769751A271D41CBA756480313EAE9F9C71D40C3749A96E0B07A63BB9B83B5F56E5E1A505AD4327189910936121A65B583DCACED280BFF32AFF5CA291BAFBFDFA21C7B080006B12A191E942447A48AF12E958B6702EA0B96277B86D028A6B7 ']' 255s + valid_certificate /tmp/sssd-softhsm2-00o6YG/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-783 /tmp/sssd-softhsm2-00o6YG/test-full-chain-CA.pem partial_chain 255s + check_certificate /tmp/sssd-softhsm2-00o6YG/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-783 /tmp/sssd-softhsm2-00o6YG/test-full-chain-CA.pem partial_chain 255s + local certificate=/tmp/sssd-softhsm2-00o6YG/test-root-CA-trusted-certificate-0001.pem 255s + local key_pass=pass:random-root-ca-trusted-cert-0001-783 255s + local key_ring=/tmp/sssd-softhsm2-00o6YG/test-full-chain-CA.pem 255s + local verify_option=partial_chain 255s + prepare_softhsm2_card /tmp/sssd-softhsm2-00o6YG/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-783 255s + local certificate=/tmp/sssd-softhsm2-00o6YG/test-root-CA-trusted-certificate-0001.pem 255s + local key_pass=pass:random-root-ca-trusted-cert-0001-783 255s + local key_cn 255s + local key_name 255s + local tokens_dir 255s + local output_cert_file 255s + token_name= 255s ++ basename /tmp/sssd-softhsm2-00o6YG/test-root-CA-trusted-certificate-0001.pem .pem 255s + key_name=test-root-CA-trusted-certificate-0001 255s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-00o6YG/test-root-CA-trusted-certificate-0001.pem 255s ++ sed -n 's/ *commonName *= //p' 255s Test Organization Root Tr Token 255s + key_cn='Test Organization Root Trusted Certificate 0001' 255s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 255s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-00o6YG/softhsm2-test-root-CA-trusted-certificate-0001.conf 255s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-00o6YG/softhsm2-test-root-CA-trusted-certificate-0001.conf 255s ++ basename /tmp/sssd-softhsm2-00o6YG/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 255s + tokens_dir=/tmp/sssd-softhsm2-00o6YG/softhsm2-test-root-CA-trusted-certificate-0001 255s + token_name='Test Organization Root Tr Token' 255s + '[' '!' -e /tmp/sssd-softhsm2-00o6YG/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 255s + '[' '!' -d /tmp/sssd-softhsm2-00o6YG/softhsm2-test-root-CA-trusted-certificate-0001 ']' 255s + echo 'Test Organization Root Tr Token' 255s + '[' -n partial_chain ']' 255s + local verify_arg=--verify=partial_chain 255s + local output_base_name=SSSD-child-21958 255s + local output_file=/tmp/sssd-softhsm2-00o6YG/SSSD-child-21958.output 255s + output_cert_file=/tmp/sssd-softhsm2-00o6YG/SSSD-child-21958.pem 255s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-00o6YG/test-full-chain-CA.pem 255s [p11_child[2166]] [main] (0x0400): p11_child started. 255s [p11_child[2166]] [main] (0x2000): Running in [pre-auth] mode. 255s [p11_child[2166]] [main] (0x2000): Running with effective IDs: [0][0]. 255s [p11_child[2166]] [main] (0x2000): Running with real IDs [0][0]. 255s [p11_child[2166]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 255s [p11_child[2166]] [do_card] (0x4000): Module List: 255s [p11_child[2166]] [do_card] (0x4000): common name: [softhsm2]. 255s [p11_child[2166]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 255s [p11_child[2166]] [do_card] (0x4000): Description [SoftHSM slot ID 0x2c8842dc] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 255s [p11_child[2166]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 255s [p11_child[2166]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x2c8842dc][747127516] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 255s [p11_child[2166]] [do_card] (0x4000): Login NOT required. 255s [p11_child[2166]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 255s [p11_child[2166]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 255s [p11_child[2166]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Root Tr Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 255s [p11_child[2166]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x2c8842dc;slot-manufacturer=SoftHSM%20project;slot-id=747127516;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=d56039852c8842dc;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 255s [p11_child[2166]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 255s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-00o6YG/SSSD-child-21958.output 255s + echo '-----BEGIN CERTIFICATE-----' 255s + tail -n1 /tmp/sssd-softhsm2-00o6YG/SSSD-child-21958.output 255s + echo '-----END CERTIFICATE-----' 255s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-00o6YG/SSSD-child-21958.pem 255s Certificate: 255s Data: 255s Version: 3 (0x2) 255s Serial Number: 3 (0x3) 255s Signature Algorithm: sha256WithRSAEncryption 255s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 255s Validity 255s Not Before: Jul 4 00:03:15 2025 GMT 255s Not After : Jul 4 00:03:15 2026 GMT 255s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 255s Subject Public Key Info: 255s Public Key Algorithm: rsaEncryption 255s Public-Key: (1024 bit) 255s Modulus: 255s 00:c4:7f:4b:f2:c0:6d:5f:35:d4:f1:28:51:77:cd: 255s 96:36:08:17:a4:a7:8a:bc:fc:76:42:1b:75:b8:b9: 255s 55:c8:86:45:37:69:75:1a:27:1d:41:cb:a7:56:48: 255s 03:13:ea:e9:f9:c7:1d:40:c3:74:9a:96:e0:b0:7a: 255s 63:bb:9b:83:b5:f5:6e:5e:1a:50:5a:d4:32:71:89: 255s 91:09:36:12:1a:65:b5:83:dc:ac:ed:28:0b:ff:32: 255s af:f5:ca:29:1b:af:bf:df:a2:1c:7b:08:00:06:b1: 255s 2a:19:1e:94:24:47:a4:8a:f1:2e:95:8b:67:02:ea: 255s 0b:96:27:7b:86:d0:28:a6:b7 255s Exponent: 65537 (0x10001) 255s X509v3 extensions: 255s X509v3 Authority Key Identifier: 255s 04:1F:6C:C2:5A:A4:9A:2F:59:FF:AA:BE:E8:4F:AC:F7:20:28:BA:9E 255s X509v3 Basic Constraints: 255s CA:FALSE 255s Netscape Cert Type: 255s SSL Client, S/MIME 255s Netscape Comment: 255s Test Organization Root CA trusted Certificate 255s X509v3 Subject Key Identifier: 255s 57:35:97:ED:4A:D7:67:53:5C:C7:FD:84:46:50:8B:53:57:35:1B:58 255s X509v3 Key Usage: critical 255s Digital Signature, Non Repudiation, Key Encipherment 255s X509v3 Extended Key Usage: 255s TLS Web Client Authentication, E-mail Protection 255s X509v3 Subject Alternative Name: 255s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 255s Signature Algorithm: sha256WithRSAEncryption 255s Signature Value: 255s 87:49:1b:74:4d:11:c2:05:84:17:ad:72:89:fc:07:e9:bd:0b: 255s e0:ef:ad:c0:2d:1c:dd:a1:2d:f1:eb:b0:f6:96:20:7c:06:16: 255s 18:02:52:64:60:75:f2:b2:fe:32:8c:5c:33:82:71:b1:08:c4: 255s 7a:a2:d2:71:9a:1d:ca:a8:4c:3c:72:46:03:25:01:27:8a:9a: 255s a4:ae:39:2c:8e:25:14:79:ca:c2:21:d4:11:2f:6a:02:64:fc: 255s 64:d8:97:84:4e:63:45:e6:77:77:f2:ba:bd:1c:c4:1b:f5:04: 255s b8:36:9d:53:f3:8c:41:28:45:51:d5:79:ec:32:34:6f:f7:e8: 255s 31:d0 255s + local found_md5 expected_md5 255s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-00o6YG/test-root-CA-trusted-certificate-0001.pem 255s + expected_md5=Modulus=C47F4BF2C06D5F35D4F1285177CD96360817A4A78ABCFC76421B75B8B955C886453769751A271D41CBA756480313EAE9F9C71D40C3749A96E0B07A63BB9B83B5F56E5E1A505AD4327189910936121A65B583DCACED280BFF32AFF5CA291BAFBFDFA21C7B080006B12A191E942447A48AF12E958B6702EA0B96277B86D028A6B7 255s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-00o6YG/SSSD-child-21958.pem 255s + found_md5=Modulus=C47F4BF2C06D5F35D4F1285177CD96360817A4A78ABCFC76421B75B8B955C886453769751A271D41CBA756480313EAE9F9C71D40C3749A96E0B07A63BB9B83B5F56E5E1A505AD4327189910936121A65B583DCACED280BFF32AFF5CA291BAFBFDFA21C7B080006B12A191E942447A48AF12E958B6702EA0B96277B86D028A6B7 255s + '[' Modulus=C47F4BF2C06D5F35D4F1285177CD96360817A4A78ABCFC76421B75B8B955C886453769751A271D41CBA756480313EAE9F9C71D40C3749A96E0B07A63BB9B83B5F56E5E1A505AD4327189910936121A65B583DCACED280BFF32AFF5CA291BAFBFDFA21C7B080006B12A191E942447A48AF12E958B6702EA0B96277B86D028A6B7 '!=' Modulus=C47F4BF2C06D5F35D4F1285177CD96360817A4A78ABCFC76421B75B8B955C886453769751A271D41CBA756480313EAE9F9C71D40C3749A96E0B07A63BB9B83B5F56E5E1A505AD4327189910936121A65B583DCACED280BFF32AFF5CA291BAFBFDFA21C7B080006B12A191E942447A48AF12E958B6702EA0B96277B86D028A6B7 ']' 255s + output_file=/tmp/sssd-softhsm2-00o6YG/SSSD-child-21958-auth.output 255s ++ basename /tmp/sssd-softhsm2-00o6YG/SSSD-child-21958-auth.output .output 255s + output_cert_file=/tmp/sssd-softhsm2-00o6YG/SSSD-child-21958-auth.pem 255s + echo -n 053350 255s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-00o6YG/test-full-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Root Tr Token' --module_name /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so 255s [p11_child[2174]] [main] (0x0400): p11_child started. 255s [p11_child[2174]] [main] (0x2000): Running in [auth] mode. 255s [p11_child[2174]] [main] (0x2000): Running with effective IDs: [0][0]. 255s [p11_child[2174]] [main] (0x2000): Running with real IDs [0][0]. 255s [p11_child[2174]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 255s [p11_child[2174]] [do_card] (0x4000): Module List: 255s [p11_child[2174]] [do_card] (0x4000): common name: [softhsm2]. 255s [p11_child[2174]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 255s [p11_child[2174]] [do_card] (0x4000): Description [SoftHSM slot ID 0x2c8842dc] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 255s [p11_child[2174]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 255s [p11_child[2174]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x2c8842dc][747127516] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 255s [p11_child[2174]] [do_card] (0x4000): Login required. 255s [p11_child[2174]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 255s [p11_child[2174]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 255s [p11_child[2174]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so Test Organization Root Tr Token Test Organization Root Tr Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 255s [p11_child[2174]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x2c8842dc;slot-manufacturer=SoftHSM%20project;slot-id=747127516;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=d56039852c8842dc;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 255s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 255s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 255s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 255s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 255s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 255s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 255s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 255s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 255s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 255s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 255s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 255s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 255s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 255s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 255s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 255s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 255s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 255s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 255s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 255s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 255s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 255s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 255s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 255s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 255s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 255s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 255s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 255s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 255s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 255s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 255s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 255s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 255s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 255s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 255s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 255s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 255s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 255s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 255s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 255s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 255s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 255s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 255s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 255s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 255s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 255s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 255s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 255s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 255s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 255s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 255s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 255s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 255s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 255s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 255s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 255s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 255s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 255s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 255s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 255s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 255s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 255s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 255s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 255s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 255s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 255s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 255s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 255s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 255s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 255s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 255s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 255s [p11_child[2174]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 255s [p11_child[2174]] [do_card] (0x4000): Certificate verified and validated. 255s [p11_child[2174]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 255s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-00o6YG/SSSD-child-21958-auth.output 255s + echo '-----BEGIN CERTIFICATE-----' 255s + tail -n1 /tmp/sssd-softhsm2-00o6YG/SSSD-child-21958-auth.output 255s + echo '-----END CERTIFICATE-----' 255s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-00o6YG/SSSD-child-21958-auth.pem 255s Certificate: 255s Data: 255s Version: 3 (0x2) 255s Serial Number: 3 (0x3) 255s Signature Algorithm: sha256WithRSAEncryption 255s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 255s Validity 255s Not Before: Jul 4 00:03:15 2025 GMT 255s Not After : Jul 4 00:03:15 2026 GMT 255s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 255s Subject Public Key Info: 255s Public Key Algorithm: rsaEncryption 255s Public-Key: (1024 bit) 255s Modulus: 255s 00:c4:7f:4b:f2:c0:6d:5f:35:d4:f1:28:51:77:cd: 255s 96:36:08:17:a4:a7:8a:bc:fc:76:42:1b:75:b8:b9: 255s 55:c8:86:45:37:69:75:1a:27:1d:41:cb:a7:56:48: 255s 03:13:ea:e9:f9:c7:1d:40:c3:74:9a:96:e0:b0:7a: 255s 63:bb:9b:83:b5:f5:6e:5e:1a:50:5a:d4:32:71:89: 255s 91:09:36:12:1a:65:b5:83:dc:ac:ed:28:0b:ff:32: 255s af:f5:ca:29:1b:af:bf:df:a2:1c:7b:08:00:06:b1: 255s 2a:19:1e:94:24:47:a4:8a:f1:2e:95:8b:67:02:ea: 255s 0b:96:27:7b:86:d0:28:a6:b7 255s Exponent: 65537 (0x10001) 255s X509v3 extensions: 255s X509v3 Authority Key Identifier: 255s 04:1F:6C:C2:5A:A4:9A:2F:59:FF:AA:BE:E8:4F:AC:F7:20:28:BA:9E 255s X509v3 Basic Constraints: 255s CA:FALSE 255s Netscape Cert Type: 255s SSL Client, S/MIME 255s Netscape Comment: 255s Test Organization Root CA trusted Certificate 255s X509v3 Subject Key Identifier: 255s 57:35:97:ED:4A:D7:67:53:5C:C7:FD:84:46:50:8B:53:57:35:1B:58 255s X509v3 Key Usage: critical 255s Digital Signature, Non Repudiation, Key Encipherment 255s X509v3 Extended Key Usage: 255s TLS Web Client Authentication, E-mail Protection 255s X509v3 Subject Alternative Name: 255s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 255s Signature Algorithm: sha256WithRSAEncryption 255s Signature Value: 255s 87:49:1b:74:4d:11:c2:05:84:17:ad:72:89:fc:07:e9:bd:0b: 255s e0:ef:ad:c0:2d:1c:dd:a1:2d:f1:eb:b0:f6:96:20:7c:06:16: 255s 18:02:52:64:60:75:f2:b2:fe:32:8c:5c:33:82:71:b1:08:c4: 255s 7a:a2:d2:71:9a:1d:ca:a8:4c:3c:72:46:03:25:01:27:8a:9a: 255s a4:ae:39:2c:8e:25:14:79:ca:c2:21:d4:11:2f:6a:02:64:fc: 255s 64:d8:97:84:4e:63:45:e6:77:77:f2:ba:bd:1c:c4:1b:f5:04: 255s b8:36:9d:53:f3:8c:41:28:45:51:d5:79:ec:32:34:6f:f7:e8: 255s 31:d0 255s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-00o6YG/SSSD-child-21958-auth.pem 255s + found_md5=Modulus=C47F4BF2C06D5F35D4F1285177CD96360817A4A78ABCFC76421B75B8B955C886453769751A271D41CBA756480313EAE9F9C71D40C3749A96E0B07A63BB9B83B5F56E5E1A505AD4327189910936121A65B583DCACED280BFF32AFF5CA291BAFBFDFA21C7B080006B12A191E942447A48AF12E958B6702EA0B96277B86D028A6B7 255s + '[' Modulus=C47F4BF2C06D5F35D4F1285177CD96360817A4A78ABCFC76421B75B8B955C886453769751A271D41CBA756480313EAE9F9C71D40C3749A96E0B07A63BB9B83B5F56E5E1A505AD4327189910936121A65B583DCACED280BFF32AFF5CA291BAFBFDFA21C7B080006B12A191E942447A48AF12E958B6702EA0B96277B86D028A6B7 '!=' Modulus=C47F4BF2C06D5F35D4F1285177CD96360817A4A78ABCFC76421B75B8B955C886453769751A271D41CBA756480313EAE9F9C71D40C3749A96E0B07A63BB9B83B5F56E5E1A505AD4327189910936121A65B583DCACED280BFF32AFF5CA291BAFBFDFA21C7B080006B12A191E942447A48AF12E958B6702EA0B96277B86D028A6B7 ']' 255s + invalid_certificate /tmp/sssd-softhsm2-00o6YG/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-783 /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA.pem 255s + check_certificate /tmp/sssd-softhsm2-00o6YG/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-783 /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA.pem 255s + local certificate=/tmp/sssd-softhsm2-00o6YG/test-root-CA-trusted-certificate-0001.pem 255s + local key_pass=pass:random-root-ca-trusted-cert-0001-783 255s + local key_ring=/tmp/sssd-softhsm2-00o6YG/test-intermediate-CA.pem 255s + local verify_option= 255s + prepare_softhsm2_card /tmp/sssd-softhsm2-00o6YG/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-783 255s + local certificate=/tmp/sssd-softhsm2-00o6YG/test-root-CA-trusted-certificate-0001.pem 255s + local key_pass=pass:random-root-ca-trusted-cert-0001-783 255s + local key_cn 255s + local key_name 255s + local tokens_dir 255s + local output_cert_file 255s + token_name= 255s ++ basename /tmp/sssd-softhsm2-00o6YG/test-root-CA-trusted-certificate-0001.pem .pem 255s + key_name=test-root-CA-trusted-certificate-0001 255s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-00o6YG/test-root-CA-trusted-certificate-0001.pem 255s ++ sed -n 's/ *commonName *= //p' 256s + key_cn='Test Organization Root Trusted Certificate 0001' 256s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 256s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-00o6YG/softhsm2-test-root-CA-trusted-certificate-0001.conf 256s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-00o6YG/softhsm2-test-root-CA-trusted-certificate-0001.conf 256s ++ basename /tmp/sssd-softhsm2-00o6YG/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 256s Test Organization Root Tr Token 256s + tokens_dir=/tmp/sssd-softhsm2-00o6YG/softhsm2-test-root-CA-trusted-certificate-0001 256s + token_name='Test Organization Root Tr Token' 256s + '[' '!' -e /tmp/sssd-softhsm2-00o6YG/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 256s + '[' '!' -d /tmp/sssd-softhsm2-00o6YG/softhsm2-test-root-CA-trusted-certificate-0001 ']' 256s + echo 'Test Organization Root Tr Token' 256s + '[' -n '' ']' 256s + local output_base_name=SSSD-child-25499 256s + local output_file=/tmp/sssd-softhsm2-00o6YG/SSSD-child-25499.output 256s + output_cert_file=/tmp/sssd-softhsm2-00o6YG/SSSD-child-25499.pem 256s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-00o6YG/test-intermediate-CA.pem 256s [p11_child[2184]] [main] (0x0400): p11_child started. 256s [p11_child[2184]] [main] (0x2000): Running in [pre-auth] mode. 256s [p11_child[2184]] [main] (0x2000): Running with effective IDs: [0][0]. 256s [p11_child[2184]] [main] (0x2000): Running with real IDs [0][0]. 256s [p11_child[2184]] [do_card] (0x4000): Module List: 256s [p11_child[2184]] [do_card] (0x4000): common name: [softhsm2]. 256s [p11_child[2184]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 256s [p11_child[2184]] [do_card] (0x4000): Description [SoftHSM slot ID 0x2c8842dc] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 256s [p11_child[2184]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 256s [p11_child[2184]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x2c8842dc][747127516] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 256s [p11_child[2184]] [do_card] (0x4000): Login NOT required. 256s [p11_child[2184]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 256s [p11_child[2184]] [do_verification] (0x0040): X509_verify_cert failed [0]. 256s [p11_child[2184]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 256s [p11_child[2184]] [read_certs] (0x0040): Certificate [Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] not valid, skipping. 256s [p11_child[2184]] [do_card] (0x4000): No certificate found. 256s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-00o6YG/SSSD-child-25499.output 256s + return 2 256s + invalid_certificate /tmp/sssd-softhsm2-00o6YG/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-783 /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA.pem partial_chain 256s + check_certificate /tmp/sssd-softhsm2-00o6YG/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-783 /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA.pem partial_chain 256s + local certificate=/tmp/sssd-softhsm2-00o6YG/test-root-CA-trusted-certificate-0001.pem 256s + local key_pass=pass:random-root-ca-trusted-cert-0001-783 256s + local key_ring=/tmp/sssd-softhsm2-00o6YG/test-intermediate-CA.pem 256s + local verify_option=partial_chain 256s + prepare_softhsm2_card /tmp/sssd-softhsm2-00o6YG/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-783 256s + local certificate=/tmp/sssd-softhsm2-00o6YG/test-root-CA-trusted-certificate-0001.pem 256s + local key_pass=pass:random-root-ca-trusted-cert-0001-783 256s + local key_cn 256s + local key_name 256s + local tokens_dir 256s + local output_cert_file 256s + token_name= 256s ++ basename /tmp/sssd-softhsm2-00o6YG/test-root-CA-trusted-certificate-0001.pem .pem 256s + key_name=test-root-CA-trusted-certificate-0001 256s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-00o6YG/test-root-CA-trusted-certificate-0001.pem 256s ++ sed -n 's/ *commonName *= //p' 256s + key_cn='Test Organization Root Trusted Certificate 0001' 256s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 256s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-00o6YG/softhsm2-test-root-CA-trusted-certificate-0001.conf 256s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-00o6YG/softhsm2-test-root-CA-trusted-certificate-0001.conf 256s ++ basename /tmp/sssd-softhsm2-00o6YG/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 256s + tokens_dir=/tmp/sssd-softhsm2-00o6YG/softhsm2-test-root-CA-trusted-certificate-0001 256s + token_name='Test Organization Root Tr Token' 256s + '[' '!' -e /tmp/sssd-softhsm2-00o6YG/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 256s Test Organization Root Tr Token 256s + '[' '!' -d /tmp/sssd-softhsm2-00o6YG/softhsm2-test-root-CA-trusted-certificate-0001 ']' 256s + echo 'Test Organization Root Tr Token' 256s + '[' -n partial_chain ']' 256s + local verify_arg=--verify=partial_chain 256s + local output_base_name=SSSD-child-10696 256s + local output_file=/tmp/sssd-softhsm2-00o6YG/SSSD-child-10696.output 256s + output_cert_file=/tmp/sssd-softhsm2-00o6YG/SSSD-child-10696.pem 256s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-00o6YG/test-intermediate-CA.pem 256s [p11_child[2191]] [main] (0x0400): p11_child started. 256s [p11_child[2191]] [main] (0x2000): Running in [pre-auth] mode. 256s [p11_child[2191]] [main] (0x2000): Running with effective IDs: [0][0]. 256s [p11_child[2191]] [main] (0x2000): Running with real IDs [0][0]. 256s [p11_child[2191]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 256s [p11_child[2191]] [do_card] (0x4000): Module List: 256s [p11_child[2191]] [do_card] (0x4000): common name: [softhsm2]. 256s [p11_child[2191]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 256s [p11_child[2191]] [do_card] (0x4000): Description [SoftHSM slot ID 0x2c8842dc] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 256s [p11_child[2191]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 256s [p11_child[2191]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x2c8842dc][747127516] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 256s [p11_child[2191]] [do_card] (0x4000): Login NOT required. 256s [p11_child[2191]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 256s [p11_child[2191]] [do_verification] (0x0040): X509_verify_cert failed [0]. 256s [p11_child[2191]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 256s [p11_child[2191]] [read_certs] (0x0040): Certificate [Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] not valid, skipping. 256s [p11_child[2191]] [do_card] (0x4000): No certificate found. 256s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-00o6YG/SSSD-child-10696.output 256s + return 2 256s + invalid_certificate /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-16416 /dev/null 256s + check_certificate /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-16416 /dev/null 256s + local certificate=/tmp/sssd-softhsm2-00o6YG/test-intermediate-CA-trusted-certificate-0001.pem 256s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-16416 256s + local key_ring=/dev/null 256s + local verify_option= 256s + prepare_softhsm2_card /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-16416 256s + local certificate=/tmp/sssd-softhsm2-00o6YG/test-intermediate-CA-trusted-certificate-0001.pem 256s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-16416 256s + local key_cn 256s + local key_name 256s + local tokens_dir 256s + local output_cert_file 256s + token_name= 256s ++ basename /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA-trusted-certificate-0001.pem .pem 256s + key_name=test-intermediate-CA-trusted-certificate-0001 256s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA-trusted-certificate-0001.pem 256s ++ sed -n 's/ *commonName *= //p' 256s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 256s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 256s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-00o6YG/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 256s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-00o6YG/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 256s ++ basename /tmp/sssd-softhsm2-00o6YG/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 256s + tokens_dir=/tmp/sssd-softhsm2-00o6YG/softhsm2-test-intermediate-CA-trusted-certificate-0001 256s + token_name='Test Organization Interme Token' 256s + '[' '!' -e /tmp/sssd-softhsm2-00o6YG/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 256s + local key_file 256s + local decrypted_key 256s + mkdir -p /tmp/sssd-softhsm2-00o6YG/softhsm2-test-intermediate-CA-trusted-certificate-0001 256s + key_file=/tmp/sssd-softhsm2-00o6YG/test-intermediate-CA-trusted-certificate-0001-key.pem 256s + decrypted_key=/tmp/sssd-softhsm2-00o6YG/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 256s + cat 256s + softhsm2-util --init-token --label 'Test Organization Interme Token' --pin 053350 --so-pin 053350 --free 256s Slot 0 has a free/uninitialized token. 256s The token has been initialized and is reassigned to slot 962187557 256s + softhsm2-util --show-slots 256s Available slots: 256s Slot 962187557 256s Slot info: 256s Description: SoftHSM slot ID 0x3959d125 256s Manufacturer ID: SoftHSM project 256s Hardware version: 2.6 256s Firmware version: 2.6 256s Token present: yes 256s Token info: 256s Manufacturer ID: SoftHSM project 256s Model: SoftHSM v2 256s Hardware version: 2.6 256s Firmware version: 2.6 256s Serial number: b0a003973959d125 256s Initialized: yes 256s User PIN init.: yes 256s Label: Test Organization Interme Token 256s Slot 1 256s Slot info: 256s Description: SoftHSM slot ID 0x1 256s Manufacturer ID: SoftHSM project 256s Hardware version: 2.6 256s Firmware version: 2.6 256s Token present: yes 256s Token info: 256s Manufacturer ID: SoftHSM project 256s Model: SoftHSM v2 256s Hardware version: 2.6 256s Firmware version: 2.6 256s Serial number: 256s Initialized: no 256s User PIN init.: no 256s Label: 256s + p11tool --provider=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --write --no-mark-private --load-certificate=/tmp/sssd-softhsm2-00o6YG/test-intermediate-CA-trusted-certificate-0001.pem --login --set-pin=053350 --label 'Test Organization Intermediate Trusted Certificate 0001' --id 00112233445566778899FFAABBCCDDEEFF012345 256s + openssl rsa -passin pass:random-intermediate-ca-trusted-cert-0001-16416 -in /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA-trusted-certificate-0001-key.pem -out /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 256s writing RSA key 256s + p11tool --provider=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --write --load-privkey=/tmp/sssd-softhsm2-00o6YG/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem --login --set-pin=053350 --label 'Test Organization Intermediate Trusted Certificate 0001 Key' --id 00112233445566778899FFAABBCCDDEEFF012345 256s + rm /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 256s + p11tool --provider=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --list-all 256s Object 0: 256s URL: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=b0a003973959d125;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert 256s Type: X.509 Certificate (RSA-1024) 256s Expires: Sat Jul 4 00:03:15 2026 256s Label: Test Organization Intermediate Trusted Certificate 0001 256s ID: 00:11:22:33:44:55:66:77:88:99:ff:aa:bb:cc:dd:ee:ff:01:23:45 256s 256s + echo 'Test Organization Interme Token' 256s + '[' -n '' ']' 256s + local output_base_name=SSSD-child-30455 256s + local output_file=/tmp/sssd-softhsm2-00o6YG/SSSD-child-30455.output 256s + output_cert_file=/tmp/sssd-softhsm2-00o6YG/SSSD-child-30455.pem 256s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/dev/null 256s Test Organization Interme Token 256s [p11_child[2207]] [main] (0x0400): p11_child started. 256s [p11_child[2207]] [main] (0x2000): Running in [pre-auth] mode. 256s [p11_child[2207]] [main] (0x2000): Running with effective IDs: [0][0]. 256s [p11_child[2207]] [main] (0x2000): Running with real IDs [0][0]. 256s [p11_child[2207]] [init_verification] (0x0040): X509_LOOKUP_load_file [/dev/null] failed [92274824][error:05800088:x509 certificate routines::no certificate or crl found]. 256s [p11_child[2207]] [do_work] (0x0040): init_verification failed. 256s [p11_child[2207]] [main] (0x0020): p11_child failed (5) 256s + return 2 256s + valid_certificate /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-16416 /dev/null no_verification 256s + check_certificate /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-16416 /dev/null no_verification 256s + local certificate=/tmp/sssd-softhsm2-00o6YG/test-intermediate-CA-trusted-certificate-0001.pem 256s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-16416 256s + local key_ring=/dev/null 256s + local verify_option=no_verification 256s + prepare_softhsm2_card /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-16416 256s + local certificate=/tmp/sssd-softhsm2-00o6YG/test-intermediate-CA-trusted-certificate-0001.pem 256s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-16416 256s + local key_cn 256s + local key_name 256s + local tokens_dir 256s + local output_cert_file 256s + token_name= 256s ++ basename /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA-trusted-certificate-0001.pem .pem 256s + key_name=test-intermediate-CA-trusted-certificate-0001 256s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA-trusted-certificate-0001.pem 256s ++ sed -n 's/ *commonName *= //p' 256s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 256s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 256s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-00o6YG/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 256s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-00o6YG/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 256s ++ basename /tmp/sssd-softhsm2-00o6YG/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 256s + tokens_dir=/tmp/sssd-softhsm2-00o6YG/softhsm2-test-intermediate-CA-trusted-certificate-0001 256s + token_name='Test Organization Interme Token' 256s + '[' '!' -e /tmp/sssd-softhsm2-00o6YG/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 256s + '[' '!' -d /tmp/sssd-softhsm2-00o6YG/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 256s + echo 'Test Organization Interme Token' 256s + '[' -n no_verification ']' 256s + local verify_arg=--verify=no_verification 256s + local output_base_name=SSSD-child-30354 256s + local output_file=/tmp/sssd-softhsm2-00o6YG/SSSD-child-30354.output 256s + output_cert_file=/tmp/sssd-softhsm2-00o6YG/SSSD-child-30354.pem 256s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --verify=no_verification --ca_db=/dev/null 256s Test Organization Interme Token 256s [p11_child[2213]] [main] (0x0400): p11_child started. 256s [p11_child[2213]] [main] (0x2000): Running in [pre-auth] mode. 256s [p11_child[2213]] [main] (0x2000): Running with effective IDs: [0][0]. 256s [p11_child[2213]] [main] (0x2000): Running with real IDs [0][0]. 256s [p11_child[2213]] [parse_cert_verify_opts] (0x0020): Found 'no_verification' option, disabling verification completely. This should not be used in production. 256s [p11_child[2213]] [do_card] (0x4000): Module List: 256s [p11_child[2213]] [do_card] (0x4000): common name: [softhsm2]. 256s [p11_child[2213]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 256s [p11_child[2213]] [do_card] (0x4000): Description [SoftHSM slot ID 0x3959d125] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 256s [p11_child[2213]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 256s [p11_child[2213]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x3959d125][962187557] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 256s [p11_child[2213]] [do_card] (0x4000): Login NOT required. 256s [p11_child[2213]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 256s [p11_child[2213]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Interme Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 256s [p11_child[2213]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x3959d125;slot-manufacturer=SoftHSM%20project;slot-id=962187557;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=b0a003973959d125;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 256s [p11_child[2213]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 256s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-00o6YG/SSSD-child-30354.output 256s + echo '-----BEGIN CERTIFICATE-----' 256s + tail -n1 /tmp/sssd-softhsm2-00o6YG/SSSD-child-30354.output 256s + echo '-----END CERTIFICATE-----' 256s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-00o6YG/SSSD-child-30354.pem 256s Certificate: 256s Data: 256s Version: 3 (0x2) 256s Serial Number: 4 (0x4) 256s Signature Algorithm: sha256WithRSAEncryption 256s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 256s Validity 256s Not Before: Jul 4 00:03:15 2025 GMT 256s Not After : Jul 4 00:03:15 2026 GMT 256s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 256s Subject Public Key Info: 256s Public Key Algorithm: rsaEncryption 256s Public-Key: (1024 bit) 256s Modulus: 256s 00:da:5f:0c:0c:a5:84:8d:ce:8c:3f:52:8f:0e:20: 256s c8:2b:7e:c6:26:21:9b:b0:4d:c0:23:06:6b:34:ff: 256s 50:85:9c:fb:0d:3d:dd:32:48:72:04:98:57:56:f2: 256s 81:4f:e4:f6:7f:07:62:cd:c6:13:09:b9:7e:98:b8: 256s 9b:aa:f0:89:f9:21:93:89:74:17:10:72:05:0f:8d: 256s d5:69:a0:5b:fa:e8:df:bf:37:a6:61:78:6c:70:41: 256s 98:ee:eb:5d:8b:1b:0c:78:eb:72:7c:c3:06:40:17: 256s 38:e2:9e:22:3c:a6:cc:86:d1:fd:2b:2a:85:cb:33: 256s 80:04:5e:79:31:ee:97:65:d7 256s Exponent: 65537 (0x10001) 256s X509v3 extensions: 256s X509v3 Authority Key Identifier: 256s B2:3D:49:62:5C:A2:E5:1E:99:C6:58:55:C5:D5:FA:DE:2A:FC:9B:11 256s X509v3 Basic Constraints: 256s CA:FALSE 256s Netscape Cert Type: 256s SSL Client, S/MIME 256s Netscape Comment: 256s Test Organization Intermediate CA trusted Certificate 256s X509v3 Subject Key Identifier: 256s AD:E1:BD:A6:DA:BC:FF:92:6A:C1:C7:EF:3F:FF:05:23:1E:F4:E2:2F 256s X509v3 Key Usage: critical 256s Digital Signature, Non Repudiation, Key Encipherment 256s X509v3 Extended Key Usage: 256s TLS Web Client Authentication, E-mail Protection 256s X509v3 Subject Alternative Name: 256s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 256s Signature Algorithm: sha256WithRSAEncryption 256s Signature Value: 256s 90:32:09:b3:e7:87:be:8e:9f:5a:ac:2d:32:28:bc:b4:e7:f2: 256s b5:0d:09:54:77:b2:60:79:e4:46:07:68:e4:c9:04:f9:2d:cc: 256s 7f:15:ae:47:f9:62:84:e4:55:e3:da:d0:0d:db:d0:4f:bc:0e: 256s e3:d3:97:05:c3:2e:4a:39:d3:8e:b3:3f:06:70:35:86:a6:fd: 256s a1:7f:e5:1d:38:e2:95:51:e7:bf:99:2e:ce:e4:ed:14:7b:fc: 256s 04:9f:99:54:0d:da:53:de:c8:62:c1:db:a0:b4:5a:b0:bb:ec: 256s 6e:61:1a:c1:4f:5e:0e:da:88:58:a9:e6:31:42:26:40:27:31: 256s 74:14 256s + local found_md5 expected_md5 256s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA-trusted-certificate-0001.pem 256s + expected_md5=Modulus=DA5F0C0CA5848DCE8C3F528F0E20C82B7EC626219BB04DC023066B34FF50859CFB0D3DDD32487204985756F2814FE4F67F0762CDC61309B97E98B89BAAF089F921938974171072050F8DD569A05BFAE8DFBF37A661786C704198EEEB5D8B1B0C78EB727CC306401738E29E223CA6CC86D1FD2B2A85CB3380045E7931EE9765D7 256s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-00o6YG/SSSD-child-30354.pem 256s + found_md5=Modulus=DA5F0C0CA5848DCE8C3F528F0E20C82B7EC626219BB04DC023066B34FF50859CFB0D3DDD32487204985756F2814FE4F67F0762CDC61309B97E98B89BAAF089F921938974171072050F8DD569A05BFAE8DFBF37A661786C704198EEEB5D8B1B0C78EB727CC306401738E29E223CA6CC86D1FD2B2A85CB3380045E7931EE9765D7 256s + '[' Modulus=DA5F0C0CA5848DCE8C3F528F0E20C82B7EC626219BB04DC023066B34FF50859CFB0D3DDD32487204985756F2814FE4F67F0762CDC61309B97E98B89BAAF089F921938974171072050F8DD569A05BFAE8DFBF37A661786C704198EEEB5D8B1B0C78EB727CC306401738E29E223CA6CC86D1FD2B2A85CB3380045E7931EE9765D7 '!=' Modulus=DA5F0C0CA5848DCE8C3F528F0E20C82B7EC626219BB04DC023066B34FF50859CFB0D3DDD32487204985756F2814FE4F67F0762CDC61309B97E98B89BAAF089F921938974171072050F8DD569A05BFAE8DFBF37A661786C704198EEEB5D8B1B0C78EB727CC306401738E29E223CA6CC86D1FD2B2A85CB3380045E7931EE9765D7 ']' 256s + output_file=/tmp/sssd-softhsm2-00o6YG/SSSD-child-30354-auth.output 256s ++ basename /tmp/sssd-softhsm2-00o6YG/SSSD-child-30354-auth.output .output 256s + output_cert_file=/tmp/sssd-softhsm2-00o6YG/SSSD-child-30354-auth.pem 256s + echo -n 053350 256s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/dev/null --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=no_verification --token_name 'Test Organization Interme Token' --module_name /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so 256s [p11_child[2221]] [main] (0x0400): p11_child started. 256s [p11_child[2221]] [main] (0x2000): Running in [auth] mode. 256s [p11_child[2221]] [main] (0x2000): Running with effective IDs: [0][0]. 256s [p11_child[2221]] [main] (0x2000): Running with real IDs [0][0]. 256s [p11_child[2221]] [parse_cert_verify_opts] (0x0020): Found 'no_verification' option, disabling verification completely. This should not be used in production. 256s [p11_child[2221]] [do_card] (0x4000): Module List: 256s [p11_child[2221]] [do_card] (0x4000): common name: [softhsm2]. 256s [p11_child[2221]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 256s [p11_child[2221]] [do_card] (0x4000): Description [SoftHSM slot ID 0x3959d125] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 256s [p11_child[2221]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 256s [p11_child[2221]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x3959d125][962187557] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 256s [p11_child[2221]] [do_card] (0x4000): Login required. 256s [p11_child[2221]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 256s [p11_child[2221]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so Test Organization Interme Token Test Organization Interme Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 256s [p11_child[2221]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x3959d125;slot-manufacturer=SoftHSM%20project;slot-id=962187557;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=b0a003973959d125;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 256s [p11_child[2221]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 256s [p11_child[2221]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 256s [p11_child[2221]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 256s [p11_child[2221]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 256s [p11_child[2221]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 256s [p11_child[2221]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 256s [p11_child[2221]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 256s [p11_child[2221]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 256s [p11_child[2221]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 256s [p11_child[2221]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 256s [p11_child[2221]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 256s [p11_child[2221]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 256s [p11_child[2221]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 256s [p11_child[2221]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 256s [p11_child[2221]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 256s [p11_child[2221]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 256s [p11_child[2221]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 256s [p11_child[2221]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 256s [p11_child[2221]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 256s [p11_child[2221]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 256s [p11_child[2221]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 256s [p11_child[2221]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 256s [p11_child[2221]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 256s [p11_child[2221]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 256s [p11_child[2221]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 256s [p11_child[2221]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 256s [p11_child[2221]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 256s [p11_child[2221]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 256s [p11_child[2221]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 256s [p11_child[2221]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 256s [p11_child[2221]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 256s [p11_child[2221]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 256s [p11_child[2221]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 256s [p11_child[2221]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 256s [p11_child[2221]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 256s [p11_child[2221]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 256s [p11_child[2221]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 256s [p11_child[2221]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 256s [p11_child[2221]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 256s [p11_child[2221]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 256s [p11_child[2221]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 256s [p11_child[2221]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 256s [p11_child[2221]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 256s [p11_child[2221]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 256s [p11_child[2221]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 256s [p11_child[2221]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 256s [p11_child[2221]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 256s [p11_child[2221]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 256s [p11_child[2221]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 256s [p11_child[2221]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 256s [p11_child[2221]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 256s [p11_child[2221]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 256s [p11_child[2221]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 256s [p11_child[2221]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 256s [p11_child[2221]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 256s [p11_child[2221]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 256s [p11_child[2221]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 256s [p11_child[2221]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 256s [p11_child[2221]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 256s [p11_child[2221]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 256s [p11_child[2221]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 256s [p11_child[2221]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 256s [p11_child[2221]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 256s [p11_child[2221]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 256s [p11_child[2221]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 256s [p11_child[2221]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 256s [p11_child[2221]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 256s [p11_child[2221]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 256s [p11_child[2221]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 256s [p11_child[2221]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 256s [p11_child[2221]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 256s [p11_child[2221]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 256s [p11_child[2221]] [do_card] (0x4000): Certificate verified and validated. 256s [p11_child[2221]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 256s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-00o6YG/SSSD-child-30354-auth.output 256s + echo '-----BEGIN CERTIFICATE-----' 256s + tail -n1 /tmp/sssd-softhsm2-00o6YG/SSSD-child-30354-auth.output 256s + echo '-----END CERTIFICATE-----' 256s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-00o6YG/SSSD-child-30354-auth.pem 256s Certificate: 256s Data: 256s Version: 3 (0x2) 256s Serial Number: 4 (0x4) 256s Signature Algorithm: sha256WithRSAEncryption 256s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 256s Validity 256s Not Before: Jul 4 00:03:15 2025 GMT 256s Not After : Jul 4 00:03:15 2026 GMT 256s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 256s Subject Public Key Info: 256s Public Key Algorithm: rsaEncryption 256s Public-Key: (1024 bit) 256s Modulus: 256s 00:da:5f:0c:0c:a5:84:8d:ce:8c:3f:52:8f:0e:20: 256s c8:2b:7e:c6:26:21:9b:b0:4d:c0:23:06:6b:34:ff: 256s 50:85:9c:fb:0d:3d:dd:32:48:72:04:98:57:56:f2: 256s 81:4f:e4:f6:7f:07:62:cd:c6:13:09:b9:7e:98:b8: 256s 9b:aa:f0:89:f9:21:93:89:74:17:10:72:05:0f:8d: 256s d5:69:a0:5b:fa:e8:df:bf:37:a6:61:78:6c:70:41: 256s 98:ee:eb:5d:8b:1b:0c:78:eb:72:7c:c3:06:40:17: 256s 38:e2:9e:22:3c:a6:cc:86:d1:fd:2b:2a:85:cb:33: 256s 80:04:5e:79:31:ee:97:65:d7 256s Exponent: 65537 (0x10001) 256s X509v3 extensions: 256s X509v3 Authority Key Identifier: 256s B2:3D:49:62:5C:A2:E5:1E:99:C6:58:55:C5:D5:FA:DE:2A:FC:9B:11 256s X509v3 Basic Constraints: 256s CA:FALSE 256s Netscape Cert Type: 256s SSL Client, S/MIME 256s Netscape Comment: 256s Test Organization Intermediate CA trusted Certificate 256s X509v3 Subject Key Identifier: 256s AD:E1:BD:A6:DA:BC:FF:92:6A:C1:C7:EF:3F:FF:05:23:1E:F4:E2:2F 256s X509v3 Key Usage: critical 256s Digital Signature, Non Repudiation, Key Encipherment 256s X509v3 Extended Key Usage: 256s TLS Web Client Authentication, E-mail Protection 256s X509v3 Subject Alternative Name: 256s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 256s Signature Algorithm: sha256WithRSAEncryption 256s Signature Value: 256s 90:32:09:b3:e7:87:be:8e:9f:5a:ac:2d:32:28:bc:b4:e7:f2: 256s b5:0d:09:54:77:b2:60:79:e4:46:07:68:e4:c9:04:f9:2d:cc: 256s 7f:15:ae:47:f9:62:84:e4:55:e3:da:d0:0d:db:d0:4f:bc:0e: 256s e3:d3:97:05:c3:2e:4a:39:d3:8e:b3:3f:06:70:35:86:a6:fd: 256s a1:7f:e5:1d:38:e2:95:51:e7:bf:99:2e:ce:e4:ed:14:7b:fc: 256s 04:9f:99:54:0d:da:53:de:c8:62:c1:db:a0:b4:5a:b0:bb:ec: 256s 6e:61:1a:c1:4f:5e:0e:da:88:58:a9:e6:31:42:26:40:27:31: 256s 74:14 256s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-00o6YG/SSSD-child-30354-auth.pem 256s + found_md5=Modulus=DA5F0C0CA5848DCE8C3F528F0E20C82B7EC626219BB04DC023066B34FF50859CFB0D3DDD32487204985756F2814FE4F67F0762CDC61309B97E98B89BAAF089F921938974171072050F8DD569A05BFAE8DFBF37A661786C704198EEEB5D8B1B0C78EB727CC306401738E29E223CA6CC86D1FD2B2A85CB3380045E7931EE9765D7 256s + '[' Modulus=DA5F0C0CA5848DCE8C3F528F0E20C82B7EC626219BB04DC023066B34FF50859CFB0D3DDD32487204985756F2814FE4F67F0762CDC61309B97E98B89BAAF089F921938974171072050F8DD569A05BFAE8DFBF37A661786C704198EEEB5D8B1B0C78EB727CC306401738E29E223CA6CC86D1FD2B2A85CB3380045E7931EE9765D7 '!=' Modulus=DA5F0C0CA5848DCE8C3F528F0E20C82B7EC626219BB04DC023066B34FF50859CFB0D3DDD32487204985756F2814FE4F67F0762CDC61309B97E98B89BAAF089F921938974171072050F8DD569A05BFAE8DFBF37A661786C704198EEEB5D8B1B0C78EB727CC306401738E29E223CA6CC86D1FD2B2A85CB3380045E7931EE9765D7 ']' 256s + invalid_certificate /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-16416 /tmp/sssd-softhsm2-00o6YG/test-root-CA.pem 256s + check_certificate /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-16416 /tmp/sssd-softhsm2-00o6YG/test-root-CA.pem 256s + local certificate=/tmp/sssd-softhsm2-00o6YG/test-intermediate-CA-trusted-certificate-0001.pem 256s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-16416 256s + local key_ring=/tmp/sssd-softhsm2-00o6YG/test-root-CA.pem 256s + local verify_option= 256s + prepare_softhsm2_card /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-16416 256s + local certificate=/tmp/sssd-softhsm2-00o6YG/test-intermediate-CA-trusted-certificate-0001.pem 256s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-16416 256s + local key_cn 256s + local key_name 256s + local tokens_dir 256s + local output_cert_file 256s + token_name= 256s ++ basename /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA-trusted-certificate-0001.pem .pem 256s + key_name=test-intermediate-CA-trusted-certificate-0001 256s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA-trusted-certificate-0001.pem 256s ++ sed -n 's/ *commonName *= //p' 256s Test Organization Interme Token 256s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 256s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 256s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-00o6YG/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 256s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-00o6YG/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 256s ++ basename /tmp/sssd-softhsm2-00o6YG/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 256s + tokens_dir=/tmp/sssd-softhsm2-00o6YG/softhsm2-test-intermediate-CA-trusted-certificate-0001 256s + token_name='Test Organization Interme Token' 256s + '[' '!' -e /tmp/sssd-softhsm2-00o6YG/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 256s + '[' '!' -d /tmp/sssd-softhsm2-00o6YG/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 256s + echo 'Test Organization Interme Token' 256s + '[' -n '' ']' 256s + local output_base_name=SSSD-child-30498 256s + local output_file=/tmp/sssd-softhsm2-00o6YG/SSSD-child-30498.output 256s + output_cert_file=/tmp/sssd-softhsm2-00o6YG/SSSD-child-30498.pem 256s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-00o6YG/test-root-CA.pem 256s [p11_child[2231]] [main] (0x0400): p11_child started. 256s [p11_child[2231]] [main] (0x2000): Running in [pre-auth] mode. 256s [p11_child[2231]] [main] (0x2000): Running with effective IDs: [0][0]. 256s [p11_child[2231]] [main] (0x2000): Running with real IDs [0][0]. 256s [p11_child[2231]] [do_card] (0x4000): Module List: 256s [p11_child[2231]] [do_card] (0x4000): common name: [softhsm2]. 256s [p11_child[2231]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 256s [p11_child[2231]] [do_card] (0x4000): Description [SoftHSM slot ID 0x3959d125] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 256s [p11_child[2231]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 256s [p11_child[2231]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x3959d125][962187557] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 256s [p11_child[2231]] [do_card] (0x4000): Login NOT required. 256s [p11_child[2231]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 256s [p11_child[2231]] [do_verification] (0x0040): X509_verify_cert failed [0]. 256s [p11_child[2231]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 256s [p11_child[2231]] [read_certs] (0x0040): Certificate [Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] not valid, skipping. 256s [p11_child[2231]] [do_card] (0x4000): No certificate found. 256s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-00o6YG/SSSD-child-30498.output 256s + return 2 256s + invalid_certificate /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-16416 /tmp/sssd-softhsm2-00o6YG/test-root-CA.pem partial_chain 256s + check_certificate /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-16416 /tmp/sssd-softhsm2-00o6YG/test-root-CA.pem partial_chain 256s + local certificate=/tmp/sssd-softhsm2-00o6YG/test-intermediate-CA-trusted-certificate-0001.pem 256s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-16416 256s + local key_ring=/tmp/sssd-softhsm2-00o6YG/test-root-CA.pem 256s + local verify_option=partial_chain 256s + prepare_softhsm2_card /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-16416 256s + local certificate=/tmp/sssd-softhsm2-00o6YG/test-intermediate-CA-trusted-certificate-0001.pem 256s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-16416 256s + local key_cn 256s + local key_name 256s + local tokens_dir 256s + local output_cert_file 256s + token_name= 256s ++ basename /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA-trusted-certificate-0001.pem .pem 256s + key_name=test-intermediate-CA-trusted-certificate-0001 256s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA-trusted-certificate-0001.pem 256s ++ sed -n 's/ *commonName *= //p' 256s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 256s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 256s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-00o6YG/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 256s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-00o6YG/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 256s ++ basename /tmp/sssd-softhsm2-00o6YG/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 256s + tokens_dir=/tmp/sssd-softhsm2-00o6YG/softhsm2-test-intermediate-CA-trusted-certificate-0001 256s + token_name='Test Organization Interme Token' 256s Test Organization Interme Token 256s + '[' '!' -e /tmp/sssd-softhsm2-00o6YG/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 256s + '[' '!' -d /tmp/sssd-softhsm2-00o6YG/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 256s + echo 'Test Organization Interme Token' 256s + '[' -n partial_chain ']' 256s + local verify_arg=--verify=partial_chain 256s + local output_base_name=SSSD-child-18835 256s + local output_file=/tmp/sssd-softhsm2-00o6YG/SSSD-child-18835.output 256s + output_cert_file=/tmp/sssd-softhsm2-00o6YG/SSSD-child-18835.pem 256s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-00o6YG/test-root-CA.pem 256s [p11_child[2238]] [main] (0x0400): p11_child started. 256s [p11_child[2238]] [main] (0x2000): Running in [pre-auth] mode. 256s [p11_child[2238]] [main] (0x2000): Running with effective IDs: [0][0]. 256s [p11_child[2238]] [main] (0x2000): Running with real IDs [0][0]. 256s [p11_child[2238]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 256s [p11_child[2238]] [do_card] (0x4000): Module List: 256s [p11_child[2238]] [do_card] (0x4000): common name: [softhsm2]. 256s [p11_child[2238]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 256s [p11_child[2238]] [do_card] (0x4000): Description [SoftHSM slot ID 0x3959d125] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 256s [p11_child[2238]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 256s [p11_child[2238]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x3959d125][962187557] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 256s [p11_child[2238]] [do_card] (0x4000): Login NOT required. 256s [p11_child[2238]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 256s [p11_child[2238]] [do_verification] (0x0040): X509_verify_cert failed [0]. 256s [p11_child[2238]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 256s [p11_child[2238]] [read_certs] (0x0040): Certificate [Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] not valid, skipping. 256s [p11_child[2238]] [do_card] (0x4000): No certificate found. 256s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-00o6YG/SSSD-child-18835.output 256s + return 2 256s + valid_certificate /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-16416 /tmp/sssd-softhsm2-00o6YG/test-full-chain-CA.pem 256s + check_certificate /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-16416 /tmp/sssd-softhsm2-00o6YG/test-full-chain-CA.pem 256s + local certificate=/tmp/sssd-softhsm2-00o6YG/test-intermediate-CA-trusted-certificate-0001.pem 256s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-16416 256s + local key_ring=/tmp/sssd-softhsm2-00o6YG/test-full-chain-CA.pem 256s + local verify_option= 256s + prepare_softhsm2_card /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-16416 256s + local certificate=/tmp/sssd-softhsm2-00o6YG/test-intermediate-CA-trusted-certificate-0001.pem 256s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-16416 256s + local key_cn 256s + local key_name 256s + local tokens_dir 256s + local output_cert_file 256s + token_name= 256s ++ basename /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA-trusted-certificate-0001.pem .pem 256s + key_name=test-intermediate-CA-trusted-certificate-0001 256s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA-trusted-certificate-0001.pem 256s ++ sed -n 's/ *commonName *= //p' 256s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 256s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 256s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-00o6YG/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 256s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-00o6YG/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 256s ++ basename /tmp/sssd-softhsm2-00o6YG/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 256s + tokens_dir=/tmp/sssd-softhsm2-00o6YG/softhsm2-test-intermediate-CA-trusted-certificate-0001 256s Test Organization Interme Token 256s + token_name='Test Organization Interme Token' 256s + '[' '!' -e /tmp/sssd-softhsm2-00o6YG/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 256s + '[' '!' -d /tmp/sssd-softhsm2-00o6YG/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 256s + echo 'Test Organization Interme Token' 256s + '[' -n '' ']' 256s + local output_base_name=SSSD-child-29317 256s + local output_file=/tmp/sssd-softhsm2-00o6YG/SSSD-child-29317.output 256s + output_cert_file=/tmp/sssd-softhsm2-00o6YG/SSSD-child-29317.pem 256s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-00o6YG/test-full-chain-CA.pem 256s [p11_child[2245]] [main] (0x0400): p11_child started. 256s [p11_child[2245]] [main] (0x2000): Running in [pre-auth] mode. 256s [p11_child[2245]] [main] (0x2000): Running with effective IDs: [0][0]. 256s [p11_child[2245]] [main] (0x2000): Running with real IDs [0][0]. 256s [p11_child[2245]] [do_card] (0x4000): Module List: 256s [p11_child[2245]] [do_card] (0x4000): common name: [softhsm2]. 256s [p11_child[2245]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 256s [p11_child[2245]] [do_card] (0x4000): Description [SoftHSM slot ID 0x3959d125] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 256s [p11_child[2245]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 256s [p11_child[2245]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x3959d125][962187557] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 256s [p11_child[2245]] [do_card] (0x4000): Login NOT required. 256s [p11_child[2245]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 256s [p11_child[2245]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 256s [p11_child[2245]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Interme Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 256s [p11_child[2245]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x3959d125;slot-manufacturer=SoftHSM%20project;slot-id=962187557;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=b0a003973959d125;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 256s [p11_child[2245]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 256s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-00o6YG/SSSD-child-29317.output 256s + echo '-----BEGIN CERTIFICATE-----' 256s + tail -n1 /tmp/sssd-softhsm2-00o6YG/SSSD-child-29317.output 256s + echo '-----END CERTIFICATE-----' 256s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-00o6YG/SSSD-child-29317.pem 256s Certificate: 256s Data: 256s Version: 3 (0x2) 256s Serial Number: 4 (0x4) 256s Signature Algorithm: sha256WithRSAEncryption 256s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 256s Validity 256s Not Before: Jul 4 00:03:15 2025 GMT 256s Not After : Jul 4 00:03:15 2026 GMT 256s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 256s Subject Public Key Info: 256s Public Key Algorithm: rsaEncryption 256s Public-Key: (1024 bit) 256s Modulus: 256s 00:da:5f:0c:0c:a5:84:8d:ce:8c:3f:52:8f:0e:20: 256s c8:2b:7e:c6:26:21:9b:b0:4d:c0:23:06:6b:34:ff: 256s 50:85:9c:fb:0d:3d:dd:32:48:72:04:98:57:56:f2: 256s 81:4f:e4:f6:7f:07:62:cd:c6:13:09:b9:7e:98:b8: 256s 9b:aa:f0:89:f9:21:93:89:74:17:10:72:05:0f:8d: 256s d5:69:a0:5b:fa:e8:df:bf:37:a6:61:78:6c:70:41: 256s 98:ee:eb:5d:8b:1b:0c:78:eb:72:7c:c3:06:40:17: 256s 38:e2:9e:22:3c:a6:cc:86:d1:fd:2b:2a:85:cb:33: 256s 80:04:5e:79:31:ee:97:65:d7 256s Exponent: 65537 (0x10001) 256s X509v3 extensions: 256s X509v3 Authority Key Identifier: 256s B2:3D:49:62:5C:A2:E5:1E:99:C6:58:55:C5:D5:FA:DE:2A:FC:9B:11 256s X509v3 Basic Constraints: 256s CA:FALSE 256s Netscape Cert Type: 256s SSL Client, S/MIME 256s Netscape Comment: 256s Test Organization Intermediate CA trusted Certificate 256s X509v3 Subject Key Identifier: 256s AD:E1:BD:A6:DA:BC:FF:92:6A:C1:C7:EF:3F:FF:05:23:1E:F4:E2:2F 256s X509v3 Key Usage: critical 256s Digital Signature, Non Repudiation, Key Encipherment 256s X509v3 Extended Key Usage: 256s TLS Web Client Authentication, E-mail Protection 256s X509v3 Subject Alternative Name: 256s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 256s Signature Algorithm: sha256WithRSAEncryption 256s Signature Value: 256s 90:32:09:b3:e7:87:be:8e:9f:5a:ac:2d:32:28:bc:b4:e7:f2: 256s b5:0d:09:54:77:b2:60:79:e4:46:07:68:e4:c9:04:f9:2d:cc: 256s 7f:15:ae:47:f9:62:84:e4:55:e3:da:d0:0d:db:d0:4f:bc:0e: 256s e3:d3:97:05:c3:2e:4a:39:d3:8e:b3:3f:06:70:35:86:a6:fd: 256s a1:7f:e5:1d:38:e2:95:51:e7:bf:99:2e:ce:e4:ed:14:7b:fc: 256s 04:9f:99:54:0d:da:53:de:c8:62:c1:db:a0:b4:5a:b0:bb:ec: 256s 6e:61:1a:c1:4f:5e:0e:da:88:58:a9:e6:31:42:26:40:27:31: 256s 74:14 256s + local found_md5 expected_md5 256s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA-trusted-certificate-0001.pem 256s + expected_md5=Modulus=DA5F0C0CA5848DCE8C3F528F0E20C82B7EC626219BB04DC023066B34FF50859CFB0D3DDD32487204985756F2814FE4F67F0762CDC61309B97E98B89BAAF089F921938974171072050F8DD569A05BFAE8DFBF37A661786C704198EEEB5D8B1B0C78EB727CC306401738E29E223CA6CC86D1FD2B2A85CB3380045E7931EE9765D7 256s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-00o6YG/SSSD-child-29317.pem 256s + found_md5=Modulus=DA5F0C0CA5848DCE8C3F528F0E20C82B7EC626219BB04DC023066B34FF50859CFB0D3DDD32487204985756F2814FE4F67F0762CDC61309B97E98B89BAAF089F921938974171072050F8DD569A05BFAE8DFBF37A661786C704198EEEB5D8B1B0C78EB727CC306401738E29E223CA6CC86D1FD2B2A85CB3380045E7931EE9765D7 256s + '[' Modulus=DA5F0C0CA5848DCE8C3F528F0E20C82B7EC626219BB04DC023066B34FF50859CFB0D3DDD32487204985756F2814FE4F67F0762CDC61309B97E98B89BAAF089F921938974171072050F8DD569A05BFAE8DFBF37A661786C704198EEEB5D8B1B0C78EB727CC306401738E29E223CA6CC86D1FD2B2A85CB3380045E7931EE9765D7 '!=' Modulus=DA5F0C0CA5848DCE8C3F528F0E20C82B7EC626219BB04DC023066B34FF50859CFB0D3DDD32487204985756F2814FE4F67F0762CDC61309B97E98B89BAAF089F921938974171072050F8DD569A05BFAE8DFBF37A661786C704198EEEB5D8B1B0C78EB727CC306401738E29E223CA6CC86D1FD2B2A85CB3380045E7931EE9765D7 ']' 256s + output_file=/tmp/sssd-softhsm2-00o6YG/SSSD-child-29317-auth.output 256s ++ basename /tmp/sssd-softhsm2-00o6YG/SSSD-child-29317-auth.output .output 256s + output_cert_file=/tmp/sssd-softhsm2-00o6YG/SSSD-child-29317-auth.pem 256s + echo -n 053350 256s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-00o6YG/test-full-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 '' --token_name 'Test Organization Interme Token' --module_name /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so 256s [p11_child[2253]] [main] (0x0400): p11_child started. 256s [p11_child[2253]] [main] (0x2000): Running in [auth] mode. 256s [p11_child[2253]] [main] (0x2000): Running with effective IDs: [0][0]. 256s [p11_child[2253]] [main] (0x2000): Running with real IDs [0][0]. 256s [p11_child[2253]] [do_card] (0x4000): Module List: 256s [p11_child[2253]] [do_card] (0x4000): common name: [softhsm2]. 256s [p11_child[2253]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 256s [p11_child[2253]] [do_card] (0x4000): Description [SoftHSM slot ID 0x3959d125] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 256s [p11_child[2253]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 256s [p11_child[2253]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x3959d125][962187557] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 256s [p11_child[2253]] [do_card] (0x4000): Login required. 256s [p11_child[2253]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 256s [p11_child[2253]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 256s [p11_child[2253]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so Test Organization Interme Token Test Organization Interme Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 256s [p11_child[2253]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x3959d125;slot-manufacturer=SoftHSM%20project;slot-id=962187557;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=b0a003973959d125;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 256s [p11_child[2253]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 256s [p11_child[2253]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 256s [p11_child[2253]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 256s [p11_child[2253]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 256s [p11_child[2253]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 256s [p11_child[2253]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 256s [p11_child[2253]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 256s [p11_child[2253]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 256s [p11_child[2253]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 256s [p11_child[2253]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 256s [p11_child[2253]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 256s [p11_child[2253]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 256s [p11_child[2253]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 256s [p11_child[2253]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 256s [p11_child[2253]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 256s [p11_child[2253]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 256s [p11_child[2253]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 256s [p11_child[2253]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 256s [p11_child[2253]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 256s [p11_child[2253]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 256s [p11_child[2253]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 256s [p11_child[2253]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 256s [p11_child[2253]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 256s [p11_child[2253]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 256s [p11_child[2253]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 256s [p11_child[2253]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 256s [p11_child[2253]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 256s [p11_child[2253]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 256s [p11_child[2253]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 256s [p11_child[2253]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 256s [p11_child[2253]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 256s [p11_child[2253]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 256s [p11_child[2253]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 256s [p11_child[2253]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 256s [p11_child[2253]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 256s [p11_child[2253]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 256s [p11_child[2253]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 256s [p11_child[2253]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 256s [p11_child[2253]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 256s [p11_child[2253]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 256s [p11_child[2253]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 256s [p11_child[2253]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 256s [p11_child[2253]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 256s [p11_child[2253]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 256s [p11_child[2253]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 256s [p11_child[2253]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 256s [p11_child[2253]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 256s [p11_child[2253]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 256s [p11_child[2253]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 256s [p11_child[2253]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 256s [p11_child[2253]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 256s [p11_child[2253]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 256s [p11_child[2253]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 256s [p11_child[2253]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 256s [p11_child[2253]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 256s [p11_child[2253]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 256s [p11_child[2253]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 256s [p11_child[2253]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 256s [p11_child[2253]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 256s [p11_child[2253]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 256s [p11_child[2253]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 256s [p11_child[2253]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 256s [p11_child[2253]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 256s [p11_child[2253]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 256s [p11_child[2253]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 256s [p11_child[2253]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 256s [p11_child[2253]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 256s [p11_child[2253]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 256s [p11_child[2253]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 256s [p11_child[2253]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 256s [p11_child[2253]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 256s [p11_child[2253]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 256s [p11_child[2253]] [do_card] (0x4000): Certificate verified and validated. 256s [p11_child[2253]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 256s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-00o6YG/SSSD-child-29317-auth.output 256s + echo '-----BEGIN CERTIFICATE-----' 256s + tail -n1 /tmp/sssd-softhsm2-00o6YG/SSSD-child-29317-auth.output 256s + echo '-----END CERTIFICATE-----' 256s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-00o6YG/SSSD-child-29317-auth.pem 256s Certificate: 256s Data: 256s Version: 3 (0x2) 256s Serial Number: 4 (0x4) 256s Signature Algorithm: sha256WithRSAEncryption 256s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 256s Validity 256s Not Before: Jul 4 00:03:15 2025 GMT 256s Not After : Jul 4 00:03:15 2026 GMT 256s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 256s Subject Public Key Info: 256s Public Key Algorithm: rsaEncryption 256s Public-Key: (1024 bit) 256s Modulus: 256s 00:da:5f:0c:0c:a5:84:8d:ce:8c:3f:52:8f:0e:20: 256s c8:2b:7e:c6:26:21:9b:b0:4d:c0:23:06:6b:34:ff: 256s 50:85:9c:fb:0d:3d:dd:32:48:72:04:98:57:56:f2: 256s 81:4f:e4:f6:7f:07:62:cd:c6:13:09:b9:7e:98:b8: 256s 9b:aa:f0:89:f9:21:93:89:74:17:10:72:05:0f:8d: 256s d5:69:a0:5b:fa:e8:df:bf:37:a6:61:78:6c:70:41: 256s 98:ee:eb:5d:8b:1b:0c:78:eb:72:7c:c3:06:40:17: 256s 38:e2:9e:22:3c:a6:cc:86:d1:fd:2b:2a:85:cb:33: 256s 80:04:5e:79:31:ee:97:65:d7 256s Exponent: 65537 (0x10001) 256s X509v3 extensions: 256s X509v3 Authority Key Identifier: 256s B2:3D:49:62:5C:A2:E5:1E:99:C6:58:55:C5:D5:FA:DE:2A:FC:9B:11 256s X509v3 Basic Constraints: 256s CA:FALSE 256s Netscape Cert Type: 256s SSL Client, S/MIME 256s Netscape Comment: 256s Test Organization Intermediate CA trusted Certificate 256s X509v3 Subject Key Identifier: 256s AD:E1:BD:A6:DA:BC:FF:92:6A:C1:C7:EF:3F:FF:05:23:1E:F4:E2:2F 256s X509v3 Key Usage: critical 256s Digital Signature, Non Repudiation, Key Encipherment 256s X509v3 Extended Key Usage: 256s TLS Web Client Authentication, E-mail Protection 256s X509v3 Subject Alternative Name: 256s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 256s Signature Algorithm: sha256WithRSAEncryption 256s Signature Value: 256s 90:32:09:b3:e7:87:be:8e:9f:5a:ac:2d:32:28:bc:b4:e7:f2: 256s b5:0d:09:54:77:b2:60:79:e4:46:07:68:e4:c9:04:f9:2d:cc: 256s 7f:15:ae:47:f9:62:84:e4:55:e3:da:d0:0d:db:d0:4f:bc:0e: 256s e3:d3:97:05:c3:2e:4a:39:d3:8e:b3:3f:06:70:35:86:a6:fd: 256s a1:7f:e5:1d:38:e2:95:51:e7:bf:99:2e:ce:e4:ed:14:7b:fc: 256s 04:9f:99:54:0d:da:53:de:c8:62:c1:db:a0:b4:5a:b0:bb:ec: 256s 6e:61:1a:c1:4f:5e:0e:da:88:58:a9:e6:31:42:26:40:27:31: 256s 74:14 256s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-00o6YG/SSSD-child-29317-auth.pem 256s + found_md5=Modulus=DA5F0C0CA5848DCE8C3F528F0E20C82B7EC626219BB04DC023066B34FF50859CFB0D3DDD32487204985756F2814FE4F67F0762CDC61309B97E98B89BAAF089F921938974171072050F8DD569A05BFAE8DFBF37A661786C704198EEEB5D8B1B0C78EB727CC306401738E29E223CA6CC86D1FD2B2A85CB3380045E7931EE9765D7 256s + '[' Modulus=DA5F0C0CA5848DCE8C3F528F0E20C82B7EC626219BB04DC023066B34FF50859CFB0D3DDD32487204985756F2814FE4F67F0762CDC61309B97E98B89BAAF089F921938974171072050F8DD569A05BFAE8DFBF37A661786C704198EEEB5D8B1B0C78EB727CC306401738E29E223CA6CC86D1FD2B2A85CB3380045E7931EE9765D7 '!=' Modulus=DA5F0C0CA5848DCE8C3F528F0E20C82B7EC626219BB04DC023066B34FF50859CFB0D3DDD32487204985756F2814FE4F67F0762CDC61309B97E98B89BAAF089F921938974171072050F8DD569A05BFAE8DFBF37A661786C704198EEEB5D8B1B0C78EB727CC306401738E29E223CA6CC86D1FD2B2A85CB3380045E7931EE9765D7 ']' 256s + valid_certificate /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-16416 /tmp/sssd-softhsm2-00o6YG/test-full-chain-CA.pem partial_chain 256s + check_certificate /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-16416 /tmp/sssd-softhsm2-00o6YG/test-full-chain-CA.pem partial_chain 256s + local certificate=/tmp/sssd-softhsm2-00o6YG/test-intermediate-CA-trusted-certificate-0001.pem 256s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-16416 256s + local key_ring=/tmp/sssd-softhsm2-00o6YG/test-full-chain-CA.pem 256s + local verify_option=partial_chain 256s + prepare_softhsm2_card /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-16416 256s + local certificate=/tmp/sssd-softhsm2-00o6YG/test-intermediate-CA-trusted-certificate-0001.pem 256s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-16416 256s + local key_cn 256s + local key_name 256s + local tokens_dir 256s + local output_cert_file 256s + token_name= 256s ++ basename /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA-trusted-certificate-0001.pem .pem 256s + key_name=test-intermediate-CA-trusted-certificate-0001 256s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA-trusted-certificate-0001.pem 256s ++ sed -n 's/ *commonName *= //p' 256s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 256s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 256s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-00o6YG/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 256s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-00o6YG/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 256s ++ basename /tmp/sssd-softhsm2-00o6YG/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 256s Test Organization Interme Token 256s + tokens_dir=/tmp/sssd-softhsm2-00o6YG/softhsm2-test-intermediate-CA-trusted-certificate-0001 256s + token_name='Test Organization Interme Token' 256s + '[' '!' -e /tmp/sssd-softhsm2-00o6YG/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 256s + '[' '!' -d /tmp/sssd-softhsm2-00o6YG/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 256s + echo 'Test Organization Interme Token' 256s + '[' -n partial_chain ']' 256s + local verify_arg=--verify=partial_chain 256s + local output_base_name=SSSD-child-24224 256s + local output_file=/tmp/sssd-softhsm2-00o6YG/SSSD-child-24224.output 256s + output_cert_file=/tmp/sssd-softhsm2-00o6YG/SSSD-child-24224.pem 256s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-00o6YG/test-full-chain-CA.pem 256s [p11_child[2263]] [main] (0x0400): p11_child started. 256s [p11_child[2263]] [main] (0x2000): Running in [pre-auth] mode. 256s [p11_child[2263]] [main] (0x2000): Running with effective IDs: [0][0]. 256s [p11_child[2263]] [main] (0x2000): Running with real IDs [0][0]. 256s [p11_child[2263]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 256s [p11_child[2263]] [do_card] (0x4000): Module List: 256s [p11_child[2263]] [do_card] (0x4000): common name: [softhsm2]. 256s [p11_child[2263]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 256s [p11_child[2263]] [do_card] (0x4000): Description [SoftHSM slot ID 0x3959d125] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 256s [p11_child[2263]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 256s [p11_child[2263]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x3959d125][962187557] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 256s [p11_child[2263]] [do_card] (0x4000): Login NOT required. 256s [p11_child[2263]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 256s [p11_child[2263]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 256s [p11_child[2263]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Interme Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 256s [p11_child[2263]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x3959d125;slot-manufacturer=SoftHSM%20project;slot-id=962187557;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=b0a003973959d125;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 256s [p11_child[2263]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 256s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-00o6YG/SSSD-child-24224.output 256s + echo '-----BEGIN CERTIFICATE-----' 256s + tail -n1 /tmp/sssd-softhsm2-00o6YG/SSSD-child-24224.output 256s + echo '-----END CERTIFICATE-----' 256s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-00o6YG/SSSD-child-24224.pem 256s Certificate: 256s Data: 256s Version: 3 (0x2) 256s Serial Number: 4 (0x4) 256s Signature Algorithm: sha256WithRSAEncryption 256s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 256s Validity 256s Not Before: Jul 4 00:03:15 2025 GMT 256s Not After : Jul 4 00:03:15 2026 GMT 256s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 256s Subject Public Key Info: 256s Public Key Algorithm: rsaEncryption 256s Public-Key: (1024 bit) 256s Modulus: 256s 00:da:5f:0c:0c:a5:84:8d:ce:8c:3f:52:8f:0e:20: 256s c8:2b:7e:c6:26:21:9b:b0:4d:c0:23:06:6b:34:ff: 256s 50:85:9c:fb:0d:3d:dd:32:48:72:04:98:57:56:f2: 256s 81:4f:e4:f6:7f:07:62:cd:c6:13:09:b9:7e:98:b8: 256s 9b:aa:f0:89:f9:21:93:89:74:17:10:72:05:0f:8d: 256s d5:69:a0:5b:fa:e8:df:bf:37:a6:61:78:6c:70:41: 256s 98:ee:eb:5d:8b:1b:0c:78:eb:72:7c:c3:06:40:17: 256s 38:e2:9e:22:3c:a6:cc:86:d1:fd:2b:2a:85:cb:33: 256s 80:04:5e:79:31:ee:97:65:d7 256s Exponent: 65537 (0x10001) 256s X509v3 extensions: 256s X509v3 Authority Key Identifier: 256s B2:3D:49:62:5C:A2:E5:1E:99:C6:58:55:C5:D5:FA:DE:2A:FC:9B:11 256s X509v3 Basic Constraints: 256s CA:FALSE 256s Netscape Cert Type: 256s SSL Client, S/MIME 256s Netscape Comment: 256s Test Organization Intermediate CA trusted Certificate 256s X509v3 Subject Key Identifier: 256s AD:E1:BD:A6:DA:BC:FF:92:6A:C1:C7:EF:3F:FF:05:23:1E:F4:E2:2F 256s X509v3 Key Usage: critical 256s Digital Signature, Non Repudiation, Key Encipherment 256s X509v3 Extended Key Usage: 256s TLS Web Client Authentication, E-mail Protection 256s X509v3 Subject Alternative Name: 256s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 256s Signature Algorithm: sha256WithRSAEncryption 256s Signature Value: 256s 90:32:09:b3:e7:87:be:8e:9f:5a:ac:2d:32:28:bc:b4:e7:f2: 256s b5:0d:09:54:77:b2:60:79:e4:46:07:68:e4:c9:04:f9:2d:cc: 256s 7f:15:ae:47:f9:62:84:e4:55:e3:da:d0:0d:db:d0:4f:bc:0e: 256s e3:d3:97:05:c3:2e:4a:39:d3:8e:b3:3f:06:70:35:86:a6:fd: 256s a1:7f:e5:1d:38:e2:95:51:e7:bf:99:2e:ce:e4:ed:14:7b:fc: 256s 04:9f:99:54:0d:da:53:de:c8:62:c1:db:a0:b4:5a:b0:bb:ec: 256s 6e:61:1a:c1:4f:5e:0e:da:88:58:a9:e6:31:42:26:40:27:31: 256s 74:14 256s + local found_md5 expected_md5 256s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA-trusted-certificate-0001.pem 256s + expected_md5=Modulus=DA5F0C0CA5848DCE8C3F528F0E20C82B7EC626219BB04DC023066B34FF50859CFB0D3DDD32487204985756F2814FE4F67F0762CDC61309B97E98B89BAAF089F921938974171072050F8DD569A05BFAE8DFBF37A661786C704198EEEB5D8B1B0C78EB727CC306401738E29E223CA6CC86D1FD2B2A85CB3380045E7931EE9765D7 256s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-00o6YG/SSSD-child-24224.pem 256s + found_md5=Modulus=DA5F0C0CA5848DCE8C3F528F0E20C82B7EC626219BB04DC023066B34FF50859CFB0D3DDD32487204985756F2814FE4F67F0762CDC61309B97E98B89BAAF089F921938974171072050F8DD569A05BFAE8DFBF37A661786C704198EEEB5D8B1B0C78EB727CC306401738E29E223CA6CC86D1FD2B2A85CB3380045E7931EE9765D7 256s + '[' Modulus=DA5F0C0CA5848DCE8C3F528F0E20C82B7EC626219BB04DC023066B34FF50859CFB0D3DDD32487204985756F2814FE4F67F0762CDC61309B97E98B89BAAF089F921938974171072050F8DD569A05BFAE8DFBF37A661786C704198EEEB5D8B1B0C78EB727CC306401738E29E223CA6CC86D1FD2B2A85CB3380045E7931EE9765D7 '!=' Modulus=DA5F0C0CA5848DCE8C3F528F0E20C82B7EC626219BB04DC023066B34FF50859CFB0D3DDD32487204985756F2814FE4F67F0762CDC61309B97E98B89BAAF089F921938974171072050F8DD569A05BFAE8DFBF37A661786C704198EEEB5D8B1B0C78EB727CC306401738E29E223CA6CC86D1FD2B2A85CB3380045E7931EE9765D7 ']' 256s + output_file=/tmp/sssd-softhsm2-00o6YG/SSSD-child-24224-auth.output 256s ++ basename /tmp/sssd-softhsm2-00o6YG/SSSD-child-24224-auth.output .output 256s + output_cert_file=/tmp/sssd-softhsm2-00o6YG/SSSD-child-24224-auth.pem 256s + echo -n 053350 256s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-00o6YG/test-full-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Interme Token' --module_name /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so 256s [p11_child[2271]] [main] (0x0400): p11_child started. 256s [p11_child[2271]] [main] (0x2000): Running in [auth] mode. 256s [p11_child[2271]] [main] (0x2000): Running with effective IDs: [0][0]. 256s [p11_child[2271]] [main] (0x2000): Running with real IDs [0][0]. 256s [p11_child[2271]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 256s [p11_child[2271]] [do_card] (0x4000): Module List: 256s [p11_child[2271]] [do_card] (0x4000): common name: [softhsm2]. 256s [p11_child[2271]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 256s [p11_child[2271]] [do_card] (0x4000): Description [SoftHSM slot ID 0x3959d125] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 256s [p11_child[2271]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 256s [p11_child[2271]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x3959d125][962187557] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 256s [p11_child[2271]] [do_card] (0x4000): Login required. 256s [p11_child[2271]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 256s [p11_child[2271]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 256s [p11_child[2271]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so Test Organization Interme Token Test Organization Interme Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 256s [p11_child[2271]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x3959d125;slot-manufacturer=SoftHSM%20project;slot-id=962187557;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=b0a003973959d125;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 256s [p11_child[2271]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 256s [p11_child[2271]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 256s [p11_child[2271]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 256s [p11_child[2271]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 256s [p11_child[2271]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 256s [p11_child[2271]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 256s [p11_child[2271]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 256s [p11_child[2271]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 256s [p11_child[2271]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 256s [p11_child[2271]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 256s [p11_child[2271]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 256s [p11_child[2271]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 256s [p11_child[2271]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 256s [p11_child[2271]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 256s [p11_child[2271]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 256s [p11_child[2271]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 256s [p11_child[2271]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 256s [p11_child[2271]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 256s [p11_child[2271]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 256s [p11_child[2271]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 256s [p11_child[2271]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 256s [p11_child[2271]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 256s [p11_child[2271]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 256s [p11_child[2271]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 256s [p11_child[2271]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 256s [p11_child[2271]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 256s [p11_child[2271]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 256s [p11_child[2271]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 256s [p11_child[2271]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 256s [p11_child[2271]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 256s [p11_child[2271]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 256s [p11_child[2271]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 256s [p11_child[2271]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 256s [p11_child[2271]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 256s [p11_child[2271]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 256s [p11_child[2271]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 256s [p11_child[2271]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 256s [p11_child[2271]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 256s [p11_child[2271]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 256s [p11_child[2271]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 256s [p11_child[2271]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 256s [p11_child[2271]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 256s [p11_child[2271]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 256s [p11_child[2271]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 256s [p11_child[2271]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 256s [p11_child[2271]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 256s [p11_child[2271]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 256s [p11_child[2271]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 256s [p11_child[2271]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 256s [p11_child[2271]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 256s [p11_child[2271]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 256s [p11_child[2271]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 256s [p11_child[2271]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 256s [p11_child[2271]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 256s [p11_child[2271]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 256s [p11_child[2271]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 256s [p11_child[2271]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 256s [p11_child[2271]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 256s [p11_child[2271]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 256s [p11_child[2271]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 256s [p11_child[2271]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 256s [p11_child[2271]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 256s [p11_child[2271]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 256s [p11_child[2271]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 256s [p11_child[2271]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 256s [p11_child[2271]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 256s [p11_child[2271]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 256s [p11_child[2271]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 256s [p11_child[2271]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 256s [p11_child[2271]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 256s [p11_child[2271]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 256s [p11_child[2271]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 256s [p11_child[2271]] [do_card] (0x4000): Certificate verified and validated. 256s [p11_child[2271]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 256s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-00o6YG/SSSD-child-24224-auth.output 256s + echo '-----BEGIN CERTIFICATE-----' 256s + tail -n1 /tmp/sssd-softhsm2-00o6YG/SSSD-child-24224-auth.output 256s + echo '-----END CERTIFICATE-----' 256s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-00o6YG/SSSD-child-24224-auth.pem 256s Certificate: 256s Data: 256s Version: 3 (0x2) 256s Serial Number: 4 (0x4) 256s Signature Algorithm: sha256WithRSAEncryption 256s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 256s Validity 256s Not Before: Jul 4 00:03:15 2025 GMT 256s Not After : Jul 4 00:03:15 2026 GMT 256s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 256s Subject Public Key Info: 256s Public Key Algorithm: rsaEncryption 256s Public-Key: (1024 bit) 256s Modulus: 256s 00:da:5f:0c:0c:a5:84:8d:ce:8c:3f:52:8f:0e:20: 256s c8:2b:7e:c6:26:21:9b:b0:4d:c0:23:06:6b:34:ff: 256s 50:85:9c:fb:0d:3d:dd:32:48:72:04:98:57:56:f2: 256s 81:4f:e4:f6:7f:07:62:cd:c6:13:09:b9:7e:98:b8: 256s 9b:aa:f0:89:f9:21:93:89:74:17:10:72:05:0f:8d: 256s d5:69:a0:5b:fa:e8:df:bf:37:a6:61:78:6c:70:41: 256s 98:ee:eb:5d:8b:1b:0c:78:eb:72:7c:c3:06:40:17: 256s 38:e2:9e:22:3c:a6:cc:86:d1:fd:2b:2a:85:cb:33: 256s 80:04:5e:79:31:ee:97:65:d7 256s Exponent: 65537 (0x10001) 256s X509v3 extensions: 256s X509v3 Authority Key Identifier: 256s B2:3D:49:62:5C:A2:E5:1E:99:C6:58:55:C5:D5:FA:DE:2A:FC:9B:11 256s X509v3 Basic Constraints: 256s CA:FALSE 256s Netscape Cert Type: 256s SSL Client, S/MIME 256s Netscape Comment: 256s Test Organization Intermediate CA trusted Certificate 256s X509v3 Subject Key Identifier: 256s AD:E1:BD:A6:DA:BC:FF:92:6A:C1:C7:EF:3F:FF:05:23:1E:F4:E2:2F 256s X509v3 Key Usage: critical 256s Digital Signature, Non Repudiation, Key Encipherment 256s X509v3 Extended Key Usage: 256s TLS Web Client Authentication, E-mail Protection 256s X509v3 Subject Alternative Name: 256s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 256s Signature Algorithm: sha256WithRSAEncryption 256s Signature Value: 256s 90:32:09:b3:e7:87:be:8e:9f:5a:ac:2d:32:28:bc:b4:e7:f2: 256s b5:0d:09:54:77:b2:60:79:e4:46:07:68:e4:c9:04:f9:2d:cc: 256s 7f:15:ae:47:f9:62:84:e4:55:e3:da:d0:0d:db:d0:4f:bc:0e: 256s e3:d3:97:05:c3:2e:4a:39:d3:8e:b3:3f:06:70:35:86:a6:fd: 256s a1:7f:e5:1d:38:e2:95:51:e7:bf:99:2e:ce:e4:ed:14:7b:fc: 256s 04:9f:99:54:0d:da:53:de:c8:62:c1:db:a0:b4:5a:b0:bb:ec: 256s 6e:61:1a:c1:4f:5e:0e:da:88:58:a9:e6:31:42:26:40:27:31: 256s 74:14 256s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-00o6YG/SSSD-child-24224-auth.pem 256s + found_md5=Modulus=DA5F0C0CA5848DCE8C3F528F0E20C82B7EC626219BB04DC023066B34FF50859CFB0D3DDD32487204985756F2814FE4F67F0762CDC61309B97E98B89BAAF089F921938974171072050F8DD569A05BFAE8DFBF37A661786C704198EEEB5D8B1B0C78EB727CC306401738E29E223CA6CC86D1FD2B2A85CB3380045E7931EE9765D7 256s + '[' Modulus=DA5F0C0CA5848DCE8C3F528F0E20C82B7EC626219BB04DC023066B34FF50859CFB0D3DDD32487204985756F2814FE4F67F0762CDC61309B97E98B89BAAF089F921938974171072050F8DD569A05BFAE8DFBF37A661786C704198EEEB5D8B1B0C78EB727CC306401738E29E223CA6CC86D1FD2B2A85CB3380045E7931EE9765D7 '!=' Modulus=DA5F0C0CA5848DCE8C3F528F0E20C82B7EC626219BB04DC023066B34FF50859CFB0D3DDD32487204985756F2814FE4F67F0762CDC61309B97E98B89BAAF089F921938974171072050F8DD569A05BFAE8DFBF37A661786C704198EEEB5D8B1B0C78EB727CC306401738E29E223CA6CC86D1FD2B2A85CB3380045E7931EE9765D7 ']' 256s + invalid_certificate /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-16416 /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA.pem 256s + check_certificate /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-16416 /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA.pem 256s + local certificate=/tmp/sssd-softhsm2-00o6YG/test-intermediate-CA-trusted-certificate-0001.pem 256s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-16416 256s + local key_ring=/tmp/sssd-softhsm2-00o6YG/test-intermediate-CA.pem 256s + local verify_option= 256s + prepare_softhsm2_card /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-16416 256s + local certificate=/tmp/sssd-softhsm2-00o6YG/test-intermediate-CA-trusted-certificate-0001.pem 256s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-16416 256s + local key_cn 256s + local key_name 256s + local tokens_dir 256s + local output_cert_file 256s + token_name= 256s ++ basename /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA-trusted-certificate-0001.pem .pem 256s + key_name=test-intermediate-CA-trusted-certificate-0001 256s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA-trusted-certificate-0001.pem 256s ++ sed -n 's/ *commonName *= //p' 256s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 256s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 256s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-00o6YG/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 256s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-00o6YG/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 256s ++ basename /tmp/sssd-softhsm2-00o6YG/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 256s + tokens_dir=/tmp/sssd-softhsm2-00o6YG/softhsm2-test-intermediate-CA-trusted-certificate-0001 256s + token_name='Test Organization Interme Token' 256s + '[' '!' -e /tmp/sssd-softhsm2-00o6YG/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 256s + '[' '!' -d /tmp/sssd-softhsm2-00o6YG/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 256s + echo 'Test Organization Interme Token' 256s + '[' -n '' ']' 256s + local output_base_name=SSSD-child-3881 256s + local output_file=/tmp/sssd-softhsm2-00o6YG/SSSD-child-3881.output 256s + output_cert_file=/tmp/sssd-softhsm2-00o6YG/SSSD-child-3881.pem 256s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-00o6YG/test-intermediate-CA.pem 256s [p11_child[2281]] [main] (0x0400): p11_child started. 256s Test Organization Interme Token 256s [p11_child[2281]] [main] (0x2000): Running in [pre-auth] mode. 256s [p11_child[2281]] [main] (0x2000): Running with effective IDs: [0][0]. 256s [p11_child[2281]] [main] (0x2000): Running with real IDs [0][0]. 256s [p11_child[2281]] [do_card] (0x4000): Module List: 256s [p11_child[2281]] [do_card] (0x4000): common name: [softhsm2]. 256s [p11_child[2281]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 256s [p11_child[2281]] [do_card] (0x4000): Description [SoftHSM slot ID 0x3959d125] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 256s [p11_child[2281]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 256s [p11_child[2281]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x3959d125][962187557] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 256s [p11_child[2281]] [do_card] (0x4000): Login NOT required. 256s [p11_child[2281]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 256s [p11_child[2281]] [do_verification] (0x0040): X509_verify_cert failed [0]. 256s [p11_child[2281]] [do_verification] (0x0040): X509_verify_cert failed [2][unable to get issuer certificate]. 256s [p11_child[2281]] [read_certs] (0x0040): Certificate [Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] not valid, skipping. 256s [p11_child[2281]] [do_card] (0x4000): No certificate found. 256s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-00o6YG/SSSD-child-3881.output 256s + return 2 256s + valid_certificate /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-16416 /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA.pem partial_chain 256s + check_certificate /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-16416 /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA.pem partial_chain 256s + local certificate=/tmp/sssd-softhsm2-00o6YG/test-intermediate-CA-trusted-certificate-0001.pem 256s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-16416 256s + local key_ring=/tmp/sssd-softhsm2-00o6YG/test-intermediate-CA.pem 256s + local verify_option=partial_chain 256s + prepare_softhsm2_card /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-16416 256s + local certificate=/tmp/sssd-softhsm2-00o6YG/test-intermediate-CA-trusted-certificate-0001.pem 256s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-16416 256s + local key_cn 256s + local key_name 256s + local tokens_dir 256s + local output_cert_file 256s + token_name= 256s ++ basename /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA-trusted-certificate-0001.pem .pem 256s + key_name=test-intermediate-CA-trusted-certificate-0001 256s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA-trusted-certificate-0001.pem 256s ++ sed -n 's/ *commonName *= //p' 256s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 256s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 256s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-00o6YG/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 256s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-00o6YG/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 256s ++ basename /tmp/sssd-softhsm2-00o6YG/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 256s + tokens_dir=/tmp/sssd-softhsm2-00o6YG/softhsm2-test-intermediate-CA-trusted-certificate-0001 256s + token_name='Test Organization Interme Token' 256s + '[' '!' -e /tmp/sssd-softhsm2-00o6YG/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 256s + '[' '!' -d /tmp/sssd-softhsm2-00o6YG/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 256s + echo 'Test Organization Interme Token' 256s + '[' -n partial_chain ']' 256s + local verify_arg=--verify=partial_chain 256s + local output_base_name=SSSD-child-20894 256s + local output_file=/tmp/sssd-softhsm2-00o6YG/SSSD-child-20894.output 256s + output_cert_file=/tmp/sssd-softhsm2-00o6YG/SSSD-child-20894.pem 256s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-00o6YG/test-intermediate-CA.pem 256s Test Organization Interme Token 256s [p11_child[2288]] [main] (0x0400): p11_child started. 256s [p11_child[2288]] [main] (0x2000): Running in [pre-auth] mode. 256s [p11_child[2288]] [main] (0x2000): Running with effective IDs: [0][0]. 256s [p11_child[2288]] [main] (0x2000): Running with real IDs [0][0]. 256s [p11_child[2288]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 256s [p11_child[2288]] [do_card] (0x4000): Module List: 256s [p11_child[2288]] [do_card] (0x4000): common name: [softhsm2]. 256s [p11_child[2288]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 256s [p11_child[2288]] [do_card] (0x4000): Description [SoftHSM slot ID 0x3959d125] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 256s [p11_child[2288]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 256s [p11_child[2288]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x3959d125][962187557] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 256s [p11_child[2288]] [do_card] (0x4000): Login NOT required. 256s [p11_child[2288]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 256s [p11_child[2288]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 256s [p11_child[2288]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Interme Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 256s [p11_child[2288]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x3959d125;slot-manufacturer=SoftHSM%20project;slot-id=962187557;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=b0a003973959d125;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 256s [p11_child[2288]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 256s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-00o6YG/SSSD-child-20894.output 256s + echo '-----BEGIN CERTIFICATE-----' 256s + tail -n1 /tmp/sssd-softhsm2-00o6YG/SSSD-child-20894.output 256s + echo '-----END CERTIFICATE-----' 256s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-00o6YG/SSSD-child-20894.pem 256s Certificate: 256s Data: 256s Version: 3 (0x2) 256s Serial Number: 4 (0x4) 256s Signature Algorithm: sha256WithRSAEncryption 256s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 256s Validity 256s Not Before: Jul 4 00:03:15 2025 GMT 256s Not After : Jul 4 00:03:15 2026 GMT 256s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 256s Subject Public Key Info: 256s Public Key Algorithm: rsaEncryption 256s Public-Key: (1024 bit) 256s Modulus: 256s 00:da:5f:0c:0c:a5:84:8d:ce:8c:3f:52:8f:0e:20: 256s c8:2b:7e:c6:26:21:9b:b0:4d:c0:23:06:6b:34:ff: 256s 50:85:9c:fb:0d:3d:dd:32:48:72:04:98:57:56:f2: 256s 81:4f:e4:f6:7f:07:62:cd:c6:13:09:b9:7e:98:b8: 256s 9b:aa:f0:89:f9:21:93:89:74:17:10:72:05:0f:8d: 256s d5:69:a0:5b:fa:e8:df:bf:37:a6:61:78:6c:70:41: 256s 98:ee:eb:5d:8b:1b:0c:78:eb:72:7c:c3:06:40:17: 256s 38:e2:9e:22:3c:a6:cc:86:d1:fd:2b:2a:85:cb:33: 256s 80:04:5e:79:31:ee:97:65:d7 256s Exponent: 65537 (0x10001) 256s X509v3 extensions: 256s X509v3 Authority Key Identifier: 256s B2:3D:49:62:5C:A2:E5:1E:99:C6:58:55:C5:D5:FA:DE:2A:FC:9B:11 256s X509v3 Basic Constraints: 256s CA:FALSE 256s Netscape Cert Type: 256s SSL Client, S/MIME 256s Netscape Comment: 256s Test Organization Intermediate CA trusted Certificate 256s X509v3 Subject Key Identifier: 256s AD:E1:BD:A6:DA:BC:FF:92:6A:C1:C7:EF:3F:FF:05:23:1E:F4:E2:2F 256s X509v3 Key Usage: critical 256s Digital Signature, Non Repudiation, Key Encipherment 256s X509v3 Extended Key Usage: 256s TLS Web Client Authentication, E-mail Protection 256s X509v3 Subject Alternative Name: 256s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 256s Signature Algorithm: sha256WithRSAEncryption 256s Signature Value: 256s 90:32:09:b3:e7:87:be:8e:9f:5a:ac:2d:32:28:bc:b4:e7:f2: 256s b5:0d:09:54:77:b2:60:79:e4:46:07:68:e4:c9:04:f9:2d:cc: 256s 7f:15:ae:47:f9:62:84:e4:55:e3:da:d0:0d:db:d0:4f:bc:0e: 256s e3:d3:97:05:c3:2e:4a:39:d3:8e:b3:3f:06:70:35:86:a6:fd: 256s a1:7f:e5:1d:38:e2:95:51:e7:bf:99:2e:ce:e4:ed:14:7b:fc: 256s 04:9f:99:54:0d:da:53:de:c8:62:c1:db:a0:b4:5a:b0:bb:ec: 256s 6e:61:1a:c1:4f:5e:0e:da:88:58:a9:e6:31:42:26:40:27:31: 256s 74:14 256s + local found_md5 expected_md5 256s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-00o6YG/test-intermediate-CA-trusted-certificate-0001.pem 256s + expected_md5=Modulus=DA5F0C0CA5848DCE8C3F528F0E20C82B7EC626219BB04DC023066B34FF50859CFB0D3DDD32487204985756F2814FE4F67F0762CDC61309B97E98B89BAAF089F921938974171072050F8DD569A05BFAE8DFBF37A661786C704198EEEB5D8B1B0C78EB727CC306401738E29E223CA6CC86D1FD2B2A85CB3380045E7931EE9765D7 256s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-00o6YG/SSSD-child-20894.pem 256s + found_md5=Modulus=DA5F0C0CA5848DCE8C3F528F0E20C82B7EC626219BB04DC023066B34FF50859CFB0D3DDD32487204985756F2814FE4F67F0762CDC61309B97E98B89BAAF089F921938974171072050F8DD569A05BFAE8DFBF37A661786C704198EEEB5D8B1B0C78EB727CC306401738E29E223CA6CC86D1FD2B2A85CB3380045E7931EE9765D7 256s + '[' Modulus=DA5F0C0CA5848DCE8C3F528F0E20C82B7EC626219BB04DC023066B34FF50859CFB0D3DDD32487204985756F2814FE4F67F0762CDC61309B97E98B89BAAF089F921938974171072050F8DD569A05BFAE8DFBF37A661786C704198EEEB5D8B1B0C78EB727CC306401738E29E223CA6CC86D1FD2B2A85CB3380045E7931EE9765D7 '!=' Modulus=DA5F0C0CA5848DCE8C3F528F0E20C82B7EC626219BB04DC023066B34FF50859CFB0D3DDD32487204985756F2814FE4F67F0762CDC61309B97E98B89BAAF089F921938974171072050F8DD569A05BFAE8DFBF37A661786C704198EEEB5D8B1B0C78EB727CC306401738E29E223CA6CC86D1FD2B2A85CB3380045E7931EE9765D7 ']' 256s + output_file=/tmp/sssd-softhsm2-00o6YG/SSSD-child-20894-auth.output 256s ++ basename /tmp/sssd-softhsm2-00o6YG/SSSD-child-20894-auth.output .output 256s + output_cert_file=/tmp/sssd-softhsm2-00o6YG/SSSD-child-20894-auth.pem 256s + echo -n 053350 256s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-00o6YG/test-intermediate-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Interme Token' --module_name /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so 256s [p11_child[2296]] [main] (0x0400): p11_child started. 256s [p11_child[2296]] [main] (0x2000): Running in [auth] mode. 256s [p11_child[2296]] [main] (0x2000): Running with effective IDs: [0][0]. 256s [p11_child[2296]] [main] (0x2000): Running with real IDs [0][0]. 256s [p11_child[2296]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 256s [p11_child[2296]] [do_card] (0x4000): Module List: 256s [p11_child[2296]] [do_card] (0x4000): common name: [softhsm2]. 256s [p11_child[2296]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 256s [p11_child[2296]] [do_card] (0x4000): Description [SoftHSM slot ID 0x3959d125] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 256s [p11_child[2296]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 256s [p11_child[2296]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x3959d125][962187557] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 256s [p11_child[2296]] [do_card] (0x4000): Login required. 256s [p11_child[2296]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 256s [p11_child[2296]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 256s [p11_child[2296]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so Test Organization Interme Token Test Organization Interme Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 256s [p11_child[2296]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x3959d125;slot-manufacturer=SoftHSM%20project;slot-id=962187557;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=b0a003973959d125;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 256s [p11_child[2296]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 256s [p11_child[2296]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 256s [p11_child[2296]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 256s [p11_child[2296]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 256s [p11_child[2296]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 256s [p11_child[2296]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 256s [p11_child[2296]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 256s [p11_child[2296]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 256s [p11_child[2296]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 256s [p11_child[2296]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 256s [p11_child[2296]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 256s [p11_child[2296]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 256s [p11_child[2296]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 256s [p11_child[2296]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 256s [p11_child[2296]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 256s [p11_child[2296]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 256s [p11_child[2296]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 256s [p11_child[2296]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 256s [p11_child[2296]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 256s [p11_child[2296]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 256s [p11_child[2296]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 256s [p11_child[2296]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 256s [p11_child[2296]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 256s [p11_child[2296]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 256s [p11_child[2296]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 256s [p11_child[2296]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 256s [p11_child[2296]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 256s [p11_child[2296]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 256s [p11_child[2296]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 256s [p11_child[2296]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 256s [p11_child[2296]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 256s [p11_child[2296]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 256s [p11_child[2296]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 256s [p11_child[2296]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 256s [p11_child[2296]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 256s [p11_child[2296]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 256s [p11_child[2296]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 256s [p11_child[2296]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 256s [p11_child[2296]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 256s [p11_child[2296]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 256s [p11_child[2296]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 256s [p11_child[2296]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 256s [p11_child[2296]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 256s [p11_child[2296]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 256s [p11_child[2296]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 256s [p11_child[2296]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 256s [p11_child[2296]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 256s [p11_child[2296]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 256s [p11_child[2296]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 256s [p11_child[2296]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 256s [p11_child[2296]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 256s [p11_child[2296]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 256s [p11_child[2296]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 256s [p11_child[2296]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 256s [p11_child[2296]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 256s [p11_child[2296]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 256s [p11_child[2296]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 256s [p11_child[2296]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 256s [p11_child[2296]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 256s [p11_child[2296]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 256s [p11_child[2296]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 256s [p11_child[2296]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 256s [p11_child[2296]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 256s [p11_child[2296]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 256s [p11_child[2296]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 256s [p11_child[2296]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 256s [p11_child[2296]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 256s [p11_child[2296]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 256s [p11_child[2296]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 256s [p11_child[2296]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 256s [p11_child[2296]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 256s [p11_child[2296]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 256s [p11_child[2296]] [do_card] (0x4000): Certificate verified and validated. 256s [p11_child[2296]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 256s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-00o6YG/SSSD-child-20894-auth.output 256s + echo '-----BEGIN CERTIFICATE-----' 256s + tail -n1 /tmp/sssd-softhsm2-00o6YG/SSSD-child-20894-auth.output 256s + echo '-----END CERTIFICATE-----' 256s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-00o6YG/SSSD-child-20894-auth.pem 256s Certificate: 256s Data: 256s Version: 3 (0x2) 256s Serial Number: 4 (0x4) 256s Signature Algorithm: sha256WithRSAEncryption 256s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 256s Validity 256s Not Before: Jul 4 00:03:15 2025 GMT 256s Not After : Jul 4 00:03:15 2026 GMT 256s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 256s Subject Public Key Info: 256s Public Key Algorithm: rsaEncryption 256s Public-Key: (1024 bit) 256s Modulus: 256s 00:da:5f:0c:0c:a5:84:8d:ce:8c:3f:52:8f:0e:20: 256s c8:2b:7e:c6:26:21:9b:b0:4d:c0:23:06:6b:34:ff: 256s 50:85:9c:fb:0d:3d:dd:32:48:72:04:98:57:56:f2: 256s 81:4f:e4:f6:7f:07:62:cd:c6:13:09:b9:7e:98:b8: 256s 9b:aa:f0:89:f9:21:93:89:74:17:10:72:05:0f:8d: 256s d5:69:a0:5b:fa:e8:df:bf:37:a6:61:78:6c:70:41: 256s 98:ee:eb:5d:8b:1b:0c:78:eb:72:7c:c3:06:40:17: 256s 38:e2:9e:22:3c:a6:cc:86:d1:fd:2b:2a:85:cb:33: 256s 80:04:5e:79:31:ee:97:65:d7 256s Exponent: 65537 (0x10001) 256s X509v3 extensions: 256s X509v3 Authority Key Identifier: 256s B2:3D:49:62:5C:A2:E5:1E:99:C6:58:55:C5:D5:FA:DE:2A:FC:9B:11 256s X509v3 Basic Constraints: 256s CA:FALSE 256s Netscape Cert Type: 256s SSL Client, S/MIME 256s Netscape Comment: 256s Test Organization Intermediate CA trusted Certificate 256s X509v3 Subject Key Identifier: 256s AD:E1:BD:A6:DA:BC:FF:92:6A:C1:C7:EF:3F:FF:05:23:1E:F4:E2:2F 256s X509v3 Key Usage: critical 256s Digital Signature, Non Repudiation, Key Encipherment 256s X509v3 Extended Key Usage: 256s TLS Web Client Authentication, E-mail Protection 256s X509v3 Subject Alternative Name: 256s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 256s Signature Algorithm: sha256WithRSAEncryption 256s Signature Value: 256s 90:32:09:b3:e7:87:be:8e:9f:5a:ac:2d:32:28:bc:b4:e7:f2: 256s b5:0d:09:54:77:b2:60:79:e4:46:07:68:e4:c9:04:f9:2d:cc: 256s 7f:15:ae:47:f9:62:84:e4:55:e3:da:d0:0d:db:d0:4f:bc:0e: 256s e3:d3:97:05:c3:2e:4a:39:d3:8e:b3:3f:06:70:35:86:a6:fd: 256s a1:7f:e5:1d:38:e2:95:51:e7:bf:99:2e:ce:e4:ed:14:7b:fc: 256s 04:9f:99:54:0d:da:53:de:c8:62:c1:db:a0:b4:5a:b0:bb:ec: 256s 6e:61:1a:c1:4f:5e:0e:da:88:58:a9:e6:31:42:26:40:27:31: 256s 74:14 256s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-00o6YG/SSSD-child-20894-auth.pem 257s + found_md5=Modulus=DA5F0C0CA5848DCE8C3F528F0E20C82B7EC626219BB04DC023066B34FF50859CFB0D3DDD32487204985756F2814FE4F67F0762CDC61309B97E98B89BAAF089F921938974171072050F8DD569A05BFAE8DFBF37A661786C704198EEEB5D8B1B0C78EB727CC306401738E29E223CA6CC86D1FD2B2A85CB3380045E7931EE9765D7 257s + '[' Modulus=DA5F0C0CA5848DCE8C3F528F0E20C82B7EC626219BB04DC023066B34FF50859CFB0D3DDD32487204985756F2814FE4F67F0762CDC61309B97E98B89BAAF089F921938974171072050F8DD569A05BFAE8DFBF37A661786C704198EEEB5D8B1B0C78EB727CC306401738E29E223CA6CC86D1FD2B2A85CB3380045E7931EE9765D7 '!=' Modulus=DA5F0C0CA5848DCE8C3F528F0E20C82B7EC626219BB04DC023066B34FF50859CFB0D3DDD32487204985756F2814FE4F67F0762CDC61309B97E98B89BAAF089F921938974171072050F8DD569A05BFAE8DFBF37A661786C704198EEEB5D8B1B0C78EB727CC306401738E29E223CA6CC86D1FD2B2A85CB3380045E7931EE9765D7 ']' 257s + invalid_certificate /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-1604 /tmp/sssd-softhsm2-00o6YG/test-root-CA.pem 257s + check_certificate /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-1604 /tmp/sssd-softhsm2-00o6YG/test-root-CA.pem 257s + local certificate=/tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-trusted-certificate-0001.pem 257s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-1604 257s + local key_ring=/tmp/sssd-softhsm2-00o6YG/test-root-CA.pem 257s + local verify_option= 257s + prepare_softhsm2_card /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-1604 257s + local certificate=/tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-trusted-certificate-0001.pem 257s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-1604 257s + local key_cn 257s + local key_name 257s + local tokens_dir 257s + local output_cert_file 257s + token_name= 257s ++ basename /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 257s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 257s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-trusted-certificate-0001.pem 257s ++ sed -n 's/ *commonName *= //p' 257s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 257s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 257s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-00o6YG/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 257s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-00o6YG/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 257s ++ basename /tmp/sssd-softhsm2-00o6YG/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 257s + tokens_dir=/tmp/sssd-softhsm2-00o6YG/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 257s + token_name='Test Organization Sub Int Token' 257s + '[' '!' -e /tmp/sssd-softhsm2-00o6YG/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 257s + local key_file 257s + local decrypted_key 257s + mkdir -p /tmp/sssd-softhsm2-00o6YG/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 257s + key_file=/tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-trusted-certificate-0001-key.pem 257s + decrypted_key=/tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 257s + cat 257s + softhsm2-util --init-token --label 'Test Organization Sub Int Token' --pin 053350 --so-pin 053350 --free 257s Slot 0 has a free/uninitialized token. 257s The token has been initialized and is reassigned to slot 1140625220 257s + softhsm2-util --show-slots 257s Available slots: 257s Slot 1140625220 257s Slot info: 257s Description: SoftHSM slot ID 0x43fc8f44 257s Manufacturer ID: SoftHSM project 257s Hardware version: 2.6 257s Firmware version: 2.6 257s Token present: yes 257s Token info: 257s Manufacturer ID: SoftHSM project 257s Model: SoftHSM v2 257s Hardware version: 2.6 257s Firmware version: 2.6 257s Serial number: 2b5547dc43fc8f44 257s Initialized: yes 257s User PIN init.: yes 257s Label: Test Organization Sub Int Token 257s Slot 1 257s Slot info: 257s Description: SoftHSM slot ID 0x1 257s Manufacturer ID: SoftHSM project 257s Hardware version: 2.6 257s Firmware version: 2.6 257s Token present: yes 257s Token info: 257s Manufacturer ID: SoftHSM project 257s Model: SoftHSM v2 257s Hardware version: 2.6 257s Firmware version: 2.6 257s Serial number: 257s Initialized: no 257s User PIN init.: no 257s Label: 257s + p11tool --provider=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --write --no-mark-private --load-certificate=/tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-trusted-certificate-0001.pem --login --set-pin=053350 --label 'Test Organization Sub Intermediate Trusted Certificate 0001' --id 00112233445566778899FFAABBCCDDEEFF012345 257s + openssl rsa -passin pass:random-sub-intermediate-ca-trusted-cert-0001-1604 -in /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-trusted-certificate-0001-key.pem -out /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 257s writing RSA key 257s + p11tool --provider=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --write --load-privkey=/tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem --login --set-pin=053350 --label 'Test Organization Sub Intermediate Trusted Certificate 0001 Key' --id 00112233445566778899FFAABBCCDDEEFF012345 257s + rm /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 257s + p11tool --provider=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --list-all 257s Object 0: 257s URL: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=2b5547dc43fc8f44;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert 257s Type: X.509 Certificate (RSA-1024) 257s Expires: Sat Jul 4 00:03:15 2026 257s Label: Test Organization Sub Intermediate Trusted Certificate 0001 257s ID: 00:11:22:33:44:55:66:77:88:99:ff:aa:bb:cc:dd:ee:ff:01:23:45 257s 257s Test Organization Sub Int Token 257s + echo 'Test Organization Sub Int Token' 257s + '[' -n '' ']' 257s + local output_base_name=SSSD-child-24088 257s + local output_file=/tmp/sssd-softhsm2-00o6YG/SSSD-child-24088.output 257s + output_cert_file=/tmp/sssd-softhsm2-00o6YG/SSSD-child-24088.pem 257s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-00o6YG/test-root-CA.pem 257s [p11_child[2315]] [main] (0x0400): p11_child started. 257s [p11_child[2315]] [main] (0x2000): Running in [pre-auth] mode. 257s [p11_child[2315]] [main] (0x2000): Running with effective IDs: [0][0]. 257s [p11_child[2315]] [main] (0x2000): Running with real IDs [0][0]. 257s [p11_child[2315]] [do_card] (0x4000): Module List: 257s [p11_child[2315]] [do_card] (0x4000): common name: [softhsm2]. 257s [p11_child[2315]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 257s [p11_child[2315]] [do_card] (0x4000): Description [SoftHSM slot ID 0x43fc8f44] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 257s [p11_child[2315]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 257s [p11_child[2315]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x43fc8f44][1140625220] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 257s [p11_child[2315]] [do_card] (0x4000): Login NOT required. 257s [p11_child[2315]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 257s [p11_child[2315]] [do_verification] (0x0040): X509_verify_cert failed [0]. 257s [p11_child[2315]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 257s [p11_child[2315]] [read_certs] (0x0040): Certificate [Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] not valid, skipping. 257s [p11_child[2315]] [do_card] (0x4000): No certificate found. 257s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-00o6YG/SSSD-child-24088.output 257s + return 2 257s + invalid_certificate /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-1604 /tmp/sssd-softhsm2-00o6YG/test-root-CA.pem partial_chain 257s + check_certificate /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-1604 /tmp/sssd-softhsm2-00o6YG/test-root-CA.pem partial_chain 257s + local certificate=/tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-trusted-certificate-0001.pem 257s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-1604 257s + local key_ring=/tmp/sssd-softhsm2-00o6YG/test-root-CA.pem 257s + local verify_option=partial_chain 257s + prepare_softhsm2_card /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-1604 257s + local certificate=/tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-trusted-certificate-0001.pem 257s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-1604 257s + local key_cn 257s + local key_name 257s + local tokens_dir 257s + local output_cert_file 257s + token_name= 257s ++ basename /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 257s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 257s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-trusted-certificate-0001.pem 257s ++ sed -n 's/ *commonName *= //p' 257s Test Organization Sub Int Token 257s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 257s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 257s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-00o6YG/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 257s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-00o6YG/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 257s ++ basename /tmp/sssd-softhsm2-00o6YG/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 257s + tokens_dir=/tmp/sssd-softhsm2-00o6YG/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 257s + token_name='Test Organization Sub Int Token' 257s + '[' '!' -e /tmp/sssd-softhsm2-00o6YG/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 257s + '[' '!' -d /tmp/sssd-softhsm2-00o6YG/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 257s + echo 'Test Organization Sub Int Token' 257s + '[' -n partial_chain ']' 257s + local verify_arg=--verify=partial_chain 257s + local output_base_name=SSSD-child-28528 257s + local output_file=/tmp/sssd-softhsm2-00o6YG/SSSD-child-28528.output 257s + output_cert_file=/tmp/sssd-softhsm2-00o6YG/SSSD-child-28528.pem 257s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-00o6YG/test-root-CA.pem 257s [p11_child[2322]] [main] (0x0400): p11_child started. 257s [p11_child[2322]] [main] (0x2000): Running in [pre-auth] mode. 257s [p11_child[2322]] [main] (0x2000): Running with effective IDs: [0][0]. 257s [p11_child[2322]] [main] (0x2000): Running with real IDs [0][0]. 257s [p11_child[2322]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 257s [p11_child[2322]] [do_card] (0x4000): Module List: 257s [p11_child[2322]] [do_card] (0x4000): common name: [softhsm2]. 257s [p11_child[2322]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 257s [p11_child[2322]] [do_card] (0x4000): Description [SoftHSM slot ID 0x43fc8f44] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 257s [p11_child[2322]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 257s [p11_child[2322]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x43fc8f44][1140625220] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 257s [p11_child[2322]] [do_card] (0x4000): Login NOT required. 257s [p11_child[2322]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 257s [p11_child[2322]] [do_verification] (0x0040): X509_verify_cert failed [0]. 257s [p11_child[2322]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 257s [p11_child[2322]] [read_certs] (0x0040): Certificate [Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] not valid, skipping. 257s [p11_child[2322]] [do_card] (0x4000): No certificate found. 257s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-00o6YG/SSSD-child-28528.output 257s + return 2 257s + valid_certificate /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-1604 /tmp/sssd-softhsm2-00o6YG/test-full-chain-CA.pem 257s + check_certificate /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-1604 /tmp/sssd-softhsm2-00o6YG/test-full-chain-CA.pem 257s + local certificate=/tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-trusted-certificate-0001.pem 257s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-1604 257s + local key_ring=/tmp/sssd-softhsm2-00o6YG/test-full-chain-CA.pem 257s + local verify_option= 257s + prepare_softhsm2_card /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-1604 257s + local certificate=/tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-trusted-certificate-0001.pem 257s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-1604 257s + local key_cn 257s + local key_name 257s + local tokens_dir 257s + local output_cert_file 257s + token_name= 257s ++ basename /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 257s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 257s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-trusted-certificate-0001.pem 257s ++ sed -n 's/ *commonName *= //p' 257s Test Organization Sub Int Token 257s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 257s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 257s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-00o6YG/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 257s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-00o6YG/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 257s ++ basename /tmp/sssd-softhsm2-00o6YG/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 257s + tokens_dir=/tmp/sssd-softhsm2-00o6YG/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 257s + token_name='Test Organization Sub Int Token' 257s + '[' '!' -e /tmp/sssd-softhsm2-00o6YG/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 257s + '[' '!' -d /tmp/sssd-softhsm2-00o6YG/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 257s + echo 'Test Organization Sub Int Token' 257s + '[' -n '' ']' 257s + local output_base_name=SSSD-child-31811 257s + local output_file=/tmp/sssd-softhsm2-00o6YG/SSSD-child-31811.output 257s + output_cert_file=/tmp/sssd-softhsm2-00o6YG/SSSD-child-31811.pem 257s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-00o6YG/test-full-chain-CA.pem 257s [p11_child[2329]] [main] (0x0400): p11_child started. 257s [p11_child[2329]] [main] (0x2000): Running in [pre-auth] mode. 257s [p11_child[2329]] [main] (0x2000): Running with effective IDs: [0][0]. 257s [p11_child[2329]] [main] (0x2000): Running with real IDs [0][0]. 257s [p11_child[2329]] [do_card] (0x4000): Module List: 257s [p11_child[2329]] [do_card] (0x4000): common name: [softhsm2]. 257s [p11_child[2329]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 257s [p11_child[2329]] [do_card] (0x4000): Description [SoftHSM slot ID 0x43fc8f44] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 257s [p11_child[2329]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 257s [p11_child[2329]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x43fc8f44][1140625220] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 257s [p11_child[2329]] [do_card] (0x4000): Login NOT required. 257s [p11_child[2329]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 257s [p11_child[2329]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 257s [p11_child[2329]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Sub Int Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 257s [p11_child[2329]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x43fc8f44;slot-manufacturer=SoftHSM%20project;slot-id=1140625220;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=2b5547dc43fc8f44;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 257s [p11_child[2329]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 257s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-00o6YG/SSSD-child-31811.output 257s + echo '-----BEGIN CERTIFICATE-----' 257s + tail -n1 /tmp/sssd-softhsm2-00o6YG/SSSD-child-31811.output 257s + echo '-----END CERTIFICATE-----' 257s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-00o6YG/SSSD-child-31811.pem 257s Certificate: 257s Data: 257s Version: 3 (0x2) 257s Serial Number: 5 (0x5) 257s Signature Algorithm: sha256WithRSAEncryption 257s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 257s Validity 257s Not Before: Jul 4 00:03:15 2025 GMT 257s Not After : Jul 4 00:03:15 2026 GMT 257s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 257s Subject Public Key Info: 257s Public Key Algorithm: rsaEncryption 257s Public-Key: (1024 bit) 257s Modulus: 257s 00:d4:0c:95:d7:a3:e4:f3:c8:19:73:db:bf:fb:f9: 257s b6:a3:92:95:77:42:60:51:0e:73:d9:24:36:22:c6: 257s bd:87:9e:3f:83:23:c0:39:3a:3c:9c:21:ba:dd:d4: 257s 65:24:3a:9d:8f:88:d9:35:c3:41:47:0f:be:5f:39: 257s c1:7f:f0:f5:32:56:42:24:d7:85:6e:55:a6:01:5f: 257s 7b:c6:ce:15:5c:5d:e8:b8:05:96:9e:2c:52:e4:b8: 257s af:44:f3:0a:23:d4:e2:28:5b:09:dd:47:1c:c5:b4: 257s d6:34:b7:58:1d:58:9a:0e:1e:05:81:19:b4:51:0e: 257s 7a:5d:ab:4f:e2:d1:a3:a0:59 257s Exponent: 65537 (0x10001) 257s X509v3 extensions: 257s X509v3 Authority Key Identifier: 257s FD:9D:53:80:40:64:D4:EF:1D:5B:C4:4C:2D:E6:69:C8:70:9F:44:59 257s X509v3 Basic Constraints: 257s CA:FALSE 257s Netscape Cert Type: 257s SSL Client, S/MIME 257s Netscape Comment: 257s Test Organization Sub Intermediate CA trusted Certificate 257s X509v3 Subject Key Identifier: 257s E4:53:95:2C:D5:4C:87:C8:13:D7:92:83:65:4F:70:86:8F:0F:AE:29 257s X509v3 Key Usage: critical 257s Digital Signature, Non Repudiation, Key Encipherment 257s X509v3 Extended Key Usage: 257s TLS Web Client Authentication, E-mail Protection 257s X509v3 Subject Alternative Name: 257s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 257s Signature Algorithm: sha256WithRSAEncryption 257s Signature Value: 257s b1:cb:e4:7d:df:14:c1:37:80:c8:94:18:01:40:7b:2c:a1:31: 257s 18:8e:a0:df:c8:12:9f:17:bb:25:97:f9:c5:35:c0:a9:ee:b1: 257s 2f:a4:a3:d4:b3:b7:9b:30:f4:3a:79:49:84:a0:80:84:af:47: 257s a4:c2:75:77:6d:e5:22:43:38:39:af:44:05:c1:be:d6:91:a8: 257s 83:7e:56:9a:47:15:47:ba:d7:fd:36:0d:52:d0:3b:69:fc:4b: 257s 7b:c2:ff:55:5a:42:52:25:06:50:8c:ba:cb:9f:c3:12:a5:0f: 257s 2b:e4:eb:b1:1b:a0:23:23:31:f6:56:ac:b2:6b:93:73:ed:fd: 257s e7:98 257s + local found_md5 expected_md5 257s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-trusted-certificate-0001.pem 257s + expected_md5=Modulus=D40C95D7A3E4F3C81973DBBFFBF9B6A39295774260510E73D9243622C6BD879E3F8323C0393A3C9C21BADDD465243A9D8F88D935C341470FBE5F39C17FF0F532564224D7856E55A6015F7BC6CE155C5DE8B805969E2C52E4B8AF44F30A23D4E2285B09DD471CC5B4D634B7581D589A0E1E058119B4510E7A5DAB4FE2D1A3A059 257s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-00o6YG/SSSD-child-31811.pem 257s + found_md5=Modulus=D40C95D7A3E4F3C81973DBBFFBF9B6A39295774260510E73D9243622C6BD879E3F8323C0393A3C9C21BADDD465243A9D8F88D935C341470FBE5F39C17FF0F532564224D7856E55A6015F7BC6CE155C5DE8B805969E2C52E4B8AF44F30A23D4E2285B09DD471CC5B4D634B7581D589A0E1E058119B4510E7A5DAB4FE2D1A3A059 257s + '[' Modulus=D40C95D7A3E4F3C81973DBBFFBF9B6A39295774260510E73D9243622C6BD879E3F8323C0393A3C9C21BADDD465243A9D8F88D935C341470FBE5F39C17FF0F532564224D7856E55A6015F7BC6CE155C5DE8B805969E2C52E4B8AF44F30A23D4E2285B09DD471CC5B4D634B7581D589A0E1E058119B4510E7A5DAB4FE2D1A3A059 '!=' Modulus=D40C95D7A3E4F3C81973DBBFFBF9B6A39295774260510E73D9243622C6BD879E3F8323C0393A3C9C21BADDD465243A9D8F88D935C341470FBE5F39C17FF0F532564224D7856E55A6015F7BC6CE155C5DE8B805969E2C52E4B8AF44F30A23D4E2285B09DD471CC5B4D634B7581D589A0E1E058119B4510E7A5DAB4FE2D1A3A059 ']' 257s + output_file=/tmp/sssd-softhsm2-00o6YG/SSSD-child-31811-auth.output 257s ++ basename /tmp/sssd-softhsm2-00o6YG/SSSD-child-31811-auth.output .output 257s + output_cert_file=/tmp/sssd-softhsm2-00o6YG/SSSD-child-31811-auth.pem 257s + echo -n 053350 257s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-00o6YG/test-full-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 '' --token_name 'Test Organization Sub Int Token' --module_name /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so 257s [p11_child[2337]] [main] (0x0400): p11_child started. 257s [p11_child[2337]] [main] (0x2000): Running in [auth] mode. 257s [p11_child[2337]] [main] (0x2000): Running with effective IDs: [0][0]. 257s [p11_child[2337]] [main] (0x2000): Running with real IDs [0][0]. 257s [p11_child[2337]] [do_card] (0x4000): Module List: 257s [p11_child[2337]] [do_card] (0x4000): common name: [softhsm2]. 257s [p11_child[2337]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 257s [p11_child[2337]] [do_card] (0x4000): Description [SoftHSM slot ID 0x43fc8f44] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 257s [p11_child[2337]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 257s [p11_child[2337]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x43fc8f44][1140625220] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 257s [p11_child[2337]] [do_card] (0x4000): Login required. 257s [p11_child[2337]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 257s [p11_child[2337]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 257s [p11_child[2337]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so Test Organization Sub Int Token Test Organization Sub Int Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 257s [p11_child[2337]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x43fc8f44;slot-manufacturer=SoftHSM%20project;slot-id=1140625220;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=2b5547dc43fc8f44;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 257s [p11_child[2337]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 257s [p11_child[2337]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 257s [p11_child[2337]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 257s [p11_child[2337]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 257s [p11_child[2337]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 257s [p11_child[2337]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 257s [p11_child[2337]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 257s [p11_child[2337]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 257s [p11_child[2337]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 257s [p11_child[2337]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 257s [p11_child[2337]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 257s [p11_child[2337]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 257s [p11_child[2337]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 257s [p11_child[2337]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 257s [p11_child[2337]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 257s [p11_child[2337]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 257s [p11_child[2337]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 257s [p11_child[2337]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 257s [p11_child[2337]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 257s [p11_child[2337]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 257s [p11_child[2337]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 257s [p11_child[2337]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 257s [p11_child[2337]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 257s [p11_child[2337]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 257s [p11_child[2337]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 257s [p11_child[2337]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 257s [p11_child[2337]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 257s [p11_child[2337]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 257s [p11_child[2337]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 257s [p11_child[2337]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 257s [p11_child[2337]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 257s [p11_child[2337]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 257s [p11_child[2337]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 257s [p11_child[2337]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 257s [p11_child[2337]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 257s [p11_child[2337]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 257s [p11_child[2337]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 257s [p11_child[2337]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 257s [p11_child[2337]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 257s [p11_child[2337]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 257s [p11_child[2337]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 257s [p11_child[2337]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 257s [p11_child[2337]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 257s [p11_child[2337]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 257s [p11_child[2337]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 257s [p11_child[2337]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 257s [p11_child[2337]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 257s [p11_child[2337]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 257s [p11_child[2337]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 257s [p11_child[2337]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 257s [p11_child[2337]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 257s [p11_child[2337]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 257s [p11_child[2337]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 257s [p11_child[2337]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 257s [p11_child[2337]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 257s [p11_child[2337]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 257s [p11_child[2337]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 257s [p11_child[2337]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 257s [p11_child[2337]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 257s [p11_child[2337]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 257s [p11_child[2337]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 257s [p11_child[2337]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 257s [p11_child[2337]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 257s [p11_child[2337]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 257s [p11_child[2337]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 257s [p11_child[2337]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 257s [p11_child[2337]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 257s [p11_child[2337]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 257s [p11_child[2337]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 257s [p11_child[2337]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 257s [p11_child[2337]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 257s [p11_child[2337]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 257s [p11_child[2337]] [do_card] (0x4000): Certificate verified and validated. 257s [p11_child[2337]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 257s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-00o6YG/SSSD-child-31811-auth.output 257s + echo '-----BEGIN CERTIFICATE-----' 257s + tail -n1 /tmp/sssd-softhsm2-00o6YG/SSSD-child-31811-auth.output 257s + echo '-----END CERTIFICATE-----' 257s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-00o6YG/SSSD-child-31811-auth.pem 257s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-00o6YG/SSSD-child-31811-auth.pem 257s Certificate: 257s Data: 257s Version: 3 (0x2) 257s Serial Number: 5 (0x5) 257s Signature Algorithm: sha256WithRSAEncryption 257s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 257s Validity 257s Not Before: Jul 4 00:03:15 2025 GMT 257s Not After : Jul 4 00:03:15 2026 GMT 257s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 257s Subject Public Key Info: 257s Public Key Algorithm: rsaEncryption 257s Public-Key: (1024 bit) 257s Modulus: 257s 00:d4:0c:95:d7:a3:e4:f3:c8:19:73:db:bf:fb:f9: 257s b6:a3:92:95:77:42:60:51:0e:73:d9:24:36:22:c6: 257s bd:87:9e:3f:83:23:c0:39:3a:3c:9c:21:ba:dd:d4: 257s 65:24:3a:9d:8f:88:d9:35:c3:41:47:0f:be:5f:39: 257s c1:7f:f0:f5:32:56:42:24:d7:85:6e:55:a6:01:5f: 257s 7b:c6:ce:15:5c:5d:e8:b8:05:96:9e:2c:52:e4:b8: 257s af:44:f3:0a:23:d4:e2:28:5b:09:dd:47:1c:c5:b4: 257s d6:34:b7:58:1d:58:9a:0e:1e:05:81:19:b4:51:0e: 257s 7a:5d:ab:4f:e2:d1:a3:a0:59 257s Exponent: 65537 (0x10001) 257s X509v3 extensions: 257s X509v3 Authority Key Identifier: 257s FD:9D:53:80:40:64:D4:EF:1D:5B:C4:4C:2D:E6:69:C8:70:9F:44:59 257s X509v3 Basic Constraints: 257s CA:FALSE 257s Netscape Cert Type: 257s SSL Client, S/MIME 257s Netscape Comment: 257s Test Organization Sub Intermediate CA trusted Certificate 257s X509v3 Subject Key Identifier: 257s E4:53:95:2C:D5:4C:87:C8:13:D7:92:83:65:4F:70:86:8F:0F:AE:29 257s X509v3 Key Usage: critical 257s Digital Signature, Non Repudiation, Key Encipherment 257s X509v3 Extended Key Usage: 257s TLS Web Client Authentication, E-mail Protection 257s X509v3 Subject Alternative Name: 257s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 257s Signature Algorithm: sha256WithRSAEncryption 257s Signature Value: 257s b1:cb:e4:7d:df:14:c1:37:80:c8:94:18:01:40:7b:2c:a1:31: 257s 18:8e:a0:df:c8:12:9f:17:bb:25:97:f9:c5:35:c0:a9:ee:b1: 257s 2f:a4:a3:d4:b3:b7:9b:30:f4:3a:79:49:84:a0:80:84:af:47: 257s a4:c2:75:77:6d:e5:22:43:38:39:af:44:05:c1:be:d6:91:a8: 257s 83:7e:56:9a:47:15:47:ba:d7:fd:36:0d:52:d0:3b:69:fc:4b: 257s 7b:c2:ff:55:5a:42:52:25:06:50:8c:ba:cb:9f:c3:12:a5:0f: 257s 2b:e4:eb:b1:1b:a0:23:23:31:f6:56:ac:b2:6b:93:73:ed:fd: 257s e7:98 257s + found_md5=Modulus=D40C95D7A3E4F3C81973DBBFFBF9B6A39295774260510E73D9243622C6BD879E3F8323C0393A3C9C21BADDD465243A9D8F88D935C341470FBE5F39C17FF0F532564224D7856E55A6015F7BC6CE155C5DE8B805969E2C52E4B8AF44F30A23D4E2285B09DD471CC5B4D634B7581D589A0E1E058119B4510E7A5DAB4FE2D1A3A059 257s + '[' Modulus=D40C95D7A3E4F3C81973DBBFFBF9B6A39295774260510E73D9243622C6BD879E3F8323C0393A3C9C21BADDD465243A9D8F88D935C341470FBE5F39C17FF0F532564224D7856E55A6015F7BC6CE155C5DE8B805969E2C52E4B8AF44F30A23D4E2285B09DD471CC5B4D634B7581D589A0E1E058119B4510E7A5DAB4FE2D1A3A059 '!=' Modulus=D40C95D7A3E4F3C81973DBBFFBF9B6A39295774260510E73D9243622C6BD879E3F8323C0393A3C9C21BADDD465243A9D8F88D935C341470FBE5F39C17FF0F532564224D7856E55A6015F7BC6CE155C5DE8B805969E2C52E4B8AF44F30A23D4E2285B09DD471CC5B4D634B7581D589A0E1E058119B4510E7A5DAB4FE2D1A3A059 ']' 257s + valid_certificate /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-1604 /tmp/sssd-softhsm2-00o6YG/test-full-chain-CA.pem partial_chain 257s + check_certificate /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-1604 /tmp/sssd-softhsm2-00o6YG/test-full-chain-CA.pem partial_chain 257s + local certificate=/tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-trusted-certificate-0001.pem 257s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-1604 257s + local key_ring=/tmp/sssd-softhsm2-00o6YG/test-full-chain-CA.pem 257s + local verify_option=partial_chain 257s + prepare_softhsm2_card /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-1604 257s + local certificate=/tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-trusted-certificate-0001.pem 257s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-1604 257s + local key_cn 257s + local key_name 257s + local tokens_dir 257s + local output_cert_file 257s + token_name= 257s ++ basename /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 257s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 257s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-trusted-certificate-0001.pem 257s ++ sed -n 's/ *commonName *= //p' 257s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 257s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 257s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-00o6YG/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 257s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-00o6YG/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 257s ++ basename /tmp/sssd-softhsm2-00o6YG/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 257s + tokens_dir=/tmp/sssd-softhsm2-00o6YG/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 257s + token_name='Test Organization Sub Int Token' 257s + '[' '!' -e /tmp/sssd-softhsm2-00o6YG/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 257s + '[' '!' -d /tmp/sssd-softhsm2-00o6YG/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 257s + echo 'Test Organization Sub Int Token' 257s + '[' -n partial_chain ']' 257s + local verify_arg=--verify=partial_chain 257s + local output_base_name=SSSD-child-11619 257s + local output_file=/tmp/sssd-softhsm2-00o6YG/SSSD-child-11619.output 257s + output_cert_file=/tmp/sssd-softhsm2-00o6YG/SSSD-child-11619.pem 257s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-00o6YG/test-full-chain-CA.pem 257s [p11_child[2347]] [main] (0x0400): p11_child started. 257s Test Organization Sub Int Token 257s [p11_child[2347]] [main] (0x2000): Running in [pre-auth] mode. 257s [p11_child[2347]] [main] (0x2000): Running with effective IDs: [0][0]. 257s [p11_child[2347]] [main] (0x2000): Running with real IDs [0][0]. 257s [p11_child[2347]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 257s [p11_child[2347]] [do_card] (0x4000): Module List: 257s [p11_child[2347]] [do_card] (0x4000): common name: [softhsm2]. 257s [p11_child[2347]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 257s [p11_child[2347]] [do_card] (0x4000): Description [SoftHSM slot ID 0x43fc8f44] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 257s [p11_child[2347]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 257s [p11_child[2347]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x43fc8f44][1140625220] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 257s [p11_child[2347]] [do_card] (0x4000): Login NOT required. 257s [p11_child[2347]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 257s [p11_child[2347]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 257s [p11_child[2347]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Sub Int Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 257s [p11_child[2347]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x43fc8f44;slot-manufacturer=SoftHSM%20project;slot-id=1140625220;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=2b5547dc43fc8f44;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 257s [p11_child[2347]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 257s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-00o6YG/SSSD-child-11619.output 257s + echo '-----BEGIN CERTIFICATE-----' 257s + tail -n1 /tmp/sssd-softhsm2-00o6YG/SSSD-child-11619.output 257s + echo '-----END CERTIFICATE-----' 257s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-00o6YG/SSSD-child-11619.pem 257s Certificate: 257s Data: 257s Version: 3 (0x2) 257s Serial Number: 5 (0x5) 257s Signature Algorithm: sha256WithRSAEncryption 257s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 257s Validity 257s Not Before: Jul 4 00:03:15 2025 GMT 257s Not After : Jul 4 00:03:15 2026 GMT 257s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 257s Subject Public Key Info: 257s Public Key Algorithm: rsaEncryption 257s Public-Key: (1024 bit) 257s Modulus: 257s 00:d4:0c:95:d7:a3:e4:f3:c8:19:73:db:bf:fb:f9: 257s b6:a3:92:95:77:42:60:51:0e:73:d9:24:36:22:c6: 257s bd:87:9e:3f:83:23:c0:39:3a:3c:9c:21:ba:dd:d4: 257s 65:24:3a:9d:8f:88:d9:35:c3:41:47:0f:be:5f:39: 257s c1:7f:f0:f5:32:56:42:24:d7:85:6e:55:a6:01:5f: 257s 7b:c6:ce:15:5c:5d:e8:b8:05:96:9e:2c:52:e4:b8: 257s af:44:f3:0a:23:d4:e2:28:5b:09:dd:47:1c:c5:b4: 257s d6:34:b7:58:1d:58:9a:0e:1e:05:81:19:b4:51:0e: 257s 7a:5d:ab:4f:e2:d1:a3:a0:59 257s Exponent: 65537 (0x10001) 257s X509v3 extensions: 257s X509v3 Authority Key Identifier: 257s FD:9D:53:80:40:64:D4:EF:1D:5B:C4:4C:2D:E6:69:C8:70:9F:44:59 257s X509v3 Basic Constraints: 257s CA:FALSE 257s Netscape Cert Type: 257s SSL Client, S/MIME 257s Netscape Comment: 257s Test Organization Sub Intermediate CA trusted Certificate 257s X509v3 Subject Key Identifier: 257s E4:53:95:2C:D5:4C:87:C8:13:D7:92:83:65:4F:70:86:8F:0F:AE:29 257s X509v3 Key Usage: critical 257s Digital Signature, Non Repudiation, Key Encipherment 257s X509v3 Extended Key Usage: 257s TLS Web Client Authentication, E-mail Protection 257s X509v3 Subject Alternative Name: 257s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 257s Signature Algorithm: sha256WithRSAEncryption 257s Signature Value: 257s b1:cb:e4:7d:df:14:c1:37:80:c8:94:18:01:40:7b:2c:a1:31: 257s 18:8e:a0:df:c8:12:9f:17:bb:25:97:f9:c5:35:c0:a9:ee:b1: 257s 2f:a4:a3:d4:b3:b7:9b:30:f4:3a:79:49:84:a0:80:84:af:47: 257s a4:c2:75:77:6d:e5:22:43:38:39:af:44:05:c1:be:d6:91:a8: 257s 83:7e:56:9a:47:15:47:ba:d7:fd:36:0d:52:d0:3b:69:fc:4b: 257s 7b:c2:ff:55:5a:42:52:25:06:50:8c:ba:cb:9f:c3:12:a5:0f: 257s 2b:e4:eb:b1:1b:a0:23:23:31:f6:56:ac:b2:6b:93:73:ed:fd: 257s e7:98 257s + local found_md5 expected_md5 257s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-trusted-certificate-0001.pem 257s + expected_md5=Modulus=D40C95D7A3E4F3C81973DBBFFBF9B6A39295774260510E73D9243622C6BD879E3F8323C0393A3C9C21BADDD465243A9D8F88D935C341470FBE5F39C17FF0F532564224D7856E55A6015F7BC6CE155C5DE8B805969E2C52E4B8AF44F30A23D4E2285B09DD471CC5B4D634B7581D589A0E1E058119B4510E7A5DAB4FE2D1A3A059 257s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-00o6YG/SSSD-child-11619.pem 257s + found_md5=Modulus=D40C95D7A3E4F3C81973DBBFFBF9B6A39295774260510E73D9243622C6BD879E3F8323C0393A3C9C21BADDD465243A9D8F88D935C341470FBE5F39C17FF0F532564224D7856E55A6015F7BC6CE155C5DE8B805969E2C52E4B8AF44F30A23D4E2285B09DD471CC5B4D634B7581D589A0E1E058119B4510E7A5DAB4FE2D1A3A059 257s + '[' Modulus=D40C95D7A3E4F3C81973DBBFFBF9B6A39295774260510E73D9243622C6BD879E3F8323C0393A3C9C21BADDD465243A9D8F88D935C341470FBE5F39C17FF0F532564224D7856E55A6015F7BC6CE155C5DE8B805969E2C52E4B8AF44F30A23D4E2285B09DD471CC5B4D634B7581D589A0E1E058119B4510E7A5DAB4FE2D1A3A059 '!=' Modulus=D40C95D7A3E4F3C81973DBBFFBF9B6A39295774260510E73D9243622C6BD879E3F8323C0393A3C9C21BADDD465243A9D8F88D935C341470FBE5F39C17FF0F532564224D7856E55A6015F7BC6CE155C5DE8B805969E2C52E4B8AF44F30A23D4E2285B09DD471CC5B4D634B7581D589A0E1E058119B4510E7A5DAB4FE2D1A3A059 ']' 257s + output_file=/tmp/sssd-softhsm2-00o6YG/SSSD-child-11619-auth.output 257s ++ basename /tmp/sssd-softhsm2-00o6YG/SSSD-child-11619-auth.output .output 257s + output_cert_file=/tmp/sssd-softhsm2-00o6YG/SSSD-child-11619-auth.pem 257s + echo -n 053350 257s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-00o6YG/test-full-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Sub Int Token' --module_name /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so 257s [p11_child[2355]] [main] (0x0400): p11_child started. 257s [p11_child[2355]] [main] (0x2000): Running in [auth] mode. 257s [p11_child[2355]] [main] (0x2000): Running with effective IDs: [0][0]. 257s [p11_child[2355]] [main] (0x2000): Running with real IDs [0][0]. 257s [p11_child[2355]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 257s [p11_child[2355]] [do_card] (0x4000): Module List: 257s [p11_child[2355]] [do_card] (0x4000): common name: [softhsm2]. 257s [p11_child[2355]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 257s [p11_child[2355]] [do_card] (0x4000): Description [SoftHSM slot ID 0x43fc8f44] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 257s [p11_child[2355]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 257s [p11_child[2355]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x43fc8f44][1140625220] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 257s [p11_child[2355]] [do_card] (0x4000): Login required. 257s [p11_child[2355]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 257s [p11_child[2355]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 257s [p11_child[2355]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so Test Organization Sub Int Token Test Organization Sub Int Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 257s [p11_child[2355]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x43fc8f44;slot-manufacturer=SoftHSM%20project;slot-id=1140625220;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=2b5547dc43fc8f44;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 257s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 257s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 257s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 257s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 257s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 257s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 257s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 257s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 257s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 257s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 257s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 257s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 257s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 257s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 257s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 257s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 257s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 257s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 257s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 257s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 257s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 257s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 257s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 257s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 257s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 257s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 257s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 257s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 257s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 257s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 257s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 257s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 257s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 257s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 257s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 257s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 257s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 257s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 257s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 257s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 257s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 257s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 257s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 257s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 257s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 257s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 257s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 257s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 257s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 257s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 257s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 257s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 257s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 257s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 257s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 257s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 257s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 257s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 257s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 257s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 257s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 257s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 257s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 257s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 257s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 257s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 257s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 257s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 257s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 257s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 257s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 257s [p11_child[2355]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 257s [p11_child[2355]] [do_card] (0x4000): Certificate verified and validated. 257s [p11_child[2355]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 257s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-00o6YG/SSSD-child-11619-auth.output 257s + echo '-----BEGIN CERTIFICATE-----' 257s + tail -n1 /tmp/sssd-softhsm2-00o6YG/SSSD-child-11619-auth.output 257s + echo '-----END CERTIFICATE-----' 257s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-00o6YG/SSSD-child-11619-auth.pem 257s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-00o6YG/SSSD-child-11619-auth.pem 257s Certificate: 257s Data: 257s Version: 3 (0x2) 257s Serial Number: 5 (0x5) 257s Signature Algorithm: sha256WithRSAEncryption 257s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 257s Validity 257s Not Before: Jul 4 00:03:15 2025 GMT 257s Not After : Jul 4 00:03:15 2026 GMT 257s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 257s Subject Public Key Info: 257s Public Key Algorithm: rsaEncryption 257s Public-Key: (1024 bit) 257s Modulus: 257s 00:d4:0c:95:d7:a3:e4:f3:c8:19:73:db:bf:fb:f9: 257s b6:a3:92:95:77:42:60:51:0e:73:d9:24:36:22:c6: 257s bd:87:9e:3f:83:23:c0:39:3a:3c:9c:21:ba:dd:d4: 257s 65:24:3a:9d:8f:88:d9:35:c3:41:47:0f:be:5f:39: 257s c1:7f:f0:f5:32:56:42:24:d7:85:6e:55:a6:01:5f: 257s 7b:c6:ce:15:5c:5d:e8:b8:05:96:9e:2c:52:e4:b8: 257s af:44:f3:0a:23:d4:e2:28:5b:09:dd:47:1c:c5:b4: 257s d6:34:b7:58:1d:58:9a:0e:1e:05:81:19:b4:51:0e: 257s 7a:5d:ab:4f:e2:d1:a3:a0:59 257s Exponent: 65537 (0x10001) 257s X509v3 extensions: 257s X509v3 Authority Key Identifier: 257s FD:9D:53:80:40:64:D4:EF:1D:5B:C4:4C:2D:E6:69:C8:70:9F:44:59 257s X509v3 Basic Constraints: 257s CA:FALSE 257s Netscape Cert Type: 257s SSL Client, S/MIME 257s Netscape Comment: 257s Test Organization Sub Intermediate CA trusted Certificate 257s X509v3 Subject Key Identifier: 257s E4:53:95:2C:D5:4C:87:C8:13:D7:92:83:65:4F:70:86:8F:0F:AE:29 257s X509v3 Key Usage: critical 257s Digital Signature, Non Repudiation, Key Encipherment 257s X509v3 Extended Key Usage: 257s TLS Web Client Authentication, E-mail Protection 257s X509v3 Subject Alternative Name: 257s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 257s Signature Algorithm: sha256WithRSAEncryption 257s Signature Value: 257s b1:cb:e4:7d:df:14:c1:37:80:c8:94:18:01:40:7b:2c:a1:31: 257s 18:8e:a0:df:c8:12:9f:17:bb:25:97:f9:c5:35:c0:a9:ee:b1: 257s 2f:a4:a3:d4:b3:b7:9b:30:f4:3a:79:49:84:a0:80:84:af:47: 257s a4:c2:75:77:6d:e5:22:43:38:39:af:44:05:c1:be:d6:91:a8: 257s 83:7e:56:9a:47:15:47:ba:d7:fd:36:0d:52:d0:3b:69:fc:4b: 257s 7b:c2:ff:55:5a:42:52:25:06:50:8c:ba:cb:9f:c3:12:a5:0f: 257s 2b:e4:eb:b1:1b:a0:23:23:31:f6:56:ac:b2:6b:93:73:ed:fd: 257s e7:98 257s + found_md5=Modulus=D40C95D7A3E4F3C81973DBBFFBF9B6A39295774260510E73D9243622C6BD879E3F8323C0393A3C9C21BADDD465243A9D8F88D935C341470FBE5F39C17FF0F532564224D7856E55A6015F7BC6CE155C5DE8B805969E2C52E4B8AF44F30A23D4E2285B09DD471CC5B4D634B7581D589A0E1E058119B4510E7A5DAB4FE2D1A3A059 257s + '[' Modulus=D40C95D7A3E4F3C81973DBBFFBF9B6A39295774260510E73D9243622C6BD879E3F8323C0393A3C9C21BADDD465243A9D8F88D935C341470FBE5F39C17FF0F532564224D7856E55A6015F7BC6CE155C5DE8B805969E2C52E4B8AF44F30A23D4E2285B09DD471CC5B4D634B7581D589A0E1E058119B4510E7A5DAB4FE2D1A3A059 '!=' Modulus=D40C95D7A3E4F3C81973DBBFFBF9B6A39295774260510E73D9243622C6BD879E3F8323C0393A3C9C21BADDD465243A9D8F88D935C341470FBE5F39C17FF0F532564224D7856E55A6015F7BC6CE155C5DE8B805969E2C52E4B8AF44F30A23D4E2285B09DD471CC5B4D634B7581D589A0E1E058119B4510E7A5DAB4FE2D1A3A059 ']' 257s + invalid_certificate /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-1604 /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA.pem 257s + check_certificate /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-1604 /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA.pem 257s + local certificate=/tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-trusted-certificate-0001.pem 257s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-1604 257s + local key_ring=/tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA.pem 257s + local verify_option= 257s + prepare_softhsm2_card /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-1604 257s + local certificate=/tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-trusted-certificate-0001.pem 257s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-1604 257s + local key_cn 257s + local key_name 257s + local tokens_dir 257s + local output_cert_file 257s + token_name= 257s ++ basename /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 257s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 257s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-trusted-certificate-0001.pem 257s ++ sed -n 's/ *commonName *= //p' 257s Test Organization Sub Int Token 257s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 257s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 257s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-00o6YG/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 257s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-00o6YG/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 257s ++ basename /tmp/sssd-softhsm2-00o6YG/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 257s + tokens_dir=/tmp/sssd-softhsm2-00o6YG/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 257s + token_name='Test Organization Sub Int Token' 257s + '[' '!' -e /tmp/sssd-softhsm2-00o6YG/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 257s + '[' '!' -d /tmp/sssd-softhsm2-00o6YG/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 257s + echo 'Test Organization Sub Int Token' 257s + '[' -n '' ']' 257s + local output_base_name=SSSD-child-23117 257s + local output_file=/tmp/sssd-softhsm2-00o6YG/SSSD-child-23117.output 257s + output_cert_file=/tmp/sssd-softhsm2-00o6YG/SSSD-child-23117.pem 257s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA.pem 257s [p11_child[2365]] [main] (0x0400): p11_child started. 257s [p11_child[2365]] [main] (0x2000): Running in [pre-auth] mode. 257s [p11_child[2365]] [main] (0x2000): Running with effective IDs: [0][0]. 257s [p11_child[2365]] [main] (0x2000): Running with real IDs [0][0]. 257s [p11_child[2365]] [do_card] (0x4000): Module List: 257s [p11_child[2365]] [do_card] (0x4000): common name: [softhsm2]. 257s [p11_child[2365]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 257s [p11_child[2365]] [do_card] (0x4000): Description [SoftHSM slot ID 0x43fc8f44] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 257s [p11_child[2365]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 257s [p11_child[2365]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x43fc8f44][1140625220] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 257s [p11_child[2365]] [do_card] (0x4000): Login NOT required. 257s [p11_child[2365]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 257s [p11_child[2365]] [do_verification] (0x0040): X509_verify_cert failed [0]. 257s [p11_child[2365]] [do_verification] (0x0040): X509_verify_cert failed [2][unable to get issuer certificate]. 257s [p11_child[2365]] [read_certs] (0x0040): Certificate [Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] not valid, skipping. 257s [p11_child[2365]] [do_card] (0x4000): No certificate found. 257s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-00o6YG/SSSD-child-23117.output 257s + return 2 257s + invalid_certificate /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-1604 /tmp/sssd-softhsm2-00o6YG/test-root-intermediate-chain-CA.pem partial_chain 257s + check_certificate /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-1604 /tmp/sssd-softhsm2-00o6YG/test-root-intermediate-chain-CA.pem partial_chain 257s + local certificate=/tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-trusted-certificate-0001.pem 257s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-1604 257s + local key_ring=/tmp/sssd-softhsm2-00o6YG/test-root-intermediate-chain-CA.pem 257s + local verify_option=partial_chain 257s + prepare_softhsm2_card /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-1604 257s + local certificate=/tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-trusted-certificate-0001.pem 257s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-1604 257s + local key_cn 257s + local key_name 257s + local tokens_dir 257s + local output_cert_file 257s + token_name= 257s ++ basename /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 257s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 257s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-trusted-certificate-0001.pem 257s ++ sed -n 's/ *commonName *= //p' 257s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 257s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 257s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-00o6YG/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 257s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-00o6YG/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 257s ++ basename /tmp/sssd-softhsm2-00o6YG/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 257s + tokens_dir=/tmp/sssd-softhsm2-00o6YG/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 257s + token_name='Test Organization Sub Int Token' 257s + '[' '!' -e /tmp/sssd-softhsm2-00o6YG/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 257s + '[' '!' -d /tmp/sssd-softhsm2-00o6YG/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 257s + echo 'Test Organization Sub Int Token' 257s + '[' -n partial_chain ']' 257s + local verify_arg=--verify=partial_chain 257s + local output_base_name=SSSD-child-6221 257s + local output_file=/tmp/sssd-softhsm2-00o6YG/SSSD-child-6221.output 257s + output_cert_file=/tmp/sssd-softhsm2-00o6YG/SSSD-child-6221.pem 257s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-00o6YG/test-root-intermediate-chain-CA.pem 257s Test Organization Sub Int Token 257s [p11_child[2372]] [main] (0x0400): p11_child started. 257s [p11_child[2372]] [main] (0x2000): Running in [pre-auth] mode. 257s [p11_child[2372]] [main] (0x2000): Running with effective IDs: [0][0]. 257s [p11_child[2372]] [main] (0x2000): Running with real IDs [0][0]. 257s [p11_child[2372]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 257s [p11_child[2372]] [do_card] (0x4000): Module List: 257s [p11_child[2372]] [do_card] (0x4000): common name: [softhsm2]. 257s [p11_child[2372]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 257s [p11_child[2372]] [do_card] (0x4000): Description [SoftHSM slot ID 0x43fc8f44] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 257s [p11_child[2372]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 257s [p11_child[2372]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x43fc8f44][1140625220] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 257s [p11_child[2372]] [do_card] (0x4000): Login NOT required. 257s [p11_child[2372]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 257s [p11_child[2372]] [do_verification] (0x0040): X509_verify_cert failed [0]. 257s [p11_child[2372]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 257s [p11_child[2372]] [read_certs] (0x0040): Certificate [Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] not valid, skipping. 257s [p11_child[2372]] [do_card] (0x4000): No certificate found. 257s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-00o6YG/SSSD-child-6221.output 257s + return 2 257s + valid_certificate /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-1604 /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA.pem partial_chain 257s + check_certificate /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-1604 /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA.pem partial_chain 257s + local certificate=/tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-trusted-certificate-0001.pem 257s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-1604 257s + local key_ring=/tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA.pem 257s + local verify_option=partial_chain 257s + prepare_softhsm2_card /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-1604 257s + local certificate=/tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-trusted-certificate-0001.pem 257s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-1604 257s + local key_cn 257s + local key_name 257s + local tokens_dir 257s + local output_cert_file 257s + token_name= 257s ++ basename /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 257s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 257s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-trusted-certificate-0001.pem 257s ++ sed -n 's/ *commonName *= //p' 257s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 257s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 257s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-00o6YG/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 257s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-00o6YG/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 257s ++ basename /tmp/sssd-softhsm2-00o6YG/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 257s + tokens_dir=/tmp/sssd-softhsm2-00o6YG/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 257s + token_name='Test Organization Sub Int Token' 257s + '[' '!' -e /tmp/sssd-softhsm2-00o6YG/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 257s + '[' '!' -d /tmp/sssd-softhsm2-00o6YG/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 257s + echo 'Test Organization Sub Int Token' 257s + '[' -n partial_chain ']' 257s + local verify_arg=--verify=partial_chain 257s + local output_base_name=SSSD-child-30450 257s + local output_file=/tmp/sssd-softhsm2-00o6YG/SSSD-child-30450.output 257s + output_cert_file=/tmp/sssd-softhsm2-00o6YG/SSSD-child-30450.pem 257s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA.pem 257s Test Organization Sub Int Token 257s [p11_child[2379]] [main] (0x0400): p11_child started. 257s [p11_child[2379]] [main] (0x2000): Running in [pre-auth] mode. 257s [p11_child[2379]] [main] (0x2000): Running with effective IDs: [0][0]. 257s [p11_child[2379]] [main] (0x2000): Running with real IDs [0][0]. 257s [p11_child[2379]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 257s [p11_child[2379]] [do_card] (0x4000): Module List: 257s [p11_child[2379]] [do_card] (0x4000): common name: [softhsm2]. 257s [p11_child[2379]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 257s [p11_child[2379]] [do_card] (0x4000): Description [SoftHSM slot ID 0x43fc8f44] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 257s [p11_child[2379]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 257s [p11_child[2379]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x43fc8f44][1140625220] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 257s [p11_child[2379]] [do_card] (0x4000): Login NOT required. 257s [p11_child[2379]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 257s [p11_child[2379]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 257s [p11_child[2379]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Sub Int Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 257s [p11_child[2379]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x43fc8f44;slot-manufacturer=SoftHSM%20project;slot-id=1140625220;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=2b5547dc43fc8f44;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 257s [p11_child[2379]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 257s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-00o6YG/SSSD-child-30450.output 257s + echo '-----BEGIN CERTIFICATE-----' 257s + tail -n1 /tmp/sssd-softhsm2-00o6YG/SSSD-child-30450.output 257s + echo '-----END CERTIFICATE-----' 257s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-00o6YG/SSSD-child-30450.pem 257s + local found_md5 expected_md5 257s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-trusted-certificate-0001.pem 257s Certificate: 257s Data: 257s Version: 3 (0x2) 257s Serial Number: 5 (0x5) 257s Signature Algorithm: sha256WithRSAEncryption 257s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 257s Validity 257s Not Before: Jul 4 00:03:15 2025 GMT 257s Not After : Jul 4 00:03:15 2026 GMT 257s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 257s Subject Public Key Info: 257s Public Key Algorithm: rsaEncryption 257s Public-Key: (1024 bit) 257s Modulus: 257s 00:d4:0c:95:d7:a3:e4:f3:c8:19:73:db:bf:fb:f9: 257s b6:a3:92:95:77:42:60:51:0e:73:d9:24:36:22:c6: 257s bd:87:9e:3f:83:23:c0:39:3a:3c:9c:21:ba:dd:d4: 257s 65:24:3a:9d:8f:88:d9:35:c3:41:47:0f:be:5f:39: 257s c1:7f:f0:f5:32:56:42:24:d7:85:6e:55:a6:01:5f: 257s 7b:c6:ce:15:5c:5d:e8:b8:05:96:9e:2c:52:e4:b8: 257s af:44:f3:0a:23:d4:e2:28:5b:09:dd:47:1c:c5:b4: 257s d6:34:b7:58:1d:58:9a:0e:1e:05:81:19:b4:51:0e: 257s 7a:5d:ab:4f:e2:d1:a3:a0:59 257s Exponent: 65537 (0x10001) 257s X509v3 extensions: 257s X509v3 Authority Key Identifier: 257s FD:9D:53:80:40:64:D4:EF:1D:5B:C4:4C:2D:E6:69:C8:70:9F:44:59 257s X509v3 Basic Constraints: 257s CA:FALSE 257s Netscape Cert Type: 257s SSL Client, S/MIME 257s Netscape Comment: 257s Test Organization Sub Intermediate CA trusted Certificate 257s X509v3 Subject Key Identifier: 257s E4:53:95:2C:D5:4C:87:C8:13:D7:92:83:65:4F:70:86:8F:0F:AE:29 257s X509v3 Key Usage: critical 257s Digital Signature, Non Repudiation, Key Encipherment 257s X509v3 Extended Key Usage: 257s TLS Web Client Authentication, E-mail Protection 257s X509v3 Subject Alternative Name: 257s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 257s Signature Algorithm: sha256WithRSAEncryption 257s Signature Value: 257s b1:cb:e4:7d:df:14:c1:37:80:c8:94:18:01:40:7b:2c:a1:31: 257s 18:8e:a0:df:c8:12:9f:17:bb:25:97:f9:c5:35:c0:a9:ee:b1: 257s 2f:a4:a3:d4:b3:b7:9b:30:f4:3a:79:49:84:a0:80:84:af:47: 257s a4:c2:75:77:6d:e5:22:43:38:39:af:44:05:c1:be:d6:91:a8: 257s 83:7e:56:9a:47:15:47:ba:d7:fd:36:0d:52:d0:3b:69:fc:4b: 257s 7b:c2:ff:55:5a:42:52:25:06:50:8c:ba:cb:9f:c3:12:a5:0f: 257s 2b:e4:eb:b1:1b:a0:23:23:31:f6:56:ac:b2:6b:93:73:ed:fd: 257s e7:98 257s + expected_md5=Modulus=D40C95D7A3E4F3C81973DBBFFBF9B6A39295774260510E73D9243622C6BD879E3F8323C0393A3C9C21BADDD465243A9D8F88D935C341470FBE5F39C17FF0F532564224D7856E55A6015F7BC6CE155C5DE8B805969E2C52E4B8AF44F30A23D4E2285B09DD471CC5B4D634B7581D589A0E1E058119B4510E7A5DAB4FE2D1A3A059 257s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-00o6YG/SSSD-child-30450.pem 257s + found_md5=Modulus=D40C95D7A3E4F3C81973DBBFFBF9B6A39295774260510E73D9243622C6BD879E3F8323C0393A3C9C21BADDD465243A9D8F88D935C341470FBE5F39C17FF0F532564224D7856E55A6015F7BC6CE155C5DE8B805969E2C52E4B8AF44F30A23D4E2285B09DD471CC5B4D634B7581D589A0E1E058119B4510E7A5DAB4FE2D1A3A059 257s + '[' Modulus=D40C95D7A3E4F3C81973DBBFFBF9B6A39295774260510E73D9243622C6BD879E3F8323C0393A3C9C21BADDD465243A9D8F88D935C341470FBE5F39C17FF0F532564224D7856E55A6015F7BC6CE155C5DE8B805969E2C52E4B8AF44F30A23D4E2285B09DD471CC5B4D634B7581D589A0E1E058119B4510E7A5DAB4FE2D1A3A059 '!=' Modulus=D40C95D7A3E4F3C81973DBBFFBF9B6A39295774260510E73D9243622C6BD879E3F8323C0393A3C9C21BADDD465243A9D8F88D935C341470FBE5F39C17FF0F532564224D7856E55A6015F7BC6CE155C5DE8B805969E2C52E4B8AF44F30A23D4E2285B09DD471CC5B4D634B7581D589A0E1E058119B4510E7A5DAB4FE2D1A3A059 ']' 257s + output_file=/tmp/sssd-softhsm2-00o6YG/SSSD-child-30450-auth.output 257s ++ basename /tmp/sssd-softhsm2-00o6YG/SSSD-child-30450-auth.output .output 257s + output_cert_file=/tmp/sssd-softhsm2-00o6YG/SSSD-child-30450-auth.pem 257s + echo -n 053350 257s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Sub Int Token' --module_name /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so 257s [p11_child[2387]] [main] (0x0400): p11_child started. 257s [p11_child[2387]] [main] (0x2000): Running in [auth] mode. 257s [p11_child[2387]] [main] (0x2000): Running with effective IDs: [0][0]. 257s [p11_child[2387]] [main] (0x2000): Running with real IDs [0][0]. 257s [p11_child[2387]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 257s [p11_child[2387]] [do_card] (0x4000): Module List: 257s [p11_child[2387]] [do_card] (0x4000): common name: [softhsm2]. 257s [p11_child[2387]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 257s [p11_child[2387]] [do_card] (0x4000): Description [SoftHSM slot ID 0x43fc8f44] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 257s [p11_child[2387]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 257s [p11_child[2387]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x43fc8f44][1140625220] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 257s [p11_child[2387]] [do_card] (0x4000): Login required. 257s [p11_child[2387]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 257s [p11_child[2387]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 257s [p11_child[2387]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so Test Organization Sub Int Token Test Organization Sub Int Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 257s [p11_child[2387]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x43fc8f44;slot-manufacturer=SoftHSM%20project;slot-id=1140625220;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=2b5547dc43fc8f44;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 257s [p11_child[2387]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 257s [p11_child[2387]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 257s [p11_child[2387]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 257s [p11_child[2387]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 257s [p11_child[2387]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 257s [p11_child[2387]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 257s [p11_child[2387]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 257s [p11_child[2387]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 257s [p11_child[2387]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 257s [p11_child[2387]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 257s [p11_child[2387]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 257s [p11_child[2387]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 257s [p11_child[2387]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 257s [p11_child[2387]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 257s [p11_child[2387]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 257s [p11_child[2387]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 257s [p11_child[2387]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 257s [p11_child[2387]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 257s [p11_child[2387]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 257s [p11_child[2387]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 257s [p11_child[2387]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 257s [p11_child[2387]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 257s [p11_child[2387]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 257s [p11_child[2387]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 257s [p11_child[2387]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 257s [p11_child[2387]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 257s [p11_child[2387]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 257s [p11_child[2387]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 257s [p11_child[2387]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 257s [p11_child[2387]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 257s [p11_child[2387]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 257s [p11_child[2387]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 257s [p11_child[2387]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 257s [p11_child[2387]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 257s [p11_child[2387]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 257s [p11_child[2387]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 257s [p11_child[2387]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 257s [p11_child[2387]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 257s [p11_child[2387]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 257s [p11_child[2387]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 257s [p11_child[2387]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 257s [p11_child[2387]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 257s [p11_child[2387]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 257s [p11_child[2387]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 257s [p11_child[2387]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 257s [p11_child[2387]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 257s [p11_child[2387]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 257s [p11_child[2387]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 257s [p11_child[2387]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 257s [p11_child[2387]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 257s [p11_child[2387]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 257s [p11_child[2387]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 257s [p11_child[2387]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 257s [p11_child[2387]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 257s [p11_child[2387]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 257s [p11_child[2387]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 257s [p11_child[2387]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 257s [p11_child[2387]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 257s [p11_child[2387]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 257s [p11_child[2387]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 257s [p11_child[2387]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 257s [p11_child[2387]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 257s [p11_child[2387]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 257s [p11_child[2387]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 257s [p11_child[2387]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 257s [p11_child[2387]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 257s [p11_child[2387]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 257s [p11_child[2387]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 257s [p11_child[2387]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 257s [p11_child[2387]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 257s [p11_child[2387]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 257s [p11_child[2387]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 257s [p11_child[2387]] [do_card] (0x4000): Certificate verified and validated. 257s [p11_child[2387]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 257s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-00o6YG/SSSD-child-30450-auth.output 257s + echo '-----BEGIN CERTIFICATE-----' 257s + tail -n1 /tmp/sssd-softhsm2-00o6YG/SSSD-child-30450-auth.output 257s + echo '-----END CERTIFICATE-----' 257s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-00o6YG/SSSD-child-30450-auth.pem 257s Certificate: 257s Data: 257s Version: 3 (0x2) 257s Serial Number: 5 (0x5) 257s Signature Algorithm: sha256WithRSAEncryption 257s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 257s Validity 257s Not Before: Jul 4 00:03:15 2025 GMT 257s Not After : Jul 4 00:03:15 2026 GMT 257s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 257s Subject Public Key Info: 257s Public Key Algorithm: rsaEncryption 257s Public-Key: (1024 bit) 257s Modulus: 257s 00:d4:0c:95:d7:a3:e4:f3:c8:19:73:db:bf:fb:f9: 257s b6:a3:92:95:77:42:60:51:0e:73:d9:24:36:22:c6: 257s bd:87:9e:3f:83:23:c0:39:3a:3c:9c:21:ba:dd:d4: 257s 65:24:3a:9d:8f:88:d9:35:c3:41:47:0f:be:5f:39: 257s c1:7f:f0:f5:32:56:42:24:d7:85:6e:55:a6:01:5f: 257s 7b:c6:ce:15:5c:5d:e8:b8:05:96:9e:2c:52:e4:b8: 257s af:44:f3:0a:23:d4:e2:28:5b:09:dd:47:1c:c5:b4: 257s d6:34:b7:58:1d:58:9a:0e:1e:05:81:19:b4:51:0e: 257s 7a:5d:ab:4f:e2:d1:a3:a0:59 257s Exponent: 65537 (0x10001) 257s X509v3 extensions: 257s X509v3 Authority Key Identifier: 257s FD:9D:53:80:40:64:D4:EF:1D:5B:C4:4C:2D:E6:69:C8:70:9F:44:59 257s X509v3 Basic Constraints: 257s CA:FALSE 257s Netscape Cert Type: 257s SSL Client, S/MIME 257s Netscape Comment: 257s Test Organization Sub Intermediate CA trusted Certificate 257s X509v3 Subject Key Identifier: 257s E4:53:95:2C:D5:4C:87:C8:13:D7:92:83:65:4F:70:86:8F:0F:AE:29 257s X509v3 Key Usage: critical 257s Digital Signature, Non Repudiation, Key Encipherment 257s X509v3 Extended Key Usage: 257s TLS Web Client Authentication, E-mail Protection 257s X509v3 Subject Alternative Name: 257s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 257s Signature Algorithm: sha256WithRSAEncryption 257s Signature Value: 257s b1:cb:e4:7d:df:14:c1:37:80:c8:94:18:01:40:7b:2c:a1:31: 257s 18:8e:a0:df:c8:12:9f:17:bb:25:97:f9:c5:35:c0:a9:ee:b1: 257s 2f:a4:a3:d4:b3:b7:9b:30:f4:3a:79:49:84:a0:80:84:af:47: 257s a4:c2:75:77:6d:e5:22:43:38:39:af:44:05:c1:be:d6:91:a8: 257s 83:7e:56:9a:47:15:47:ba:d7:fd:36:0d:52:d0:3b:69:fc:4b: 257s 7b:c2:ff:55:5a:42:52:25:06:50:8c:ba:cb:9f:c3:12:a5:0f: 257s 2b:e4:eb:b1:1b:a0:23:23:31:f6:56:ac:b2:6b:93:73:ed:fd: 257s e7:98 257s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-00o6YG/SSSD-child-30450-auth.pem 257s + found_md5=Modulus=D40C95D7A3E4F3C81973DBBFFBF9B6A39295774260510E73D9243622C6BD879E3F8323C0393A3C9C21BADDD465243A9D8F88D935C341470FBE5F39C17FF0F532564224D7856E55A6015F7BC6CE155C5DE8B805969E2C52E4B8AF44F30A23D4E2285B09DD471CC5B4D634B7581D589A0E1E058119B4510E7A5DAB4FE2D1A3A059 257s + '[' Modulus=D40C95D7A3E4F3C81973DBBFFBF9B6A39295774260510E73D9243622C6BD879E3F8323C0393A3C9C21BADDD465243A9D8F88D935C341470FBE5F39C17FF0F532564224D7856E55A6015F7BC6CE155C5DE8B805969E2C52E4B8AF44F30A23D4E2285B09DD471CC5B4D634B7581D589A0E1E058119B4510E7A5DAB4FE2D1A3A059 '!=' Modulus=D40C95D7A3E4F3C81973DBBFFBF9B6A39295774260510E73D9243622C6BD879E3F8323C0393A3C9C21BADDD465243A9D8F88D935C341470FBE5F39C17FF0F532564224D7856E55A6015F7BC6CE155C5DE8B805969E2C52E4B8AF44F30A23D4E2285B09DD471CC5B4D634B7581D589A0E1E058119B4510E7A5DAB4FE2D1A3A059 ']' 257s + valid_certificate /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-1604 /tmp/sssd-softhsm2-00o6YG/test-intermediate-sub-chain-CA.pem partial_chain 257s + check_certificate /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-1604 /tmp/sssd-softhsm2-00o6YG/test-intermediate-sub-chain-CA.pem partial_chain 257s + local certificate=/tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-trusted-certificate-0001.pem 257s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-1604 257s + local key_ring=/tmp/sssd-softhsm2-00o6YG/test-intermediate-sub-chain-CA.pem 257s + local verify_option=partial_chain 257s + prepare_softhsm2_card /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-1604 257s + local certificate=/tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-trusted-certificate-0001.pem 257s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-1604 257s + local key_cn 257s + local key_name 257s + local tokens_dir 257s + local output_cert_file 257s + token_name= 257s ++ basename /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 257s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 257s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-trusted-certificate-0001.pem 257s ++ sed -n 's/ *commonName *= //p' 257s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 257s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 257s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-00o6YG/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 257s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-00o6YG/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 257s ++ basename /tmp/sssd-softhsm2-00o6YG/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 257s + tokens_dir=/tmp/sssd-softhsm2-00o6YG/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 257s + token_name='Test Organization Sub Int Token' 257s + '[' '!' -e /tmp/sssd-softhsm2-00o6YG/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 257s + '[' '!' -d /tmp/sssd-softhsm2-00o6YG/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 257s + echo 'Test Organization Sub Int Token' 257s + '[' -n partial_chain ']' 257s + local verify_arg=--verify=partial_chain 257s + local output_base_name=SSSD-child-9600 257s + local output_file=/tmp/sssd-softhsm2-00o6YG/SSSD-child-9600.output 257s + output_cert_file=/tmp/sssd-softhsm2-00o6YG/SSSD-child-9600.pem 257s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-00o6YG/test-intermediate-sub-chain-CA.pem 257s Test Organization Sub Int Token 257s [p11_child[2397]] [main] (0x0400): p11_child started. 257s [p11_child[2397]] [main] (0x2000): Running in [pre-auth] mode. 257s [p11_child[2397]] [main] (0x2000): Running with effective IDs: [0][0]. 257s [p11_child[2397]] [main] (0x2000): Running with real IDs [0][0]. 257s [p11_child[2397]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 257s [p11_child[2397]] [do_card] (0x4000): Module List: 257s [p11_child[2397]] [do_card] (0x4000): common name: [softhsm2]. 257s [p11_child[2397]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 257s [p11_child[2397]] [do_card] (0x4000): Description [SoftHSM slot ID 0x43fc8f44] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 257s [p11_child[2397]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 257s [p11_child[2397]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x43fc8f44][1140625220] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 257s [p11_child[2397]] [do_card] (0x4000): Login NOT required. 257s [p11_child[2397]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 257s [p11_child[2397]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 257s [p11_child[2397]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Sub Int Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 257s [p11_child[2397]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x43fc8f44;slot-manufacturer=SoftHSM%20project;slot-id=1140625220;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=2b5547dc43fc8f44;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 257s [p11_child[2397]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 257s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-00o6YG/SSSD-child-9600.output 257s + echo '-----BEGIN CERTIFICATE-----' 257s + tail -n1 /tmp/sssd-softhsm2-00o6YG/SSSD-child-9600.output 257s + echo '-----END CERTIFICATE-----' 257s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-00o6YG/SSSD-child-9600.pem 257s Certificate: 257s Data: 257s Version: 3 (0x2) 257s Serial Number: 5 (0x5) 257s Signature Algorithm: sha256WithRSAEncryption 257s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 257s Validity 257s Not Before: Jul 4 00:03:15 2025 GMT 257s Not After : Jul 4 00:03:15 2026 GMT 257s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 257s Subject Public Key Info: 257s Public Key Algorithm: rsaEncryption 257s Public-Key: (1024 bit) 257s Modulus: 257s 00:d4:0c:95:d7:a3:e4:f3:c8:19:73:db:bf:fb:f9: 257s b6:a3:92:95:77:42:60:51:0e:73:d9:24:36:22:c6: 257s bd:87:9e:3f:83:23:c0:39:3a:3c:9c:21:ba:dd:d4: 257s 65:24:3a:9d:8f:88:d9:35:c3:41:47:0f:be:5f:39: 257s c1:7f:f0:f5:32:56:42:24:d7:85:6e:55:a6:01:5f: 257s 7b:c6:ce:15:5c:5d:e8:b8:05:96:9e:2c:52:e4:b8: 257s af:44:f3:0a:23:d4:e2:28:5b:09:dd:47:1c:c5:b4: 257s d6:34:b7:58:1d:58:9a:0e:1e:05:81:19:b4:51:0e: 257s 7a:5d:ab:4f:e2:d1:a3:a0:59 257s Exponent: 65537 (0x10001) 257s X509v3 extensions: 257s X509v3 Authority Key Identifier: 257s FD:9D:53:80:40:64:D4:EF:1D:5B:C4:4C:2D:E6:69:C8:70:9F:44:59 257s X509v3 Basic Constraints: 257s CA:FALSE 257s Netscape Cert Type: 257s SSL Client, S/MIME 257s Netscape Comment: 257s Test Organization Sub Intermediate CA trusted Certificate 257s X509v3 Subject Key Identifier: 257s E4:53:95:2C:D5:4C:87:C8:13:D7:92:83:65:4F:70:86:8F:0F:AE:29 257s X509v3 Key Usage: critical 257s Digital Signature, Non Repudiation, Key Encipherment 257s X509v3 Extended Key Usage: 257s TLS Web Client Authentication, E-mail Protection 257s X509v3 Subject Alternative Name: 257s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 257s Signature Algorithm: sha256WithRSAEncryption 257s Signature Value: 257s b1:cb:e4:7d:df:14:c1:37:80:c8:94:18:01:40:7b:2c:a1:31: 257s 18:8e:a0:df:c8:12:9f:17:bb:25:97:f9:c5:35:c0:a9:ee:b1: 257s 2f:a4:a3:d4:b3:b7:9b:30:f4:3a:79:49:84:a0:80:84:af:47: 257s a4:c2:75:77:6d:e5:22:43:38:39:af:44:05:c1:be:d6:91:a8: 257s 83:7e:56:9a:47:15:47:ba:d7:fd:36:0d:52:d0:3b:69:fc:4b: 257s 7b:c2:ff:55:5a:42:52:25:06:50:8c:ba:cb:9f:c3:12:a5:0f: 257s 2b:e4:eb:b1:1b:a0:23:23:31:f6:56:ac:b2:6b:93:73:ed:fd: 257s e7:98 257s + local found_md5 expected_md5 257s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-00o6YG/test-sub-intermediate-CA-trusted-certificate-0001.pem 257s + expected_md5=Modulus=D40C95D7A3E4F3C81973DBBFFBF9B6A39295774260510E73D9243622C6BD879E3F8323C0393A3C9C21BADDD465243A9D8F88D935C341470FBE5F39C17FF0F532564224D7856E55A6015F7BC6CE155C5DE8B805969E2C52E4B8AF44F30A23D4E2285B09DD471CC5B4D634B7581D589A0E1E058119B4510E7A5DAB4FE2D1A3A059 257s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-00o6YG/SSSD-child-9600.pem 257s + found_md5=Modulus=D40C95D7A3E4F3C81973DBBFFBF9B6A39295774260510E73D9243622C6BD879E3F8323C0393A3C9C21BADDD465243A9D8F88D935C341470FBE5F39C17FF0F532564224D7856E55A6015F7BC6CE155C5DE8B805969E2C52E4B8AF44F30A23D4E2285B09DD471CC5B4D634B7581D589A0E1E058119B4510E7A5DAB4FE2D1A3A059 257s + '[' Modulus=D40C95D7A3E4F3C81973DBBFFBF9B6A39295774260510E73D9243622C6BD879E3F8323C0393A3C9C21BADDD465243A9D8F88D935C341470FBE5F39C17FF0F532564224D7856E55A6015F7BC6CE155C5DE8B805969E2C52E4B8AF44F30A23D4E2285B09DD471CC5B4D634B7581D589A0E1E058119B4510E7A5DAB4FE2D1A3A059 '!=' Modulus=D40C95D7A3E4F3C81973DBBFFBF9B6A39295774260510E73D9243622C6BD879E3F8323C0393A3C9C21BADDD465243A9D8F88D935C341470FBE5F39C17FF0F532564224D7856E55A6015F7BC6CE155C5DE8B805969E2C52E4B8AF44F30A23D4E2285B09DD471CC5B4D634B7581D589A0E1E058119B4510E7A5DAB4FE2D1A3A059 ']' 257s + output_file=/tmp/sssd-softhsm2-00o6YG/SSSD-child-9600-auth.output 257s ++ basename /tmp/sssd-softhsm2-00o6YG/SSSD-child-9600-auth.output .output 257s + output_cert_file=/tmp/sssd-softhsm2-00o6YG/SSSD-child-9600-auth.pem 257s + echo -n 053350 257s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-00o6YG/test-intermediate-sub-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Sub Int Token' --module_name /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so 257s [p11_child[2405]] [main] (0x0400): p11_child started. 257s [p11_child[2405]] [main] (0x2000): Running in [auth] mode. 257s [p11_child[2405]] [main] (0x2000): Running with effective IDs: [0][0]. 257s [p11_child[2405]] [main] (0x2000): Running with real IDs [0][0]. 257s [p11_child[2405]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 257s [p11_child[2405]] [do_card] (0x4000): Module List: 257s [p11_child[2405]] [do_card] (0x4000): common name: [softhsm2]. 257s [p11_child[2405]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 257s [p11_child[2405]] [do_card] (0x4000): Description [SoftHSM slot ID 0x43fc8f44] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 257s [p11_child[2405]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 257s [p11_child[2405]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x43fc8f44][1140625220] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 257s [p11_child[2405]] [do_card] (0x4000): Login required. 257s [p11_child[2405]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 257s [p11_child[2405]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 257s [p11_child[2405]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so Test Organization Sub Int Token Test Organization Sub Int Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 257s [p11_child[2405]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x43fc8f44;slot-manufacturer=SoftHSM%20project;slot-id=1140625220;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=2b5547dc43fc8f44;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 257s [p11_child[2405]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 257s [p11_child[2405]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 257s [p11_child[2405]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 257s [p11_child[2405]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 257s [p11_child[2405]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 257s [p11_child[2405]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 257s [p11_child[2405]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 257s [p11_child[2405]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 257s [p11_child[2405]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 257s [p11_child[2405]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 257s [p11_child[2405]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 257s [p11_child[2405]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 257s [p11_child[2405]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 257s [p11_child[2405]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 257s [p11_child[2405]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 257s [p11_child[2405]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 257s [p11_child[2405]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 257s [p11_child[2405]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 257s [p11_child[2405]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 257s [p11_child[2405]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 257s [p11_child[2405]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 257s [p11_child[2405]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 257s [p11_child[2405]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 257s [p11_child[2405]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 257s [p11_child[2405]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 257s [p11_child[2405]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 257s [p11_child[2405]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 257s [p11_child[2405]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 257s [p11_child[2405]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 257s [p11_child[2405]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 257s [p11_child[2405]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 257s [p11_child[2405]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 257s [p11_child[2405]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 257s [p11_child[2405]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 257s [p11_child[2405]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 257s [p11_child[2405]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 257s [p11_child[2405]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 257s [p11_child[2405]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 257s [p11_child[2405]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 257s [p11_child[2405]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 257s [p11_child[2405]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 257s [p11_child[2405]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 257s [p11_child[2405]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 257s [p11_child[2405]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 257s [p11_child[2405]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 257s [p11_child[2405]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 257s [p11_child[2405]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 257s [p11_child[2405]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 257s [p11_child[2405]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 257s [p11_child[2405]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 257s [p11_child[2405]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 257s [p11_child[2405]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 257s [p11_child[2405]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 257s [p11_child[2405]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 257s [p11_child[2405]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 257s [p11_child[2405]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 257s [p11_child[2405]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 257s [p11_child[2405]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 257s [p11_child[2405]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 257s [p11_child[2405]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 257s [p11_child[2405]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 257s [p11_child[2405]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 257s [p11_child[2405]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 257s [p11_child[2405]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 257s [p11_child[2405]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 257s [p11_child[2405]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 257s [p11_child[2405]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 257s [p11_child[2405]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 257s [p11_child[2405]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 257s [p11_child[2405]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 257s [p11_child[2405]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 257s [p11_child[2405]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 257s [p11_child[2405]] [do_card] (0x4000): Certificate verified and validated. 257s [p11_child[2405]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 257s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-00o6YG/SSSD-child-9600-auth.output 257s + echo '-----BEGIN CERTIFICATE-----' 257s + tail -n1 /tmp/sssd-softhsm2-00o6YG/SSSD-child-9600-auth.output 257s + echo '-----END CERTIFICATE-----' 257s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-00o6YG/SSSD-child-9600-auth.pem 257s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-00o6YG/SSSD-child-9600-auth.pem 257s Certificate: 257s Data: 257s Version: 3 (0x2) 257s Serial Number: 5 (0x5) 257s Signature Algorithm: sha256WithRSAEncryption 257s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 257s Validity 257s Not Before: Jul 4 00:03:15 2025 GMT 257s Not After : Jul 4 00:03:15 2026 GMT 257s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 257s Subject Public Key Info: 257s Public Key Algorithm: rsaEncryption 257s Public-Key: (1024 bit) 257s Modulus: 257s 00:d4:0c:95:d7:a3:e4:f3:c8:19:73:db:bf:fb:f9: 257s b6:a3:92:95:77:42:60:51:0e:73:d9:24:36:22:c6: 257s bd:87:9e:3f:83:23:c0:39:3a:3c:9c:21:ba:dd:d4: 257s 65:24:3a:9d:8f:88:d9:35:c3:41:47:0f:be:5f:39: 257s c1:7f:f0:f5:32:56:42:24:d7:85:6e:55:a6:01:5f: 257s 7b:c6:ce:15:5c:5d:e8:b8:05:96:9e:2c:52:e4:b8: 257s af:44:f3:0a:23:d4:e2:28:5b:09:dd:47:1c:c5:b4: 257s d6:34:b7:58:1d:58:9a:0e:1e:05:81:19:b4:51:0e: 257s 7a:5d:ab:4f:e2:d1:a3:a0:59 257s Exponent: 65537 (0x10001) 257s X509v3 extensions: 257s X509v3 Authority Key Identifier: 257s FD:9D:53:80:40:64:D4:EF:1D:5B:C4:4C:2D:E6:69:C8:70:9F:44:59 257s X509v3 Basic Constraints: 257s CA:FALSE 257s Netscape Cert Type: 257s SSL Client, S/MIME 257s Netscape Comment: 257s Test Organization Sub Intermediate CA trusted Certificate 257s X509v3 Subject Key Identifier: 257s E4:53:95:2C:D5:4C:87:C8:13:D7:92:83:65:4F:70:86:8F:0F:AE:29 257s X509v3 Key Usage: critical 257s Digital Signature, Non Repudiation, Key Encipherment 257s X509v3 Extended Key Usage: 257s TLS Web Client Authentication, E-mail Protection 257s X509v3 Subject Alternative Name: 257s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 257s Signature Algorithm: sha256WithRSAEncryption 257s Signature Value: 257s b1:cb:e4:7d:df:14:c1:37:80:c8:94:18:01:40:7b:2c:a1:31: 257s 18:8e:a0:df:c8:12:9f:17:bb:25:97:f9:c5:35:c0:a9:ee:b1: 257s 2f:a4:a3:d4:b3:b7:9b:30:f4:3a:79:49:84:a0:80:84:af:47: 257s a4:c2:75:77:6d:e5:22:43:38:39:af:44:05:c1:be:d6:91:a8: 257s 83:7e:56:9a:47:15:47:ba:d7:fd:36:0d:52:d0:3b:69:fc:4b: 257s 7b:c2:ff:55:5a:42:52:25:06:50:8c:ba:cb:9f:c3:12:a5:0f: 257s 2b:e4:eb:b1:1b:a0:23:23:31:f6:56:ac:b2:6b:93:73:ed:fd: 257s e7:98 257s + found_md5=Modulus=D40C95D7A3E4F3C81973DBBFFBF9B6A39295774260510E73D9243622C6BD879E3F8323C0393A3C9C21BADDD465243A9D8F88D935C341470FBE5F39C17FF0F532564224D7856E55A6015F7BC6CE155C5DE8B805969E2C52E4B8AF44F30A23D4E2285B09DD471CC5B4D634B7581D589A0E1E058119B4510E7A5DAB4FE2D1A3A059 257s + '[' Modulus=D40C95D7A3E4F3C81973DBBFFBF9B6A39295774260510E73D9243622C6BD879E3F8323C0393A3C9C21BADDD465243A9D8F88D935C341470FBE5F39C17FF0F532564224D7856E55A6015F7BC6CE155C5DE8B805969E2C52E4B8AF44F30A23D4E2285B09DD471CC5B4D634B7581D589A0E1E058119B4510E7A5DAB4FE2D1A3A059 '!=' Modulus=D40C95D7A3E4F3C81973DBBFFBF9B6A39295774260510E73D9243622C6BD879E3F8323C0393A3C9C21BADDD465243A9D8F88D935C341470FBE5F39C17FF0F532564224D7856E55A6015F7BC6CE155C5DE8B805969E2C52E4B8AF44F30A23D4E2285B09DD471CC5B4D634B7581D589A0E1E058119B4510E7A5DAB4FE2D1A3A059 ']' 257s + set +x 257s 257s Test completed, Root CA and intermediate issued certificates verified! 258s autopkgtest [00:01:54]: test sssd-softhism2-certificates-tests.sh: -----------------------] 258s sssd-softhism2-certificates-tests.sh PASS 258s autopkgtest [00:01:54]: test sssd-softhism2-certificates-tests.sh: - - - - - - - - - - results - - - - - - - - - - 259s autopkgtest [00:01:55]: test sssd-smart-card-pam-auth-configs: preparing testbed 259s Reading package lists... 259s Building dependency tree... 259s Reading state information... 259s Starting pkgProblemResolver with broken count: 0 259s Starting 2 pkgProblemResolver with broken count: 0 259s Done 259s The following NEW packages will be installed: 259s pamtester 259s 0 upgraded, 1 newly installed, 0 to remove and 0 not upgraded. 259s Need to get 12.2 kB of archives. 259s After this operation, 36.9 kB of additional disk space will be used. 259s Get:1 http://ftpmaster.internal/ubuntu noble/universe s390x pamtester s390x 0.1.2-4 [12.2 kB] 260s Fetched 12.2 kB in 0s (85.6 kB/s) 260s Selecting previously unselected package pamtester. 260s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 78933 files and directories currently installed.) 260s Preparing to unpack .../pamtester_0.1.2-4_s390x.deb ... 260s Unpacking pamtester (0.1.2-4) ... 260s Setting up pamtester (0.1.2-4) ... 260s Processing triggers for man-db (2.12.0-4build2) ... 261s autopkgtest [00:01:57]: test sssd-smart-card-pam-auth-configs: env OFFLINE_MODE=1 bash debian/tests/sssd-smart-card-pam-auth-configs-tester.sh 261s autopkgtest [00:01:57]: test sssd-smart-card-pam-auth-configs: [----------------------- 261s + '[' -z ubuntu ']' 261s + export DEBIAN_FRONTEND=noninteractive 261s + DEBIAN_FRONTEND=noninteractive 261s + required_tools=(pamtester softhsm2-util sssd) 261s + [[ ! -v OFFLINE_MODE ]] 261s + for cmd in "${required_tools[@]}" 261s + command -v pamtester 261s + for cmd in "${required_tools[@]}" 261s + command -v softhsm2-util 261s + for cmd in "${required_tools[@]}" 261s + command -v sssd 261s + PIN=123456 261s ++ mktemp -d -t sssd-softhsm2-certs-XXXXXX 261s + tmpdir=/tmp/sssd-softhsm2-certs-AyXu88 261s + backupsdir= 261s + alternative_pam_configs=(sss-smart-card-optional sss-smart-card-required) 261s + declare -a restore_paths 261s + declare -a delete_paths 261s + trap handle_exit EXIT 261s ++ dirname debian/tests/sssd-smart-card-pam-auth-configs-tester.sh 261s + tester=debian/tests/sssd-softhism2-certificates-tests.sh 261s + '[' '!' -e debian/tests/sssd-softhism2-certificates-tests.sh ']' 261s + '[' '!' -e debian/tests/sssd-softhism2-certificates-tests.sh ']' 261s + export PIN TEST_TMPDIR=/tmp/sssd-softhsm2-certs-AyXu88 GENERATE_SMART_CARDS=1 KEEP_TEMPORARY_FILES=1 NO_SSSD_TESTS=1 261s + TEST_TMPDIR=/tmp/sssd-softhsm2-certs-AyXu88 261s + GENERATE_SMART_CARDS=1 261s + KEEP_TEMPORARY_FILES=1 261s + NO_SSSD_TESTS=1 261s + bash debian/tests/sssd-softhism2-certificates-tests.sh 261s + '[' -z ubuntu ']' 261s + required_tools=(p11tool openssl softhsm2-util) 261s + for cmd in "${required_tools[@]}" 261s + command -v p11tool 261s + for cmd in "${required_tools[@]}" 261s + command -v openssl 261s + for cmd in "${required_tools[@]}" 261s + command -v softhsm2-util 261s + PIN=123456 261s +++ find /usr/lib/softhsm/libsofthsm2.so 261s +++ head -n 1 261s ++ realpath /usr/lib/softhsm/libsofthsm2.so 261s + SOFTHSM2_MODULE=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so 261s + SSSD_P11_CHILD=/usr/libexec/sssd/p11_child 261s + TOKEN_ID=00112233445566778899FFAABBCCDDEEFF012345 261s + '[' '!' -v NO_SSSD_TESTS ']' 261s + '[' '!' -e /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so ']' 261s + tmpdir=/tmp/sssd-softhsm2-certs-AyXu88 261s + keys_size=1024 261s + [[ ! -v KEEP_TEMPORARY_FILES ]] 261s + trap 'set +x; echo -e "\nUnexpected failure!!!"' ERR 261s + echo -n 01 261s + touch /tmp/sssd-softhsm2-certs-AyXu88/index.txt 261s + mkdir -p /tmp/sssd-softhsm2-certs-AyXu88/new_certs 261s + cat 261s + root_ca_key_pass=pass:random-root-CA-password-19251 261s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-certs-AyXu88/test-root-CA-key.pem -passout pass:random-root-CA-password-19251 1024 261s + openssl req -passin pass:random-root-CA-password-19251 -batch -config /tmp/sssd-softhsm2-certs-AyXu88/test-root-CA.config -x509 -new -nodes -key /tmp/sssd-softhsm2-certs-AyXu88/test-root-CA-key.pem -sha256 -days 1024 -set_serial 0 -extensions v3_ca -out /tmp/sssd-softhsm2-certs-AyXu88/test-root-CA.pem 261s + openssl x509 -noout -in /tmp/sssd-softhsm2-certs-AyXu88/test-root-CA.pem 261s + cat 261s + intermediate_ca_key_pass=pass:random-intermediate-CA-password-26053 261s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-certs-AyXu88/test-intermediate-CA-key.pem -passout pass:random-intermediate-CA-password-26053 1024 261s + openssl req -batch -new -nodes -passin pass:random-intermediate-CA-password-26053 -config /tmp/sssd-softhsm2-certs-AyXu88/test-intermediate-CA.config -key /tmp/sssd-softhsm2-certs-AyXu88/test-intermediate-CA-key.pem -passout pass:random-root-CA-password-19251 -sha256 -extensions v3_ca -out /tmp/sssd-softhsm2-certs-AyXu88/test-intermediate-CA-certificate-request.pem 261s + openssl req -text -noout -in /tmp/sssd-softhsm2-certs-AyXu88/test-intermediate-CA-certificate-request.pem 261s Certificate Request: 261s Data: 261s Version: 1 (0x0) 261s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 261s Subject Public Key Info: 261s Public Key Algorithm: rsaEncryption 261s Public-Key: (1024 bit) 261s Modulus: 261s 00:bf:cb:b9:e2:48:67:07:cb:cc:e4:55:35:58:b1: 261s f4:a4:4a:a5:b5:12:c7:5b:2d:63:ae:ce:7e:00:5a: 261s a8:a1:43:f1:61:21:0e:23:f9:a2:a9:9b:49:86:09: 261s 84:05:22:7b:af:55:f2:4d:b7:e7:73:46:93:e8:32: 261s f0:25:e8:df:10:2f:1d:dc:cf:76:13:03:de:95:97: 261s 63:2a:eb:56:99:90:bf:97:97:95:e2:e5:e8:f4:26: 261s 32:8d:41:66:bc:b4:72:aa:ba:2d:a5:f4:d0:bc:62: 261s fe:5f:4a:58:e0:84:e2:99:e2:96:d8:4b:09:0e:1a: 261s eb:f6:65:cc:19:cf:49:15:6b 261s Exponent: 65537 (0x10001) 261s Attributes: 261s (none) 261s Requested Extensions: 261s Signature Algorithm: sha256WithRSAEncryption 261s Signature Value: 261s 51:99:a7:b9:bf:01:d1:07:59:4e:65:bd:4a:33:4b:76:b0:41: 261s 89:39:24:d8:f5:73:79:7d:f1:b6:79:5b:87:59:c7:f1:c0:ae: 261s 79:75:3a:5e:ca:08:30:11:36:f3:9f:bf:5e:89:6b:ee:3f:ac: 261s 5c:a3:14:97:6d:f3:8f:17:08:2f:49:ed:bb:36:cd:e6:d9:ba: 261s ab:5c:c2:b2:e9:11:30:cc:cd:0a:02:b8:1b:37:50:80:8c:15: 261s 9c:40:eb:fb:7b:0a:a1:d8:8e:9e:93:1a:8b:3f:8e:91:3a:b5: 261s 51:be:28:03:bf:95:e8:f7:06:6b:79:51:d1:b3:4d:68:ca:d4: 261s df:9c 261s + openssl ca -batch -notext -config /tmp/sssd-softhsm2-certs-AyXu88/test-root-CA.config -passin pass:random-root-CA-password-19251 -keyfile /tmp/sssd-softhsm2-certs-AyXu88/test-root-CA-key.pem -in /tmp/sssd-softhsm2-certs-AyXu88/test-intermediate-CA-certificate-request.pem -days 365 -extensions v3_intermediate_ca -out /tmp/sssd-softhsm2-certs-AyXu88/test-intermediate-CA.pem 261s Using configuration from /tmp/sssd-softhsm2-certs-AyXu88/test-root-CA.config 261s Check that the request matches the signature 261s Signature ok 261s Certificate Details: 261s Serial Number: 1 (0x1) 261s Validity 261s Not Before: Jul 4 00:03:22 2025 GMT 261s Not After : Jul 4 00:03:22 2026 GMT 261s Subject: 261s organizationName = Test Organization 261s organizationalUnitName = Test Organization Unit 261s commonName = Test Organization Intermediate CA 261s X509v3 extensions: 261s X509v3 Subject Key Identifier: 261s 68:7D:1F:84:D2:88:A9:8E:32:D4:26:96:D8:AA:68:EC:D4:7D:A4:7E 261s X509v3 Authority Key Identifier: 261s keyid:78:35:E2:2E:97:8D:26:77:84:94:68:D0:AB:8F:2A:65:6C:31:8A:3A 261s DirName:/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root CA 261s serial:00 261s X509v3 Basic Constraints: 261s CA:TRUE 261s X509v3 Key Usage: critical 261s Digital Signature, Certificate Sign, CRL Sign 261s Certificate is to be certified until Jul 4 00:03:22 2026 GMT (365 days) 261s 261s Write out database with 1 new entries 261s Database updated 261s + openssl x509 -noout -in /tmp/sssd-softhsm2-certs-AyXu88/test-intermediate-CA.pem 261s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-AyXu88/test-root-CA.pem /tmp/sssd-softhsm2-certs-AyXu88/test-intermediate-CA.pem 261s /tmp/sssd-softhsm2-certs-AyXu88/test-intermediate-CA.pem: OK 261s + cat 261s + sub_intermediate_ca_key_pass=pass:random-sub-intermediate-CA-password-19952 261s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-certs-AyXu88/test-sub-intermediate-CA-key.pem -passout pass:random-sub-intermediate-CA-password-19952 1024 261s + openssl req -batch -new -nodes -passin pass:random-sub-intermediate-CA-password-19952 -config /tmp/sssd-softhsm2-certs-AyXu88/test-sub-intermediate-CA.config -key /tmp/sssd-softhsm2-certs-AyXu88/test-sub-intermediate-CA-key.pem -passout pass:random-intermediate-CA-password-26053 -sha256 -extensions v3_ca -out /tmp/sssd-softhsm2-certs-AyXu88/test-sub-intermediate-CA-certificate-request.pem 261s + openssl req -text -noout -in /tmp/sssd-softhsm2-certs-AyXu88/test-sub-intermediate-CA-certificate-request.pem 261s Certificate Request: 261s Data: 261s Version: 1 (0x0) 261s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 261s Subject Public Key Info: 261s Public Key Algorithm: rsaEncryption 261s Public-Key: (1024 bit) 261s Modulus: 261s 00:bd:11:9d:8d:b5:78:42:e5:c8:a7:c5:6d:3a:cd: 261s db:9f:9c:61:16:97:78:b3:56:4b:85:ca:a7:39:f4: 261s ae:51:24:5e:15:8d:f5:6b:19:23:1c:2f:c0:f1:44: 261s 6d:53:77:3f:f3:e3:cd:7a:bc:a6:3f:80:f7:5b:e1: 261s 95:c1:3c:e4:52:31:50:6c:17:4a:1f:79:d9:cf:40: 261s 60:28:fd:48:40:25:a6:5b:21:a4:d2:45:89:67:47: 261s ce:41:ac:aa:5c:b6:e9:1b:b5:f0:43:c6:d0:18:b4: 261s 4e:b6:68:2d:94:ba:3e:53:ef:a9:b2:1d:78:e4:1f: 261s 07:97:93:68:26:2d:2e:bf:4f 261s Exponent: 65537 (0x10001) 261s Attributes: 261s (none) 261s Requested Extensions: 261s Signature Algorithm: sha256WithRSAEncryption 261s Signature Value: 261s 75:ca:6a:ab:c0:79:f3:ba:5e:0b:db:d5:06:5f:f7:e4:84:ec: 261s 8a:90:c9:94:04:85:1c:76:69:e7:d4:ab:e6:5a:1f:a4:1a:68: 261s 33:03:41:87:f2:a5:40:d8:05:03:14:08:85:7a:1d:90:94:1a: 261s ac:c2:3e:9d:bd:9f:21:69:06:a5:3c:c9:15:a7:15:ed:a9:5a: 261s a9:05:f7:4c:0f:1b:ed:79:b8:90:2a:1d:8d:db:47:44:97:97: 261s 91:5a:5d:2b:ff:07:bf:15:2e:f0:38:ae:17:e1:91:ab:7c:d8: 261s ed:bb:99:a8:ec:a0:71:2f:1f:45:6b:f4:b4:d9:bb:88:e9:b7: 261s aa:fe 261s + openssl ca -batch -notext -config /tmp/sssd-softhsm2-certs-AyXu88/test-intermediate-CA.config -passin pass:random-intermediate-CA-password-26053 -keyfile /tmp/sssd-softhsm2-certs-AyXu88/test-intermediate-CA-key.pem -in /tmp/sssd-softhsm2-certs-AyXu88/test-sub-intermediate-CA-certificate-request.pem -days 365 -extensions v3_intermediate_ca -out /tmp/sssd-softhsm2-certs-AyXu88/test-sub-intermediate-CA.pem 261s Using configuration from /tmp/sssd-softhsm2-certs-AyXu88/test-intermediate-CA.config 261s Check that the request matches the signature 261s Signature ok 261s Certificate Details: 261s Serial Number: 2 (0x2) 261s Validity 261s Not Before: Jul 4 00:03:22 2025 GMT 261s Not After : Jul 4 00:03:22 2026 GMT 261s Subject: 261s organizationName = Test Organization 261s organizationalUnitName = Test Organization Unit 261s commonName = Test Organization Sub Intermediate CA 261s X509v3 extensions: 261s X509v3 Subject Key Identifier: 261s 3F:7F:7C:B0:C3:C1:7F:3B:D2:16:20:CC:B9:44:E3:27:7D:B2:38:1F 261s X509v3 Authority Key Identifier: 261s keyid:68:7D:1F:84:D2:88:A9:8E:32:D4:26:96:D8:AA:68:EC:D4:7D:A4:7E 261s DirName:/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root CA 261s serial:01 261s X509v3 Basic Constraints: 261s CA:TRUE 261s X509v3 Key Usage: critical 261s Digital Signature, Certificate Sign, CRL Sign 261s Certificate is to be certified until Jul 4 00:03:22 2026 GMT (365 days) 261s 261s Write out database with 1 new entries 261s Database updated 261s + openssl x509 -noout -in /tmp/sssd-softhsm2-certs-AyXu88/test-sub-intermediate-CA.pem 261s /tmp/sssd-softhsm2-certs-AyXu88/test-sub-intermediate-CA.pem: OK 261s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-certs-AyXu88/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-AyXu88/test-sub-intermediate-CA.pem 261s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-certs-AyXu88/test-root-CA.pem /tmp/sssd-softhsm2-certs-AyXu88/test-sub-intermediate-CA.pem 261s + local cmd=openssl 261s + shift 261s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-AyXu88/test-root-CA.pem /tmp/sssd-softhsm2-certs-AyXu88/test-sub-intermediate-CA.pem 261s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 261s error 20 at 0 depth lookup: unable to get local issuer certificate 261s error /tmp/sssd-softhsm2-certs-AyXu88/test-sub-intermediate-CA.pem: verification failed 261s + cat 261s + root_ca_trusted_cert_0001_key_pass=pass:random-root-ca-trusted-cert-0001-21324 261s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-certs-AyXu88/test-root-CA-trusted-certificate-0001-key.pem -passout pass:random-root-ca-trusted-cert-0001-21324 1024 261s + openssl req -new -nodes -reqexts req_exts -passin pass:random-root-ca-trusted-cert-0001-21324 -key /tmp/sssd-softhsm2-certs-AyXu88/test-root-CA-trusted-certificate-0001-key.pem -config /tmp/sssd-softhsm2-certs-AyXu88/test-root-CA-trusted-certificate-0001.config -out /tmp/sssd-softhsm2-certs-AyXu88/test-root-CA-trusted-certificate-0001-request.pem 261s + openssl req -text -noout -in /tmp/sssd-softhsm2-certs-AyXu88/test-root-CA-trusted-certificate-0001-request.pem 261s Certificate Request: 261s Data: 261s Version: 1 (0x0) 261s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 261s Subject Public Key Info: 261s Public Key Algorithm: rsaEncryption 261s Public-Key: (1024 bit) 261s Modulus: 261s 00:c2:d2:e6:c4:32:1f:40:2e:92:3c:97:c2:cc:98: 261s 2e:c0:2b:0d:8e:e1:a6:69:a4:8f:df:6f:9a:e9:fb: 261s 09:48:5a:ad:fd:79:4b:d1:f6:a0:03:ab:e8:5f:00: 261s 42:7f:51:28:b6:1f:5f:72:44:a1:3a:0b:b2:b4:ca: 261s 24:c0:b0:13:9a:11:d1:e5:1c:56:e0:8f:d7:0a:b5: 261s 21:45:20:11:5a:93:14:76:41:93:e5:bc:0b:1b:33: 261s 92:c4:eb:e9:9e:53:1f:e2:0c:b7:fd:12:83:d2:f6: 261s 77:6b:62:3e:98:d3:f8:28:1b:14:4d:ae:de:1d:72: 261s c1:97:1f:cb:9c:66:e2:eb:51 261s Exponent: 65537 (0x10001) 261s Attributes: 261s Requested Extensions: 261s X509v3 Basic Constraints: 261s CA:FALSE 261s Netscape Cert Type: 261s SSL Client, S/MIME 261s Netscape Comment: 261s Test Organization Root CA trusted Certificate 261s X509v3 Subject Key Identifier: 261s 2F:3A:21:E4:1D:AB:41:D9:00:40:D3:CD:00:CA:13:F7:4C:F4:C5:1B 261s X509v3 Key Usage: critical 261s Digital Signature, Non Repudiation, Key Encipherment 261s X509v3 Extended Key Usage: 261s TLS Web Client Authentication, E-mail Protection 261s X509v3 Subject Alternative Name: 261s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 261s Signature Algorithm: sha256WithRSAEncryption 261s Signature Value: 261s af:0e:2d:a4:ec:53:e4:6c:7a:dc:86:67:84:c0:ea:a7:60:b2: 261s e0:a2:2c:18:f9:d9:41:b7:01:86:c6:0c:6e:60:d1:48:d8:8f: 261s 34:24:62:62:ae:cb:74:24:41:be:84:f5:f2:1f:f9:d1:b0:be: 261s 3e:a8:94:9a:9c:b5:0e:23:d3:0e:05:14:21:fb:19:bb:3f:a2: 261s 71:e7:23:aa:e8:5f:af:6a:47:d9:ce:8f:09:fd:54:6d:07:2e: 261s 09:68:d5:3b:2c:83:ea:91:8c:d6:a9:66:a3:df:95:9d:20:04: 261s f0:f0:c3:e3:89:50:23:56:10:0a:59:75:73:62:12:ed:7d:68: 261s da:af 261s + openssl ca -batch -notext -config /tmp/sssd-softhsm2-certs-AyXu88/test-root-CA.config -passin pass:random-root-CA-password-19251 -keyfile /tmp/sssd-softhsm2-certs-AyXu88/test-root-CA-key.pem -in /tmp/sssd-softhsm2-certs-AyXu88/test-root-CA-trusted-certificate-0001-request.pem -days 365 -extensions usr_cert -out /tmp/sssd-softhsm2-certs-AyXu88/test-root-CA-trusted-certificate-0001.pem 261s Using configuration from /tmp/sssd-softhsm2-certs-AyXu88/test-root-CA.config 261s Check that the request matches the signature 261s Signature ok 261s Certificate Details: 261s Serial Number: 3 (0x3) 261s Validity 261s Not Before: Jul 4 00:03:22 2025 GMT 261s Not After : Jul 4 00:03:22 2026 GMT 261s Subject: 261s organizationName = Test Organization 261s organizationalUnitName = Test Organization Unit 261s commonName = Test Organization Root Trusted Certificate 0001 261s X509v3 extensions: 261s X509v3 Authority Key Identifier: 261s 78:35:E2:2E:97:8D:26:77:84:94:68:D0:AB:8F:2A:65:6C:31:8A:3A 261s X509v3 Basic Constraints: 261s CA:FALSE 261s Netscape Cert Type: 261s SSL Client, S/MIME 261s Netscape Comment: 261s Test Organization Root CA trusted Certificate 261s X509v3 Subject Key Identifier: 261s 2F:3A:21:E4:1D:AB:41:D9:00:40:D3:CD:00:CA:13:F7:4C:F4:C5:1B 261s X509v3 Key Usage: critical 261s Digital Signature, Non Repudiation, Key Encipherment 261s X509v3 Extended Key Usage: 261s TLS Web Client Authentication, E-mail Protection 261s X509v3 Subject Alternative Name: 261s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 261s Certificate is to be certified until Jul 4 00:03:22 2026 GMT (365 days) 261s 261s Write out database with 1 new entries 261s Database updated 261s + openssl x509 -noout -in /tmp/sssd-softhsm2-certs-AyXu88/test-root-CA-trusted-certificate-0001.pem 261s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-AyXu88/test-root-CA.pem /tmp/sssd-softhsm2-certs-AyXu88/test-root-CA-trusted-certificate-0001.pem 261s /tmp/sssd-softhsm2-certs-AyXu88/test-root-CA-trusted-certificate-0001.pem: OK 261s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-certs-AyXu88/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-AyXu88/test-root-CA-trusted-certificate-0001.pem 261s + local cmd=openssl 261s + shift 261s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-AyXu88/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-AyXu88/test-root-CA-trusted-certificate-0001.pem 261s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 261s error 20 at 0 depth lookup: unable to get local issuer certificate 261s error /tmp/sssd-softhsm2-certs-AyXu88/test-root-CA-trusted-certificate-0001.pem: verification failed 261s + cat 261s + intermediate_ca_trusted_cert_0001_key_pass=pass:random-intermediate-ca-trusted-cert-0001-29624 261s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-certs-AyXu88/test-intermediate-CA-trusted-certificate-0001-key.pem -passout pass:random-intermediate-ca-trusted-cert-0001-29624 1024 261s + openssl req -new -nodes -reqexts req_exts -passin pass:random-intermediate-ca-trusted-cert-0001-29624 -key /tmp/sssd-softhsm2-certs-AyXu88/test-intermediate-CA-trusted-certificate-0001-key.pem -config /tmp/sssd-softhsm2-certs-AyXu88/test-intermediate-CA-trusted-certificate-0001.config -out /tmp/sssd-softhsm2-certs-AyXu88/test-intermediate-CA-trusted-certificate-0001-request.pem 261s + openssl req -text -noout -in /tmp/sssd-softhsm2-certs-AyXu88/test-intermediate-CA-trusted-certificate-0001-request.pem 261s Certificate Request: 261s Data: 261s Version: 1 (0x0) 261s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 261s Subject Public Key Info: 261s Public Key Algorithm: rsaEncryption 261s Public-Key: (1024 bit) 261s Modulus: 261s 00:d6:5a:3f:c3:08:61:b7:65:ad:95:11:10:ce:6d: 261s f9:4e:e5:ba:f1:e8:18:2c:8b:ae:4e:0c:2a:de:aa: 261s 9f:3e:ca:7f:43:50:47:34:e2:6f:5a:e0:7e:b2:e1: 261s 8f:b6:69:d9:73:d9:6d:3a:ff:5f:8b:60:74:bf:90: 261s 77:09:e5:52:ec:b6:7b:3f:b5:18:61:9c:db:1d:dd: 261s 0a:94:a0:16:f6:f9:f6:c4:b5:85:5e:5d:7f:15:2b: 261s 6e:6a:a3:6b:8f:21:33:2a:2f:44:e0:a4:b0:11:57: 261s 04:7d:21:fd:29:2b:53:bf:e5:92:68:2e:77:34:2b: 261s 60:17:e9:f3:3b:81:3e:ff:e7 261s Exponent: 65537 (0x10001) 261s Attributes: 261s Requested Extensions: 261s X509v3 Basic Constraints: 261s CA:FALSE 261s Netscape Cert Type: 261s SSL Client, S/MIME 261s Netscape Comment: 261s Test Organization Intermediate CA trusted Certificate 261s X509v3 Subject Key Identifier: 261s 4B:DA:FD:4F:42:8F:C7:CA:0E:AF:3E:52:A2:33:A5:94:DB:2D:3F:5E 261s X509v3 Key Usage: critical 261s Digital Signature, Non Repudiation, Key Encipherment 261s X509v3 Extended Key Usage: 261s TLS Web Client Authentication, E-mail Protection 261s X509v3 Subject Alternative Name: 261s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 261s Signature Algorithm: sha256WithRSAEncryption 261s Signature Value: 261s 46:31:8a:32:b0:fa:db:c6:7d:d6:2a:56:6b:33:01:ef:51:af: 261s 59:e6:dd:77:f0:08:54:5f:20:52:c3:fb:38:00:69:0c:99:36: 261s ca:11:05:70:f0:7a:05:2c:69:e1:91:a7:fe:60:b6:8b:a9:a2: 261s c3:80:df:f1:b7:e4:0d:f5:ac:0b:4d:b5:11:f0:ed:e2:dd:5a: 261s 34:c3:7c:1e:47:f2:82:46:78:d0:f1:84:03:df:e8:15:e7:0a: 261s 00:36:bb:18:39:35:2e:cb:62:f2:f4:8b:2f:86:75:db:26:b2: 261s 43:0b:78:14:63:f5:4c:1d:a1:f9:ea:15:92:d5:93:54:65:b4: 261s 5e:8d 261s + openssl ca -passin pass:random-intermediate-CA-password-26053 -config /tmp/sssd-softhsm2-certs-AyXu88/test-intermediate-CA.config -batch -notext -keyfile /tmp/sssd-softhsm2-certs-AyXu88/test-intermediate-CA-key.pem -in /tmp/sssd-softhsm2-certs-AyXu88/test-intermediate-CA-trusted-certificate-0001-request.pem -days 365 -extensions usr_cert -out /tmp/sssd-softhsm2-certs-AyXu88/test-intermediate-CA-trusted-certificate-0001.pem 261s Using configuration from /tmp/sssd-softhsm2-certs-AyXu88/test-intermediate-CA.config 261s Check that the request matches the signature 261s Signature ok 261s Certificate Details: 261s Serial Number: 4 (0x4) 261s Validity 261s Not Before: Jul 4 00:03:22 2025 GMT 261s Not After : Jul 4 00:03:22 2026 GMT 261s Subject: 261s organizationName = Test Organization 261s organizationalUnitName = Test Organization Unit 261s commonName = Test Organization Intermediate Trusted Certificate 0001 261s X509v3 extensions: 261s X509v3 Authority Key Identifier: 261s 68:7D:1F:84:D2:88:A9:8E:32:D4:26:96:D8:AA:68:EC:D4:7D:A4:7E 261s X509v3 Basic Constraints: 261s CA:FALSE 261s Netscape Cert Type: 261s SSL Client, S/MIME 261s Netscape Comment: 261s Test Organization Intermediate CA trusted Certificate 261s X509v3 Subject Key Identifier: 261s 4B:DA:FD:4F:42:8F:C7:CA:0E:AF:3E:52:A2:33:A5:94:DB:2D:3F:5E 261s X509v3 Key Usage: critical 261s Digital Signature, Non Repudiation, Key Encipherment 261s X509v3 Extended Key Usage: 261s TLS Web Client Authentication, E-mail Protection 261s X509v3 Subject Alternative Name: 261s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 261s Certificate is to be certified until Jul 4 00:03:22 2026 GMT (365 days) 261s 261s Write out database with 1 new entries 261s Database updated 261s + openssl x509 -noout -in /tmp/sssd-softhsm2-certs-AyXu88/test-intermediate-CA-trusted-certificate-0001.pem 261s This certificate should not be trusted fully 261s + echo 'This certificate should not be trusted fully' 261s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-certs-AyXu88/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-AyXu88/test-intermediate-CA-trusted-certificate-0001.pem 261s + local cmd=openssl 261s + shift 261s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-AyXu88/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-AyXu88/test-intermediate-CA-trusted-certificate-0001.pem 261s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 261s error 2 at 1 depth lookup: unable to get issuer certificate 261s error /tmp/sssd-softhsm2-certs-AyXu88/test-intermediate-CA-trusted-certificate-0001.pem: verification failed 261s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-certs-AyXu88/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-AyXu88/test-intermediate-CA-trusted-certificate-0001.pem 261s /tmp/sssd-softhsm2-certs-AyXu88/test-intermediate-CA-trusted-certificate-0001.pem: OK 261s + cat 261s + sub_intermediate_ca_trusted_cert_0001_key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-21000 261s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-certs-AyXu88/test-sub-intermediate-CA-trusted-certificate-0001-key.pem -passout pass:random-sub-intermediate-ca-trusted-cert-0001-21000 1024 261s + openssl req -new -nodes -reqexts req_exts -passin pass:random-sub-intermediate-ca-trusted-cert-0001-21000 -key /tmp/sssd-softhsm2-certs-AyXu88/test-sub-intermediate-CA-trusted-certificate-0001-key.pem -config /tmp/sssd-softhsm2-certs-AyXu88/test-sub-intermediate-CA-trusted-certificate-0001.config -out /tmp/sssd-softhsm2-certs-AyXu88/test-sub-intermediate-CA-trusted-certificate-0001-request.pem 261s + openssl req -text -noout -in /tmp/sssd-softhsm2-certs-AyXu88/test-sub-intermediate-CA-trusted-certificate-0001-request.pem 261s Certificate Request: 261s Data: 261s Version: 1 (0x0) 261s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 261s Subject Public Key Info: 261s Public Key Algorithm: rsaEncryption 261s Public-Key: (1024 bit) 261s Modulus: 261s 00:de:4d:32:5c:13:25:82:44:1d:be:26:40:d2:f5: 261s 52:a6:16:a8:1a:54:53:14:86:f1:59:d9:23:02:f4: 261s b7:33:6e:71:a4:1d:5d:bb:af:41:46:ac:3a:a9:13: 261s 28:0e:a2:43:c1:6d:f6:85:7c:28:76:38:ce:29:1a: 261s b6:ba:50:a1:5b:d5:c3:81:f1:0d:5b:aa:93:44:8b: 261s 71:3c:57:d1:ee:55:c2:a7:19:90:ac:d5:30:51:44: 261s 40:5b:64:cd:55:95:6b:da:2f:76:28:a5:d6:5d:99: 261s a0:03:43:4e:7c:1f:c1:25:89:53:ba:12:17:50:66: 261s 29:4b:bd:51:e3:06:1c:10:73 261s Exponent: 65537 (0x10001) 261s Attributes: 261s Requested Extensions: 261s X509v3 Basic Constraints: 261s CA:FALSE 261s Netscape Cert Type: 261s SSL Client, S/MIME 261s Netscape Comment: 261s Test Organization Sub Intermediate CA trusted Certificate 261s X509v3 Subject Key Identifier: 261s 5E:47:63:63:0B:45:D5:23:0F:93:06:D3:17:70:56:5C:09:F6:EF:01 261s X509v3 Key Usage: critical 261s Digital Signature, Non Repudiation, Key Encipherment 261s X509v3 Extended Key Usage: 261s TLS Web Client Authentication, E-mail Protection 261s X509v3 Subject Alternative Name: 261s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 261s Signature Algorithm: sha256WithRSAEncryption 261s Signature Value: 261s 43:d3:b0:08:5f:40:4a:03:a1:b9:a9:eb:f6:d9:74:26:b7:34: 261s c8:19:f6:3a:6b:51:cd:86:77:7b:d2:7e:30:74:ec:ac:7a:06: 261s a3:23:e7:29:44:83:11:32:d7:78:fc:cb:2f:f8:35:f9:21:c0: 261s dc:b5:fe:05:4b:e8:d3:a1:7c:b4:5f:76:1b:bc:a3:0f:65:a6: 261s 5c:d1:89:6e:e5:27:91:ba:8a:0a:54:c9:90:95:5c:26:ba:cf: 261s 2f:c7:81:38:fd:bf:bf:5d:cc:d7:32:61:07:68:85:10:30:5d: 261s 44:63:57:d0:e8:87:63:b7:91:85:cd:ad:7f:9d:40:ce:2f:0c: 261s 00:62 261s + openssl ca -passin pass:random-sub-intermediate-CA-password-19952 -config /tmp/sssd-softhsm2-certs-AyXu88/test-sub-intermediate-CA.config -batch -notext -keyfile /tmp/sssd-softhsm2-certs-AyXu88/test-sub-intermediate-CA-key.pem -in /tmp/sssd-softhsm2-certs-AyXu88/test-sub-intermediate-CA-trusted-certificate-0001-request.pem -days 365 -extensions usr_cert -out /tmp/sssd-softhsm2-certs-AyXu88/test-sub-intermediate-CA-trusted-certificate-0001.pem 261s Using configuration from /tmp/sssd-softhsm2-certs-AyXu88/test-sub-intermediate-CA.config 261s Check that the request matches the signature 261s Signature ok 262s Certificate Details: 262s Serial Number: 5 (0x5) 262s Validity 262s Not Before: Jul 4 00:03:22 2025 GMT 262s Not After : Jul 4 00:03:22 2026 GMT 262s Subject: 262s organizationName = Test Organization 262s organizationalUnitName = Test Organization Unit 262s commonName = Test Organization Sub Intermediate Trusted Certificate 0001 262s X509v3 extensions: 262s X509v3 Authority Key Identifier: 262s 3F:7F:7C:B0:C3:C1:7F:3B:D2:16:20:CC:B9:44:E3:27:7D:B2:38:1F 262s X509v3 Basic Constraints: 262s CA:FALSE 262s Netscape Cert Type: 262s SSL Client, S/MIME 262s Netscape Comment: 262s Test Organization Sub Intermediate CA trusted Certificate 262s X509v3 Subject Key Identifier: 262s 5E:47:63:63:0B:45:D5:23:0F:93:06:D3:17:70:56:5C:09:F6:EF:01 262s X509v3 Key Usage: critical 262s Digital Signature, Non Repudiation, Key Encipherment 262s X509v3 Extended Key Usage: 262s TLS Web Client Authentication, E-mail Protection 262s X509v3 Subject Alternative Name: 262s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 262s Certificate is to be certified until Jul 4 00:03:22 2026 GMT (365 days) 262s 262s Write out database with 1 new entries 262s Database updated 262s + openssl x509 -noout -in /tmp/sssd-softhsm2-certs-AyXu88/test-sub-intermediate-CA-trusted-certificate-0001.pem 262s This certificate should not be trusted fully 262s + echo 'This certificate should not be trusted fully' 262s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-certs-AyXu88/test-sub-intermediate-CA.pem /tmp/sssd-softhsm2-certs-AyXu88/test-sub-intermediate-CA-trusted-certificate-0001.pem 262s + local cmd=openssl 262s + shift 262s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-AyXu88/test-sub-intermediate-CA.pem /tmp/sssd-softhsm2-certs-AyXu88/test-sub-intermediate-CA-trusted-certificate-0001.pem 262s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 262s error 2 at 1 depth lookup: unable to get issuer certificate 262s error /tmp/sssd-softhsm2-certs-AyXu88/test-sub-intermediate-CA-trusted-certificate-0001.pem: verification failed 262s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-certs-AyXu88/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-AyXu88/test-sub-intermediate-CA-trusted-certificate-0001.pem 262s + local cmd=openssl 262s + shift 262s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-AyXu88/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-AyXu88/test-sub-intermediate-CA-trusted-certificate-0001.pem 262s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 262s error 20 at 0 depth lookup: unable to get local issuer certificate 262s error /tmp/sssd-softhsm2-certs-AyXu88/test-sub-intermediate-CA-trusted-certificate-0001.pem: verification failed 262s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-certs-AyXu88/test-sub-intermediate-CA.pem /tmp/sssd-softhsm2-certs-AyXu88/test-sub-intermediate-CA-trusted-certificate-0001.pem 262s /tmp/sssd-softhsm2-certs-AyXu88/test-sub-intermediate-CA-trusted-certificate-0001.pem: OK 262s + expect_fail openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-certs-AyXu88/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-AyXu88/test-sub-intermediate-CA-trusted-certificate-0001.pem 262s + local cmd=openssl 262s + shift 262s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-certs-AyXu88/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-AyXu88/test-sub-intermediate-CA-trusted-certificate-0001.pem 262s Building a the full-chain CA file... 262s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 262s error 20 at 0 depth lookup: unable to get local issuer certificate 262s error /tmp/sssd-softhsm2-certs-AyXu88/test-sub-intermediate-CA-trusted-certificate-0001.pem: verification failed 262s + echo 'Building a the full-chain CA file...' 262s + cat /tmp/sssd-softhsm2-certs-AyXu88/test-root-CA.pem /tmp/sssd-softhsm2-certs-AyXu88/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-AyXu88/test-sub-intermediate-CA.pem 262s + cat /tmp/sssd-softhsm2-certs-AyXu88/test-root-CA.pem /tmp/sssd-softhsm2-certs-AyXu88/test-intermediate-CA.pem 262s + cat /tmp/sssd-softhsm2-certs-AyXu88/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-AyXu88/test-sub-intermediate-CA.pem 262s + openssl crl2pkcs7 -nocrl -certfile /tmp/sssd-softhsm2-certs-AyXu88/test-full-chain-CA.pem 262s + openssl pkcs7 -print_certs -noout 262s subject=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 262s issuer=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 262s 262s subject=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 262s issuer=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 262s 262s subject=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 262s issuer=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 262s 262s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-AyXu88/test-full-chain-CA.pem /tmp/sssd-softhsm2-certs-AyXu88/test-intermediate-CA.pem 262s /tmp/sssd-softhsm2-certs-AyXu88/test-intermediate-CA.pem: OK 262s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-AyXu88/test-full-chain-CA.pem /tmp/sssd-softhsm2-certs-AyXu88/test-root-CA-trusted-certificate-0001.pem 262s /tmp/sssd-softhsm2-certs-AyXu88/test-root-CA-trusted-certificate-0001.pem: OK 262s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-AyXu88/test-full-chain-CA.pem /tmp/sssd-softhsm2-certs-AyXu88/test-intermediate-CA-trusted-certificate-0001.pem 262s /tmp/sssd-softhsm2-certs-AyXu88/test-intermediate-CA-trusted-certificate-0001.pem: OK 262s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-AyXu88/test-full-chain-CA.pem /tmp/sssd-softhsm2-certs-AyXu88/test-root-intermediate-chain-CA.pem 262s /tmp/sssd-softhsm2-certs-AyXu88/test-root-intermediate-chain-CA.pem: OK 262s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-AyXu88/test-full-chain-CA.pem /tmp/sssd-softhsm2-certs-AyXu88/test-sub-intermediate-CA-trusted-certificate-0001.pem 262s /tmp/sssd-softhsm2-certs-AyXu88/test-sub-intermediate-CA-trusted-certificate-0001.pem: OK 262s Certificates generation completed! 262s + echo 'Certificates generation completed!' 262s + [[ -v NO_SSSD_TESTS ]] 262s + [[ -v GENERATE_SMART_CARDS ]] 262s + prepare_softhsm2_card /tmp/sssd-softhsm2-certs-AyXu88/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-21324 262s + local certificate=/tmp/sssd-softhsm2-certs-AyXu88/test-root-CA-trusted-certificate-0001.pem 262s + local key_pass=pass:random-root-ca-trusted-cert-0001-21324 262s + local key_cn 262s + local key_name 262s + local tokens_dir 262s + local output_cert_file 262s + token_name= 262s ++ basename /tmp/sssd-softhsm2-certs-AyXu88/test-root-CA-trusted-certificate-0001.pem .pem 262s + key_name=test-root-CA-trusted-certificate-0001 262s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-certs-AyXu88/test-root-CA-trusted-certificate-0001.pem 262s ++ sed -n 's/ *commonName *= //p' 262s + key_cn='Test Organization Root Trusted Certificate 0001' 262s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 262s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-certs-AyXu88/softhsm2-test-root-CA-trusted-certificate-0001.conf 262s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-certs-AyXu88/softhsm2-test-root-CA-trusted-certificate-0001.conf 262s ++ basename /tmp/sssd-softhsm2-certs-AyXu88/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 262s + tokens_dir=/tmp/sssd-softhsm2-certs-AyXu88/softhsm2-test-root-CA-trusted-certificate-0001 262s + token_name='Test Organization Root Tr Token' 262s + '[' '!' -e /tmp/sssd-softhsm2-certs-AyXu88/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 262s + local key_file 262s + local decrypted_key 262s + mkdir -p /tmp/sssd-softhsm2-certs-AyXu88/softhsm2-test-root-CA-trusted-certificate-0001 262s + key_file=/tmp/sssd-softhsm2-certs-AyXu88/test-root-CA-trusted-certificate-0001-key.pem 262s + decrypted_key=/tmp/sssd-softhsm2-certs-AyXu88/test-root-CA-trusted-certificate-0001-key-decrypted.pem 262s + cat 262s + softhsm2-util --init-token --label 'Test Organization Root Tr Token' --pin 123456 --so-pin 123456 --free 262s Slot 0 has a free/uninitialized token. 262s The token has been initialized and is reassigned to slot 1328201868 262s + softhsm2-util --show-slots 262s Available slots: 262s Slot 1328201868 262s Slot info: 262s Description: SoftHSM slot ID 0x4f2ac08c 262s Manufacturer ID: SoftHSM project 262s Hardware version: 2.6 262s Firmware version: 2.6 262s Token present: yes 262s Token info: 262s Manufacturer ID: SoftHSM project 262s Model: SoftHSM v2 262s Hardware version: 2.6 262s Firmware version: 2.6 262s Serial number: 6e3afb2d4f2ac08c 262s Initialized: yes 262s User PIN init.: yes 262s Label: Test Organization Root Tr Token 262s Slot 1 262s Slot info: 262s Description: SoftHSM slot ID 0x1 262s Manufacturer ID: SoftHSM project 262s Hardware version: 2.6 262s Firmware version: 2.6 262s Token present: yes 262s Token info: 262s Manufacturer ID: SoftHSM project 262s Model: SoftHSM v2 262s Hardware version: 2.6 262s Firmware version: 2.6 262s Serial number: 262s Initialized: no 262s User PIN init.: no 262s Label: 262s + p11tool --provider=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --write --no-mark-private --load-certificate=/tmp/sssd-softhsm2-certs-AyXu88/test-root-CA-trusted-certificate-0001.pem --login --set-pin=123456 --label 'Test Organization Root Trusted Certificate 0001' --id 00112233445566778899FFAABBCCDDEEFF012345 262s + openssl rsa -passin pass:random-root-ca-trusted-cert-0001-21324 -in /tmp/sssd-softhsm2-certs-AyXu88/test-root-CA-trusted-certificate-0001-key.pem -out /tmp/sssd-softhsm2-certs-AyXu88/test-root-CA-trusted-certificate-0001-key-decrypted.pem 262s writing RSA key 262s + p11tool --provider=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --write --load-privkey=/tmp/sssd-softhsm2-certs-AyXu88/test-root-CA-trusted-certificate-0001-key-decrypted.pem --login --set-pin=123456 --label 'Test Organization Root Trusted Certificate 0001 Key' --id 00112233445566778899FFAABBCCDDEEFF012345 262s + rm /tmp/sssd-softhsm2-certs-AyXu88/test-root-CA-trusted-certificate-0001-key-decrypted.pem 262s + p11tool --provider=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --list-all 262s Object 0: 262s URL: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=6e3afb2d4f2ac08c;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert 262s Type: X.509 Certificate (RSA-1024) 262s Expires: Sat Jul 4 00:03:22 2026 262s Label: Test Organization Root Trusted Certificate 0001 262s ID: 00:11:22:33:44:55:66:77:88:99:ff:aa:bb:cc:dd:ee:ff:01:23:45 262s 262s Test Organization Root Tr Token 262s + echo 'Test Organization Root Tr Token' 262s + prepare_softhsm2_card /tmp/sssd-softhsm2-certs-AyXu88/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-29624 262s + local certificate=/tmp/sssd-softhsm2-certs-AyXu88/test-intermediate-CA-trusted-certificate-0001.pem 262s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-29624 262s + local key_cn 262s + local key_name 262s + local tokens_dir 262s + local output_cert_file 262s + token_name= 262s ++ basename /tmp/sssd-softhsm2-certs-AyXu88/test-intermediate-CA-trusted-certificate-0001.pem .pem 262s + key_name=test-intermediate-CA-trusted-certificate-0001 262s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-certs-AyXu88/test-intermediate-CA-trusted-certificate-0001.pem 262s ++ sed -n 's/ *commonName *= //p' 262s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 262s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 262s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-certs-AyXu88/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 262s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-certs-AyXu88/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 262s ++ basename /tmp/sssd-softhsm2-certs-AyXu88/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 262s + tokens_dir=/tmp/sssd-softhsm2-certs-AyXu88/softhsm2-test-intermediate-CA-trusted-certificate-0001 262s + token_name='Test Organization Interme Token' 262s + '[' '!' -e /tmp/sssd-softhsm2-certs-AyXu88/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 262s + local key_file 262s + local decrypted_key 262s + mkdir -p /tmp/sssd-softhsm2-certs-AyXu88/softhsm2-test-intermediate-CA-trusted-certificate-0001 262s + key_file=/tmp/sssd-softhsm2-certs-AyXu88/test-intermediate-CA-trusted-certificate-0001-key.pem 262s + decrypted_key=/tmp/sssd-softhsm2-certs-AyXu88/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 262s + cat 262s + softhsm2-util --init-token --label 'Test Organization Interme Token' --pin 123456 --so-pin 123456 --free 262s Slot 0 has a free/uninitialized token. 262s The token has been initialized and is reassigned to slot 1727225727 262s + softhsm2-util --show-slots 262s Available slots: 262s Slot 1727225727 262s Slot info: 262s Description: SoftHSM slot ID 0x66f35f7f 262s Manufacturer ID: SoftHSM project 262s Hardware version: 2.6 262s Firmware version: 2.6 262s Token present: yes 262s Token info: 262s Manufacturer ID: SoftHSM project 262s Model: SoftHSM v2 262s Hardware version: 2.6 262s Firmware version: 2.6 262s Serial number: 290b396366f35f7f 262s Initialized: yes 262s User PIN init.: yes 262s Label: Test Organization Interme Token 262s Slot 1 262s Slot info: 262s Description: SoftHSM slot ID 0x1 262s Manufacturer ID: SoftHSM project 262s Hardware version: 2.6 262s Firmware version: 2.6 262s Token present: yes 262s Token info: 262s Manufacturer ID: SoftHSM project 262s Model: SoftHSM v2 262s Hardware version: 2.6 262s Firmware version: 2.6 262s Serial number: 262s Initialized: no 262s User PIN init.: no 262s Label: 262s + p11tool --provider=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --write --no-mark-private --load-certificate=/tmp/sssd-softhsm2-certs-AyXu88/test-intermediate-CA-trusted-certificate-0001.pem --login --set-pin=123456 --label 'Test Organization Intermediate Trusted Certificate 0001' --id 00112233445566778899FFAABBCCDDEEFF012345 262s + openssl rsa -passin pass:random-intermediate-ca-trusted-cert-0001-29624 -in /tmp/sssd-softhsm2-certs-AyXu88/test-intermediate-CA-trusted-certificate-0001-key.pem -out /tmp/sssd-softhsm2-certs-AyXu88/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 262s writing RSA key 262s + p11tool --provider=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --write --load-privkey=/tmp/sssd-softhsm2-certs-AyXu88/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem --login --set-pin=123456 --label 'Test Organization Intermediate Trusted Certificate 0001 Key' --id 00112233445566778899FFAABBCCDDEEFF012345 262s + rm /tmp/sssd-softhsm2-certs-AyXu88/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 262s + p11tool --provider=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --list-all 262s + echo 'Test Organization Interme Token' 262s Object 0: 262s URL: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=290b396366f35f7f;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert 262s Type: X.509 Certificate (RSA-1024) 262s Expires: Sat Jul 4 00:03:22 2026 262s Label: Test Organization Intermediate Trusted Certificate 0001 262s ID: 00:11:22:33:44:55:66:77:88:99:ff:aa:bb:cc:dd:ee:ff:01:23:45 262s 262s Test Organization Interme Token 262s + prepare_softhsm2_card /tmp/sssd-softhsm2-certs-AyXu88/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-21000 262s + local certificate=/tmp/sssd-softhsm2-certs-AyXu88/test-sub-intermediate-CA-trusted-certificate-0001.pem 262s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-21000 262s + local key_cn 262s + local key_name 262s + local tokens_dir 262s + local output_cert_file 262s + token_name= 262s ++ basename /tmp/sssd-softhsm2-certs-AyXu88/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 262s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 262s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-certs-AyXu88/test-sub-intermediate-CA-trusted-certificate-0001.pem 262s ++ sed -n 's/ *commonName *= //p' 262s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 262s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 262s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-certs-AyXu88/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 262s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-certs-AyXu88/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 262s ++ basename /tmp/sssd-softhsm2-certs-AyXu88/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 262s + tokens_dir=/tmp/sssd-softhsm2-certs-AyXu88/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 262s + token_name='Test Organization Sub Int Token' 262s + '[' '!' -e /tmp/sssd-softhsm2-certs-AyXu88/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 262s + local key_file 262s + local decrypted_key 262s + mkdir -p /tmp/sssd-softhsm2-certs-AyXu88/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 262s + key_file=/tmp/sssd-softhsm2-certs-AyXu88/test-sub-intermediate-CA-trusted-certificate-0001-key.pem 262s + decrypted_key=/tmp/sssd-softhsm2-certs-AyXu88/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 262s + cat 262s + softhsm2-util --init-token --label 'Test Organization Sub Int Token' --pin 123456 --so-pin 123456 --free 262s Slot 0 has a free/uninitialized token. 262s The token has been initialized and is reassigned to slot 1506667265 262s + softhsm2-util --show-slots 262s Available slots: 262s Slot 1506667265 262s Slot info: 262s Description: SoftHSM slot ID 0x59cdeb01 262s Manufacturer ID: SoftHSM project 262s Hardware version: 2.6 262s Firmware version: 2.6 262s Token present: yes 262s Token info: 262s Manufacturer ID: SoftHSM project 262s Model: SoftHSM v2 262s Hardware version: 2.6 262s Firmware version: 2.6 262s Serial number: 6a1c344459cdeb01 262s Initialized: yes 262s User PIN init.: yes 262s Label: Test Organization Sub Int Token 262s Slot 1 262s Slot info: 262s Description: SoftHSM slot ID 0x1 262s Manufacturer ID: SoftHSM project 262s Hardware version: 2.6 262s Firmware version: 2.6 262s Token present: yes 262s Token info: 262s Manufacturer ID: SoftHSM project 262s Model: SoftHSM v2 262s Hardware version: 2.6 262s Firmware version: 2.6 262s Serial number: 262s Initialized: no 262s User PIN init.: no 262s Label: 262s + p11tool --provider=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --write --no-mark-private --load-certificate=/tmp/sssd-softhsm2-certs-AyXu88/test-sub-intermediate-CA-trusted-certificate-0001.pem --login --set-pin=123456 --label 'Test Organization Sub Intermediate Trusted Certificate 0001' --id 00112233445566778899FFAABBCCDDEEFF012345 262s + openssl rsa -passin pass:random-sub-intermediate-ca-trusted-cert-0001-21000 -in /tmp/sssd-softhsm2-certs-AyXu88/test-sub-intermediate-CA-trusted-certificate-0001-key.pem -out /tmp/sssd-softhsm2-certs-AyXu88/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 262s writing RSA key 262s + p11tool --provider=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --write --load-privkey=/tmp/sssd-softhsm2-certs-AyXu88/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem --login --set-pin=123456 --label 'Test Organization Sub Intermediate Trusted Certificate 0001 Key' --id 00112233445566778899FFAABBCCDDEEFF012345 262s + rm /tmp/sssd-softhsm2-certs-AyXu88/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 262s + p11tool --provider=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --list-all 262s Object 0: 262s URL: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=6a1c344459cdeb01;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert 262s Type: X.509 Certificate (RSA-1024) 262s Expires: Sat Jul 4 00:03:22 2026 262s Label: Test Organization Sub Intermediate Trusted Certificate 0001 262s ID: 00:11:22:33:44:55:66:77:88:99:ff:aa:bb:cc:dd:ee:ff:01:23:45 262s 262s Test Organization Sub Int Token 262s Certificates generation completed! 262s + echo 'Test Organization Sub Int Token' 262s + echo 'Certificates generation completed!' 262s + exit 0 262s + find /tmp/sssd-softhsm2-certs-AyXu88 -type d -exec chmod 777 '{}' ';' 262s + find /tmp/sssd-softhsm2-certs-AyXu88 -type f -exec chmod 666 '{}' ';' 262s + backup_file /etc/sssd/sssd.conf 262s + '[' -z '' ']' 262s ++ mktemp -d -t sssd-softhsm2-backups-XXXXXX 262s + backupsdir=/tmp/sssd-softhsm2-backups-LmQPn3 262s + '[' -e /etc/sssd/sssd.conf ']' 262s + delete_paths+=("$1") 262s + rm -f /etc/sssd/sssd.conf 262s ++ runuser -u ubuntu -- sh -c 'echo ~' 262s + user_home=/home/ubuntu 262s + mkdir -p /home/ubuntu 262s + chown ubuntu:ubuntu /home/ubuntu 262s ++ runuser -u ubuntu -- sh -c 'echo ${XDG_CONFIG_HOME:-~/.config}' 262s + user_config=/home/ubuntu/.config 262s + system_config=/etc 262s + softhsm2_conf_paths=("${AUTOPKGTEST_NORMAL_USER}:$user_config/softhsm2/softhsm2.conf" "root:$system_config/softhsm/softhsm2.conf") 262s + for path_pair in "${softhsm2_conf_paths[@]}" 262s + IFS=: 262s + read -r -a path 262s + path=/home/ubuntu/.config/softhsm2/softhsm2.conf 262s + backup_file /home/ubuntu/.config/softhsm2/softhsm2.conf 262s + '[' -z /tmp/sssd-softhsm2-backups-LmQPn3 ']' 262s + '[' -e /home/ubuntu/.config/softhsm2/softhsm2.conf ']' 262s + delete_paths+=("$1") 262s + rm -f /home/ubuntu/.config/softhsm2/softhsm2.conf 262s + for path_pair in "${softhsm2_conf_paths[@]}" 262s + IFS=: 262s + read -r -a path 262s + path=/etc/softhsm/softhsm2.conf 262s + backup_file /etc/softhsm/softhsm2.conf 262s + '[' -z /tmp/sssd-softhsm2-backups-LmQPn3 ']' 262s + '[' -e /etc/softhsm/softhsm2.conf ']' 262s ++ dirname /etc/softhsm/softhsm2.conf 262s + local back_dir=/tmp/sssd-softhsm2-backups-LmQPn3//etc/softhsm 262s ++ basename /etc/softhsm/softhsm2.conf 262s + local back_path=/tmp/sssd-softhsm2-backups-LmQPn3//etc/softhsm/softhsm2.conf 262s + '[' '!' -e /tmp/sssd-softhsm2-backups-LmQPn3//etc/softhsm/softhsm2.conf ']' 262s + mkdir -p /tmp/sssd-softhsm2-backups-LmQPn3//etc/softhsm 262s + cp -a /etc/softhsm/softhsm2.conf /tmp/sssd-softhsm2-backups-LmQPn3//etc/softhsm/softhsm2.conf 262s + restore_paths+=("$back_path") 262s + rm -f /etc/softhsm/softhsm2.conf 262s + test_authentication login /tmp/sssd-softhsm2-certs-AyXu88/softhsm2-test-root-CA-trusted-certificate-0001.conf /tmp/sssd-softhsm2-certs-AyXu88/test-full-chain-CA.pem 262s + pam_service=login 262s Using CA DB '/tmp/sssd-softhsm2-certs-AyXu88/test-full-chain-CA.pem' with verification options: '' 262s + certificate_config=/tmp/sssd-softhsm2-certs-AyXu88/softhsm2-test-root-CA-trusted-certificate-0001.conf 262s + ca_db=/tmp/sssd-softhsm2-certs-AyXu88/test-full-chain-CA.pem 262s + verification_options= 262s + mkdir -p -m 700 /etc/sssd 262s + echo 'Using CA DB '\''/tmp/sssd-softhsm2-certs-AyXu88/test-full-chain-CA.pem'\'' with verification options: '\'''\''' 262s + cat 262s + chmod 600 /etc/sssd/sssd.conf 262s + for path_pair in "${softhsm2_conf_paths[@]}" 262s + IFS=: 262s + read -r -a path 262s + user=ubuntu 262s + path=/home/ubuntu/.config/softhsm2/softhsm2.conf 262s ++ dirname /home/ubuntu/.config/softhsm2/softhsm2.conf 262s + runuser -u ubuntu -- mkdir -p /home/ubuntu/.config/softhsm2 262s + runuser -u ubuntu -- ln -sf /tmp/sssd-softhsm2-certs-AyXu88/softhsm2-test-root-CA-trusted-certificate-0001.conf /home/ubuntu/.config/softhsm2/softhsm2.conf 262s + runuser -u ubuntu -- softhsm2-util --show-slots 262s + grep 'Test Organization' 262s Label: Test Organization Root Tr Token 262s + for path_pair in "${softhsm2_conf_paths[@]}" 262s + IFS=: 262s + read -r -a path 262s + user=root 262s + path=/etc/softhsm/softhsm2.conf 262s ++ dirname /etc/softhsm/softhsm2.conf 262s + runuser -u root -- mkdir -p /etc/softhsm 262s + runuser -u root -- ln -sf /tmp/sssd-softhsm2-certs-AyXu88/softhsm2-test-root-CA-trusted-certificate-0001.conf /etc/softhsm/softhsm2.conf 262s + runuser -u root -- softhsm2-util --show-slots 262s + grep 'Test Organization' 262s Label: Test Organization Root Tr Token 262s + systemctl restart sssd 262s + pam-auth-update --disable sss-smart-card-optional sss-smart-card-required 262s + for alternative in "${alternative_pam_configs[@]}" 262s + pam-auth-update --enable sss-smart-card-optional 262s + cat /etc/pam.d/common-auth 262s # 262s # /etc/pam.d/common-auth - authentication settings common to all services 262s # 262s # This file is included from other service-specific PAM config files, 262s # and should contain a list of the authentication modules that define 262s # the central authentication scheme for use on the system 262s # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the 262s # traditional Unix authentication mechanisms. 262s # 262s # As of pam 1.0.1-6, this file is managed by pam-auth-update by default. 262s # To take advantage of this, it is recommended that you configure any 262s # local modules either before or after the default block, and use 262s # pam-auth-update to manage selection of other modules. See 262s # pam-auth-update(8) for details. 262s 262s # here are the per-package modules (the "Primary" block) 262s auth [success=3 default=ignore] pam_sss.so allow_missing_name try_cert_auth 262s auth [success=2 default=ignore] pam_unix.so nullok try_first_pass 262s auth [success=1 default=ignore] pam_sss.so use_first_pass 262s # here's the fallback if no module succeeds 262s auth requisite pam_deny.so 262s # prime the stack with a positive return value if there isn't one already; 262s # this avoids us returning an error just because nothing sets a success code 262s # since the modules above will each just jump around 262s auth required pam_permit.so 262s # and here are more per-package modules (the "Additional" block) 262s auth optional pam_cap.so 262s # end of pam-auth-update config 262s + echo -n -e 123456 262s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 262s pamtester: invoking pam_start(login, ubuntu, ...) 262s pamtester: performing operation - authenticate 262s PIN for Test Organization Root Tr Token: pamtester: successfully authenticated 262s + echo -n -e 123456 262s + runuser -u ubuntu -- pamtester -v login '' authenticate 262s pamtester: invoking pam_start(login, , ...) 262s pamtester: performing operation - authenticate 262s PIN for Test Organization Root Tr Token: pamtester: successfully authenticated 262s + echo -n -e wrong123456 262s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 262s pamtester: invoking pam_start(login, ubuntu, ...) 262s pamtester: performing operation - authenticate 265s PIN for Test Organization Root Tr Token: Password: pamtester: Authentication failure 265s + echo -n -e wrong123456 265s + runuser -u ubuntu -- pamtester -v login '' authenticate 265s pamtester: invoking pam_start(login, , ...) 265s pamtester: performing operation - authenticate 268s Password: pamtester: Authentication failure 268s + echo -n -e 123456 268s + pamtester -v login root authenticate 268s pamtester: invoking pam_start(login, root, ...) 268s pamtester: performing operation - authenticate 270s Password: pamtester: Authentication failure 270s + for alternative in "${alternative_pam_configs[@]}" 270s + pam-auth-update --enable sss-smart-card-required 271s PAM configuration 271s ----------------- 271s 271s Incompatible PAM profiles selected. 271s 271s The following PAM profiles cannot be used together: 271s 271s SSS required smart card authentication, SSS optional smart card 271s authentication 271s 271s Please select a different set of modules to enable. 271s 271s + cat /etc/pam.d/common-auth 271s # 271s # /etc/pam.d/common-auth - authentication settings common to all services 271s # 271s # This file is included from other service-specific PAM config files, 271s # and should contain a list of the authentication modules that define 271s # the central authentication scheme for use on the system 271s # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the 271s # traditional Unix authentication mechanisms. 271s # 271s # As of pam 1.0.1-6, this file is managed by pam-auth-update by default. 271s # To take advantage of this, it is recommended that you configure any 271s # local modules either before or after the default block, and use 271s # pam-auth-update to manage selection of other modules. See 271s # pam-auth-update(8) for details. 271s 271s # here are the per-package modules (the "Primary" block) 271s auth [success=3 ignore=ignore default=die] pam_sss.so allow_missing_name require_cert_auth 271s auth [success=2 default=ignore] pam_unix.so nullok try_first_pass 271s auth [success=1 default=ignore] pam_sss.so use_first_pass 271s # here's the fallback if no module succeeds 271s auth requisite pam_deny.so 271s # prime the stack with a positive return value if there isn't one already; 271s # this avoids us returning an error just because nothing sets a success code 271s # since the modules above will each just jump around 271s auth required pam_permit.so 271s # and here are more per-package modules (the "Additional" block) 271s auth optional pam_cap.so 271s # end of pam-auth-update config 271s + echo -n -e 123456 271s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 271s pamtester: invoking pam_start(login, ubuntu, ...) 271s pamtester: performing operation - authenticate 275s Please (re)insert (different) Smartcardpamtester: Authentication service cannot retrieve authentication info 275s Please insert smart card 275s Please (re)insert (different) Smartcard 275s + return 2 275s + handle_exit 275s + exit_code=2 275s + restore_changes 275s + for path in "${restore_paths[@]}" 275s + local original_path 275s ++ realpath --strip --relative-base=/tmp/sssd-softhsm2-backups-LmQPn3 /tmp/sssd-softhsm2-backups-LmQPn3//etc/softhsm/softhsm2.conf 275s + original_path=/etc/softhsm/softhsm2.conf 275s + rm /etc/softhsm/softhsm2.conf 275s + mv /tmp/sssd-softhsm2-backups-LmQPn3//etc/softhsm/softhsm2.conf /etc/softhsm/softhsm2.conf 275s + for path in "${delete_paths[@]}" 275s + rm -f /etc/sssd/sssd.conf 275s + for path in "${delete_paths[@]}" 275s + rm -f /home/ubuntu/.config/softhsm2/softhsm2.conf 275s + pam-auth-update --disable sss-smart-card-optional sss-smart-card-required 275s + '[' -e /etc/sssd/sssd.conf ']' 275s + systemctl stop sssd 275s + '[' -e /etc/softhsm/softhsm2.conf ']' 275s + chmod 600 /etc/softhsm/softhsm2.conf 275s + rm -rf /tmp/sssd-softhsm2-certs-AyXu88 275s + '[' 2 = 0 ']' 275s + set +x 275s Script failed, check the log! 275s Backup preserved at /tmp/sssd-softhsm2-backups-LmQPn3 275s PAM Log: /var/log/auth.log 275s SSSD PAM Log: /var/log/sssd/sssd_pam.log 275s SSSD p11_child Log: /var/log/sssd/p11_child.log 275s autopkgtest [00:02:11]: test sssd-smart-card-pam-auth-configs: -----------------------] 276s autopkgtest [00:02:12]: test sssd-smart-card-pam-auth-configs: - - - - - - - - - - results - - - - - - - - - - 276s sssd-smart-card-pam-auth-configs FAIL non-zero exit status 2 276s autopkgtest [00:02:12]: @@@@@@@@@@@@@@@@@@@@ summary 276s ldap-user-group-ldap-auth PASS 276s ldap-user-group-krb5-auth PASS 276s sssd-softhism2-certificates-tests.sh PASS 276s sssd-smart-card-pam-auth-configs FAIL non-zero exit status 2