0s autopkgtest [21:21:49]: starting date and time: 2025-02-20 21:21:49+0000 0s autopkgtest [21:21:49]: git checkout: 325255d2 Merge branch 'pin-any-arch' into 'ubuntu/production' 0s autopkgtest [21:21:49]: host juju-7f2275-prod-proposed-migration-environment-2; command line: /home/ubuntu/autopkgtest/runner/autopkgtest --output-dir /tmp/autopkgtest-work.6q8f2iog/out --timeout-copy=6000 --setup-commands /home/ubuntu/autopkgtest-cloud/worker-config-production/setup-canonical.sh --apt-pocket=proposed=src:gmp --apt-upgrade gnutls28 --timeout-short=300 --timeout-copy=20000 --timeout-build=20000 --env=ADT_TEST_TRIGGERS=gmp/2:6.3.0+dfsg-3ubuntu1 -- ssh -s /home/ubuntu/autopkgtest/ssh-setup/nova -- --flavor builder-cpu2-ram4-disk20 --security-groups autopkgtest-juju-7f2275-prod-proposed-migration-environment-2@bos03-29.secgroup --name adt-plucky-amd64-gnutls28-20250220-201056-juju-7f2275-prod-proposed-migration-environment-2-f74a7210-be5b-4a53-b16b-124bd0355e3b --image adt/ubuntu-plucky-amd64-server --keyname testbed-juju-7f2275-prod-proposed-migration-environment-2 --net-id=net_prod-proposed-migration-amd64 -e TERM=linux -e ''"'"'http_proxy=http://squid.internal:3128'"'"'' -e ''"'"'https_proxy=http://squid.internal:3128'"'"'' -e ''"'"'no_proxy=127.0.0.1,127.0.1.1,login.ubuntu.com,localhost,localdomain,novalocal,internal,archive.ubuntu.com,ports.ubuntu.com,security.ubuntu.com,ddebs.ubuntu.com,changelogs.ubuntu.com,keyserver.ubuntu.com,launchpadlibrarian.net,launchpadcontent.net,launchpad.net,10.24.0.0/24,keystone.ps5.canonical.com,objectstorage.prodstack5.canonical.com,radosgw.ps5.canonical.com'"'"'' --mirror=http://ftpmaster.internal/ubuntu/ 145s autopkgtest [21:24:14]: testbed dpkg architecture: amd64 145s autopkgtest [21:24:14]: testbed apt version: 2.9.30 145s autopkgtest [21:24:14]: @@@@@@@@@@@@@@@@@@@@ test bed setup 145s autopkgtest [21:24:14]: testbed release detected to be: None 146s autopkgtest [21:24:15]: updating testbed package index (apt update) 147s Get:1 http://ftpmaster.internal/ubuntu plucky-proposed InRelease [110 kB] 147s Hit:2 http://ftpmaster.internal/ubuntu plucky InRelease 147s Hit:3 http://ftpmaster.internal/ubuntu plucky-updates InRelease 147s Hit:4 http://ftpmaster.internal/ubuntu plucky-security InRelease 147s Get:5 http://ftpmaster.internal/ubuntu plucky-proposed/multiverse Sources [14.8 kB] 147s Get:6 http://ftpmaster.internal/ubuntu plucky-proposed/universe Sources [746 kB] 148s Get:7 http://ftpmaster.internal/ubuntu plucky-proposed/restricted Sources [3120 B] 148s Get:8 http://ftpmaster.internal/ubuntu plucky-proposed/main Sources [88.0 kB] 148s Get:9 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 Packages [130 kB] 148s Get:10 http://ftpmaster.internal/ubuntu plucky-proposed/main i386 Packages [105 kB] 148s Get:11 http://ftpmaster.internal/ubuntu plucky-proposed/restricted i386 Packages [2412 B] 148s Get:12 http://ftpmaster.internal/ubuntu plucky-proposed/restricted amd64 Packages [7984 B] 148s Get:13 http://ftpmaster.internal/ubuntu plucky-proposed/universe i386 Packages [267 kB] 148s Get:14 http://ftpmaster.internal/ubuntu plucky-proposed/universe amd64 Packages [703 kB] 148s Get:15 http://ftpmaster.internal/ubuntu plucky-proposed/multiverse i386 Packages [9128 B] 148s Get:16 http://ftpmaster.internal/ubuntu plucky-proposed/multiverse amd64 Packages [22.5 kB] 148s Fetched 2210 kB in 2s (1230 kB/s) 149s Reading package lists... 150s Reading package lists... 150s Building dependency tree... 150s Reading state information... 151s Calculating upgrade... 151s The following package was automatically installed and is no longer required: 151s libapt-pkg6.0t64 151s Use 'sudo apt autoremove' to remove it. 151s The following packages will be upgraded: 151s cryptsetup-bin fwupd inetutils-telnet kbd libcryptsetup12 libfwupd3 151s libssl3t64 openssl openssl-provider-legacy python3-requests telnet 151s ubuntu-pro-client ubuntu-pro-client-l10n 151s 13 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 151s Need to get 10.3 MB of archives. 151s After this operation, 189 kB of additional disk space will be used. 151s Get:1 http://ftpmaster.internal/ubuntu plucky/main amd64 openssl-provider-legacy amd64 3.4.1-1ubuntu1 [38.8 kB] 151s Get:2 http://ftpmaster.internal/ubuntu plucky/main amd64 libssl3t64 amd64 3.4.1-1ubuntu1 [2334 kB] 152s Get:3 http://ftpmaster.internal/ubuntu plucky/main amd64 kbd amd64 2.7.1-2ubuntu1 [242 kB] 152s Get:4 http://ftpmaster.internal/ubuntu plucky/main amd64 openssl amd64 3.4.1-1ubuntu1 [1189 kB] 153s Get:5 http://ftpmaster.internal/ubuntu plucky/main amd64 ubuntu-pro-client-l10n amd64 34.1.3 [18.3 kB] 153s Get:6 http://ftpmaster.internal/ubuntu plucky/main amd64 ubuntu-pro-client amd64 34.1.3 [241 kB] 153s Get:7 http://ftpmaster.internal/ubuntu plucky/main amd64 inetutils-telnet amd64 2:2.5-6ubuntu1 [116 kB] 153s Get:8 http://ftpmaster.internal/ubuntu plucky/main amd64 telnet all 0.17+2.5-6ubuntu1 [3694 B] 153s Get:9 http://ftpmaster.internal/ubuntu plucky/main amd64 libcryptsetup12 amd64 2:2.7.5-1ubuntu2 [321 kB] 153s Get:10 http://ftpmaster.internal/ubuntu plucky/main amd64 cryptsetup-bin amd64 2:2.7.5-1ubuntu2 [222 kB] 153s Get:11 http://ftpmaster.internal/ubuntu plucky/main amd64 fwupd amd64 2.0.6-3 [5408 kB] 154s Get:12 http://ftpmaster.internal/ubuntu plucky/main amd64 libfwupd3 amd64 2.0.6-3 [136 kB] 154s Get:13 http://ftpmaster.internal/ubuntu plucky/main amd64 python3-requests all 2.32.3+dfsg-4ubuntu1 [52.9 kB] 154s Fetched 10.3 MB in 3s (3494 kB/s) 155s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 109023 files and directories currently installed.) 155s Preparing to unpack .../openssl-provider-legacy_3.4.1-1ubuntu1_amd64.deb ... 155s Unpacking openssl-provider-legacy (3.4.1-1ubuntu1) over (3.4.0-1ubuntu2) ... 155s Setting up openssl-provider-legacy (3.4.1-1ubuntu1) ... 155s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 109023 files and directories currently installed.) 155s Preparing to unpack .../libssl3t64_3.4.1-1ubuntu1_amd64.deb ... 155s Unpacking libssl3t64:amd64 (3.4.1-1ubuntu1) over (3.4.0-1ubuntu2) ... 155s Setting up libssl3t64:amd64 (3.4.1-1ubuntu1) ... 155s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 109023 files and directories currently installed.) 155s Preparing to unpack .../00-kbd_2.7.1-2ubuntu1_amd64.deb ... 155s Unpacking kbd (2.7.1-2ubuntu1) over (2.6.4-2ubuntu3) ... 155s Preparing to unpack .../01-openssl_3.4.1-1ubuntu1_amd64.deb ... 155s Unpacking openssl (3.4.1-1ubuntu1) over (3.4.0-1ubuntu2) ... 155s Preparing to unpack .../02-ubuntu-pro-client-l10n_34.1.3_amd64.deb ... 155s Unpacking ubuntu-pro-client-l10n (34.1.3) over (34.1.2) ... 155s Preparing to unpack .../03-ubuntu-pro-client_34.1.3_amd64.deb ... 155s /usr/bin/py3clean:101: DeprecationWarning: glob.glob1 is deprecated and will be removed in Python 3.15. Use glob.glob and pass a directory to its root_dir argument instead. 155s for fn in glob1(directory, "%s.*" % fname): 155s Unpacking ubuntu-pro-client (34.1.3) over (34.1.2) ... 155s Preparing to unpack .../04-inetutils-telnet_2%3a2.5-6ubuntu1_amd64.deb ... 155s Unpacking inetutils-telnet (2:2.5-6ubuntu1) over (2:2.5-5ubuntu1) ... 155s Preparing to unpack .../05-telnet_0.17+2.5-6ubuntu1_all.deb ... 155s Unpacking telnet (0.17+2.5-6ubuntu1) over (0.17+2.5-5ubuntu1) ... 155s Preparing to unpack .../06-libcryptsetup12_2%3a2.7.5-1ubuntu2_amd64.deb ... 155s Unpacking libcryptsetup12:amd64 (2:2.7.5-1ubuntu2) over (2:2.7.2-2ubuntu1) ... 155s Preparing to unpack .../07-cryptsetup-bin_2%3a2.7.5-1ubuntu2_amd64.deb ... 155s Unpacking cryptsetup-bin (2:2.7.5-1ubuntu2) over (2:2.7.2-2ubuntu1) ... 155s Preparing to unpack .../08-fwupd_2.0.6-3_amd64.deb ... 156s Unpacking fwupd (2.0.6-3) over (2.0.5-1) ... 156s Preparing to unpack .../09-libfwupd3_2.0.6-3_amd64.deb ... 156s Unpacking libfwupd3:amd64 (2.0.6-3) over (2.0.5-1) ... 156s Preparing to unpack .../10-python3-requests_2.32.3+dfsg-4ubuntu1_all.deb ... 156s /usr/bin/py3clean:101: DeprecationWarning: glob.glob1 is deprecated and will be removed in Python 3.15. Use glob.glob and pass a directory to its root_dir argument instead. 156s for fn in glob1(directory, "%s.*" % fname): 156s Unpacking python3-requests (2.32.3+dfsg-4ubuntu1) over (2.32.3+dfsg-1ubuntu1) ... 156s Setting up inetutils-telnet (2:2.5-6ubuntu1) ... 156s Setting up libfwupd3:amd64 (2.0.6-3) ... 156s Setting up python3-requests (2.32.3+dfsg-4ubuntu1) ... 156s Setting up libcryptsetup12:amd64 (2:2.7.5-1ubuntu2) ... 156s Setting up kbd (2.7.1-2ubuntu1) ... 156s Setting up openssl (3.4.1-1ubuntu1) ... 156s Setting up ubuntu-pro-client (34.1.3) ... 157s Setting up fwupd (2.0.6-3) ... 158s fwupd-refresh.service is a disabled or a static unit not running, not starting it. 158s fwupd.service is a disabled or a static unit not running, not starting it. 158s Setting up cryptsetup-bin (2:2.7.5-1ubuntu2) ... 158s Setting up ubuntu-pro-client-l10n (34.1.3) ... 158s Setting up telnet (0.17+2.5-6ubuntu1) ... 158s Processing triggers for libc-bin (2.40-4ubuntu1) ... 158s Processing triggers for man-db (2.13.0-1) ... 159s Processing triggers for dbus (1.16.0-1ubuntu1) ... 159s Processing triggers for initramfs-tools (0.145ubuntu2) ... 159s update-initramfs: Generating /boot/initrd.img-6.12.0-15-generic 159s W: No lz4 in /usr/bin:/sbin:/bin, using gzip 170s Reading package lists... 170s Building dependency tree... 170s Reading state information... 171s The following packages will be REMOVED: 171s libapt-pkg6.0t64* 171s 0 upgraded, 0 newly installed, 1 to remove and 1 not upgraded. 171s After this operation, 3725 kB disk space will be freed. 171s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 109020 files and directories currently installed.) 171s Removing libapt-pkg6.0t64:amd64 (2.9.29) ... 171s Processing triggers for libc-bin (2.40-4ubuntu1) ... 171s autopkgtest [21:24:40]: upgrading testbed (apt dist-upgrade and autopurge) 171s Reading package lists... 172s Building dependency tree... 172s Reading state information... 172s Calculating upgrade...Starting pkgProblemResolver with broken count: 0 172s Starting 2 pkgProblemResolver with broken count: 0 172s Done 173s Entering ResolveByKeep 173s 173s The following packages will be upgraded: 173s libgmp10 174s 1 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 174s Need to get 256 kB of archives. 174s After this operation, 0 B of additional disk space will be used. 174s Get:1 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 libgmp10 amd64 2:6.3.0+dfsg-3ubuntu1 [256 kB] 174s Fetched 256 kB in 0s (614 kB/s) 174s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 108970 files and directories currently installed.) 174s Preparing to unpack .../libgmp10_2%3a6.3.0+dfsg-3ubuntu1_amd64.deb ... 174s Unpacking libgmp10:amd64 (2:6.3.0+dfsg-3ubuntu1) over (2:6.3.0+dfsg-2ubuntu7) ... 174s Setting up libgmp10:amd64 (2:6.3.0+dfsg-3ubuntu1) ... 174s Processing triggers for libc-bin (2.40-4ubuntu1) ... 175s Reading package lists... 175s Building dependency tree... 175s Reading state information... 176s Starting pkgProblemResolver with broken count: 0 176s Starting 2 pkgProblemResolver with broken count: 0 176s Done 176s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 176s autopkgtest [21:24:45]: rebooting testbed after setup commands that affected boot 202s autopkgtest [21:25:11]: testbed running kernel: Linux 6.12.0-15-generic #15-Ubuntu SMP PREEMPT_DYNAMIC Tue Feb 4 16:02:16 UTC 2025 206s autopkgtest [21:25:15]: @@@@@@@@@@@@@@@@@@@@ apt-source gnutls28 212s Get:1 http://ftpmaster.internal/ubuntu plucky/main gnutls28 3.8.9-2ubuntu1 (dsc) [3264 B] 212s Get:2 http://ftpmaster.internal/ubuntu plucky/main gnutls28 3.8.9-2ubuntu1 (tar) [6847 kB] 212s Get:3 http://ftpmaster.internal/ubuntu plucky/main gnutls28 3.8.9-2ubuntu1 (asc) [833 B] 212s Get:4 http://ftpmaster.internal/ubuntu plucky/main gnutls28 3.8.9-2ubuntu1 (diff) [81.7 kB] 213s gpgv: Signature made Tue Feb 11 13:03:29 2025 UTC 213s gpgv: using RSA key 92978A6E195E4921825F7FF0F34F09744E9F5DD9 213s gpgv: Can't check signature: No public key 213s dpkg-source: warning: cannot verify inline signature for ./gnutls28_3.8.9-2ubuntu1.dsc: no acceptable signature found 213s autopkgtest [21:25:22]: testing package gnutls28 version 3.8.9-2ubuntu1 214s autopkgtest [21:25:23]: build not needed 222s autopkgtest [21:25:31]: test run-upstream-testsuite: preparing testbed 222s Reading package lists... 223s Building dependency tree... 223s Reading state information... 223s Starting pkgProblemResolver with broken count: 0 223s Starting 2 pkgProblemResolver with broken count: 0 223s Done 224s The following NEW packages will be installed: 224s build-essential cpp cpp-14 cpp-14-x86-64-linux-gnu cpp-x86-64-linux-gnu g++ 224s g++-14 g++-14-x86-64-linux-gnu g++-x86-64-linux-gnu gcc gcc-14 224s gcc-14-x86-64-linux-gnu gcc-x86-64-linux-gnu gnutls-bin gnutls-doc libasan8 224s libcc1-0 libevent-2.1-7t64 libgcc-14-dev libgmp-dev libgmpxx4ldbl 224s libgnutls-dane0t64 libgnutls-openssl27t64 libgnutls28-dev libgomp1 224s libhwasan0 libidn2-dev libisl23 libitm1 liblsan0 libmpc3 libp11-kit-dev 224s libquadmath0 libsofthsm2 libstdc++-14-dev libtasn1-6-dev libtsan2 libubsan1 224s libunbound8 net-tools nettle-dev softhsm2 softhsm2-common 224s 0 upgraded, 43 newly installed, 0 to remove and 0 not upgraded. 224s Need to get 74.5 MB of archives. 224s After this operation, 252 MB of additional disk space will be used. 224s Get:1 http://ftpmaster.internal/ubuntu plucky/main amd64 libisl23 amd64 0.27-1 [685 kB] 225s Get:2 http://ftpmaster.internal/ubuntu plucky/main amd64 libmpc3 amd64 1.3.1-1build2 [55.3 kB] 225s Get:3 http://ftpmaster.internal/ubuntu plucky/main amd64 cpp-14-x86-64-linux-gnu amd64 14.2.0-17ubuntu1 [11.9 MB] 226s Get:4 http://ftpmaster.internal/ubuntu plucky/main amd64 cpp-14 amd64 14.2.0-17ubuntu1 [1032 B] 226s Get:5 http://ftpmaster.internal/ubuntu plucky/main amd64 cpp-x86-64-linux-gnu amd64 4:14.2.0-1ubuntu1 [5586 B] 226s Get:6 http://ftpmaster.internal/ubuntu plucky/main amd64 cpp amd64 4:14.2.0-1ubuntu1 [22.4 kB] 226s Get:7 http://ftpmaster.internal/ubuntu plucky/main amd64 libcc1-0 amd64 15-20250213-1ubuntu1 [47.0 kB] 226s Get:8 http://ftpmaster.internal/ubuntu plucky/main amd64 libgomp1 amd64 15-20250213-1ubuntu1 [148 kB] 226s Get:9 http://ftpmaster.internal/ubuntu plucky/main amd64 libitm1 amd64 15-20250213-1ubuntu1 [28.5 kB] 226s Get:10 http://ftpmaster.internal/ubuntu plucky/main amd64 libasan8 amd64 15-20250213-1ubuntu1 [3059 kB] 226s Get:11 http://ftpmaster.internal/ubuntu plucky/main amd64 liblsan0 amd64 15-20250213-1ubuntu1 [1356 kB] 227s Get:12 http://ftpmaster.internal/ubuntu plucky/main amd64 libtsan2 amd64 15-20250213-1ubuntu1 [2757 kB] 227s Get:13 http://ftpmaster.internal/ubuntu plucky/main amd64 libubsan1 amd64 15-20250213-1ubuntu1 [1206 kB] 227s Get:14 http://ftpmaster.internal/ubuntu plucky/main amd64 libhwasan0 amd64 15-20250213-1ubuntu1 [1678 kB] 227s Get:15 http://ftpmaster.internal/ubuntu plucky/main amd64 libquadmath0 amd64 15-20250213-1ubuntu1 [152 kB] 227s Get:16 http://ftpmaster.internal/ubuntu plucky/main amd64 libgcc-14-dev amd64 14.2.0-17ubuntu1 [2814 kB] 227s Get:17 http://ftpmaster.internal/ubuntu plucky/main amd64 gcc-14-x86-64-linux-gnu amd64 14.2.0-17ubuntu1 [23.3 MB] 228s Get:18 http://ftpmaster.internal/ubuntu plucky/main amd64 gcc-14 amd64 14.2.0-17ubuntu1 [536 kB] 228s Get:19 http://ftpmaster.internal/ubuntu plucky/main amd64 gcc-x86-64-linux-gnu amd64 4:14.2.0-1ubuntu1 [1208 B] 228s Get:20 http://ftpmaster.internal/ubuntu plucky/main amd64 gcc amd64 4:14.2.0-1ubuntu1 [5004 B] 228s Get:21 http://ftpmaster.internal/ubuntu plucky/main amd64 libstdc++-14-dev amd64 14.2.0-17ubuntu1 [2507 kB] 228s Get:22 http://ftpmaster.internal/ubuntu plucky/main amd64 g++-14-x86-64-linux-gnu amd64 14.2.0-17ubuntu1 [13.4 MB] 228s Get:23 http://ftpmaster.internal/ubuntu plucky/main amd64 g++-14 amd64 14.2.0-17ubuntu1 [21.8 kB] 228s Get:24 http://ftpmaster.internal/ubuntu plucky/main amd64 g++-x86-64-linux-gnu amd64 4:14.2.0-1ubuntu1 [968 B] 228s Get:25 http://ftpmaster.internal/ubuntu plucky/main amd64 g++ amd64 4:14.2.0-1ubuntu1 [1100 B] 228s Get:26 http://ftpmaster.internal/ubuntu plucky/main amd64 build-essential amd64 12.10ubuntu1 [4928 B] 228s Get:27 http://ftpmaster.internal/ubuntu plucky/main amd64 libevent-2.1-7t64 amd64 2.1.12-stable-10 [144 kB] 228s Get:28 http://ftpmaster.internal/ubuntu plucky/main amd64 libunbound8 amd64 1.22.0-1ubuntu1 [519 kB] 228s Get:29 http://ftpmaster.internal/ubuntu plucky/main amd64 libgnutls-dane0t64 amd64 3.8.9-2ubuntu1 [24.4 kB] 228s Get:30 http://ftpmaster.internal/ubuntu plucky/universe amd64 gnutls-bin amd64 3.8.9-2ubuntu1 [282 kB] 228s Get:31 http://ftpmaster.internal/ubuntu plucky/main amd64 gnutls-doc all 3.8.9-2ubuntu1 [4304 kB] 228s Get:32 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 libgmpxx4ldbl amd64 2:6.3.0+dfsg-3ubuntu1 [10.0 kB] 228s Get:33 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 libgmp-dev amd64 2:6.3.0+dfsg-3ubuntu1 [341 kB] 228s Get:34 http://ftpmaster.internal/ubuntu plucky/main amd64 libgnutls-openssl27t64 amd64 3.8.9-2ubuntu1 [24.6 kB] 228s Get:35 http://ftpmaster.internal/ubuntu plucky/main amd64 libidn2-dev amd64 2.3.7-2build2 [120 kB] 228s Get:36 http://ftpmaster.internal/ubuntu plucky/main amd64 libp11-kit-dev amd64 0.25.5-2ubuntu3 [23.5 kB] 229s Get:37 http://ftpmaster.internal/ubuntu plucky/main amd64 libtasn1-6-dev amd64 4.20.0-2 [98.1 kB] 229s Get:38 http://ftpmaster.internal/ubuntu plucky/main amd64 nettle-dev amd64 3.10.1-1 [1187 kB] 229s Get:39 http://ftpmaster.internal/ubuntu plucky/main amd64 libgnutls28-dev amd64 3.8.9-2ubuntu1 [1114 kB] 229s Get:40 http://ftpmaster.internal/ubuntu plucky/main amd64 net-tools amd64 2.10-1.1ubuntu1 [204 kB] 229s Get:41 http://ftpmaster.internal/ubuntu plucky/universe amd64 softhsm2-common amd64 2.6.1-2.2ubuntu3 [6198 B] 229s Get:42 http://ftpmaster.internal/ubuntu plucky/universe amd64 libsofthsm2 amd64 2.6.1-2.2ubuntu3 [266 kB] 229s Get:43 http://ftpmaster.internal/ubuntu plucky/universe amd64 softhsm2 amd64 2.6.1-2.2ubuntu3 [175 kB] 229s Fetched 74.5 MB in 5s (15.8 MB/s) 229s Selecting previously unselected package libisl23:amd64. 229s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 108970 files and directories currently installed.) 229s Preparing to unpack .../00-libisl23_0.27-1_amd64.deb ... 229s Unpacking libisl23:amd64 (0.27-1) ... 229s Selecting previously unselected package libmpc3:amd64. 229s Preparing to unpack .../01-libmpc3_1.3.1-1build2_amd64.deb ... 229s Unpacking libmpc3:amd64 (1.3.1-1build2) ... 229s Selecting previously unselected package cpp-14-x86-64-linux-gnu. 229s Preparing to unpack .../02-cpp-14-x86-64-linux-gnu_14.2.0-17ubuntu1_amd64.deb ... 229s Unpacking cpp-14-x86-64-linux-gnu (14.2.0-17ubuntu1) ... 230s Selecting previously unselected package cpp-14. 230s Preparing to unpack .../03-cpp-14_14.2.0-17ubuntu1_amd64.deb ... 230s Unpacking cpp-14 (14.2.0-17ubuntu1) ... 230s Selecting previously unselected package cpp-x86-64-linux-gnu. 230s Preparing to unpack .../04-cpp-x86-64-linux-gnu_4%3a14.2.0-1ubuntu1_amd64.deb ... 230s Unpacking cpp-x86-64-linux-gnu (4:14.2.0-1ubuntu1) ... 230s Selecting previously unselected package cpp. 230s Preparing to unpack .../05-cpp_4%3a14.2.0-1ubuntu1_amd64.deb ... 230s Unpacking cpp (4:14.2.0-1ubuntu1) ... 230s Selecting previously unselected package libcc1-0:amd64. 230s Preparing to unpack .../06-libcc1-0_15-20250213-1ubuntu1_amd64.deb ... 230s Unpacking libcc1-0:amd64 (15-20250213-1ubuntu1) ... 230s Selecting previously unselected package libgomp1:amd64. 230s Preparing to unpack .../07-libgomp1_15-20250213-1ubuntu1_amd64.deb ... 230s Unpacking libgomp1:amd64 (15-20250213-1ubuntu1) ... 230s Selecting previously unselected package libitm1:amd64. 230s Preparing to unpack .../08-libitm1_15-20250213-1ubuntu1_amd64.deb ... 230s Unpacking libitm1:amd64 (15-20250213-1ubuntu1) ... 230s Selecting previously unselected package libasan8:amd64. 230s Preparing to unpack .../09-libasan8_15-20250213-1ubuntu1_amd64.deb ... 230s Unpacking libasan8:amd64 (15-20250213-1ubuntu1) ... 230s Selecting previously unselected package liblsan0:amd64. 230s Preparing to unpack .../10-liblsan0_15-20250213-1ubuntu1_amd64.deb ... 230s Unpacking liblsan0:amd64 (15-20250213-1ubuntu1) ... 230s Selecting previously unselected package libtsan2:amd64. 230s Preparing to unpack .../11-libtsan2_15-20250213-1ubuntu1_amd64.deb ... 230s Unpacking libtsan2:amd64 (15-20250213-1ubuntu1) ... 230s Selecting previously unselected package libubsan1:amd64. 230s Preparing to unpack .../12-libubsan1_15-20250213-1ubuntu1_amd64.deb ... 230s Unpacking libubsan1:amd64 (15-20250213-1ubuntu1) ... 230s Selecting previously unselected package libhwasan0:amd64. 230s Preparing to unpack .../13-libhwasan0_15-20250213-1ubuntu1_amd64.deb ... 230s Unpacking libhwasan0:amd64 (15-20250213-1ubuntu1) ... 230s Selecting previously unselected package libquadmath0:amd64. 230s Preparing to unpack .../14-libquadmath0_15-20250213-1ubuntu1_amd64.deb ... 230s Unpacking libquadmath0:amd64 (15-20250213-1ubuntu1) ... 230s Selecting previously unselected package libgcc-14-dev:amd64. 230s Preparing to unpack .../15-libgcc-14-dev_14.2.0-17ubuntu1_amd64.deb ... 230s Unpacking libgcc-14-dev:amd64 (14.2.0-17ubuntu1) ... 230s Selecting previously unselected package gcc-14-x86-64-linux-gnu. 230s Preparing to unpack .../16-gcc-14-x86-64-linux-gnu_14.2.0-17ubuntu1_amd64.deb ... 230s Unpacking gcc-14-x86-64-linux-gnu (14.2.0-17ubuntu1) ... 231s Selecting previously unselected package gcc-14. 231s Preparing to unpack .../17-gcc-14_14.2.0-17ubuntu1_amd64.deb ... 231s Unpacking gcc-14 (14.2.0-17ubuntu1) ... 231s Selecting previously unselected package gcc-x86-64-linux-gnu. 231s Preparing to unpack .../18-gcc-x86-64-linux-gnu_4%3a14.2.0-1ubuntu1_amd64.deb ... 231s Unpacking gcc-x86-64-linux-gnu (4:14.2.0-1ubuntu1) ... 231s Selecting previously unselected package gcc. 231s Preparing to unpack .../19-gcc_4%3a14.2.0-1ubuntu1_amd64.deb ... 231s Unpacking gcc (4:14.2.0-1ubuntu1) ... 231s Selecting previously unselected package libstdc++-14-dev:amd64. 231s Preparing to unpack .../20-libstdc++-14-dev_14.2.0-17ubuntu1_amd64.deb ... 231s Unpacking libstdc++-14-dev:amd64 (14.2.0-17ubuntu1) ... 231s Selecting previously unselected package g++-14-x86-64-linux-gnu. 231s Preparing to unpack .../21-g++-14-x86-64-linux-gnu_14.2.0-17ubuntu1_amd64.deb ... 231s Unpacking g++-14-x86-64-linux-gnu (14.2.0-17ubuntu1) ... 231s Selecting previously unselected package g++-14. 231s Preparing to unpack .../22-g++-14_14.2.0-17ubuntu1_amd64.deb ... 231s Unpacking g++-14 (14.2.0-17ubuntu1) ... 231s Selecting previously unselected package g++-x86-64-linux-gnu. 231s Preparing to unpack .../23-g++-x86-64-linux-gnu_4%3a14.2.0-1ubuntu1_amd64.deb ... 231s Unpacking g++-x86-64-linux-gnu (4:14.2.0-1ubuntu1) ... 231s Selecting previously unselected package g++. 231s Preparing to unpack .../24-g++_4%3a14.2.0-1ubuntu1_amd64.deb ... 231s Unpacking g++ (4:14.2.0-1ubuntu1) ... 231s Selecting previously unselected package build-essential. 231s Preparing to unpack .../25-build-essential_12.10ubuntu1_amd64.deb ... 231s Unpacking build-essential (12.10ubuntu1) ... 231s Selecting previously unselected package libevent-2.1-7t64:amd64. 231s Preparing to unpack .../26-libevent-2.1-7t64_2.1.12-stable-10_amd64.deb ... 231s Unpacking libevent-2.1-7t64:amd64 (2.1.12-stable-10) ... 231s Selecting previously unselected package libunbound8:amd64. 231s Preparing to unpack .../27-libunbound8_1.22.0-1ubuntu1_amd64.deb ... 231s Unpacking libunbound8:amd64 (1.22.0-1ubuntu1) ... 231s Selecting previously unselected package libgnutls-dane0t64:amd64. 231s Preparing to unpack .../28-libgnutls-dane0t64_3.8.9-2ubuntu1_amd64.deb ... 231s Unpacking libgnutls-dane0t64:amd64 (3.8.9-2ubuntu1) ... 231s Selecting previously unselected package gnutls-bin. 231s Preparing to unpack .../29-gnutls-bin_3.8.9-2ubuntu1_amd64.deb ... 231s Unpacking gnutls-bin (3.8.9-2ubuntu1) ... 231s Selecting previously unselected package gnutls-doc. 231s Preparing to unpack .../30-gnutls-doc_3.8.9-2ubuntu1_all.deb ... 231s Unpacking gnutls-doc (3.8.9-2ubuntu1) ... 232s Selecting previously unselected package libgmpxx4ldbl:amd64. 232s Preparing to unpack .../31-libgmpxx4ldbl_2%3a6.3.0+dfsg-3ubuntu1_amd64.deb ... 232s Unpacking libgmpxx4ldbl:amd64 (2:6.3.0+dfsg-3ubuntu1) ... 232s Selecting previously unselected package libgmp-dev:amd64. 232s Preparing to unpack .../32-libgmp-dev_2%3a6.3.0+dfsg-3ubuntu1_amd64.deb ... 232s Unpacking libgmp-dev:amd64 (2:6.3.0+dfsg-3ubuntu1) ... 232s Selecting previously unselected package libgnutls-openssl27t64:amd64. 232s Preparing to unpack .../33-libgnutls-openssl27t64_3.8.9-2ubuntu1_amd64.deb ... 232s Unpacking libgnutls-openssl27t64:amd64 (3.8.9-2ubuntu1) ... 232s Selecting previously unselected package libidn2-dev:amd64. 232s Preparing to unpack .../34-libidn2-dev_2.3.7-2build2_amd64.deb ... 232s Unpacking libidn2-dev:amd64 (2.3.7-2build2) ... 232s Selecting previously unselected package libp11-kit-dev:amd64. 232s Preparing to unpack .../35-libp11-kit-dev_0.25.5-2ubuntu3_amd64.deb ... 232s Unpacking libp11-kit-dev:amd64 (0.25.5-2ubuntu3) ... 232s Selecting previously unselected package libtasn1-6-dev:amd64. 232s Preparing to unpack .../36-libtasn1-6-dev_4.20.0-2_amd64.deb ... 232s Unpacking libtasn1-6-dev:amd64 (4.20.0-2) ... 232s Selecting previously unselected package nettle-dev:amd64. 232s Preparing to unpack .../37-nettle-dev_3.10.1-1_amd64.deb ... 232s Unpacking nettle-dev:amd64 (3.10.1-1) ... 232s Selecting previously unselected package libgnutls28-dev:amd64. 232s Preparing to unpack .../38-libgnutls28-dev_3.8.9-2ubuntu1_amd64.deb ... 232s Unpacking libgnutls28-dev:amd64 (3.8.9-2ubuntu1) ... 232s Selecting previously unselected package net-tools. 232s Preparing to unpack .../39-net-tools_2.10-1.1ubuntu1_amd64.deb ... 232s Unpacking net-tools (2.10-1.1ubuntu1) ... 232s Selecting previously unselected package softhsm2-common. 232s Preparing to unpack .../40-softhsm2-common_2.6.1-2.2ubuntu3_amd64.deb ... 232s Unpacking softhsm2-common (2.6.1-2.2ubuntu3) ... 232s Selecting previously unselected package libsofthsm2. 232s Preparing to unpack .../41-libsofthsm2_2.6.1-2.2ubuntu3_amd64.deb ... 232s Unpacking libsofthsm2 (2.6.1-2.2ubuntu3) ... 232s Selecting previously unselected package softhsm2. 232s Preparing to unpack .../42-softhsm2_2.6.1-2.2ubuntu3_amd64.deb ... 232s Unpacking softhsm2 (2.6.1-2.2ubuntu3) ... 232s Setting up libgnutls-openssl27t64:amd64 (3.8.9-2ubuntu1) ... 232s Setting up net-tools (2.10-1.1ubuntu1) ... 232s Setting up softhsm2-common (2.6.1-2.2ubuntu3) ... 232s Creating config file /etc/softhsm/softhsm2.conf with new version 232s Setting up gnutls-doc (3.8.9-2ubuntu1) ... 232s Setting up libevent-2.1-7t64:amd64 (2.1.12-stable-10) ... 232s Setting up libgomp1:amd64 (15-20250213-1ubuntu1) ... 232s Setting up libunbound8:amd64 (1.22.0-1ubuntu1) ... 232s Setting up libgmpxx4ldbl:amd64 (2:6.3.0+dfsg-3ubuntu1) ... 232s Setting up libgnutls-dane0t64:amd64 (3.8.9-2ubuntu1) ... 232s Setting up libquadmath0:amd64 (15-20250213-1ubuntu1) ... 232s Setting up libmpc3:amd64 (1.3.1-1build2) ... 232s Setting up libidn2-dev:amd64 (2.3.7-2build2) ... 232s Setting up libubsan1:amd64 (15-20250213-1ubuntu1) ... 232s Setting up libhwasan0:amd64 (15-20250213-1ubuntu1) ... 232s Setting up libasan8:amd64 (15-20250213-1ubuntu1) ... 232s Setting up libtsan2:amd64 (15-20250213-1ubuntu1) ... 232s Setting up libisl23:amd64 (0.27-1) ... 232s Setting up libtasn1-6-dev:amd64 (4.20.0-2) ... 232s Setting up libcc1-0:amd64 (15-20250213-1ubuntu1) ... 232s Setting up liblsan0:amd64 (15-20250213-1ubuntu1) ... 232s Setting up libp11-kit-dev:amd64 (0.25.5-2ubuntu3) ... 232s Setting up libitm1:amd64 (15-20250213-1ubuntu1) ... 232s Setting up gnutls-bin (3.8.9-2ubuntu1) ... 232s Setting up libsofthsm2 (2.6.1-2.2ubuntu3) ... 232s Setting up softhsm2 (2.6.1-2.2ubuntu3) ... 232s Setting up libgmp-dev:amd64 (2:6.3.0+dfsg-3ubuntu1) ... 232s Setting up nettle-dev:amd64 (3.10.1-1) ... 232s Setting up cpp-14-x86-64-linux-gnu (14.2.0-17ubuntu1) ... 232s Setting up cpp-14 (14.2.0-17ubuntu1) ... 232s Setting up libgcc-14-dev:amd64 (14.2.0-17ubuntu1) ... 232s Setting up libstdc++-14-dev:amd64 (14.2.0-17ubuntu1) ... 232s Setting up cpp-x86-64-linux-gnu (4:14.2.0-1ubuntu1) ... 232s Setting up libgnutls28-dev:amd64 (3.8.9-2ubuntu1) ... 232s Setting up cpp (4:14.2.0-1ubuntu1) ... 232s Setting up gcc-14-x86-64-linux-gnu (14.2.0-17ubuntu1) ... 232s Setting up gcc-x86-64-linux-gnu (4:14.2.0-1ubuntu1) ... 232s Setting up gcc-14 (14.2.0-17ubuntu1) ... 232s Setting up g++-14-x86-64-linux-gnu (14.2.0-17ubuntu1) ... 232s Setting up g++-x86-64-linux-gnu (4:14.2.0-1ubuntu1) ... 232s Setting up g++-14 (14.2.0-17ubuntu1) ... 232s Setting up gcc (4:14.2.0-1ubuntu1) ... 232s Setting up g++ (4:14.2.0-1ubuntu1) ... 232s update-alternatives: using /usr/bin/g++ to provide /usr/bin/c++ (c++) in auto mode 232s Setting up build-essential (12.10ubuntu1) ... 232s Processing triggers for libc-bin (2.40-4ubuntu1) ... 232s Processing triggers for man-db (2.13.0-1) ... 234s Processing triggers for install-info (7.1.1-1) ... 237s autopkgtest [21:25:46]: test run-upstream-testsuite: [----------------------- 237s running [1]../../tests/cert-reencoding.sh ... 237s reserved port 19343 237s reserved port 13618 237s === Bringing TLS server up === 237s verify depth is 1, must return a certificate 238s Processed 1 CA certificate(s). 238s Processed 1 client X.509 certificates... 238s Resolving 'localhost:13618'... 238s Connecting to '::1:13618'... 238s - Successfully sent 1 certificate(s) to server. 238s - Server has requested a certificate. 238s - Certificate type: X.509 238s - Got a certificate list of 2 certificates. 238s - Certificate[0] info: 238s - subject `CN=10.13.129.47', issuer `CN=openshift-signer@1518195148', serial 0x1b, RSA key 2048 bits, signed using RSA-SHA256, activated `2018-02-27 20:30:40 UTC', expires `2020-02-27 20:30:41 UTC', pin-sha256="B3TjGz3S+RKw91MHrajNBvkKOA5ILVmNODRTEy9whVI=" 238s Public Key ID: 238s sha1:2998d4ed3228568f89cfe53155f83822bec2259a 238s sha256:0774e31b3dd2f912b0f75307ada8cd06f90a380e482d598d383453132f708552 238s Public Key PIN: 238s pin-sha256:B3TjGz3S+RKw91MHrajNBvkKOA5ILVmNODRTEy9whVI= 238s 238s - Certificate[1] info: 238s - subject `CN=openshift-signer@1518195148', issuer `CN=openshift-signer@1518195148', serial 0x01, RSA key 2048 bits, signed using RSA-SHA256, activated `2018-02-09 16:52:27 UTC', expires `2023-02-08 16:52:28 UTC', pin-sha256="/rwXpFoFDGYQHRTUipi7kl/XZCTtqaaa052cmrqwh6k=" 238s - Status: The certificate is trusted. 238s - Description: (TLS1.3-X.509)-(ECDHE-SECP256R1)-(RSA-PSS-RSAE-SHA256)-(AES-256-GCM) 238s - Session ID: E6:30:65:60:15:01:C7:71:F3:1B:97:5D:4E:38:FC:90:F7:44:28:74:76:CB:EE:8D:5E:F9:1A:AD:B5:EC:71:D5 238s - Options: 238s - Handshake was completed 238s 238s - Simple Client Mode: 238s 238s - Peer has closed the GnuTLS connection 238s depth=1 CN=openshift-signer@1518195148 238s verify return:1 238s depth=0 O=system:cluster-admins + O=system:masters, CN=system:admin 238s verify return:1 238s ../../tests/cert-reencoding.sh: 78: kill: No such process 238s 238s SUCCESS [1]../../tests/cert-reencoding.sh 238s running [2]../../tests/cert-tests/aki.sh ... 238s SUCCESS [2]../../tests/cert-tests/aki.sh 238s running [3]../../tests/cert-tests/alt-chain.sh ... 238s 238s 238s SUCCESS [3]../../tests/cert-tests/alt-chain.sh 238s running [4]../../tests/cert-tests/cert-critical.sh ... 238s Subject: CN=CA-1 238s Issuer: CN=CA-0 238s Checked against: CN=CA-0 238s Signature algorithm: RSA-SHA256 238s Output: Not verified. The certificate is NOT trusted. The certificate contains an unknown critical extension. 238s 238s Chain verification output: Not verified. The certificate is NOT trusted. The certificate contains an unknown critical extension. 238s 238s Subject: CN=CA-1 238s Issuer: CN=CA-0 238s Checked against: CN=CA-0 238s Signature algorithm: RSA-SHA256 238s Output: Verified. The certificate is trusted. 238s 238s Subject: CN=server-2 238s Issuer: CN=CA-1 238s Checked against: CN=CA-1 238s Signature algorithm: RSA-SHA256 238s Output: Not verified. The certificate is NOT trusted. The certificate contains an unknown critical extension. 238s 238s Chain verification output: Not verified. The certificate is NOT trusted. The certificate contains an unknown critical extension. 238s 238s Subject: CN=CA-1 238s Issuer: CN=CA-0 238s Checked against: CN=CA-0 238s Signature algorithm: RSA-SHA256 238s Output: Verified. The certificate is trusted. 238s 238s Subject: CN=server-2 238s Issuer: CN=CA-1 238s Checked against: CN=CA-1 238s Signature algorithm: RSA-SHA256 238s Output: Not verified. The certificate is NOT trusted. The certificate contains an unknown critical extension. 238s 238s Chain verification output: Not verified. The certificate is NOT trusted. The certificate contains an unknown critical extension. 238s 238s SUCCESS [4]../../tests/cert-tests/cert-critical.sh 238s running [5]../../tests/cert-tests/cert-non-digits-time.sh ... 238s SUCCESS [5]../../tests/cert-tests/cert-non-digits-time.sh 238s running [6]../../tests/cert-tests/cert-sanity.sh ... 238s Note that no verification profile was selected. In the future the medium profile will be enabled by default. 238s Use --verify-profile low to apply the default verification of NORMAL priority string. 238s Loaded CAs (1 available) 238s Note that no verification profile was selected. In the future the medium profile will be enabled by default. 238s Use --verify-profile low to apply the default verification of NORMAL priority string. 238s Loaded CAs (1 available) 238s Note that no verification profile was selected. In the future the medium profile will be enabled by default. 238s Use --verify-profile low to apply the default verification of NORMAL priority string. 238s Note that no verification profile was selected. In the future the medium profile will be enabled by default. 238s Use --verify-profile low to apply the default verification of NORMAL priority string. 238s Note that no verification profile was selected. In the future the medium profile will be enabled by default. 238s Use --verify-profile low to apply the default verification of NORMAL priority string. 238s Note that no verification profile was selected. In the future the medium profile will be enabled by default. 238s Use --verify-profile low to apply the default verification of NORMAL priority string. 238s Loaded CAs (2 available) 238s error parsing CRTs: The DER time encoding is invalid. 238s import error: Error in the certificate. 238s SUCCESS [6]../../tests/cert-tests/cert-sanity.sh 238s running [7]../../tests/cert-tests/cert-time.sh ... 238s import error: Error in the certificate. 238s import error: Error in the time fields of certificate. 238s import error: ASN1 parser: Error in DER parsing. 238s import error: Error in the time fields of certificate. 238s import error: Error in the time fields of certificate. 238s import error: Error in the time fields of certificate. 238s import error: Error in the time fields of certificate. 238s SUCCESS [7]../../tests/cert-tests/cert-time.sh 238s running [8]../../tests/cert-tests/certtool-crl-decoding.sh ... 238s import error: Error in the time fields of certificate. 238s SUCCESS [8]../../tests/cert-tests/certtool-crl-decoding.sh 238s running [9]../../tests/cert-tests/certtool-ecdsa.sh ... 238s Generating a 256 bit EC/ECDSA private key ... 238s SUCCESS [9]../../tests/cert-tests/certtool-ecdsa.sh 238s running [10]../../tests/cert-tests/certtool-eddsa.sh ... 238s Generating a 256 bit EdDSA (Ed25519) private key ... 238s Public Key Info: 238s Public Key Algorithm: EdDSA (Ed25519) 238s Key Security Level: High (256 bits) 238s 238s curve: Ed25519 238s private key: 238s ef:b5:5b:28:5d:ef:7b:39:3f:7c:86:b5:1b:a4:c9:d3 238s b7:3f:0f:36:04:ec:bd:60:e7:96:6a:ec:31:a9:23:53 238s 238s 238s x: 238s 9b:79:ce:89:cc:aa:de:e4:a9:7e:98:20:9f:33:81:88 238s 33:28:0d:6d:42:2e:d6:06:e6:ea:66:ec:4d:11:5e:cc 238s 238s 238s 238s Public Key PIN: 238s pin-sha256:i/Z+M/94K42Nk0msYYt0o46gH4m2+ODCisMCHEQK9zU= 238s Public Key ID: 238s sha256:8bf67e33ff782b8d8d9349ac618b74a38ea01f89b6f8e0c28ac3021c440af735 238s sha1:4c7298a414f8f98b867956b59dd3992f4154e762 238s 238s -----BEGIN PRIVATE KEY----- 238s MC4CAQAwBQYDK2VwBCIEIO+1Wyhd73s5P3yGtRukydO3Pw82BOy9YOeWauwxqSNT 238s -----END PRIVATE KEY----- 238s Generating a self signed certificate... 238s X.509 Certificate Information: 238s Version: 3 238s Serial Number (hex): 07 238s Validity: 238s Not Before: Tue Oct 12 00:00:00 UTC 2038 238s Not After: Tue Nov 14 00:00:00 UTC 2045 238s Subject: EMAIL=none@none.org,pseudonym=jackal,title=Dr.,UID=clauper,CN=Cindy Lauper,OU=sleeping dept.,O=Koko inc.,ST=Attiki,C=GR 238s Subject Public Key Algorithm: EdDSA (Ed25519) 238s Algorithm Security Level: High (256 bits) 238s Curve: Ed25519 238s X: 238s 9b:79:ce:89:cc:aa:de:e4:a9:7e:98:20:9f:33:81:88 238s 33:28:0d:6d:42:2e:d6:06:e6:ea:66:ec:4d:11:5e:cc 238s Extensions: 238s Basic Constraints (critical): 238s Certificate Authority (CA): TRUE 238s Subject Alternative Name (not critical): 238s DNSname: www.none.org 238s DNSname: www.morethanone.org 238s DNSname: www.evenmorethanone.org 238s IPAddress: 192.168.1.1 238s RFC822Name: none@none.org 238s RFC822Name: where@none.org 238s Key Purpose (not critical): 238s OCSP signing. 238s Key Usage (critical): 238s Digital signature. 238s Certificate signing. 238s Subject Key Identifier (not critical): 238s 4c7298a414f8f98b867956b59dd3992f4154e762 238s CRL Distribution points (not critical): 238s URI: http://www.getcrl.crl/getcrl1/ 238s URI: http://www.getcrl.crl/getcrl2/ 238s URI: http://www.getcrl.crl/getcrl3/ 238s Other Information: 238s Public Key ID: 238s sha1:4c7298a414f8f98b867956b59dd3992f4154e762 238s sha256:8bf67e33ff782b8d8d9349ac618b74a38ea01f89b6f8e0c28ac3021c440af735 238s Public Key PIN: 238s pin-sha256:i/Z+M/94K42Nk0msYYt0o46gH4m2+ODCisMCHEQK9zU= 238s 238s 238s 238s Signing certificate... 238s Subject: EMAIL=none@none.org,pseudonym=jackal,title=Dr.,UID=clauper,CN=Cindy Lauper,OU=sleeping dept.,O=Koko inc.,ST=Attiki,C=GR 238s Issuer: EMAIL=none@none.org,pseudonym=jackal,title=Dr.,UID=clauper,CN=Cindy Lauper,OU=sleeping dept.,O=Koko inc.,ST=Attiki,C=GR 238s Checked against: EMAIL=none@none.org,pseudonym=jackal,title=Dr.,UID=clauper,CN=Cindy Lauper,OU=sleeping dept.,O=Koko inc.,ST=Attiki,C=GR 238s Signature algorithm: EdDSA-Ed25519 238s Output: Verified. The certificate is trusted. 238s 238s Chain verification output: Verified. The certificate is trusted. 238s 238s Note that no verification profile was selected. In the future the medium profile will be enabled by default. 238s Use --verify-profile low to apply the default verification of NORMAL priority string. 238s Loaded CAs (1 available) 238s Subject: EMAIL=none@none.org,pseudonym=jackal,title=Dr.,UID=clauper,CN=Cindy Lauper,OU=sleeping dept.,O=Koko inc.,ST=Attiki,C=GR 238s Issuer: CN=GnuTLS Test CA 238s Checked against: CN=GnuTLS Test CA 238s Signature algorithm: RSA-SHA256 238s Output: Verified. The certificate is trusted. 238s 238s Chain verification output: Verified. The certificate is trusted. 238s 238s Subject: CN=server-1 238s Issuer: CN=CA-0 238s Checked against: CN=CA-0 238s Signature algorithm: EdDSA-Ed25519 238s Output: Verified. The certificate is trusted. 238s 238s Chain verification output: Verified. The certificate is trusted. 238s 238s SUCCESS [10]../../tests/cert-tests/certtool-eddsa.sh 238s running [11]../../tests/cert-tests/certtool-long-cn.sh ... 238s SUCCESS [11]../../tests/cert-tests/certtool-long-cn.sh 238s running [12]../../tests/cert-tests/certtool-long-oids.sh ... 238s Note that no verification profile was selected. In the future the medium profile will be enabled by default. 238s Use --verify-profile low to apply the default verification of NORMAL priority string. 238s Loaded CAs (1 available) 238s Note that no verification profile was selected. In the future the medium profile will be enabled by default. 238s Use --verify-profile low to apply the default verification of NORMAL priority string. 238s SUCCESS [12]../../tests/cert-tests/certtool-long-oids.sh 238s running [13]../../tests/cert-tests/certtool-rsa-oaep.sh ... 238s Generating a 3072 bit RSA-OAEP private key... 238s Generating a 3072 bit RSA-OAEP private key... 239s Encrypted structure detected... 239s Generating a signed certificate... 239s X.509 Certificate Information: 239s Version: 3 239s Serial Number (hex): 594334a25603610e0f521417f149be174a13ada8 239s Validity: 239s Not Before: Thu Feb 20 21:25:48 UTC 2025 239s Not After: Fri Feb 20 21:25:48 UTC 2026 239s Subject: CN=test.gnutls.org,O=GnuTLS test server 239s Subject Public Key Algorithm: RSA-OAEP 239s Algorithm Security Level: High (3072 bits) 239s Modulus (bits 3072): 239s 00:a6:c0:74:db:e7:36:da:ed:ea:49:c7:83:a7:b4:1f 239s df:2c:34:db:3b:c9:e1:76:b0:bc:8a:eb:4c:1d:45:5f 239s d2:d3:f7:9e:d6:2d:71:df:80:1f:da:8e:11:e7:10:b6 239s 69:2e:34:c0:95:4c:08:8a:11:3f:9d:64:50:0e:7d:ac 239s 2a:85:d6:34:26:6c:64:bc:69:df:4f:23:9d:79:7d:d1 239s 0e:fb:4a:d5:61:30:71:94:48:b4:1a:80:07:39:d8:31 239s 2a:7c:68:43:dd:50:76:ad:c5:5d:d8:29:50:bb:e0:c1 239s d2:18:c6:f8:5b:48:40:c7:9c:a6:74:f0:14:16:e8:c6 239s 93:dd:c4:15:98:15:0a:b5:39:e1:c8:c3:38:c7:5f:22 239s d0:39:35:24:e9:29:e6:57:fb:08:d5:66:72:b3:2d:35 239s f7:63:19:5c:3f:a3:23:76:43:14:a6:e6:d2:30:11:04 239s cd:43:12:4d:64:03:96:29:ae:6b:62:f0:23:48:18:3f 239s fa:43:0f:e1:f4:9e:f5:40:93:58:8c:c6:75:bc:65:a6 239s e9:6a:46:39:03:aa:5c:f1:66:a3:f0:a6:39:75:35:99 239s b0:0e:ff:03:58:d4:af:1b:6a:31:d4:9d:f7:2f:1b:ed 239s 1e:1f:9f:96:d7:6f:da:72:cf:42:e0:4b:8f:1b:99:12 239s f1:65:a2:80:22:e1:e4:18:a6:15:80:a3:bb:65:55:5f 239s 1a:92:e4:37:40:09:83:9a:73:6a:8e:54:48:2d:c9:00 239s 7a:cf:bc:53:52:6c:89:b5:58:d0:5b:78:f1:0f:6f:30 239s 4f:21:7e:56:21:bf:f2:e5:bb:c5:d0:8e:45:1a:bf:e7 239s ed:02:7f:93:51:62:96:b2:a2:5f:61:64:4a:cf:34:13 239s cd:f8:ed:4b:31:c4:a0:a4:aa:7b:f3:68:07:cb:22:3a 239s 20:89:5e:c5:80:9e:1e:00:44:a0:99:43:ce:84:a6:74 239s a1:57:89:8d:68:9d:4e:31:4b:96:b1:21:a6:f5:36:d2 239s af 239s Exponent (bits 24): 239s 01:00:01 239s Extensions: 239s Basic Constraints (critical): 239s Certificate Authority (CA): FALSE 239s Subject Alternative Name (not critical): 239s DNSname: test.gnutls.org 239s Key Usage (critical): 239s Digital signature. 239s Subject Key Identifier (not critical): 239s 0e45fbcfd02c3a9c942985af9ca5675d25a5d95a 239s Authority Key Identifier (not critical): 239s 4d56b76a0058f16792f4a675551b8e530103efcf 239s Other Information: 239s Public Key ID: 239s sha1:0e45fbcfd02c3a9c942985af9ca5675d25a5d95a 239s sha256:ea49ec65b49ad33a5dfe8e75bfcdb7f9a99a5deab6d6f3cb0ddef281b929b272 239s Public Key PIN: 239s pin-sha256:6knsZbSa0zpd/o51v823+amaXeq21vPLDd7ygbkpsnI= 239s 239s 239s 239s Signing certificate... 239s Subject Public Key Algorithm: RSA-OAEP 239s Generating a 3072 bit RSA-OAEP private key... 239s Encrypted structure detected... 240s Generating a signed certificate... 240s X.509 Certificate Information: 240s Version: 3 240s Serial Number (hex): 432f7e90e02908287c1ca6bbff937bdeb752ba65 240s Validity: 240s Not Before: Thu Feb 20 21:25:49 UTC 2025 240s Not After: Fri Feb 20 21:25:49 UTC 2026 240s Subject: CN=test.gnutls.org,O=GnuTLS test server 240s Subject Public Key Algorithm: RSA-OAEP 240s Algorithm Security Level: High (3072 bits) 240s Modulus (bits 3072): 240s 00:ce:41:59:87:45:fd:34:51:db:93:40:38:72:9d:c1 240s f4:cf:9f:2e:18:7e:73:0a:71:26:16:b4:51:e5:2a:4c 240s 65:5f:3e:dd:a7:1c:1b:63:75:68:2f:5e:e1:f5:5b:d2 240s da:4d:0a:62:d1:ec:7e:0c:46:96:cd:33:c7:64:85:5e 240s 90:09:5a:43:41:55:ab:4a:95:5a:8b:8d:49:39:fc:77 240s 44:f4:62:57:46:c3:8a:08:e0:c3:ca:e7:3f:87:f3:3f 240s 02:df:4c:ef:ad:71:36:22:60:49:55:24:02:ca:e4:9c 240s c6:ba:79:db:37:87:47:fa:cf:cd:8c:c8:f4:76:3d:e2 240s cc:02:41:5a:2c:81:9b:04:f2:68:44:83:96:5a:b7:4a 240s 4e:95:52:b9:fe:f9:d0:5a:fb:b7:75:48:10:db:b4:14 240s 6c:a3:e1:c7:05:8e:5e:a7:94:43:14:69:a9:10:fa:ba 240s 26:fd:00:f9:14:dd:f6:6c:87:48:2d:b2:f7:a4:9f:2c 240s c9:17:b3:94:e3:9f:7d:30:50:9d:75:80:5c:e5:21:12 240s 2d:4f:44:2d:87:6b:b3:b1:a2:50:bc:f2:64:91:c0:a2 240s 50:70:2e:27:2c:8e:e8:e3:ee:db:80:01:d4:d8:78:5e 240s 8a:59:bb:42:cf:40:2b:a0:40:b5:05:64:a9:5f:00:f6 240s 8c:b1:bc:09:d5:63:3f:32:09:1c:da:35:40:c8:de:21 240s 77:38:22:2c:14:57:6f:96:31:51:f2:b8:d0:47:e4:3d 240s 3b:bd:57:d4:68:d4:d7:0f:86:8e:00:15:05:2f:23:46 240s 79:7a:62:48:ae:f9:95:af:11:ca:0b:49:24:fe:c7:9d 240s 66:fc:04:f9:ec:8c:c3:c5:c8:31:d0:3b:99:19:f7:55 240s 45:69:8a:65:08:77:75:49:1d:5e:96:9e:ec:b9:eb:95 240s 37:34:d0:42:3d:b0:e8:c3:e1:3f:1a:1a:22:28:df:53 240s 01:03:13:d3:09:c0:42:5d:ac:08:4a:31:d2:c0:35:92 240s 23 240s Exponent (bits 24): 240s 01:00:01 240s Extensions: 240s Basic Constraints (critical): 240s Certificate Authority (CA): FALSE 240s Subject Alternative Name (not critical): 240s DNSname: test.gnutls.org 240s Key Usage (critical): 240s Digital signature. 240s Subject Key Identifier (not critical): 240s c1107a044ec4ae23d2b36a5a007a86757a8856c4 240s Authority Key Identifier (not critical): 240s 4d56b76a0058f16792f4a675551b8e530103efcf 240s Other Information: 240s Public Key ID: 240s sha1:c1107a044ec4ae23d2b36a5a007a86757a8856c4 240s sha256:9bfba6d2b53458fe8fa46b1bba885eb09b68c8a07b439f598bb20522faa9b319 240s Public Key PIN: 240s pin-sha256:m/um0rU0WP6PpGsbuohesJtoyKB7Q59Zi7IFIvqpsxk= 240s 240s 240s 240s Signing certificate... 240s Subject Public Key Algorithm: RSA-OAEP 240s Generating a 3072 bit RSA-OAEP private key... 240s Encrypted structure detected... 240s Generating a signed certificate... 240s X.509 Certificate Information: 240s Version: 3 240s Serial Number (hex): 11e831222e6cc573e7d896ec77d08d01bbe62aec 240s Validity: 240s Not Before: Thu Feb 20 21:25:49 UTC 2025 240s Not After: Fri Feb 20 21:25:49 UTC 2026 240s Subject: CN=test.gnutls.org,O=GnuTLS test server 240s Subject Public Key Algorithm: RSA-OAEP 240s Algorithm Security Level: High (3072 bits) 240s Modulus (bits 3072): 240s 00:b9:8a:7f:7d:c5:1f:77:02:0a:e4:32:21:64:45:0e 240s 88:bd:27:87:ae:9a:97:46:d0:31:a7:90:73:e2:6a:53 240s 66:af:e5:11:88:30:80:ec:59:3e:e4:91:7d:f8:53:2e 240s cb:4a:f9:30:1a:d7:31:df:19:2c:08:0e:e9:8e:c4:24 240s 09:90:95:3e:63:67:7a:3f:78:31:5e:a2:d0:9e:7f:1d 240s 19:a4:36:b9:86:bc:84:c6:f4:6f:2d:47:b0:23:5f:8f 240s c2:f6:19:b9:23:09:25:7e:52:d6:a3:27:20:b9:33:5c 240s 75:f6:72:aa:de:81:f1:34:2a:4a:2b:f5:15:44:eb:0b 240s 89:d9:2f:cb:81:94:16:12:d5:13:cb:ee:55:b8:d7:94 240s ff:c2:39:e6:bf:06:4c:7d:8f:61:d4:ed:d9:de:b8:1a 240s 10:7e:3b:a9:cd:bb:49:55:a3:d5:71:c4:18:da:26:66 240s 47:b6:cb:bd:0f:8c:9d:21:18:8e:85:03:8d:1b:92:ec 240s 99:91:b5:01:ac:83:4f:db:50:0a:1d:1d:20:0d:6f:0d 240s a4:7b:a7:be:a7:9e:a6:6a:f3:d6:c7:e6:73:55:7c:96 240s d2:9c:ec:76:8b:73:0e:e5:2a:61:59:44:61:e7:84:34 240s be:b3:32:11:2e:23:38:ac:40:f8:00:a4:cb:1a:2f:37 240s b5:d9:31:b1:2d:e6:7e:69:fa:1f:0c:00:71:27:0a:cb 240s 9a:af:79:a0:72:b5:23:cc:1e:c3:32:27:d1:57:79:20 240s 83:fb:a0:0f:14:c3:7c:4d:97:04:7d:44:b4:53:c5:8c 240s c5:d2:2c:e2:67:fc:b9:2a:e8:06:07:1e:6d:bc:6c:1e 240s 20:4b:74:9c:bc:48:4f:10:15:ab:6d:83:87:67:40:69 240s f0:ba:51:ae:22:c3:4f:1b:7b:91:b1:2b:43:a8:ae:fe 240s 99:24:1a:8e:24:71:97:c3:75:28:d8:75:28:59:ab:b3 240s 39:78:2a:e7:12:17:39:f3:e1:11:18:97:76:b0:62:26 240s 1f 240s Exponent (bits 24): 240s 01:00:01 240s Extensions: 240s Basic Constraints (critical): 240s Certificate Authority (CA): FALSE 240s Subject Alternative Name (not critical): 240s DNSname: test.gnutls.org 240s Key Usage (critical): 240s Digital signature. 240s Subject Key Identifier (not critical): 240s f7e2b321b0d79586928928c324bf8bddc5181b20 240s Authority Key Identifier (not critical): 240s 4d56b76a0058f16792f4a675551b8e530103efcf 240s Other Information: 240s Public Key ID: 240s sha1:f7e2b321b0d79586928928c324bf8bddc5181b20 240s sha256:bdbeb0a065e019c8ad38efd4f4cfea604d2738275707e595e3a75bb18c575b68 240s Public Key PIN: 240s pin-sha256:vb6woGXgGcitOO/U9M/qYE0nOCdXB+WV46dbsYxXW2g= 240s 240s 240s 240s Signing certificate... 240s Subject Public Key Algorithm: RSA-OAEP 240s SUCCESS [13]../../tests/cert-tests/certtool-rsa-oaep.sh 240s running [14]../../tests/cert-tests/certtool-rsa-pss.sh ... 240s Generating a 3072 bit RSA-PSS private key... 241s modulus: 241s Generating a 3072 bit RSA-PSS private key... 241s Generating a self signed certificate... 241s X.509 Certificate Information: 241s Version: 3 241s Serial Number (hex): 07 241s Validity: 241s Not Before: Thu Feb 20 21:25:50 UTC 2025 241s Not After: Thu Mar 25 21:25:50 UTC 2032 241s Subject: EMAIL=none@none.org,pseudonym=jackal,title=Dr.,UID=clauper,CN=Cindy Lauper,OU=sleeping dept.,O=Koko inc.,ST=Attiki,C=GR 241s Subject Public Key Algorithm: RSA-PSS 241s Algorithm Security Level: High (3072 bits) 241s Parameters: 241s Hash Algorithm: SHA256 241s Salt Length: 32 241s Modulus (bits 3072): 241s 00:ae:f9:ae:f4:c2:67:76:9a:81:5a:8f:4b:62:c9:38 241s c2:35:65:03:32:ca:a8:91:f7:76:5f:10:8e:94:c3:19 241s d9:1b:a0:84:45:0b:13:59:bc:82:10:21:bd:dc:dd:43 241s 93:38:f0:0c:47:68:71:85:06:73:93:f6:65:03:25:c9 241s cb:c4:11:76:11:b3:a1:30:1b:02:cb:42:1b:0d:33:50 241s 53:86:3a:92:e4:2a:64:eb:d6:47:7c:c7:62:c7:f2:35 241s 4b:a1:22:9e:d5:c7:88:f5:6d:3d:14:ae:19:a5:2d:20 241s 9f:88:91:c7:42:91:a5:fb:9f:90:9e:f1:46:f6:13:05 241s 58:5b:77:66:0b:df:7e:6a:ff:c2:b3:41:67:fd:0e:99 241s 2b:0e:45:80:88:1d:f9:52:ef:2b:c4:f2:7c:52:b5:d3 241s 3b:a0:0c:56:70:6a:18:11:49:4c:9a:55:8c:5d:05:80 241s 95:df:ca:50:3f:07:6a:5e:a8:3a:77:cc:6f:e9:aa:c4 241s 79:bc:4d:51:a6:f9:c4:dc:9b:24:f9:da:71:0c:74:5d 241s 1f:6f:66:49:6e:cb:e7:08:5b:d6:4a:f5:2f:e6:3a:72 241s 6c:7f:5d:1e:50:00:4f:86:cd:a7:6d:ce:ff:12:c1:2e 241s 2b:7f:18:d7:e5:fb:5e:cf:20:3f:dc:76:c1:df:71:b7 241s fd:a5:10:e4:b4:00:d5:95:15:53:fc:4d:63:69:5f:72 241s 54:36:54:f7:6f:5f:e5:50:c4:7e:5d:58:36:16:fb:96 241s f0:69:3d:43:e4:42:4d:b2:20:32:f9:27:c6:96:c6:7c 241s f0:e4:e4:c2:6c:80:66:5d:bf:58:78:0e:98:06:fd:03 241s 60:20:c5:31:a4:6d:21:67:76:77:ea:26:5d:f6:de:d9 241s ab:9e:bd:24:1c:56:f6:81:26:fe:42:e3:71:57:96:bc 241s 49:cc:9f:66:b3:f4:46:d8:c4:59:42:f7:a0:e6:a7:4a 241s 12:f1:fc:02:25:16:e1:91:d6:fd:ba:34:49:af:51:c3 241s d5 241s Exponent (bits 24): 241s 01:00:01 241s Extensions: 241s Basic Constraints (critical): 241s Certificate Authority (CA): TRUE 241s Subject Alternative Name (not critical): 241s DNSname: www.none.org 241s DNSname: www.morethanone.org 241s DNSname: www.evenmorethanone.org 241s IPAddress: 192.168.1.1 241s RFC822Name: none@none.org 241s RFC822Name: where@none.org 241s Key Purpose (not critical): 241s OCSP signing. 241s Key Usage (critical): 241s Digital signature. 241s Certificate signing. 241s Subject Key Identifier (not critical): 241s a5120bd5c894e9a1f20041718a0d385d0996b4ba 241s CRL Distribution points (not critical): 241s URI: http://www.getcrl.crl/getcrl1/ 241s URI: http://www.getcrl.crl/getcrl2/ 241s URI: http://www.getcrl.crl/getcrl3/ 241s Other Information: 241s Public Key ID: 241s sha1:a5120bd5c894e9a1f20041718a0d385d0996b4ba 241s sha256:3f211532a82094c277128484a7c5855363a14d4b8479a0f1a0d2b5f490187791 241s Public Key PIN: 241s pin-sha256:PyEVMqgglMJ3EoSEp8WFU2OhTUuEeaDxoNK19JAYd5E= 241s 241s 241s 241s Signing certificate... 241s Generating a self signed certificate... 241s X.509 Certificate Information: 241s Version: 3 241s Serial Number (hex): 07 241s Validity: 241s Not Before: Thu Feb 20 21:25:50 UTC 2025 241s Not After: Thu Mar 25 21:25:50 UTC 2032 241s Subject: EMAIL=none@none.org,pseudonym=jackal,title=Dr.,UID=clauper,CN=Cindy Lauper,OU=sleeping dept.,O=Koko inc.,ST=Attiki,C=GR 241s Subject Public Key Algorithm: RSA-PSS 241s Algorithm Security Level: High (3072 bits) 241s Parameters: 241s Hash Algorithm: SHA256 241s Salt Length: 32 241s Modulus (bits 3072): 241s 00:ae:f9:ae:f4:c2:67:76:9a:81:5a:8f:4b:62:c9:38 241s c2:35:65:03:32:ca:a8:91:f7:76:5f:10:8e:94:c3:19 241s d9:1b:a0:84:45:0b:13:59:bc:82:10:21:bd:dc:dd:43 241s 93:38:f0:0c:47:68:71:85:06:73:93:f6:65:03:25:c9 241s cb:c4:11:76:11:b3:a1:30:1b:02:cb:42:1b:0d:33:50 241s 53:86:3a:92:e4:2a:64:eb:d6:47:7c:c7:62:c7:f2:35 241s 4b:a1:22:9e:d5:c7:88:f5:6d:3d:14:ae:19:a5:2d:20 241s 9f:88:91:c7:42:91:a5:fb:9f:90:9e:f1:46:f6:13:05 241s 58:5b:77:66:0b:df:7e:6a:ff:c2:b3:41:67:fd:0e:99 241s 2b:0e:45:80:88:1d:f9:52:ef:2b:c4:f2:7c:52:b5:d3 241s 3b:a0:0c:56:70:6a:18:11:49:4c:9a:55:8c:5d:05:80 241s 95:df:ca:50:3f:07:6a:5e:a8:3a:77:cc:6f:e9:aa:c4 241s 79:bc:4d:51:a6:f9:c4:dc:9b:24:f9:da:71:0c:74:5d 241s 1f:6f:66:49:6e:cb:e7:08:5b:d6:4a:f5:2f:e6:3a:72 241s 6c:7f:5d:1e:50:00:4f:86:cd:a7:6d:ce:ff:12:c1:2e 241s 2b:7f:18:d7:e5:fb:5e:cf:20:3f:dc:76:c1:df:71:b7 241s fd:a5:10:e4:b4:00:d5:95:15:53:fc:4d:63:69:5f:72 241s 54:36:54:f7:6f:5f:e5:50:c4:7e:5d:58:36:16:fb:96 241s f0:69:3d:43:e4:42:4d:b2:20:32:f9:27:c6:96:c6:7c 241s f0:e4:e4:c2:6c:80:66:5d:bf:58:78:0e:98:06:fd:03 241s 60:20:c5:31:a4:6d:21:67:76:77:ea:26:5d:f6:de:d9 241s ab:9e:bd:24:1c:56:f6:81:26:fe:42:e3:71:57:96:bc 241s 49:cc:9f:66:b3:f4:46:d8:c4:59:42:f7:a0:e6:a7:4a 241s 12:f1:fc:02:25:16:e1:91:d6:fd:ba:34:49:af:51:c3 241s d5 241s Exponent (bits 24): 241s 01:00:01 241s Extensions: 241s Basic Constraints (critical): 241s Certificate Authority (CA): TRUE 241s Subject Alternative Name (not critical): 241s DNSname: www.none.org 241s DNSname: www.morethanone.org 241s DNSname: www.evenmorethanone.org 241s IPAddress: 192.168.1.1 241s RFC822Name: none@none.org 241s RFC822Name: where@none.org 241s Key Purpose (not critical): 241s OCSP signing. 241s Key Usage (critical): 241s Digital signature. 241s Certificate signing. 241s Subject Key Identifier (not critical): 241s a5120bd5c894e9a1f20041718a0d385d0996b4ba 241s CRL Distribution points (not critical): 241s URI: http://www.getcrl.crl/getcrl1/ 241s URI: http://www.getcrl.crl/getcrl2/ 241s URI: http://www.getcrl.crl/getcrl3/ 241s Other Information: 241s Public Key ID: 241s sha1:a5120bd5c894e9a1f20041718a0d385d0996b4ba 241s sha256:3f211532a82094c277128484a7c5855363a14d4b8479a0f1a0d2b5f490187791 241s Public Key PIN: 241s pin-sha256:PyEVMqgglMJ3EoSEp8WFU2OhTUuEeaDxoNK19JAYd5E= 241s 241s 241s 241s Signing certificate... 241s Generating a self signed certificate... 241s X.509 Certificate Information: 241s Version: 3 241s Serial Number (hex): 07 241s Validity: 241s Not Before: Thu Feb 20 21:25:50 UTC 2025 241s Not After: Thu Mar 25 21:25:50 UTC 2032 241s Subject: EMAIL=none@none.org,pseudonym=jackal,title=Dr.,UID=clauper,CN=Cindy Lauper,OU=sleeping dept.,O=Koko inc.,ST=Attiki,C=GR 241s Subject Public Key Algorithm: RSA-PSS 241s Algorithm Security Level: High (3072 bits) 241s Parameters: 241s Hash Algorithm: SHA256 241s Salt Length: 32 241s Modulus (bits 3072): 241s 00:ae:f9:ae:f4:c2:67:76:9a:81:5a:8f:4b:62:c9:38 241s c2:35:65:03:32:ca:a8:91:f7:76:5f:10:8e:94:c3:19 241s d9:1b:a0:84:45:0b:13:59:bc:82:10:21:bd:dc:dd:43 241s 93:38:f0:0c:47:68:71:85:06:73:93:f6:65:03:25:c9 241s cb:c4:11:76:11:b3:a1:30:1b:02:cb:42:1b:0d:33:50 241s 53:86:3a:92:e4:2a:64:eb:d6:47:7c:c7:62:c7:f2:35 241s 4b:a1:22:9e:d5:c7:88:f5:6d:3d:14:ae:19:a5:2d:20 241s 9f:88:91:c7:42:91:a5:fb:9f:90:9e:f1:46:f6:13:05 241s 58:5b:77:66:0b:df:7e:6a:ff:c2:b3:41:67:fd:0e:99 241s 2b:0e:45:80:88:1d:f9:52:ef:2b:c4:f2:7c:52:b5:d3 241s 3b:a0:0c:56:70:6a:18:11:49:4c:9a:55:8c:5d:05:80 241s 95:df:ca:50:3f:07:6a:5e:a8:3a:77:cc:6f:e9:aa:c4 241s 79:bc:4d:51:a6:f9:c4:dc:9b:24:f9:da:71:0c:74:5d 241s 1f:6f:66:49:6e:cb:e7:08:5b:d6:4a:f5:2f:e6:3a:72 241s 6c:7f:5d:1e:50:00:4f:86:cd:a7:6d:ce:ff:12:c1:2e 241s 2b:7f:18:d7:e5:fb:5e:cf:20:3f:dc:76:c1:df:71:b7 241s fd:a5:10:e4:b4:00:d5:95:15:53:fc:4d:63:69:5f:72 241s 54:36:54:f7:6f:5f:e5:50:c4:7e:5d:58:36:16:fb:96 241s f0:69:3d:43:e4:42:4d:b2:20:32:f9:27:c6:96:c6:7c 241s f0:e4:e4:c2:6c:80:66:5d:bf:58:78:0e:98:06:fd:03 241s 60:20:c5:31:a4:6d:21:67:76:77:ea:26:5d:f6:de:d9 241s ab:9e:bd:24:1c:56:f6:81:26:fe:42:e3:71:57:96:bc 241s 49:cc:9f:66:b3:f4:46:d8:c4:59:42:f7:a0:e6:a7:4a 241s 12:f1:fc:02:25:16:e1:91:d6:fd:ba:34:49:af:51:c3 241s d5 241s Exponent (bits 24): 241s 01:00:01 241s Extensions: 241s Basic Constraints (critical): 241s Certificate Authority (CA): TRUE 241s Subject Alternative Name (not critical): 241s DNSname: www.none.org 241s DNSname: www.morethanone.org 241s DNSname: www.evenmorethanone.org 241s IPAddress: 192.168.1.1 241s RFC822Name: none@none.org 241s RFC822Name: where@none.org 241s Key Purpose (not critical): 241s OCSP signing. 241s Key Usage (critical): 241s Digital signature. 241s Certificate signing. 241s Subject Key Identifier (not critical): 241s a5120bd5c894e9a1f20041718a0d385d0996b4ba 241s CRL Distribution points (not critical): 241s URI: http://www.getcrl.crl/getcrl1/ 241s URI: http://www.getcrl.crl/getcrl2/ 241s URI: http://www.getcrl.crl/getcrl3/ 241s Other Information: 241s Public Key ID: 241s sha1:a5120bd5c894e9a1f20041718a0d385d0996b4ba 241s sha256:3f211532a82094c277128484a7c5855363a14d4b8479a0f1a0d2b5f490187791 241s Public Key PIN: 241s pin-sha256:PyEVMqgglMJ3EoSEp8WFU2OhTUuEeaDxoNK19JAYd5E= 241s 241s 241s 241s Signing certificate... 241s Generating a self signed certificate... 241s X.509 Certificate Information: 241s Version: 3 241s Serial Number (hex): 07 241s Validity: 241s Not Before: Thu Feb 20 21:25:50 UTC 2025 241s Not After: Thu Mar 25 21:25:50 UTC 2032 241s Subject: EMAIL=none@none.org,pseudonym=jackal,title=Dr.,UID=clauper,CN=Cindy Lauper,OU=sleeping dept.,O=Koko inc.,ST=Attiki,C=GR 241s Subject Public Key Algorithm: RSA-PSS 241s Algorithm Security Level: High (3072 bits) 241s Parameters: 241s Hash Algorithm: SHA256 241s Salt Length: 32 241s Modulus (bits 3072): 241s 00:ae:f9:ae:f4:c2:67:76:9a:81:5a:8f:4b:62:c9:38 241s c2:35:65:03:32:ca:a8:91:f7:76:5f:10:8e:94:c3:19 241s d9:1b:a0:84:45:0b:13:59:bc:82:10:21:bd:dc:dd:43 241s 93:38:f0:0c:47:68:71:85:06:73:93:f6:65:03:25:c9 241s cb:c4:11:76:11:b3:a1:30:1b:02:cb:42:1b:0d:33:50 241s 53:86:3a:92:e4:2a:64:eb:d6:47:7c:c7:62:c7:f2:35 241s 4b:a1:22:9e:d5:c7:88:f5:6d:3d:14:ae:19:a5:2d:20 241s 9f:88:91:c7:42:91:a5:fb:9f:90:9e:f1:46:f6:13:05 241s 58:5b:77:66:0b:df:7e:6a:ff:c2:b3:41:67:fd:0e:99 241s 2b:0e:45:80:88:1d:f9:52:ef:2b:c4:f2:7c:52:b5:d3 241s 3b:a0:0c:56:70:6a:18:11:49:4c:9a:55:8c:5d:05:80 241s 95:df:ca:50:3f:07:6a:5e:a8:3a:77:cc:6f:e9:aa:c4 241s 79:bc:4d:51:a6:f9:c4:dc:9b:24:f9:da:71:0c:74:5d 241s 1f:6f:66:49:6e:cb:e7:08:5b:d6:4a:f5:2f:e6:3a:72 241s 6c:7f:5d:1e:50:00:4f:86:cd:a7:6d:ce:ff:12:c1:2e 241s 2b:7f:18:d7:e5:fb:5e:cf:20:3f:dc:76:c1:df:71:b7 241s fd:a5:10:e4:b4:00:d5:95:15:53:fc:4d:63:69:5f:72 241s 54:36:54:f7:6f:5f:e5:50:c4:7e:5d:58:36:16:fb:96 241s f0:69:3d:43:e4:42:4d:b2:20:32:f9:27:c6:96:c6:7c 241s f0:e4:e4:c2:6c:80:66:5d:bf:58:78:0e:98:06:fd:03 241s 60:20:c5:31:a4:6d:21:67:76:77:ea:26:5d:f6:de:d9 241s ab:9e:bd:24:1c:56:f6:81:26:fe:42:e3:71:57:96:bc 241s 49:cc:9f:66:b3:f4:46:d8:c4:59:42:f7:a0:e6:a7:4a 241s 12:f1:fc:02:25:16:e1:91:d6:fd:ba:34:49:af:51:c3 241s d5 241s Exponent (bits 24): 241s 01:00:01 241s Extensions: 241s Basic Constraints (critical): 241s Certificate Authority (CA): TRUE 241s Subject Alternative Name (not critical): 241s DNSname: www.none.org 241s DNSname: www.morethanone.org 241s DNSname: www.evenmorethanone.org 241s IPAddress: 192.168.1.1 241s RFC822Name: none@none.org 241s RFC822Name: where@none.org 241s Key Purpose (not critical): 241s OCSP signing. 241s Key Usage (critical): 241s Digital signature. 241s Certificate signing. 241s Subject Key Identifier (not critical): 241s a5120bd5c894e9a1f20041718a0d385d0996b4ba 241s CRL Distribution points (not critical): 241s URI: http://www.getcrl.crl/getcrl1/ 241s URI: http://www.getcrl.crl/getcrl2/ 241s URI: http://www.getcrl.crl/getcrl3/ 241s Other Information: 241s Public Key ID: 241s sha1:a5120bd5c894e9a1f20041718a0d385d0996b4ba 241s sha256:3f211532a82094c277128484a7c5855363a14d4b8479a0f1a0d2b5f490187791 241s Public Key PIN: 241s pin-sha256:PyEVMqgglMJ3EoSEp8WFU2OhTUuEeaDxoNK19JAYd5E= 241s 241s 241s 241s Signing certificate... 241s Generating a signed certificate... 241s X.509 Certificate Information: 241s Version: 3 241s Serial Number (hex): 07 241s Validity: 241s Not Before: Thu Feb 20 21:25:50 UTC 2025 241s Not After: Thu Mar 25 21:25:50 UTC 2032 241s Subject: EMAIL=none@none.org,pseudonym=jackal,title=Dr.,UID=clauper,CN=Cindy Lauper,OU=sleeping dept.,O=Koko inc.,ST=Attiki,C=GR 241s Subject Public Key Algorithm: RSA-PSS 241s Algorithm Security Level: Medium (2432 bits) 241s Parameters: 241s Hash Algorithm: SHA256 241s Salt Length: 32 241s Modulus (bits 2432): 241s 00:b4:6b:27:98:25:af:c1:ff:1e:ca:b0:7e:f4:d8:bc 241s ed:43:86:67:54:5d:da:b4:1e:c2:90:5f:83:3c:02:11 241s fc:13:72:85:b2:88:a4:65:41:0b:76:5f:23:be:8a:9f 241s fe:79:4b:73:3b:2e:c7:4b:3c:bf:16:c9:97:55:35:17 241s f3:a1:72:4b:30:c2:e0:27:94:12:f3:56:00:e6:ce:82 241s 4b:11:5d:a4:1e:9b:fa:fa:b9:1b:2a:4d:18:b5:ba:a5 241s e6:0c:c7:a8:a8:a1:6d:aa:88:84:dc:96:0e:b2:6c:1c 241s 35:aa:e7:c7:94:3d:f9:d5:c7:c2:a2:0d:4b:b3:6e:7a 241s f7:08:5f:c5:09:cd:15:93:1a:f7:98:df:2a:4c:66:89 241s 24:ed:1f:d0:16:63:81:65:a5:58:3b:a1:cd:25:62:9b 241s 99:81:54:08:17:18:ec:7c:2f:08:a2:3b:28:57:32:9d 241s 17:47:0a:86:fb:62:b1:41:99:e6:fb:de:a8:ea:20:7e 241s f3:1b:ee:ba:ea:9a:21:64:29:92:f2:ad:73:e5:19:05 241s 9d:37:53:e2:11:9f:18:5f:22:ba:e2:8b:0d:00:8c:9e 241s 2f:a7:87:3d:40:be:4a:a2:a5:92:08:0c:2e:61:c0:58 241s 7c:9a:99:e1:d6:ac:83:39:25:cf:3e:1b:ed:eb:a3:6d 241s 9d:cb:c5:38:de:c1:c7:6e:9b:34:14:be:30:3e:82:90 241s 1e:b9:4a:9a:76:e4:ef:33:0c:46:a2:31:72:f6:c3:61 241s 0b:f8:aa:67:89:f4:a5:e5:76:37:a1:29:9f:80:79:aa 241s 75 241s Exponent (bits 24): 241s 01:00:01 241s Extensions: 241s Basic Constraints (critical): 241s Certificate Authority (CA): TRUE 241s Subject Alternative Name (not critical): 241s DNSname: www.none.org 241s DNSname: www.morethanone.org 241s DNSname: www.evenmorethanone.org 241s IPAddress: 192.168.1.1 241s RFC822Name: none@none.org 241s RFC822Name: where@none.org 241s Key Purpose (not critical): 241s OCSP signing. 241s Key Usage (critical): 241s Digital signature. 241s Certificate signing. 241s Subject Key Identifier (not critical): 241s 482334530a8931384a5aeacab6d2a6dece1d2b18 241s Authority Key Identifier (not critical): 241s 4d56b76a0058f16792f4a675551b8e530103efcf 241s CRL Distribution points (not critical): 241s URI: http://www.getcrl.crl/getcrl1/ 241s URI: http://www.getcrl.crl/getcrl2/ 241s URI: http://www.getcrl.crl/getcrl3/ 241s Other Information: 241s Public Key ID: 241s sha1:11ce8c4ddea707d049d8031be6b5725db707c549 241s sha256:075990a687475bb0bab685b1086b2b3dee7a06ce677cae00a76d8598a09b388b 241s Public Key PIN: 241s pin-sha256:B1mQpodHW7C6toWxCGsrPe56Bs5nfK4Ap22FmKCbOIs= 241s 241s 241s 241s Signing certificate... 241s Generating a signed certificate... 241s cannot set certificate type (EC/ECDSA) incompatible with the key (RSA) 241s Generating a signed certificate... 241s X.509 Certificate Information: 241s Version: 3 241s Serial Number (hex): 07 241s Validity: 241s Not Before: Thu Feb 20 21:25:50 UTC 2025 241s Not After: Thu Mar 25 21:25:50 UTC 2032 241s Subject: EMAIL=none@none.org,pseudonym=jackal,title=Dr.,UID=clauper,CN=Cindy Lauper,OU=sleeping dept.,O=Koko inc.,ST=Attiki,C=GR 241s Subject Public Key Algorithm: RSA 241s Algorithm Security Level: Medium (2432 bits) 241s Modulus (bits 2432): 241s 00:b4:6b:27:98:25:af:c1:ff:1e:ca:b0:7e:f4:d8:bc 241s ed:43:86:67:54:5d:da:b4:1e:c2:90:5f:83:3c:02:11 241s fc:13:72:85:b2:88:a4:65:41:0b:76:5f:23:be:8a:9f 241s fe:79:4b:73:3b:2e:c7:4b:3c:bf:16:c9:97:55:35:17 241s f3:a1:72:4b:30:c2:e0:27:94:12:f3:56:00:e6:ce:82 241s 4b:11:5d:a4:1e:9b:fa:fa:b9:1b:2a:4d:18:b5:ba:a5 241s e6:0c:c7:a8:a8:a1:6d:aa:88:84:dc:96:0e:b2:6c:1c 241s 35:aa:e7:c7:94:3d:f9:d5:c7:c2:a2:0d:4b:b3:6e:7a 241s f7:08:5f:c5:09:cd:15:93:1a:f7:98:df:2a:4c:66:89 241s 24:ed:1f:d0:16:63:81:65:a5:58:3b:a1:cd:25:62:9b 241s 99:81:54:08:17:18:ec:7c:2f:08:a2:3b:28:57:32:9d 241s 17:47:0a:86:fb:62:b1:41:99:e6:fb:de:a8:ea:20:7e 241s f3:1b:ee:ba:ea:9a:21:64:29:92:f2:ad:73:e5:19:05 241s 9d:37:53:e2:11:9f:18:5f:22:ba:e2:8b:0d:00:8c:9e 241s 2f:a7:87:3d:40:be:4a:a2:a5:92:08:0c:2e:61:c0:58 241s 7c:9a:99:e1:d6:ac:83:39:25:cf:3e:1b:ed:eb:a3:6d 241s 9d:cb:c5:38:de:c1:c7:6e:9b:34:14:be:30:3e:82:90 241s 1e:b9:4a:9a:76:e4:ef:33:0c:46:a2:31:72:f6:c3:61 241s 0b:f8:aa:67:89:f4:a5:e5:76:37:a1:29:9f:80:79:aa 241s 75 241s Exponent (bits 24): 241s 01:00:01 241s Extensions: 241s Basic Constraints (critical): 241s Certificate Authority (CA): TRUE 241s Subject Alternative Name (not critical): 241s DNSname: www.none.org 241s DNSname: www.morethanone.org 241s DNSname: www.evenmorethanone.org 241s IPAddress: 192.168.1.1 241s RFC822Name: none@none.org 241s RFC822Name: where@none.org 241s Key Purpose (not critical): 241s OCSP signing. 241s Key Usage (critical): 241s Digital signature. 241s Certificate signing. 241s Subject Key Identifier (not critical): 241s 482334530a8931384a5aeacab6d2a6dece1d2b18 241s Authority Key Identifier (not critical): 241s 4d56b76a0058f16792f4a675551b8e530103efcf 241s CRL Distribution points (not critical): 241s URI: http://www.getcrl.crl/getcrl1/ 241s URI: http://www.getcrl.crl/getcrl2/ 241s URI: http://www.getcrl.crl/getcrl3/ 241s Other Information: 241s Public Key ID: 241s sha1:482334530a8931384a5aeacab6d2a6dece1d2b18 241s sha256:6429dcdb1f84533b60e9286712fc2d707c6eb325ea2794492cd0832dcfa554d1 241s Public Key PIN: 241s pin-sha256:ZCnc2x+EUztg6ShnEvwtcHxusyXqJ5RJLNCDLc+lVNE= 241s 241s 241s 241s Signing certificate... 241s Subject Public Key Algorithm: RSA-PSS 241s Signature Algorithm: RSA-PSS-SHA256 241s Signature Algorithm: RSA-PSS-SHA256 241s Generating a 3072 bit RSA-PSS private key... 241s Generating a self signed certificate... 241s X.509 Certificate Information: 241s Version: 3 241s Serial Number (hex): 07 241s Validity: 241s Not Before: Thu Feb 20 21:25:50 UTC 2025 241s Not After: Thu Mar 25 21:25:50 UTC 2032 241s Subject: EMAIL=none@none.org,pseudonym=jackal,title=Dr.,UID=clauper,CN=Cindy Lauper,OU=sleeping dept.,O=Koko inc.,ST=Attiki,C=GR 241s Subject Public Key Algorithm: RSA-PSS 241s Algorithm Security Level: High (3072 bits) 241s Parameters: 241s Hash Algorithm: SHA384 241s Salt Length: 48 241s Modulus (bits 3072): 241s 00:c6:83:2c:62:60:42:a0:30:9e:ec:08:62:ad:15:3b 241s ba:cf:4b:e7:35:79:1d:36:8e:8e:b8:24:c2:48:ef:d2 241s 3b:37:1e:32:d1:68:99:3e:a6:b0:60:b7:9f:f0:96:31 241s 5f:ef:e5:a1:a0:c8:27:e0:94:31:b6:2d:5e:9b:f9:28 241s bd:0f:48:12:c7:5f:78:64:31:8a:59:14:c9:c4:87:28 241s 3e:3e:55:f3:21:ad:69:46:d7:ac:33:0b:8a:a1:ec:fa 241s 24:c9:ce:9d:96:da:c3:ee:3c:4e:45:88:db:a8:9d:1a 241s 0d:c4:35:94:56:87:be:93:04:94:56:7e:66:a1:16:db 241s 93:a2:a8:84:80:b3:25:94:bc:95:10:12:04:3c:9a:4f 241s 9b:77:1b:57:d8:35:e0:69:7e:23:fe:e9:ee:cd:8b:f0 241s 97:29:b6:9d:25:59:52:1d:43:81:b6:21:0c:d4:89:3b 241s 64:bd:88:30:31:af:da:9a:3e:5c:35:6d:90:50:52:e9 241s aa:3d:83:41:b9:d2:35:b0:0a:88:12:2a:4c:92:cf:f5 241s 29:eb:47:13:cb:0e:fe:26:c6:6c:11:74:74:d1:38:dc 241s bd:b0:ab:f7:61:03:dc:50:6c:69:b5:35:b5:8b:0e:14 241s d6:a7:27:02:d1:d2:39:cd:4a:65:c9:b4:aa:b4:63:ea 241s fd:23:dc:74:36:c5:6a:2d:3a:f4:20:e2:df:0d:48:00 241s 15:ac:92:a0:0e:62:b7:ef:13:fb:57:a9:6e:3d:ef:c8 241s 02:62:3c:20:cd:98:27:80:61:e9:15:4b:e5:84:f3:79 241s a3:f4:28:1d:1d:b2:4b:61:10:65:59:8c:a0:1b:66:72 241s 0e:e6:9d:24:53:e9:17:9c:86:fa:2b:79:7e:29:ff:3b 241s f8:00:7a:0b:03:24:f4:4f:03:86:61:58:39:e7:1f:b2 241s 79:bb:13:1b:fc:a5:57:24:c7:7a:f2:c8:fb:77:51:3e 241s a2:61:f9:81:61:4b:9b:52:d7:39:7a:c0:aa:cd:ec:2b 241s 53 241s Exponent (bits 24): 241s 01:00:01 241s Extensions: 241s Basic Constraints (critical): 241s Certificate Authority (CA): TRUE 241s Subject Alternative Name (not critical): 241s DNSname: www.none.org 241s DNSname: www.morethanone.org 241s DNSname: www.evenmorethanone.org 241s IPAddress: 192.168.1.1 241s RFC822Name: none@none.org 241s RFC822Name: where@none.org 241s Key Purpose (not critical): 241s OCSP signing. 241s Key Usage (critical): 241s Digital signature. 241s Certificate signing. 241s Subject Key Identifier (not critical): 241s c8b98581625e5df4468e39a4ab4713712919c592 241s CRL Distribution points (not critical): 241s URI: http://www.getcrl.crl/getcrl1/ 241s URI: http://www.getcrl.crl/getcrl2/ 241s URI: http://www.getcrl.crl/getcrl3/ 241s Other Information: 241s Public Key ID: 241s sha1:c8b98581625e5df4468e39a4ab4713712919c592 241s sha256:6115b4082dfd507ba34ed39cf3ee5d7538811dc299439bf9602e2b310bed4556 241s Public Key PIN: 241s pin-sha256:YRW0CC39UHujTtOc8+5ddTiBHcKZQ5v5YC4rMQvtRVY= 241s 241s 241s 241s Signing certificate... 241s Generating a self signed certificate... 241s X.509 Certificate Information: 241s Version: 3 241s Serial Number (hex): 07 241s Validity: 241s Not Before: Thu Feb 20 21:25:50 UTC 2025 241s Not After: Thu Mar 25 21:25:50 UTC 2032 241s Subject: EMAIL=none@none.org,pseudonym=jackal,title=Dr.,UID=clauper,CN=Cindy Lauper,OU=sleeping dept.,O=Koko inc.,ST=Attiki,C=GR 241s Subject Public Key Algorithm: RSA-PSS 241s Algorithm Security Level: High (3072 bits) 241s Parameters: 241s Hash Algorithm: SHA384 241s Salt Length: 48 241s Modulus (bits 3072): 241s 00:c6:83:2c:62:60:42:a0:30:9e:ec:08:62:ad:15:3b 241s ba:cf:4b:e7:35:79:1d:36:8e:8e:b8:24:c2:48:ef:d2 241s 3b:37:1e:32:d1:68:99:3e:a6:b0:60:b7:9f:f0:96:31 241s 5f:ef:e5:a1:a0:c8:27:e0:94:31:b6:2d:5e:9b:f9:28 241s bd:0f:48:12:c7:5f:78:64:31:8a:59:14:c9:c4:87:28 241s 3e:3e:55:f3:21:ad:69:46:d7:ac:33:0b:8a:a1:ec:fa 241s 24:c9:ce:9d:96:da:c3:ee:3c:4e:45:88:db:a8:9d:1a 241s 0d:c4:35:94:56:87:be:93:04:94:56:7e:66:a1:16:db 241s 93:a2:a8:84:80:b3:25:94:bc:95:10:12:04:3c:9a:4f 241s 9b:77:1b:57:d8:35:e0:69:7e:23:fe:e9:ee:cd:8b:f0 241s 97:29:b6:9d:25:59:52:1d:43:81:b6:21:0c:d4:89:3b 241s 64:bd:88:30:31:af:da:9a:3e:5c:35:6d:90:50:52:e9 241s aa:3d:83:41:b9:d2:35:b0:0a:88:12:2a:4c:92:cf:f5 241s 29:eb:47:13:cb:0e:fe:26:c6:6c:11:74:74:d1:38:dc 241s bd:b0:ab:f7:61:03:dc:50:6c:69:b5:35:b5:8b:0e:14 241s d6:a7:27:02:d1:d2:39:cd:4a:65:c9:b4:aa:b4:63:ea 241s fd:23:dc:74:36:c5:6a:2d:3a:f4:20:e2:df:0d:48:00 241s 15:ac:92:a0:0e:62:b7:ef:13:fb:57:a9:6e:3d:ef:c8 241s 02:62:3c:20:cd:98:27:80:61:e9:15:4b:e5:84:f3:79 241s a3:f4:28:1d:1d:b2:4b:61:10:65:59:8c:a0:1b:66:72 241s 0e:e6:9d:24:53:e9:17:9c:86:fa:2b:79:7e:29:ff:3b 241s f8:00:7a:0b:03:24:f4:4f:03:86:61:58:39:e7:1f:b2 241s 79:bb:13:1b:fc:a5:57:24:c7:7a:f2:c8:fb:77:51:3e 241s a2:61:f9:81:61:4b:9b:52:d7:39:7a:c0:aa:cd:ec:2b 241s 53 241s Exponent (bits 24): 241s 01:00:01 241s Extensions: 241s Basic Constraints (critical): 241s Certificate Authority (CA): TRUE 241s Subject Alternative Name (not critical): 241s DNSname: www.none.org 241s DNSname: www.morethanone.org 241s DNSname: www.evenmorethanone.org 241s IPAddress: 192.168.1.1 241s RFC822Name: none@none.org 241s RFC822Name: where@none.org 241s Key Purpose (not critical): 241s OCSP signing. 241s Key Usage (critical): 241s Digital signature. 241s Certificate signing. 241s Subject Key Identifier (not critical): 241s c8b98581625e5df4468e39a4ab4713712919c592 241s CRL Distribution points (not critical): 241s URI: http://www.getcrl.crl/getcrl1/ 241s URI: http://www.getcrl.crl/getcrl2/ 241s URI: http://www.getcrl.crl/getcrl3/ 241s Other Information: 241s Public Key ID: 241s sha1:c8b98581625e5df4468e39a4ab4713712919c592 241s sha256:6115b4082dfd507ba34ed39cf3ee5d7538811dc299439bf9602e2b310bed4556 241s Public Key PIN: 241s pin-sha256:YRW0CC39UHujTtOc8+5ddTiBHcKZQ5v5YC4rMQvtRVY= 241s 241s 241s 241s Signing certificate... 241s Generating a self signed certificate... 241s X.509 Certificate Information: 241s Version: 3 241s Serial Number (hex): 07 241s Validity: 241s Not Before: Thu Feb 20 21:25:50 UTC 2025 241s Not After: Thu Mar 25 21:25:50 UTC 2032 241s Subject: EMAIL=none@none.org,pseudonym=jackal,title=Dr.,UID=clauper,CN=Cindy Lauper,OU=sleeping dept.,O=Koko inc.,ST=Attiki,C=GR 241s Subject Public Key Algorithm: RSA-PSS 241s Algorithm Security Level: High (3072 bits) 241s Parameters: 241s Hash Algorithm: SHA384 241s Salt Length: 48 241s Modulus (bits 3072): 241s 00:c6:83:2c:62:60:42:a0:30:9e:ec:08:62:ad:15:3b 241s ba:cf:4b:e7:35:79:1d:36:8e:8e:b8:24:c2:48:ef:d2 241s 3b:37:1e:32:d1:68:99:3e:a6:b0:60:b7:9f:f0:96:31 241s 5f:ef:e5:a1:a0:c8:27:e0:94:31:b6:2d:5e:9b:f9:28 241s bd:0f:48:12:c7:5f:78:64:31:8a:59:14:c9:c4:87:28 241s 3e:3e:55:f3:21:ad:69:46:d7:ac:33:0b:8a:a1:ec:fa 241s 24:c9:ce:9d:96:da:c3:ee:3c:4e:45:88:db:a8:9d:1a 241s 0d:c4:35:94:56:87:be:93:04:94:56:7e:66:a1:16:db 241s 93:a2:a8:84:80:b3:25:94:bc:95:10:12:04:3c:9a:4f 241s 9b:77:1b:57:d8:35:e0:69:7e:23:fe:e9:ee:cd:8b:f0 241s 97:29:b6:9d:25:59:52:1d:43:81:b6:21:0c:d4:89:3b 241s 64:bd:88:30:31:af:da:9a:3e:5c:35:6d:90:50:52:e9 241s aa:3d:83:41:b9:d2:35:b0:0a:88:12:2a:4c:92:cf:f5 241s 29:eb:47:13:cb:0e:fe:26:c6:6c:11:74:74:d1:38:dc 241s bd:b0:ab:f7:61:03:dc:50:6c:69:b5:35:b5:8b:0e:14 241s d6:a7:27:02:d1:d2:39:cd:4a:65:c9:b4:aa:b4:63:ea 241s fd:23:dc:74:36:c5:6a:2d:3a:f4:20:e2:df:0d:48:00 241s 15:ac:92:a0:0e:62:b7:ef:13:fb:57:a9:6e:3d:ef:c8 241s 02:62:3c:20:cd:98:27:80:61:e9:15:4b:e5:84:f3:79 241s a3:f4:28:1d:1d:b2:4b:61:10:65:59:8c:a0:1b:66:72 241s 0e:e6:9d:24:53:e9:17:9c:86:fa:2b:79:7e:29:ff:3b 241s f8:00:7a:0b:03:24:f4:4f:03:86:61:58:39:e7:1f:b2 241s 79:bb:13:1b:fc:a5:57:24:c7:7a:f2:c8:fb:77:51:3e 241s a2:61:f9:81:61:4b:9b:52:d7:39:7a:c0:aa:cd:ec:2b 241s 53 241s Exponent (bits 24): 241s 01:00:01 241s Extensions: 241s Basic Constraints (critical): 241s Certificate Authority (CA): TRUE 241s Subject Alternative Name (not critical): 241s DNSname: www.none.org 241s DNSname: www.morethanone.org 241s DNSname: www.evenmorethanone.org 241s IPAddress: 192.168.1.1 241s RFC822Name: none@none.org 241s RFC822Name: where@none.org 241s Key Purpose (not critical): 241s OCSP signing. 241s Key Usage (critical): 241s Digital signature. 241s Certificate signing. 241s Subject Key Identifier (not critical): 241s c8b98581625e5df4468e39a4ab4713712919c592 241s CRL Distribution points (not critical): 241s URI: http://www.getcrl.crl/getcrl1/ 241s URI: http://www.getcrl.crl/getcrl2/ 241s URI: http://www.getcrl.crl/getcrl3/ 241s Other Information: 241s Public Key ID: 241s sha1:c8b98581625e5df4468e39a4ab4713712919c592 241s sha256:6115b4082dfd507ba34ed39cf3ee5d7538811dc299439bf9602e2b310bed4556 241s Public Key PIN: 241s pin-sha256:YRW0CC39UHujTtOc8+5ddTiBHcKZQ5v5YC4rMQvtRVY= 241s 241s 241s 241s Signing certificate... 241s Generating a self signed certificate... 241s X.509 Certificate Information: 241s Version: 3 241s Serial Number (hex): 07 241s Validity: 241s Not Before: Thu Feb 20 21:25:50 UTC 2025 241s Not After: Thu Mar 25 21:25:50 UTC 2032 241s Subject: EMAIL=none@none.org,pseudonym=jackal,title=Dr.,UID=clauper,CN=Cindy Lauper,OU=sleeping dept.,O=Koko inc.,ST=Attiki,C=GR 241s Subject Public Key Algorithm: RSA-PSS 241s Algorithm Security Level: High (3072 bits) 241s Parameters: 241s Hash Algorithm: SHA384 241s Salt Length: 48 241s Modulus (bits 3072): 241s 00:c6:83:2c:62:60:42:a0:30:9e:ec:08:62:ad:15:3b 241s ba:cf:4b:e7:35:79:1d:36:8e:8e:b8:24:c2:48:ef:d2 241s 3b:37:1e:32:d1:68:99:3e:a6:b0:60:b7:9f:f0:96:31 241s 5f:ef:e5:a1:a0:c8:27:e0:94:31:b6:2d:5e:9b:f9:28 241s bd:0f:48:12:c7:5f:78:64:31:8a:59:14:c9:c4:87:28 241s 3e:3e:55:f3:21:ad:69:46:d7:ac:33:0b:8a:a1:ec:fa 241s 24:c9:ce:9d:96:da:c3:ee:3c:4e:45:88:db:a8:9d:1a 241s 0d:c4:35:94:56:87:be:93:04:94:56:7e:66:a1:16:db 241s 93:a2:a8:84:80:b3:25:94:bc:95:10:12:04:3c:9a:4f 241s 9b:77:1b:57:d8:35:e0:69:7e:23:fe:e9:ee:cd:8b:f0 241s 97:29:b6:9d:25:59:52:1d:43:81:b6:21:0c:d4:89:3b 241s 64:bd:88:30:31:af:da:9a:3e:5c:35:6d:90:50:52:e9 241s aa:3d:83:41:b9:d2:35:b0:0a:88:12:2a:4c:92:cf:f5 241s 29:eb:47:13:cb:0e:fe:26:c6:6c:11:74:74:d1:38:dc 241s bd:b0:ab:f7:61:03:dc:50:6c:69:b5:35:b5:8b:0e:14 241s d6:a7:27:02:d1:d2:39:cd:4a:65:c9:b4:aa:b4:63:ea 241s fd:23:dc:74:36:c5:6a:2d:3a:f4:20:e2:df:0d:48:00 241s 15:ac:92:a0:0e:62:b7:ef:13:fb:57:a9:6e:3d:ef:c8 241s 02:62:3c:20:cd:98:27:80:61:e9:15:4b:e5:84:f3:79 241s a3:f4:28:1d:1d:b2:4b:61:10:65:59:8c:a0:1b:66:72 241s 0e:e6:9d:24:53:e9:17:9c:86:fa:2b:79:7e:29:ff:3b 241s f8:00:7a:0b:03:24:f4:4f:03:86:61:58:39:e7:1f:b2 241s 79:bb:13:1b:fc:a5:57:24:c7:7a:f2:c8:fb:77:51:3e 241s a2:61:f9:81:61:4b:9b:52:d7:39:7a:c0:aa:cd:ec:2b 241s 53 241s Exponent (bits 24): 241s 01:00:01 241s Extensions: 241s Basic Constraints (critical): 241s Certificate Authority (CA): TRUE 241s Subject Alternative Name (not critical): 241s DNSname: www.none.org 241s DNSname: www.morethanone.org 241s DNSname: www.evenmorethanone.org 241s IPAddress: 192.168.1.1 241s RFC822Name: none@none.org 241s RFC822Name: where@none.org 241s Key Purpose (not critical): 241s OCSP signing. 241s Key Usage (critical): 241s Digital signature. 241s Certificate signing. 241s Subject Key Identifier (not critical): 241s c8b98581625e5df4468e39a4ab4713712919c592 241s CRL Distribution points (not critical): 241s URI: http://www.getcrl.crl/getcrl1/ 241s URI: http://www.getcrl.crl/getcrl2/ 241s URI: http://www.getcrl.crl/getcrl3/ 241s Other Information: 241s Public Key ID: 241s sha1:c8b98581625e5df4468e39a4ab4713712919c592 241s sha256:6115b4082dfd507ba34ed39cf3ee5d7538811dc299439bf9602e2b310bed4556 241s Public Key PIN: 241s pin-sha256:YRW0CC39UHujTtOc8+5ddTiBHcKZQ5v5YC4rMQvtRVY= 241s 241s 241s 241s Signing certificate... 241s Subject Public Key Algorithm: RSA-PSS 241s Signature Algorithm: RSA-PSS-SHA384 241s Signature Algorithm: RSA-PSS-SHA384 241s Generating a signed certificate... 241s X.509 Certificate Information: 241s Version: 3 241s Serial Number (hex): 07 241s Validity: 241s Not Before: Thu Feb 20 21:25:50 UTC 2025 241s Not After: Thu Mar 25 21:25:50 UTC 2032 241s Subject: EMAIL=none@none.org,pseudonym=jackal,title=Dr.,UID=clauper,CN=Cindy Lauper,OU=sleeping dept.,O=Koko inc.,ST=Attiki,C=GR 241s Subject Public Key Algorithm: RSA-PSS 241s Algorithm Security Level: Medium (2432 bits) 241s Parameters: 241s Hash Algorithm: SHA384 241s Salt Length: 48 241s Modulus (bits 2432): 241s 00:b4:6b:27:98:25:af:c1:ff:1e:ca:b0:7e:f4:d8:bc 241s ed:43:86:67:54:5d:da:b4:1e:c2:90:5f:83:3c:02:11 241s fc:13:72:85:b2:88:a4:65:41:0b:76:5f:23:be:8a:9f 241s fe:79:4b:73:3b:2e:c7:4b:3c:bf:16:c9:97:55:35:17 241s f3:a1:72:4b:30:c2:e0:27:94:12:f3:56:00:e6:ce:82 241s 4b:11:5d:a4:1e:9b:fa:fa:b9:1b:2a:4d:18:b5:ba:a5 241s e6:0c:c7:a8:a8:a1:6d:aa:88:84:dc:96:0e:b2:6c:1c 241s 35:aa:e7:c7:94:3d:f9:d5:c7:c2:a2:0d:4b:b3:6e:7a 241s f7:08:5f:c5:09:cd:15:93:1a:f7:98:df:2a:4c:66:89 241s 24:ed:1f:d0:16:63:81:65:a5:58:3b:a1:cd:25:62:9b 241s 99:81:54:08:17:18:ec:7c:2f:08:a2:3b:28:57:32:9d 241s 17:47:0a:86:fb:62:b1:41:99:e6:fb:de:a8:ea:20:7e 241s f3:1b:ee:ba:ea:9a:21:64:29:92:f2:ad:73:e5:19:05 241s 9d:37:53:e2:11:9f:18:5f:22:ba:e2:8b:0d:00:8c:9e 241s 2f:a7:87:3d:40:be:4a:a2:a5:92:08:0c:2e:61:c0:58 241s 7c:9a:99:e1:d6:ac:83:39:25:cf:3e:1b:ed:eb:a3:6d 241s 9d:cb:c5:38:de:c1:c7:6e:9b:34:14:be:30:3e:82:90 241s 1e:b9:4a:9a:76:e4:ef:33:0c:46:a2:31:72:f6:c3:61 241s 0b:f8:aa:67:89:f4:a5:e5:76:37:a1:29:9f:80:79:aa 241s 75 241s Exponent (bits 24): 241s 01:00:01 241s Extensions: 241s Basic Constraints (critical): 241s Certificate Authority (CA): TRUE 241s Subject Alternative Name (not critical): 241s DNSname: www.none.org 241s DNSname: www.morethanone.org 241s DNSname: www.evenmorethanone.org 241s IPAddress: 192.168.1.1 241s RFC822Name: none@none.org 241s RFC822Name: where@none.org 241s Key Purpose (not critical): 241s OCSP signing. 241s Key Usage (critical): 241s Digital signature. 241s Certificate signing. 241s Subject Key Identifier (not critical): 241s 482334530a8931384a5aeacab6d2a6dece1d2b18 241s Authority Key Identifier (not critical): 241s 4d56b76a0058f16792f4a675551b8e530103efcf 241s CRL Distribution points (not critical): 241s URI: http://www.getcrl.crl/getcrl1/ 241s URI: http://www.getcrl.crl/getcrl2/ 241s URI: http://www.getcrl.crl/getcrl3/ 241s Other Information: 241s Public Key ID: 241s sha1:600d8d17fb020c570715592950abf27a74d917e5 241s sha256:a49b81ef8676cef920ab02e512fe74a776b0de9fb02ae0332d20003e19f92e8d 241s Public Key PIN: 241s pin-sha256:pJuB74Z2zvkgqwLlEv50p3aw3p+wKuAzLSAAPhn5Lo0= 241s 241s 241s 241s Signing certificate... 241s Generating a signed certificate... 241s cannot set certificate type (EC/ECDSA) incompatible with the key (RSA) 241s Generating a signed certificate... 241s X.509 Certificate Information: 241s Version: 3 241s Serial Number (hex): 07 241s Validity: 241s Not Before: Thu Feb 20 21:25:50 UTC 2025 241s Not After: Thu Mar 25 21:25:50 UTC 2032 241s Subject: EMAIL=none@none.org,pseudonym=jackal,title=Dr.,UID=clauper,CN=Cindy Lauper,OU=sleeping dept.,O=Koko inc.,ST=Attiki,C=GR 241s Subject Public Key Algorithm: RSA 241s Algorithm Security Level: Medium (2432 bits) 241s Modulus (bits 2432): 241s 00:b4:6b:27:98:25:af:c1:ff:1e:ca:b0:7e:f4:d8:bc 241s ed:43:86:67:54:5d:da:b4:1e:c2:90:5f:83:3c:02:11 241s fc:13:72:85:b2:88:a4:65:41:0b:76:5f:23:be:8a:9f 241s fe:79:4b:73:3b:2e:c7:4b:3c:bf:16:c9:97:55:35:17 241s f3:a1:72:4b:30:c2:e0:27:94:12:f3:56:00:e6:ce:82 241s 4b:11:5d:a4:1e:9b:fa:fa:b9:1b:2a:4d:18:b5:ba:a5 241s e6:0c:c7:a8:a8:a1:6d:aa:88:84:dc:96:0e:b2:6c:1c 241s 35:aa:e7:c7:94:3d:f9:d5:c7:c2:a2:0d:4b:b3:6e:7a 241s f7:08:5f:c5:09:cd:15:93:1a:f7:98:df:2a:4c:66:89 241s 24:ed:1f:d0:16:63:81:65:a5:58:3b:a1:cd:25:62:9b 241s 99:81:54:08:17:18:ec:7c:2f:08:a2:3b:28:57:32:9d 241s 17:47:0a:86:fb:62:b1:41:99:e6:fb:de:a8:ea:20:7e 241s f3:1b:ee:ba:ea:9a:21:64:29:92:f2:ad:73:e5:19:05 241s 9d:37:53:e2:11:9f:18:5f:22:ba:e2:8b:0d:00:8c:9e 241s 2f:a7:87:3d:40:be:4a:a2:a5:92:08:0c:2e:61:c0:58 241s 7c:9a:99:e1:d6:ac:83:39:25:cf:3e:1b:ed:eb:a3:6d 241s 9d:cb:c5:38:de:c1:c7:6e:9b:34:14:be:30:3e:82:90 241s 1e:b9:4a:9a:76:e4:ef:33:0c:46:a2:31:72:f6:c3:61 241s 0b:f8:aa:67:89:f4:a5:e5:76:37:a1:29:9f:80:79:aa 241s 75 241s Exponent (bits 24): 241s 01:00:01 241s Extensions: 241s Basic Constraints (critical): 241s Certificate Authority (CA): TRUE 241s Subject Alternative Name (not critical): 241s DNSname: www.none.org 241s DNSname: www.morethanone.org 241s DNSname: www.evenmorethanone.org 241s IPAddress: 192.168.1.1 241s RFC822Name: none@none.org 241s RFC822Name: where@none.org 241s Key Purpose (not critical): 241s OCSP signing. 241s Key Usage (critical): 241s Digital signature. 241s Certificate signing. 241s Subject Key Identifier (not critical): 241s 482334530a8931384a5aeacab6d2a6dece1d2b18 241s Authority Key Identifier (not critical): 241s 4d56b76a0058f16792f4a675551b8e530103efcf 241s CRL Distribution points (not critical): 241s URI: http://www.getcrl.crl/getcrl1/ 241s URI: http://www.getcrl.crl/getcrl2/ 241s URI: http://www.getcrl.crl/getcrl3/ 241s Other Information: 241s Public Key ID: 241s sha1:482334530a8931384a5aeacab6d2a6dece1d2b18 241s sha256:6429dcdb1f84533b60e9286712fc2d707c6eb325ea2794492cd0832dcfa554d1 241s Public Key PIN: 241s pin-sha256:ZCnc2x+EUztg6ShnEvwtcHxusyXqJ5RJLNCDLc+lVNE= 241s 241s 241s 241s Signing certificate... 241s Generating a 3072 bit RSA-PSS private key... 242s Generating a self signed certificate... 242s X.509 Certificate Information: 242s Version: 3 242s Serial Number (hex): 07 242s Validity: 242s Not Before: Thu Feb 20 21:25:51 UTC 2025 242s Not After: Thu Mar 25 21:25:51 UTC 2032 242s Subject: EMAIL=none@none.org,pseudonym=jackal,title=Dr.,UID=clauper,CN=Cindy Lauper,OU=sleeping dept.,O=Koko inc.,ST=Attiki,C=GR 242s Subject Public Key Algorithm: RSA-PSS 242s Algorithm Security Level: High (3072 bits) 242s Parameters: 242s Hash Algorithm: SHA512 242s Salt Length: 64 242s Modulus (bits 3072): 242s 00:d6:2a:d9:bd:4b:8b:5e:8d:0b:94:3c:72:15:a4:25 242s de:29:cf:0e:c9:7d:ee:f3:82:a6:8b:a6:88:e9:16:69 242s 82:2e:00:1f:a3:bb:e5:97:c2:0e:d4:dc:84:1a:f2:d2 242s dc:2d:95:52:02:01:ed:7b:8f:88:f7:b5:e6:00:67:a8 242s b5:01:fc:84:35:f9:96:ce:a0:23:64:9d:35:66:39:df 242s f5:38:03:82:1c:84:da:15:b9:33:80:80:df:67:ea:15 242s f4:56:b5:66:10:d0:56:ef:33:7a:49:ba:c7:80:87:b9 242s 4c:b0:d8:e7:ef:83:63:a7:a4:f1:57:e8:88:7a:65:d6 242s d3:c7:95:21:c2:a2:8e:b4:3c:85:59:57:3e:5e:67:ea 242s 7c:ad:9d:bc:a0:2d:3d:21:7f:90:ff:26:f1:29:11:1a 242s 8f:a2:4b:c6:03:e3:71:a9:6f:3b:b7:40:71:d4:0b:ba 242s d3:ac:5b:a8:0d:cc:cc:31:a1:d2:de:44:26:c1:3d:62 242s 54:32:b2:d7:e8:75:7e:6c:50:e6:85:43:1b:1f:4b:8c 242s ab:1e:60:d7:31:08:e1:09:df:88:7d:6f:f1:d3:37:3b 242s 5e:d6:77:f3:78:47:82:d6:bf:a0:76:b4:b5:2f:c2:b8 242s e8:76:1c:39:f5:c3:f6:57:7f:8d:f6:e2:3f:74:d6:f8 242s df:08:12:00:f6:ec:b9:62:eb:05:9c:f8:63:98:07:ed 242s 1f:6b:37:cf:0f:bb:d7:48:81:0d:a9:85:b3:bd:d7:1e 242s 94:43:7c:b2:81:1c:00:53:95:a6:fa:43:ea:d7:4a:02 242s be:bf:8f:47:8d:3b:ce:ef:bc:af:4a:13:1d:4e:b3:ec 242s 18:49:68:e7:1f:53:01:e8:9d:4e:69:70:c6:57:9f:41 242s 9b:be:46:fb:18:67:58:e0:ee:18:cf:69:8d:71:81:58 242s 39:af:7d:93:b0:5d:5d:0e:ce:21:59:47:eb:26:69:69 242s 62:a3:f6:c8:62:97:9b:a8:60:00:29:70:cd:da:06:c4 242s a7 242s Exponent (bits 24): 242s 01:00:01 242s Extensions: 242s Basic Constraints (critical): 242s Certificate Authority (CA): TRUE 242s Subject Alternative Name (not critical): 242s DNSname: www.none.org 242s DNSname: www.morethanone.org 242s DNSname: www.evenmorethanone.org 242s IPAddress: 192.168.1.1 242s RFC822Name: none@none.org 242s RFC822Name: where@none.org 242s Key Purpose (not critical): 242s OCSP signing. 242s Key Usage (critical): 242s Digital signature. 242s Certificate signing. 242s Subject Key Identifier (not critical): 242s cd8a7f2dd9c70cc1a844556744b74acd9613e6cc 242s CRL Distribution points (not critical): 242s URI: http://www.getcrl.crl/getcrl1/ 242s URI: http://www.getcrl.crl/getcrl2/ 242s URI: http://www.getcrl.crl/getcrl3/ 242s Other Information: 242s Public Key ID: 242s sha1:cd8a7f2dd9c70cc1a844556744b74acd9613e6cc 242s sha256:3ba2108af3707bc1ada5dca47d2b43da7b802a9f3bde2edc9e1591ba995648d1 242s Public Key PIN: 242s pin-sha256:O6IQivNwe8GtpdykfStD2nuAKp873i7cnhWRuplWSNE= 242s 242s 242s 242s Signing certificate... 242s Generating a self signed certificate... 242s X.509 Certificate Information: 242s Version: 3 242s Serial Number (hex): 07 242s Validity: 242s Not Before: Thu Feb 20 21:25:51 UTC 2025 242s Not After: Thu Mar 25 21:25:51 UTC 2032 242s Subject: EMAIL=none@none.org,pseudonym=jackal,title=Dr.,UID=clauper,CN=Cindy Lauper,OU=sleeping dept.,O=Koko inc.,ST=Attiki,C=GR 242s Subject Public Key Algorithm: RSA-PSS 242s Algorithm Security Level: High (3072 bits) 242s Parameters: 242s Hash Algorithm: SHA512 242s Salt Length: 64 242s Modulus (bits 3072): 242s 00:d6:2a:d9:bd:4b:8b:5e:8d:0b:94:3c:72:15:a4:25 242s de:29:cf:0e:c9:7d:ee:f3:82:a6:8b:a6:88:e9:16:69 242s 82:2e:00:1f:a3:bb:e5:97:c2:0e:d4:dc:84:1a:f2:d2 242s dc:2d:95:52:02:01:ed:7b:8f:88:f7:b5:e6:00:67:a8 242s b5:01:fc:84:35:f9:96:ce:a0:23:64:9d:35:66:39:df 242s f5:38:03:82:1c:84:da:15:b9:33:80:80:df:67:ea:15 242s f4:56:b5:66:10:d0:56:ef:33:7a:49:ba:c7:80:87:b9 242s 4c:b0:d8:e7:ef:83:63:a7:a4:f1:57:e8:88:7a:65:d6 242s d3:c7:95:21:c2:a2:8e:b4:3c:85:59:57:3e:5e:67:ea 242s 7c:ad:9d:bc:a0:2d:3d:21:7f:90:ff:26:f1:29:11:1a 242s 8f:a2:4b:c6:03:e3:71:a9:6f:3b:b7:40:71:d4:0b:ba 242s d3:ac:5b:a8:0d:cc:cc:31:a1:d2:de:44:26:c1:3d:62 242s 54:32:b2:d7:e8:75:7e:6c:50:e6:85:43:1b:1f:4b:8c 242s ab:1e:60:d7:31:08:e1:09:df:88:7d:6f:f1:d3:37:3b 242s 5e:d6:77:f3:78:47:82:d6:bf:a0:76:b4:b5:2f:c2:b8 242s e8:76:1c:39:f5:c3:f6:57:7f:8d:f6:e2:3f:74:d6:f8 242s df:08:12:00:f6:ec:b9:62:eb:05:9c:f8:63:98:07:ed 242s 1f:6b:37:cf:0f:bb:d7:48:81:0d:a9:85:b3:bd:d7:1e 242s 94:43:7c:b2:81:1c:00:53:95:a6:fa:43:ea:d7:4a:02 242s be:bf:8f:47:8d:3b:ce:ef:bc:af:4a:13:1d:4e:b3:ec 242s 18:49:68:e7:1f:53:01:e8:9d:4e:69:70:c6:57:9f:41 242s 9b:be:46:fb:18:67:58:e0:ee:18:cf:69:8d:71:81:58 242s 39:af:7d:93:b0:5d:5d:0e:ce:21:59:47:eb:26:69:69 242s 62:a3:f6:c8:62:97:9b:a8:60:00:29:70:cd:da:06:c4 242s a7 242s Exponent (bits 24): 242s 01:00:01 242s Extensions: 242s Basic Constraints (critical): 242s Certificate Authority (CA): TRUE 242s Subject Alternative Name (not critical): 242s DNSname: www.none.org 242s DNSname: www.morethanone.org 242s DNSname: www.evenmorethanone.org 242s IPAddress: 192.168.1.1 242s RFC822Name: none@none.org 242s RFC822Name: where@none.org 242s Key Purpose (not critical): 242s OCSP signing. 242s Key Usage (critical): 242s Digital signature. 242s Certificate signing. 242s Subject Key Identifier (not critical): 242s cd8a7f2dd9c70cc1a844556744b74acd9613e6cc 242s CRL Distribution points (not critical): 242s URI: http://www.getcrl.crl/getcrl1/ 242s URI: http://www.getcrl.crl/getcrl2/ 242s URI: http://www.getcrl.crl/getcrl3/ 242s Other Information: 242s Public Key ID: 242s sha1:cd8a7f2dd9c70cc1a844556744b74acd9613e6cc 242s sha256:3ba2108af3707bc1ada5dca47d2b43da7b802a9f3bde2edc9e1591ba995648d1 242s Public Key PIN: 242s pin-sha256:O6IQivNwe8GtpdykfStD2nuAKp873i7cnhWRuplWSNE= 242s 242s 242s 242s Signing certificate... 242s Generating a self signed certificate... 242s X.509 Certificate Information: 242s Version: 3 242s Serial Number (hex): 07 242s Validity: 242s Not Before: Thu Feb 20 21:25:51 UTC 2025 242s Not After: Thu Mar 25 21:25:51 UTC 2032 242s Subject: EMAIL=none@none.org,pseudonym=jackal,title=Dr.,UID=clauper,CN=Cindy Lauper,OU=sleeping dept.,O=Koko inc.,ST=Attiki,C=GR 242s Subject Public Key Algorithm: RSA-PSS 242s Algorithm Security Level: High (3072 bits) 242s Parameters: 242s Hash Algorithm: SHA512 242s Salt Length: 64 242s Modulus (bits 3072): 242s 00:d6:2a:d9:bd:4b:8b:5e:8d:0b:94:3c:72:15:a4:25 242s de:29:cf:0e:c9:7d:ee:f3:82:a6:8b:a6:88:e9:16:69 242s 82:2e:00:1f:a3:bb:e5:97:c2:0e:d4:dc:84:1a:f2:d2 242s dc:2d:95:52:02:01:ed:7b:8f:88:f7:b5:e6:00:67:a8 242s b5:01:fc:84:35:f9:96:ce:a0:23:64:9d:35:66:39:df 242s f5:38:03:82:1c:84:da:15:b9:33:80:80:df:67:ea:15 242s f4:56:b5:66:10:d0:56:ef:33:7a:49:ba:c7:80:87:b9 242s 4c:b0:d8:e7:ef:83:63:a7:a4:f1:57:e8:88:7a:65:d6 242s d3:c7:95:21:c2:a2:8e:b4:3c:85:59:57:3e:5e:67:ea 242s 7c:ad:9d:bc:a0:2d:3d:21:7f:90:ff:26:f1:29:11:1a 242s 8f:a2:4b:c6:03:e3:71:a9:6f:3b:b7:40:71:d4:0b:ba 242s d3:ac:5b:a8:0d:cc:cc:31:a1:d2:de:44:26:c1:3d:62 242s 54:32:b2:d7:e8:75:7e:6c:50:e6:85:43:1b:1f:4b:8c 242s ab:1e:60:d7:31:08:e1:09:df:88:7d:6f:f1:d3:37:3b 242s 5e:d6:77:f3:78:47:82:d6:bf:a0:76:b4:b5:2f:c2:b8 242s e8:76:1c:39:f5:c3:f6:57:7f:8d:f6:e2:3f:74:d6:f8 242s df:08:12:00:f6:ec:b9:62:eb:05:9c:f8:63:98:07:ed 242s 1f:6b:37:cf:0f:bb:d7:48:81:0d:a9:85:b3:bd:d7:1e 242s 94:43:7c:b2:81:1c:00:53:95:a6:fa:43:ea:d7:4a:02 242s be:bf:8f:47:8d:3b:ce:ef:bc:af:4a:13:1d:4e:b3:ec 242s 18:49:68:e7:1f:53:01:e8:9d:4e:69:70:c6:57:9f:41 242s 9b:be:46:fb:18:67:58:e0:ee:18:cf:69:8d:71:81:58 242s 39:af:7d:93:b0:5d:5d:0e:ce:21:59:47:eb:26:69:69 242s 62:a3:f6:c8:62:97:9b:a8:60:00:29:70:cd:da:06:c4 242s a7 242s Exponent (bits 24): 242s 01:00:01 242s Extensions: 242s Basic Constraints (critical): 242s Certificate Authority (CA): TRUE 242s Subject Alternative Name (not critical): 242s DNSname: www.none.org 242s DNSname: www.morethanone.org 242s DNSname: www.evenmorethanone.org 242s IPAddress: 192.168.1.1 242s RFC822Name: none@none.org 242s RFC822Name: where@none.org 242s Key Purpose (not critical): 242s OCSP signing. 242s Key Usage (critical): 242s Digital signature. 242s Certificate signing. 242s Subject Key Identifier (not critical): 242s cd8a7f2dd9c70cc1a844556744b74acd9613e6cc 242s CRL Distribution points (not critical): 242s URI: http://www.getcrl.crl/getcrl1/ 242s URI: http://www.getcrl.crl/getcrl2/ 242s URI: http://www.getcrl.crl/getcrl3/ 242s Other Information: 242s Public Key ID: 242s sha1:cd8a7f2dd9c70cc1a844556744b74acd9613e6cc 242s sha256:3ba2108af3707bc1ada5dca47d2b43da7b802a9f3bde2edc9e1591ba995648d1 242s Public Key PIN: 242s pin-sha256:O6IQivNwe8GtpdykfStD2nuAKp873i7cnhWRuplWSNE= 242s 242s 242s 242s Signing certificate... 242s Generating a self signed certificate... 242s X.509 Certificate Information: 242s Version: 3 242s Serial Number (hex): 07 242s Validity: 242s Not Before: Thu Feb 20 21:25:51 UTC 2025 242s Not After: Thu Mar 25 21:25:51 UTC 2032 242s Subject: EMAIL=none@none.org,pseudonym=jackal,title=Dr.,UID=clauper,CN=Cindy Lauper,OU=sleeping dept.,O=Koko inc.,ST=Attiki,C=GR 242s Subject Public Key Algorithm: RSA-PSS 242s Algorithm Security Level: High (3072 bits) 242s Parameters: 242s Hash Algorithm: SHA512 242s Salt Length: 64 242s Modulus (bits 3072): 242s 00:d6:2a:d9:bd:4b:8b:5e:8d:0b:94:3c:72:15:a4:25 242s de:29:cf:0e:c9:7d:ee:f3:82:a6:8b:a6:88:e9:16:69 242s 82:2e:00:1f:a3:bb:e5:97:c2:0e:d4:dc:84:1a:f2:d2 242s dc:2d:95:52:02:01:ed:7b:8f:88:f7:b5:e6:00:67:a8 242s b5:01:fc:84:35:f9:96:ce:a0:23:64:9d:35:66:39:df 242s f5:38:03:82:1c:84:da:15:b9:33:80:80:df:67:ea:15 242s f4:56:b5:66:10:d0:56:ef:33:7a:49:ba:c7:80:87:b9 242s 4c:b0:d8:e7:ef:83:63:a7:a4:f1:57:e8:88:7a:65:d6 242s d3:c7:95:21:c2:a2:8e:b4:3c:85:59:57:3e:5e:67:ea 242s 7c:ad:9d:bc:a0:2d:3d:21:7f:90:ff:26:f1:29:11:1a 242s 8f:a2:4b:c6:03:e3:71:a9:6f:3b:b7:40:71:d4:0b:ba 242s d3:ac:5b:a8:0d:cc:cc:31:a1:d2:de:44:26:c1:3d:62 242s 54:32:b2:d7:e8:75:7e:6c:50:e6:85:43:1b:1f:4b:8c 242s ab:1e:60:d7:31:08:e1:09:df:88:7d:6f:f1:d3:37:3b 242s 5e:d6:77:f3:78:47:82:d6:bf:a0:76:b4:b5:2f:c2:b8 242s e8:76:1c:39:f5:c3:f6:57:7f:8d:f6:e2:3f:74:d6:f8 242s df:08:12:00:f6:ec:b9:62:eb:05:9c:f8:63:98:07:ed 242s 1f:6b:37:cf:0f:bb:d7:48:81:0d:a9:85:b3:bd:d7:1e 242s 94:43:7c:b2:81:1c:00:53:95:a6:fa:43:ea:d7:4a:02 242s be:bf:8f:47:8d:3b:ce:ef:bc:af:4a:13:1d:4e:b3:ec 242s 18:49:68:e7:1f:53:01:e8:9d:4e:69:70:c6:57:9f:41 242s 9b:be:46:fb:18:67:58:e0:ee:18:cf:69:8d:71:81:58 242s 39:af:7d:93:b0:5d:5d:0e:ce:21:59:47:eb:26:69:69 242s 62:a3:f6:c8:62:97:9b:a8:60:00:29:70:cd:da:06:c4 242s a7 242s Exponent (bits 24): 242s 01:00:01 242s Extensions: 242s Basic Constraints (critical): 242s Certificate Authority (CA): TRUE 242s Subject Alternative Name (not critical): 242s DNSname: www.none.org 242s DNSname: www.morethanone.org 242s DNSname: www.evenmorethanone.org 242s IPAddress: 192.168.1.1 242s RFC822Name: none@none.org 242s RFC822Name: where@none.org 242s Key Purpose (not critical): 242s OCSP signing. 242s Key Usage (critical): 242s Digital signature. 242s Certificate signing. 242s Subject Key Identifier (not critical): 242s cd8a7f2dd9c70cc1a844556744b74acd9613e6cc 242s CRL Distribution points (not critical): 242s URI: http://www.getcrl.crl/getcrl1/ 242s URI: http://www.getcrl.crl/getcrl2/ 242s URI: http://www.getcrl.crl/getcrl3/ 242s Other Information: 242s Public Key ID: 242s sha1:cd8a7f2dd9c70cc1a844556744b74acd9613e6cc 242s sha256:3ba2108af3707bc1ada5dca47d2b43da7b802a9f3bde2edc9e1591ba995648d1 242s Public Key PIN: 242s pin-sha256:O6IQivNwe8GtpdykfStD2nuAKp873i7cnhWRuplWSNE= 242s 242s 242s 242s Signing certificate... 242s Generating a signed certificate... 242s X.509 Certificate Information: 242s Version: 3 242s Serial Number (hex): 07 242s Validity: 242s Not Before: Thu Feb 20 21:25:51 UTC 2025 242s Not After: Thu Mar 25 21:25:51 UTC 2032 242s Subject: EMAIL=none@none.org,pseudonym=jackal,title=Dr.,UID=clauper,CN=Cindy Lauper,OU=sleeping dept.,O=Koko inc.,ST=Attiki,C=GR 242s Subject Public Key Algorithm: RSA-PSS 242s Algorithm Security Level: Medium (2432 bits) 242s Parameters: 242s Hash Algorithm: SHA512 242s Salt Length: 64 242s Modulus (bits 2432): 242s 00:b4:6b:27:98:25:af:c1:ff:1e:ca:b0:7e:f4:d8:bc 242s ed:43:86:67:54:5d:da:b4:1e:c2:90:5f:83:3c:02:11 242s fc:13:72:85:b2:88:a4:65:41:0b:76:5f:23:be:8a:9f 242s fe:79:4b:73:3b:2e:c7:4b:3c:bf:16:c9:97:55:35:17 242s f3:a1:72:4b:30:c2:e0:27:94:12:f3:56:00:e6:ce:82 242s 4b:11:5d:a4:1e:9b:fa:fa:b9:1b:2a:4d:18:b5:ba:a5 242s e6:0c:c7:a8:a8:a1:6d:aa:88:84:dc:96:0e:b2:6c:1c 242s 35:aa:e7:c7:94:3d:f9:d5:c7:c2:a2:0d:4b:b3:6e:7a 242s f7:08:5f:c5:09:cd:15:93:1a:f7:98:df:2a:4c:66:89 242s 24:ed:1f:d0:16:63:81:65:a5:58:3b:a1:cd:25:62:9b 242s 99:81:54:08:17:18:ec:7c:2f:08:a2:3b:28:57:32:9d 242s 17:47:0a:86:fb:62:b1:41:99:e6:fb:de:a8:ea:20:7e 242s f3:1b:ee:ba:ea:9a:21:64:29:92:f2:ad:73:e5:19:05 242s 9d:37:53:e2:11:9f:18:5f:22:ba:e2:8b:0d:00:8c:9e 242s 2f:a7:87:3d:40:be:4a:a2:a5:92:08:0c:2e:61:c0:58 242s 7c:9a:99:e1:d6:ac:83:39:25:cf:3e:1b:ed:eb:a3:6d 242s 9d:cb:c5:38:de:c1:c7:6e:9b:34:14:be:30:3e:82:90 242s 1e:b9:4a:9a:76:e4:ef:33:0c:46:a2:31:72:f6:c3:61 242s 0b:f8:aa:67:89:f4:a5:e5:76:37:a1:29:9f:80:79:aa 242s 75 242s Exponent (bits 24): 242s 01:00:01 242s Extensions: 242s Basic Constraints (critical): 242s Certificate Authority (CA): TRUE 242s Subject Alternative Name (not critical): 242s DNSname: www.none.org 242s DNSname: www.morethanone.org 242s DNSname: www.evenmorethanone.org 242s IPAddress: 192.168.1.1 242s RFC822Name: none@none.org 242s RFC822Name: where@none.org 242s Key Purpose (not critical): 242s OCSP signing. 242s Key Usage (critical): 242s Digital signature. 242s Certificate signing. 242s Subject Key Identifier (not critical): 242s 482334530a8931384a5aeacab6d2a6dece1d2b18 242s Authority Key Identifier (not critical): 242s 4d56b76a0058f16792f4a675551b8e530103efcf 242s CRL Distribution points (not critical): 242s URI: http://www.getcrl.crl/getcrl1/ 242s URI: http://www.getcrl.crl/getcrl2/ 242s URI: http://www.getcrl.crl/getcrl3/ 242s Other Information: 242s Public Key ID: 242s sha1:b0d4433ac119ebcab37c481d2fd793fd109d2c47 242s sha256:ba44413a4e54faa010b0065ccfde781125729039568343d5e6bd0cba9be7bc90 242s Public Key PIN: 242s pin-sha256:ukRBOk5U+qAQsAZcz954ESVykDlWg0PV5r0MupvnvJA= 242s 242s 242s 242s Signing certificate... 242s Subject Public Key Algorithm: RSA-PSS 242s Generating a signed certificate... 242s cannot set certificate type (EC/ECDSA) incompatible with the key (RSA) 242s Generating a signed certificate... 242s X.509 Certificate Information: 242s Version: 3 242s Serial Number (hex): 07 242s Validity: 242s Not Before: Thu Feb 20 21:25:51 UTC 2025 242s Not After: Thu Mar 25 21:25:51 UTC 2032 242s Subject: EMAIL=none@none.org,pseudonym=jackal,title=Dr.,UID=clauper,CN=Cindy Lauper,OU=sleeping dept.,O=Koko inc.,ST=Attiki,C=GR 242s Subject Public Key Algorithm: RSA 242s Algorithm Security Level: Medium (2432 bits) 242s Modulus (bits 2432): 242s 00:b4:6b:27:98:25:af:c1:ff:1e:ca:b0:7e:f4:d8:bc 242s ed:43:86:67:54:5d:da:b4:1e:c2:90:5f:83:3c:02:11 242s fc:13:72:85:b2:88:a4:65:41:0b:76:5f:23:be:8a:9f 242s fe:79:4b:73:3b:2e:c7:4b:3c:bf:16:c9:97:55:35:17 242s f3:a1:72:4b:30:c2:e0:27:94:12:f3:56:00:e6:ce:82 242s 4b:11:5d:a4:1e:9b:fa:fa:b9:1b:2a:4d:18:b5:ba:a5 242s e6:0c:c7:a8:a8:a1:6d:aa:88:84:dc:96:0e:b2:6c:1c 242s 35:aa:e7:c7:94:3d:f9:d5:c7:c2:a2:0d:4b:b3:6e:7a 242s f7:08:5f:c5:09:cd:15:93:1a:f7:98:df:2a:4c:66:89 242s 24:ed:1f:d0:16:63:81:65:a5:58:3b:a1:cd:25:62:9b 242s 99:81:54:08:17:18:ec:7c:2f:08:a2:3b:28:57:32:9d 242s 17:47:0a:86:fb:62:b1:41:99:e6:fb:de:a8:ea:20:7e 242s f3:1b:ee:ba:ea:9a:21:64:29:92:f2:ad:73:e5:19:05 242s 9d:37:53:e2:11:9f:18:5f:22:ba:e2:8b:0d:00:8c:9e 242s 2f:a7:87:3d:40:be:4a:a2:a5:92:08:0c:2e:61:c0:58 242s 7c:9a:99:e1:d6:ac:83:39:25:cf:3e:1b:ed:eb:a3:6d 242s 9d:cb:c5:38:de:c1:c7:6e:9b:34:14:be:30:3e:82:90 242s 1e:b9:4a:9a:76:e4:ef:33:0c:46:a2:31:72:f6:c3:61 242s 0b:f8:aa:67:89:f4:a5:e5:76:37:a1:29:9f:80:79:aa 242s 75 242s Exponent (bits 24): 242s 01:00:01 242s Extensions: 242s Basic Constraints (critical): 242s Certificate Authority (CA): TRUE 242s Subject Alternative Name (not critical): 242s DNSname: www.none.org 242s DNSname: www.morethanone.org 242s DNSname: www.evenmorethanone.org 242s IPAddress: 192.168.1.1 242s RFC822Name: none@none.org 242s RFC822Name: where@none.org 242s Key Purpose (not critical): 242s OCSP signing. 242s Key Usage (critical): 242s Digital signature. 242s Certificate signing. 242s Subject Key Identifier (not critical): 242s 482334530a8931384a5aeacab6d2a6dece1d2b18 242s Authority Key Identifier (not critical): 242s 4d56b76a0058f16792f4a675551b8e530103efcf 242s CRL Distribution points (not critical): 242s URI: http://www.getcrl.crl/getcrl1/ 242s URI: http://www.getcrl.crl/getcrl2/ 242s URI: http://www.getcrl.crl/getcrl3/ 242s Other Information: 242s Public Key ID: 242s sha1:482334530a8931384a5aeacab6d2a6dece1d2b18 242s sha256:6429dcdb1f84533b60e9286712fc2d707c6eb325ea2794492cd0832dcfa554d1 242s Public Key PIN: 242s pin-sha256:ZCnc2x+EUztg6ShnEvwtcHxusyXqJ5RJLNCDLc+lVNE= 242s 242s 242s 242s Signing certificate... 242s Signature Algorithm: RSA-PSS-SHA512 242s Signature Algorithm: RSA-PSS-SHA512 242s RSA-PSS to RSA conversion was successful 242s Subject: CN=CSCA_CZ,OU=Ministry of Interior,O=Czech Republic,C=CZ 242s Issuer: CN=CSCA_CZ,OU=Ministry of Interior,O=Czech Republic,C=CZ 242s Checked against: CN=CSCA_CZ,OU=Ministry of Interior,O=Czech Republic,C=CZ 242s Signature algorithm: RSA-PSS-SHA256 242s Output: Verified. The certificate is trusted. 242s 242s Chain verification output: Verified. The certificate is trusted. 242s 242s SUCCESS [14]../../tests/cert-tests/certtool-rsa-pss.sh 242s running [15]../../tests/cert-tests/certtool-subca.sh ... 242s Note that no verification profile was selected. In the future the medium profile will be enabled by default. 242s Use --verify-profile low to apply the default verification of NORMAL priority string. 242s Loaded CAs (1 available) 242s Generating a 256 bit EC/ECDSA private key ... 242s SUCCESS [15]../../tests/cert-tests/certtool-subca.sh 242s running [16]../../tests/cert-tests/certtool-utf8.sh ... 242s SUCCESS [16]../../tests/cert-tests/certtool-utf8.sh 242s running [17]../../tests/cert-tests/certtool-verify-profiles.sh ... 242s Checking chain with insecure leaf 242s Checking chain with insecure subca 242s Checking chain with insecure ca 242s SUCCESS [17]../../tests/cert-tests/certtool-verify-profiles.sh 242s running [18]../../tests/cert-tests/certtool.sh ... 242s Generating a PKCS #10 certificate request... 242s Generating a 3072 bit RSA private key... 243s Subject: EMAIL=none@none.org,pseudonym=jackal,title=Dr.,UID=clauper,CN=Cindy Lauper,ST=Attiki,OU=sleeping dept.,O=Koko inc.,C=GR 243s Issuer: CN=GnuTLS certificate authority,ST=Leuven,OU=GnuTLS certificate authority,O=GnuTLS,C=BE 243s Checked against: CN=GnuTLS certificate authority,ST=Leuven,OU=GnuTLS certificate authority,O=GnuTLS,C=BE 243s Signature algorithm: ECDSA-SHA256 243s Output: Verified. The certificate is trusted. 243s 243s Chain verification output: Verified. The certificate is trusted. 243s 243s SUCCESS [18]../../tests/cert-tests/certtool.sh 243s running [19]../../tests/cert-tests/crl.sh ... 243s Note that no verification profile was selected. In the future the medium profile will be enabled by default. 243s Use --verify-profile low to apply the default verification of NORMAL priority string. 243s SUCCESS [19]../../tests/cert-tests/crl.sh 243s running [20]../../tests/cert-tests/crq.sh ... 243s Self signature: verified 243s 243s SUCCESS [20]../../tests/cert-tests/crq.sh 243s running [21]../../tests/cert-tests/dane.sh ... 243s SUCCESS [21]../../tests/cert-tests/dane.sh 243s running [22]../../tests/cert-tests/dsa.sh ... 243s Checking various DSA key sizes (port ) 243s Checking DSA-1024 with TLS 1.0 243s reserved port 48787 243s HTTP Server listening on IPv4 0.0.0.0 port 48787...done 243s HTTP Server listening on IPv6 :: port 48787...done 244s Checking server DSA-1024 with client DSA-1024 and TLS 1.0 244s Checking server DSA-1024 with client DSA-2048 and TLS 1.0 244s Checking server DSA-1024 with client DSA-3072 and TLS 1.0 244s Error in handshake: A TLS fatal alert has been received. 244s Checking DSA-1024 with TLS 1.2 244s reserved port 48783 244s Error in handshake: A TLS fatal alert has been received. 244s Exiting via signal 15 244s HTTP Server listening on IPv4 0.0.0.0 port 48783...done 244s HTTP Server listening on IPv6 :: port 48783...done 245s Checking server DSA-1024 with client DSA-1024 and TLS 1.2 245s Checking server DSA-1024 with client DSA-2048 and TLS 1.2 245s |<1>| The hash size used in signature (20) is less than the expected (32) 245s Checking server DSA-1024 with client DSA-3072 and TLS 1.2 245s Checking DSA-2048 with TLS 1.2 245s reserved port 4052 245s |<1>| The hash size used in signature (20) is less than the expected (32) 245s Exiting via signal 15 245s HTTP Server listening on IPv4 0.0.0.0 port 4052...done 245s HTTP Server listening on IPv6 :: port 4052...done 246s |<0x5bae81d99030>| The hash size used in signature (20) is less than the expected (32) 246s |<1>| The hash size used in signature (20) is less than the expected (32) 246s Exiting via signal 15 246s Checking DSA-3072 with TLS 1.2 246s reserved port 60600 246s HTTP Server listening on IPv4 0.0.0.0 port 60600...done 246s HTTP Server listening on IPv6 :: port 60600...done 247s |<0x648525701ac0>| The hash size used in signature (20) is less than the expected (32) 247s |<1>| The hash size used in signature (20) is less than the expected (32) 247s unreserved port 60600 247s Exiting via signal 15 247s SUCCESS [22]../../tests/cert-tests/dsa.sh 247s running [23]../../tests/cert-tests/ecdsa.sh ... 247s Note that no verification profile was selected. In the future the medium profile will be enabled by default. 247s Use --verify-profile low to apply the default verification of NORMAL priority string. 247s SUCCESS [23]../../tests/cert-tests/ecdsa.sh 247s running [24]../../tests/cert-tests/email.sh ... 247s Subject: CN=invalid@example.com 247s Issuer: CN=CA-0 247s Checked against: CN=CA-0 247s Signature algorithm: RSA-SHA256 247s Output: Not verified. The certificate is NOT trusted. The certificate chain violates the signer's constraints. 247s 247s Chain verification output: Not verified. The certificate is NOT trusted. The certificate chain violates the signer's constraints. 247s 247s Subject: CN=invalid@example.com 247s Issuer: CN=CA-0 247s Checked against: CN=CA-0 247s Signature algorithm: RSA-SHA256 247s Output: Not verified. The certificate is NOT trusted. The certificate chain violates the signer's constraints. 247s 247s Chain verification output: Not verified. The certificate is NOT trusted. The certificate chain violates the signer's constraints. The name in the certificate does not match the expected. 247s 247s Note that no verification profile was selected. In the future the medium profile will be enabled by default. 247s Use --verify-profile low to apply the default verification of NORMAL priority string. 247s Note that no verification profile was selected. In the future the medium profile will be enabled by default. 247s Use --verify-profile low to apply the default verification of NORMAL priority string. 247s Subject: CN=invalid@example.com 247s Issuer: CN=CA-0 247s Checked against: CN=CA-0 247s Signature algorithm: RSA-SHA256 247s Output: Verified. The certificate is trusted. 247s 247s Chain verification output: Verified. The certificate is trusted. 247s 247s Note that no verification profile was selected. In the future the medium profile will be enabled by default. 247s Use --verify-profile low to apply the default verification of NORMAL priority string. 247s Subject: CN=invalid@example.com 247s Issuer: CN=CA-0 247s Checked against: CN=CA-0 247s Signature algorithm: RSA-SHA256 247s Output: Verified. The certificate is trusted. 247s 247s Chain verification output: Not verified. The certificate is NOT trusted. The name in the certificate does not match the expected. 247s 247s Subject: CN=invalid@example.com 247s Issuer: CN=CA-0 247s Checked against: CN=CA-0 247s Signature algorithm: RSA-SHA256 247s Output: Not verified. The certificate is NOT trusted. The certificate chain violates the signer's constraints. 247s 247s Chain verification output: Not verified. The certificate is NOT trusted. The certificate chain violates the signer's constraints. The name in the certificate does not match the expected. 247s 247s Subject: CN=invalid@example.com 247s Issuer: CN=CA-0 247s Checked against: CN=CA-0 247s Signature algorithm: RSA-SHA256 247s Output: Not verified. The certificate is NOT trusted. The certificate chain violates the signer's constraints. 247s 247s Chain verification output: Not verified. The certificate is NOT trusted. The certificate chain violates the signer's constraints. 247s 247s Subject: CN=invalid@example.com 247s Issuer: CN=CA-0 247s Checked against: CN=CA-0 247s Signature algorithm: RSA-SHA256 247s Output: Verified. The certificate is trusted. 247s 247s Chain verification output: Verified. The certificate is trusted. 247s 247s Subject: CN=invalid@example.com 247s Issuer: CN=CA-0 247s Checked against: CN=CA-0 247s Signature algorithm: RSA-SHA256 247s Output: Verified. The certificate is trusted. 247s 247s Chain verification output: Not verified. The certificate is NOT trusted. The name in the certificate does not match the expected. 247s 247s SUCCESS [24]../../tests/cert-tests/email.sh 247s running [25]../../tests/cert-tests/gost.sh ... 247s Note that no verification profile was selected. In the future the medium profile will be enabled by default. 247s Use --verify-profile low to apply the default verification of NORMAL priority string. 247s Note that no verification profile was selected. In the future the medium profile will be enabled by default. 247s Use --verify-profile low to apply the default verification of NORMAL priority string. 247s Note that no verification profile was selected. In the future the medium profile will be enabled by default. 247s Use --verify-profile low to apply the default verification of NORMAL priority string. 247s Note that no verification profile was selected. In the future the medium profile will be enabled by default. 247s Use --verify-profile low to apply the default verification of NORMAL priority string. 247s Note that no verification profile was selected. In the future the medium profile will be enabled by default. 247s Use --verify-profile low to apply the default verification of NORMAL priority string. 247s Note that no verification profile was selected. In the future the medium profile will be enabled by default. 247s Use --verify-profile low to apply the default verification of NORMAL priority string. 247s Note that no verification profile was selected. In the future the medium profile will be enabled by default. 247s Use --verify-profile low to apply the default verification of NORMAL priority string. 247s Note that no verification profile was selected. In the future the medium profile will be enabled by default. 247s Use --verify-profile low to apply the default verification of NORMAL priority string. 247s Loaded CAs (1 available) 247s SUCCESS [25]../../tests/cert-tests/gost.sh 247s running [26]../../tests/cert-tests/illegal-rsa.sh ... 247s Encrypted structure detected... 247s import error: The private key is invalid. 247s import error: The private key is invalid. 247s PKCS #8 information: 247s Cipher: 3DES-CBC 247s Schema: PKCS12-3DES-SHA1 (1.2.840.113549.1.12.1.3) 247s Salt: 3c59d7f116fbc5d6 247s Salt size: 8 247s Iteration count: 5216 247s 247s import error: The public key parameters are invalid. 247s ** Note: You may use '--sec-param Medium' instead of '--bits 2048' 247s Generating a 2048 bit RSA-PSS private key... 247s ** Note: You may use '--sec-param Medium' instead of '--bits 2048' 247s Generating a 2048 bit RSA-PSS private key... 247s privkey_generate: The public key parameters are invalid. 247s SUCCESS [26]../../tests/cert-tests/illegal-rsa.sh 247s running [27]../../tests/cert-tests/inhibit-anypolicy.sh ... 247s Generating a signed certificate... 247s X.509 Certificate Information: 247s Version: 3 247s Serial Number (hex): 444d1ab7302633b109480254eebd5c8b37c4b762 247s Validity: 247s Not Before: Sun Apr 23 00:00:00 UTC 2017 247s Not After: Mon Apr 23 00:00:00 UTC 2018 247s Subject: CN=sub-CA 247s Subject Public Key Algorithm: RSA 247s Algorithm Security Level: Low (1024 bits) 247s Modulus (bits 1024): 247s 00:ac:d7:4a:cc:04:0a:33:0f:c6:e2:fc:a3:79:1c:6d 247s 47:7c:3e:52:0d:e3:dc:7d:fc:f3:40:0a:a7:c3:f4:5d 247s 08:e3:ad:4c:39:39:09:fb:89:3a:ed:31:be:dc:52:06 247s 3d:4b:9c:5e:05:e6:54:18:14:a7:48:9f:9f:7e:79:f9 247s 36:57:58:82:9a:99:ad:38:dc:cd:31:47:4e:c5:2b:48 247s 61:b3:07:d7:37:e8:f0:6e:50:fa:37:44:a8:0d:c6:a6 247s a9:d9:1d:37:ca:61:04:6d:a9:c7:b6:35:f5:12:2f:91 247s 23:39:d7:10:79:6f:53:17:88:b7:fa:18:72:7f:bf:8e 247s 17 247s Exponent (bits 24): 247s 01:00:01 247s Extensions: 247s Basic Constraints (critical): 247s Certificate Authority (CA): TRUE 247s Subject Key Identifier (not critical): 247s 99c6d74b9feeddd283d026ed3deb0698933c523e 247s Authority Key Identifier (not critical): 247s 753ab7fc73642914496111fdce90cbf63d1c8a13 247s Other Information: 247s Public Key ID: 247s sha1:99c6d74b9feeddd283d026ed3deb0698933c523e 247s sha256:04eaac9f742c54f81aeac4246113c3314a11c9dc5fba86e5b86038d088503677 247s Public Key PIN: 247s pin-sha256:BOqsn3QsVPga6sQkYRPDMUoRydxfuobluGA40IhQNnc= 247s 247s 247s 247s Signing certificate... 247s |<2>| signing structure using RSA-SHA256 247s Setting log level to 2 247s Subject: CN=sub-CA 247s Issuer: EMAIL=none@none.org,pseudonym=jackal,title=Dr.,UID=clauper,CN=Cindy Lauper,OU=sleeping dept.,O=Koko inc.,ST=Attiki,C=GR 247s Checked against: EMAIL=none@none.org,pseudonym=jackal,title=Dr.,UID=clauper,CN=Cindy Lauper,OU=sleeping dept.,O=Koko inc.,ST=Attiki,C=GR 247s Signature algorithm: RSA-SHA256 247s Output: Verified. The certificate is trusted. 247s 247s Chain verification output: Verified. The certificate is trusted. 247s 247s SUCCESS [27]../../tests/cert-tests/inhibit-anypolicy.sh 247s running [28]../../tests/cert-tests/invalid-sig.sh ... 247s Note that no verification profile was selected. In the future the medium profile will be enabled by default. 247s Use --verify-profile low to apply the default verification of NORMAL priority string. 247s Note that no verification profile was selected. In the future the medium profile will be enabled by default. 247s Use --verify-profile low to apply the default verification of NORMAL priority string. 247s Subject: CN=Different sig in PKCS #1 247s Issuer: CN=GnuTLS Test CA 247s Checked against: CN=GnuTLS Test CA 247s Signature algorithm: RSA-SHA256 247s Output: Not verified. The certificate is NOT trusted. The signature in the certificate is invalid. 247s 247s Chain verification output: Not verified. The certificate is NOT trusted. The signature in the certificate is invalid. 247s 247s Note that no verification profile was selected. In the future the medium profile will be enabled by default. 247s Use --verify-profile low to apply the default verification of NORMAL priority string. 247s error parsing CRTs: Error in the certificate. 247s Note that no verification profile was selected. In the future the medium profile will be enabled by default. 247s Use --verify-profile low to apply the default verification of NORMAL priority string. 247s error parsing CRTs: Error in the certificate. 247s Note that no verification profile was selected. In the future the medium profile will be enabled by default. 247s Use --verify-profile low to apply the default verification of NORMAL priority string. 247s error parsing CRTs: Error in the certificate. 247s Note that no verification profile was selected. In the future the medium profile will be enabled by default. 247s Use --verify-profile low to apply the default verification of NORMAL priority string. 247s error parsing CRTs: Error in the certificate. 247s Note that no verification profile was selected. In the future the medium profile will be enabled by default. 247s Use --verify-profile low to apply the default verification of NORMAL priority string. 247s Subject: CN=VeriSign Class 3 Code Signing 2010 CA,OU=Terms of use at https://www.verisign.com/rpa (c)10,OU=VeriSign Trust Network,O=VeriSign\, Inc.,C=US 247s Issuer: CN=VeriSign Class 3 Public Primary Certification Authority - G5,OU=(c) 2006 VeriSign\, Inc. - For authorized use only,OU=VeriSign Trust Network,O=VeriSign\, Inc.,C=US 247s Signature algorithm: RSA-SHA1 247s Output: Not verified. The certificate is NOT trusted. The certificate issuer is unknown. The certificate chain uses insecure algorithm. 247s 247s Subject: CN=VeriSign Class 3 Code Signing 2010 CA,OU=Terms of use at https://www.verisign.com/rpa (c)10,OU=VeriSign Trust Network,O=VeriSign\, Inc.,C=US 247s Issuer: CN=VeriSign Class 3 Public Primary Certification Authority - G5,OU=(c) 2006 VeriSign\, Inc. - For authorized use only,OU=VeriSign Trust Network,O=VeriSign\, Inc.,C=US 247s Checked against: CN=VeriSign Class 3 Code Signing 2010 CA,OU=Terms of use at https://www.verisign.com/rpa (c)10,OU=VeriSign Trust Network,O=VeriSign\, Inc.,C=US 247s Signature algorithm: RSA-SHA1 247s Output: Verified. The certificate is trusted. 247s 247s Subject: CN=ROBLOX Corporation,OU=Digital ID Class 3 - Microsoft Software Validation v2,O=ROBLOX Corporation,L=Menlo Park,ST=California,C=US 247s Issuer: CN=VeriSign Class 3 Code Signing 2010 CA,OU=Terms of use at https://www.verisign.com/rpa (c)10,OU=VeriSign Trust Network,O=VeriSign\, Inc.,C=US 247s Checked against: CN=VeriSign Class 3 Code Signing 2010 CA,OU=Terms of use at https://www.verisign.com/rpa (c)10,OU=VeriSign Trust Network,O=VeriSign\, Inc.,C=US 247s Signature algorithm: RSA-SHA1 247s Output: Not verified. The certificate is NOT trusted. The certificate issuer is not a CA. The certificate chain uses insecure algorithm. The certificate chain uses expired certificate. 247s 247s Chain verification output: Not verified. The certificate is NOT trusted. The certificate issuer is not a CA. The certificate chain uses insecure algorithm. The certificate chain uses expired certificate. 247s 247s SUCCESS [28]../../tests/cert-tests/invalid-sig.sh 247s running [29]../../tests/cert-tests/key-id.sh ... 247s Generating a signed certificate... 247s 247s Expiration time: Fri Feb 20 21:25:56 2026 247s CA expiration time: Sat Jan 28 09:23:01 2017 247s Warning: The time set exceeds the CA's expiration time 247s X.509 Certificate Information: 247s Version: 3 247s Serial Number (hex): 01 247s Validity: 247s Not Before: Thu Feb 20 21:25:56 UTC 2025 247s Not After: Fri Feb 20 21:25:56 UTC 2026 247s Subject: 247s Subject Public Key Algorithm: RSA 247s Algorithm Security Level: Low (1024 bits) 247s Modulus (bits 1024): 247s 00:bc:f2:be:ee:e4:d5:e2:48:4d:f9:d9:06:13:f5:5f 247s 45:8d:a2:c7:b6:bd:b6:0f:da:3e:62:9f:94:ed:01:6c 247s e3:9d:d8:04:24:bc:cc:93:93:9d:33:8d:40:6a:fb:e1 247s 85:83:6d:8b:d3:3d:cf:db:88:5b:53:78:66:95:d2:d4 247s 5d:21:da:98:0a:2e:ef:db:59:28:08:4e:d6:c7:66:4b 247s 41:17:24:16:de:f3:92:ce:5e:f8:06:8a:b8:f5:5f:88 247s 4e:47:c6:98:3c:4d:07:46:ae:e6:88:67:9e:be:a7:f7 247s db:a0:5b:f8:33:9d:ab:fa:25:a3:86:f8:67:ef:33:90 247s e5 247s Exponent (bits 24): 247s 01:00:01 247s Extensions: 247s Basic Constraints (critical): 247s Certificate Authority (CA): FALSE 247s Subject Key Identifier (not critical): 247s 6e68fb2fd1fca5eb9169c7e160af051d35cee0a6 247s Authority Key Identifier (not critical): 247s 7a2c7a6097460603cbfb28e8e219df18deeb4e0d 247s Other Information: 247s Public Key ID: 247s sha1:6e68fb2fd1fca5eb9169c7e160af051d35cee0a6 247s sha256:cfb982c7a56a85949ebebdcb434fb0b17dc2e7be4d369e7272016ef8dada3a64 247s Public Key PIN: 247s pin-sha256:z7mCx6VqhZSevr3LQ0+wsX3C575NNp5ycgFu+NraOmQ= 247s 247s 247s 247s Signing certificate... 247s SUCCESS [29]../../tests/cert-tests/key-id.sh 247s running [30]../../tests/cert-tests/key-invalid.sh ... 247s OK ../../tests/cert-tests/data/key-invalid1.der - errno 1 247s OK ../../tests/cert-tests/data/key-invalid2.der - errno 1 247s OK ../../tests/cert-tests/data/key-invalid3.der - errno 1 247s OK ../../tests/cert-tests/data/key-invalid4.der - errno 1 247s OK ../../tests/cert-tests/data/key-invalid5.der - errno 1 247s OK ../../tests/cert-tests/data/key-invalid6.der - errno 1 247s DONE (rc 0) 247s import error: ASN1 parser: Error in TAG. 247s import error: ASN1 parser: Error in TAG. 247s import error: ASN1 parser: Error in TAG. 247s import error: ASN1 parser: Error in TAG. 247s import error: ASN1 parser: Error in TAG. 247s import error: ASN1 parser: Error in TAG. 247s SUCCESS [30]../../tests/cert-tests/key-invalid.sh 247s running [31]../../tests/cert-tests/krb5-test.sh ... 247s SUCCESS [31]../../tests/cert-tests/krb5-test.sh 247s running [32]../../tests/cert-tests/md5-test.sh ... 247s SUCCESS [32]../../tests/cert-tests/md5-test.sh 247s running [33]../../tests/cert-tests/mldsa.sh ... 247s Testing ML-DSA-44 247s Testing ML-DSA-65 247s Testing ML-DSA-87 247s SUCCESS [33]../../tests/cert-tests/mldsa.sh 247s running [34]../../tests/cert-tests/name-constraints.sh ... 247s Subject: OU=Public Key Infrastructure,CN=Foo Bar Sub CA 1,O=Foo Bar Inc.,C=US 247s Issuer: OU=Public Key Infrastructure,CN=Foo Bar Root CA,O=Foo Bar Inc.,C=US 247s Signature algorithm: RSA-SHA1 247s Output: Not verified. The certificate is NOT trusted. The certificate issuer is unknown. 247s 247s Subject: OU=Public Key Infrastructure,CN=Foo Bar Sub CA 1,O=Foo Bar Inc.,C=US 247s Issuer: OU=Public Key Infrastructure,CN=Foo Bar Root CA,O=Foo Bar Inc.,C=US 247s Checked against: OU=Public Key Infrastructure,CN=Foo Bar Sub CA 1,O=Foo Bar Inc.,C=US 247s Signature algorithm: RSA-SHA1 247s Output: Verified. The certificate is trusted. 247s 247s Subject: CN=bazz.foobar.com,O=Foo Bar Inc.,C=US 247s Issuer: OU=Public Key Infrastructure,CN=Foo Bar Sub CA 1,O=Foo Bar Inc.,C=US 247s Checked against: OU=Public Key Infrastructure,CN=Foo Bar Sub CA 1,O=Foo Bar Inc.,C=US 247s Signature algorithm: RSA-SHA1 247s Output: Verified. The certificate is trusted. 247s 247s Chain verification output: Verified. The certificate is trusted. 247s 247s SUCCESS [34]../../tests/cert-tests/name-constraints.sh 247s running [35]../../tests/cert-tests/othername-test.sh ... 247s SUCCESS [35]../../tests/cert-tests/othername-test.sh 247s running [36]../../tests/cert-tests/pathlen.sh ... 247s SUCCESS [36]../../tests/cert-tests/pathlen.sh 247s running [37]../../tests/cert-tests/pem-decoding.sh ... 248s SUCCESS [37]../../tests/cert-tests/pem-decoding.sh 248s running [38]../../tests/cert-tests/pkcs1-pad.sh ... 248s PKCS1-PAD1 OK 248s Note that no verification profile was selected. In the future the medium profile will be enabled by default. 248s Use --verify-profile low to apply the default verification of NORMAL priority string. 248s Note that no verification profile was selected. In the future the medium profile will be enabled by default. 248s Use --verify-profile low to apply the default verification of NORMAL priority string. 248s PKCS1-PAD2 OK 248s PKCS1-PAD3 OK 248s SUCCESS [38]../../tests/cert-tests/pkcs1-pad.sh 248s running [39]../../tests/cert-tests/pkcs12-corner-cases.sh ... 248s Note that no verification profile was selected. In the future the medium profile will be enabled by default. 248s Use --verify-profile low to apply the default verification of NORMAL priority string. 248s SUCCESS [39]../../tests/cert-tests/pkcs12-corner-cases.sh 248s running [40]../../tests/cert-tests/pkcs12-encode.sh ... 248s bag_decrypt: The cipher type is unsupported. 248s There were errors parsing the structure 248s Generating a PKCS #12 structure... 248s Loading private key list... 248s Loaded 1 private keys. 248s Generating a PKCS #12 structure... 248s Loading private key list... 248s Loaded 1 private keys. 249s SUCCESS [40]../../tests/cert-tests/pkcs12-encode.sh 249s running [41]../../tests/cert-tests/pkcs12-gost.sh ... 249s Testing decoding of known keys 249s ============================== 249s 249s Testing encoding/decoding 249s ========================= 249s Generating a PKCS #12 structure... 249s Loading private key list... 249s Loaded 1 private keys. 275s Generating a PKCS #12 structure... 275s Loading private key list... 275s Loaded 1 private keys. 300s SUCCESS [41]../../tests/cert-tests/pkcs12-gost.sh 300s running [42]../../tests/cert-tests/pkcs12-pbmac1.sh ... 300s |<9>| keyDerivationFunc.algorithm: 1.2.840.113549.1.5.12 300s |<9>| salt.specified.size: 8 300s |<9>| iterationCount: 2048 300s |<9>| keyLength: 32 300s |<9>| messageAuthScheme.algorithm: 1.2.840.113549.2.9 300s |<9>| keyDerivationFunc.algorithm: 1.2.840.113549.1.5.12 300s |<9>| salt.specified.size: 8 300s |<9>| iterationCount: 2048 300s |<9>| keyLength: 0 301s |<9>| encryptionScheme.algorithm: 2.16.840.1.101.3.4.1.42 301s |<9>| IV.size: 16 301s |<9>| keyDerivationFunc.algorithm: 1.2.840.113549.1.5.12 301s |<9>| salt.specified.size: 8 301s |<9>| iterationCount: 2048 301s |<9>| keyLength: 0 301s |<9>| encryptionScheme.algorithm: 2.16.840.1.101.3.4.1.42 301s |<9>| IV.size: 16 301s |<3>| ASSERT: ../../../lib/x509/privkey_pkcs8.c[check_for_decrypted]:815 301s |<9>| keyDerivationFunc.algorithm: 1.2.840.113549.1.5.12 301s |<9>| salt.specified.size: 8 301s |<9>| iterationCount: 2048 301s |<9>| keyLength: 0 301s |<9>| encryptionScheme.algorithm: 2.16.840.1.101.3.4.1.42 301s |<9>| IV.size: 16 301s Setting log level to 99 301s MAC info: 301s MAC: PBMAC1 (1.2.840.113549.1.5.14) 301s Salt: 4e4f542055534544 301s Salt size: 8 301s Iteration count: 1 301s 301s BAG #0 301s Type: Encrypted 301s Cipher: AES-256-CBC 301s Schema: PBES2-AES256-CBC (2.16.840.1.101.3.4.1.42) 301s Salt: 3da715f1636cac73 301s Salt size: 8 301s Iteration count: 2048 301s 301s Decrypting... 301s Elements: 1 301s Type: Certificate 301s Key ID: C1:63:B9:0E:8A:EF:55:66:05:DC:15:94:98:0C:34:AD:41:1A:8D:27 301s -----BEGIN CERTIFICATE----- 301s MIIDfTCCAmWgAwIBAgIUeOdebExxNTjUFCilWX9HoXcdFu8wDQYJKoZIhvcNAQEL 301s BQAwTjELMAkGA1UEBhMCWFgxCzAJBgNVBAgMAnFxMQswCQYDVQQHDAJ3dzELMAkG 301s A1UECgwCZWUxCzAJBgNVBAsMAnJyMQswCQYDVQQDDAJ0dDAeFw0yMzA1MjIxMzE0 301s MjFaFw0yMzA2MjExMzE0MjFaME4xCzAJBgNVBAYTAlhYMQswCQYDVQQIDAJxcTEL 301s MAkGA1UEBwwCd3cxCzAJBgNVBAoMAmVlMQswCQYDVQQLDAJycjELMAkGA1UEAwwC 301s dHQwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC8oOL1jSEa7l1HWxta 301s vRbx0LbgzDPe8JVZJMlK5/HRpoBbwp72WHISizxA2PgUT+hwdUtpOVrw02arA/8Z 301s YfSG5nvhwJPf3C+Pf5vr9sbNPAc6kWWp76oCVy4H8LvL1agDpbS+jdMnkz8YJhMk 301s rxQpAk9ZBytWJqiT6aGiYnMJyBs2YgWMlwKyud6za1FX+UobRNiR8oxv8bfKdyEd 301s 6eWqX9Ujny/roPaWKTQZCCpiZl5eXVFaWJX9pjj6gjFUTBLcV+ULZx213XBCS38f 301s 3TTSHS+25Q+mmf+ZzSmZ7fm/zy3tzHgEWBfl6tEEQ0xb+wh8Yi2MUCnG6xvbui0K 301s ksjPAgMBAAGjUzBRMB0GA1UdDgQWBBQ3wPwMQ6XJ4ZCGwOG3J3KQLP2fdjAfBgNV 301s HSMEGDAWgBQ3wPwMQ6XJ4ZCGwOG3J3KQLP2fdjAPBgNVHRMBAf8EBTADAQH/MA0G 301s CSqGSIb3DQEBCwUAA4IBAQAiU46Xg8ThhuI41U5g5y5lO9MXeiriYFqT5IEr5IXY 301s fX4u9grqKeHwqluk4jhyM/Gg+mdc1KdqIEVqWcVFBXim6cyeWIhdiGeujv5388oh 301s 5xRtSZNkHA8c7odBpYPjpVkOYNo1fZqwto76uvZT+XukhKUvReazxNP0kE1eh6PS 301s yung98M+gYU7xfYW/J9kxd9igZpKfFoqvOZJx3srKql2at6E1i7YZKbxtlbSTM+5 301s XKCSVOftBEhpszrv08fbVgiAeIr8L490GbIo2atSh5aWXzE2RBVJESDGfoItddK6 301s UwsNw3X8Vlg7btxl3XlhA/ISU4HzEl8okMocUDcozDKS 301s -----END CERTIFICATE----- 301s 301s BAG #1 301s Elements: 1 301s Type: PKCS #8 Encrypted key 301s PKCS #8 information: 301s Cipher: AES-256-CBC 301s Schema: PBES2-AES256-CBC (2.16.840.1.101.3.4.1.42) 301s Salt: 53c73c3e569b6b60 301s Salt size: 8 301s Iteration count: 2048 301s 301s Key ID: C1:63:B9:0E:8A:EF:55:66:05:DC:15:94:98:0C:34:AD:41:1A:8D:27 301s -----BEGIN ENCRYPTED PRIVATE KEY----- 301s MIIFLTBXBgkqhkiG9w0BBQ0wSjApBgkqhkiG9w0BBQwwHAQIU8c8Plaba2ACAggA 301s MAwGCCqGSIb3DQIJBQAwHQYJYIZIAWUDBAEqBBCvZ0qnNSNreLTFRm1h6XbUBIIE 301s 0MwsCO49+IAk734+p7jkp3QI0oRr+5jdo+1jFdKbJU6atm/QZ9759WNCTLy+BO7C 301s 61MzVNNqXTnHwpxKTBXHDb9rEKy6dZjgisbvDo0qh2S6ClS9ETlbGfHTBAiy4oA5 301s TykYksixK5deLRK1+P825FGljETjtvJBW027m0PGKB5UVMLCltcS4L34tIEZBv8x 301s 10X0B41//DUrb+4V5XoZ+/xsthCj7ERYWnZv4lBwH5gjJDIB01NuPCREffp7F5bX 301s efR/iHg6Y/5G8WfmLx6MPV1GSrvNvHdzEJ1KS2dQXyRoTAT1cG1VAwONAokAVXQq 301s BrTycmpS9vMaEtx9CCxQp8EDq+rtB8JXjSTxh6u/B1Mh+h8MZ4dG9OaNet6+sExW 301s Z+XDDsaW7P07Xft068Zq2KXdl57kZnt3J2mCdCC76XP/Hiy0e0iow0+CYWdIfwn3 301s Fdllr4aULoJGNKVq2fhCDJ3gdXWQfepiVS8TotePDnkoItD7MWTDYmDN9606cEE+ 301s VqjrBMg8FEKZ3uW/CpLf7OxDdCyTZz8iSUS9S3Kjna+o/umKkbT2u2vaFiajHLkz 301s /m6sxkSYftxw5RQcNmM6fYmnb+CpgdjM4UrS1KItjEo7555JHeS3nbLIQHelmynx 301s e5CwB0B0+AIunTBDuBCpBFRfSQbcQkeCRJ+gvfC6YPi5Pq32O4Bzn2cbYBlEcIF0 301s WN2i1K3U+eWSoJNxMVSj84uRIXaQGruySoaTsMiqMwKfziljDa8+oaG7tjG59Qfi 301s AOtKbGBx8cpwYLCR7+1kJm2IfB8hnx4Fb2gPKWQmKscY6S40ia0fAQbvR/cZE4ey 301s pYcYK3l2L9fbgGG1HfeZHKMfYs2nelT56L4BUm/jpncujyQAj4+oRVujyW7nD9GD 301s 6TtFbVrUHWWd3X9T9IWe6rysDjxQPoCmUnJIKgEn8oIj/Vd2XPIyIsIzc6AzNkE/ 301s lFCSoohmFyVBDjvYccxR5Ro++fQ3DUYaYJeQIEee6HyEg/cgbggCWD0P2mRzxbkU 301s 63FRt0WiGwgEu95xM5yshWizl388n8mkpsobB9ud7Z8i9THowvtm0RJKP8pXYBVM 301s b1OSSPkNyiegMI/j53bh18e9ROFMErrtsV2DKcZ0MCOq66EKWQV/Nh4aoHC1fNz/ 301s Jac0MD3R4x+c5KMZlnQtPo1P7XEHzV2KSXcqGl+7Q5lXJS4cJfabPzvONaSLDSyV 301s l8L8Rugftyzf5MOEI8DdfeD6KYjg+/qA5uZobbTu/Aqwa0cRzA/9EKp4mYys0mXq 301s cZWavie/drvL7TJ7s8wocbtAX9z4SF3CTXFYcFLa9MinvzfjbwtLZqfMMopPwZZ3 301s cTfXim3UzotsCIuuIdkBvJzpOusEPz0iCWMGZengzREEsx/9Zhgn1EJ1E9e1Av6f 301s kIHp3+gLmqdhlpb7Cawe7v6crc+ua7Y7f6LqOiIehMFqsFVaRl2Q9O4FVh9Cnv1a 301s +mjxjb5C3Jn7T7g2bJ/Y4ooN4LoXXskVX9dDsd+vZClnBu+au+4cRCM0sw8lJQTW 301s 56JvUiI7rd6/qlWJljjWrQuqv+A9CONi543d3RMmce45h94P0tgEjBc1q/ab13Ot 301s XbGDpHWeD2GvVz1GcVxWoGbKEtxdbFO/ffiCVVNLQtDB 301s -----END ENCRYPTED PRIVATE KEY----- 301s |<9>| keyDerivationFunc.algorithm: 1.2.840.113549.1.5.12 301s |<9>| salt.specified.size: 8 301s |<9>| iterationCount: 2048 301s |<9>| keyLength: 32 301s |<9>| messageAuthScheme.algorithm: 1.2.840.113549.2.9 301s Setting log level to 99 301s MAC info: 301s MAC: PBMAC1 (1.2.840.113549.1.5.14) 301s Salt: 4e4f542055534544 301s Salt size: 8 301s Iteration count: 1 301s 301s BAG #0 301s Type: Encrypted 301s Cipher: AES-256-CBC 301s Schema: PBES2-AES256-CBC (2.16.840.1.101.3.4.1.42) 301s Salt: b88fa501058da23a 301s Salt size: 8 301s Iteration count: 2048 301s 301s Decrypting... 301s Elements: 1 301s Type: Certificate 301s Key ID: C1:63:B9:0E:8A:EF:55:66:05:DC:15:94:98:0C:34:AD:41:1A:8D:27 301s -----BEGIN CERTIFICATE----- 301s MIIDfTCCAmWgAwIBAgIUeOdebExxNTjUFCilWX9HoXcdFu8wDQYJKoZIhvcNAQEL 301s BQAwTjELMAkGA1UEBhMCWFgxCzAJBgNVBAgMAnFxMQswCQYDVQQHDAJ3dzELMAkG 301s A1UECgwCZWUxCzAJBgNVBAsMAnJyMQswCQYDVQQDDAJ0dDAeFw0yMzA1MjIxMzE0 301s MjFaFw0yMzA2MjExMzE0MjFaME4xCzAJBgNVBAYTAlhYMQswCQYDVQQIDAJxcTEL 301s MAkGA1UEBwwCd3cxCzAJBgNVBAoMAmVlMQswCQYDVQQLDAJycjELMAkGA1UEAwwC 301s dHQwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC8oOL1jSEa7l1HWxta 301s vRbx0LbgzDPe8JVZJMlK5/HRpoBbwp72WHISizxA2PgUT+hwdUtpOVrw02arA/8Z 301s YfSG5nvhwJPf3C+Pf5vr9sbNPAc6kWWp76oCVy4H8LvL1agDpbS+jdMnkz8YJhMk 301s rxQpAk9ZBytWJqiT6aGiYnMJyBs2YgWMlwKyud6za1FX+UobRNiR8oxv8bfKdyEd 301s 6eWqX9Ujny/roPaWKTQZCCpiZl5eXVFaWJX9pjj6gjFUTBLcV+ULZx213XBCS38f 301s 3TTSHS+25Q+mmf+ZzSmZ7fm/zy3tzHgEWBfl6tEEQ0xb+wh8Yi2MUCnG6xvbui0K 301s ksjPAgMBAAGjUzBRMB0GA1UdDgQWBBQ3wPwMQ6XJ4ZCGwOG3J3KQLP2fdjAfBgNV 301s HSMEGDAWgBQ3wPwMQ6XJ4ZCGwOG3J3KQLP2fdjAPBgNVHRMBAf8EBTADAQH/MA0G 301s CSqGSIb3DQEBCwUAA4IBAQAiU46Xg8ThhuI41U5g5y5lO9MXeiriYFqT5IEr5IXY 301s fX4u9grqKeHwqluk4jhyM/Gg+mdc1KdqIEVqWcVFBXim6cyeWIhdiGeujv5388oh 301s 5xRtSZNkHA8c7odBpYPjpVkOYNo1fZqwto76uvZT+XukhKUvReazxNP0kE1eh6PS 301s yung98M+gYU7xfYW/J9kxd9igZpKfFoqvOZJx3srKql2at6E1i7YZKbxtlbSTM+5 301s XKCSVOftBEhpszrv08fbVgiAeIr8L490GbIo2atSh5aWXzE2RBVJESDGfoItddK6 301s UwsNw3X8Vlg7btxl3XlhA/ISU4HzEl8okMocUDcozDKS 301s -----END CERTIFICATE----- 301s 301s BAG #1 301s Elements: 1 301s Type: PKCS #8 Encrypted key 301s PKCS #8 information: 301s Cipher: AES-256-CBC 301s Schema: PBES2-AES256-CBC (2.16.840.1.101.3.4.1.42) 301s Salt: 438b0b21e30b7768 301s Salt size: 8 301s Iteration count: 2048 301s 301s Key ID: C1:63:B9:0E:8A:EF:55:66:05:DC:15:94:98:0C:34:AD:41:1A:8D:27 301s -----BEGIN ENCRYPTED PRIVATE KEY----- 301s MIIFLTBXBgkqhkiG9w0BBQ0wSjApBgkqhkiG9w0BBQwwHAQIQ4sLIeMLd2gCAggA 301s MAwGCCqGSIb3DQIJBQAwHQYJYIZIAWUDBAEqBBCzRZxKSU+ucLF8HX2dYOenBIIE 301s 0EaNOGz/31nzz2a0xHM6tajtRx1fOo++koMWrtlkPTkABvffBxbTajcTvEeunp+k 301s BYaqVgiO97UiQ/qANvajrE/l7dm0ds+fiuw+EKIl7i2t4F7+tlZIwdAywhwEuzLv 301s oZKeTigqVwku36NDpwIkIzOBJbgLIsMC6x7u89RNelMKZpYCkJ2gtUuOH1fc50vU 301s 8aH0U57gqtZbqXZ9qkI0snTlOop0HiiwX5SkYi6yRzqG2hZo1sKdVDkADLmawC4R 301s 8iGzhVzD2JN5plP9VD7kRnG3Feb9lLdlDBPlmBMV0gjmEd/0eFH1ZCHxM3kTxbNr 301s JSTCA0tn5jMhZBBBJQXJISjvSM4UFd5KHilAXTNOurn8msf7iMlz5jIgfXwKm0EO 301s I5EE0/NGypAQD9Qb8oNi/AbLLLUeYgqGYFp3wPVM+ESORm0amws+x4kpLjiKMBKj 301s qMdyFm17cuVXVgVzY2QR6WxNAsjC0h/+EHRlcPEdA4ggAtJpmjGmat9sqwUd9hOO 301s 9jftimonL199TMAfy5GTeOnN+Exmpy+SyWcdA0eiE43TYD/E5Ukq6e8tpqou1Wyq 301s fwv9vAo+a/pvvhpOhDlKSx7GdndobYa6+8aqD81ABJJMmFnnRyWqEE5KCIrGW9DB 301s pV2/bYY0PBHuNvXpH47+wkH0g0uikxP/pobid95j89WXCGnB43R4ROq26yoY0qy2 301s 4JqxmvIu3s3fPU+BDjbtMJBvSltMDNnJ+Rm9djxeq8Y0388qRu2udMnNSCdlq5tA 301s e4BrmKVaAniKIa+yJcT2HXkBkTv0pc03dMWGiVZvRcyWjDStGap2aEDBD2nqvDwt 301s 5DI6WvHgIh15PStw1nTlmL4hlQj1WCGSugqcHvhMH17PtoWYGZWM3L6VFoOtJndT 301s w+FLMi0GoGo9+7m0eiuAuJs5YRceTaL1fwvyg/i4HpDG4wrcBEHlsmoHr9pfSlBM 301s +9/wU+E4EBTOStqmaVWpsJrDppXT6XpBj4lAruWMWIP8uI1CrwKo9UvbeMFAEnAi 301s cfDr11H4KZktvpoRTwYhabNDODt51hvdUOpijKmzRz1HBQ5/T+3FIbNcbtzUS8if 301s kCH1X22t2AU1fAOlgWBJi/ZcX9bi9Vktgcevgq4dJHsjVD6PXEY6cdaI/8ZCJ6HN 301s h0DgxJL7ivQw+1ay6+7A4X5ib69ZlHyTEOf0x5O2fhPjQLjHTLZDNsil8YIWQGwa 301s 0JFN5iFtedIuz7I5VMNKNPyyb0MCSLIesniQx2PJm8vZiHXj9y0ABXJWCszcJoMG 301s 3bZlQF5kMS7oZhKV37LSM5AazScwoc29qJzUn2vq+S+lxBzR5e8AsE7rlfyVpXTb 301s mFy31X7r95rH0o0lpL+mkbUViL5jr9EG2tqNOS5cBTHdT8yjObjeAw2LbEvQOskD 301s lxLL1JFnCziZwrPEpCUXV4SU8XZs3gajNSbbSsC24BjG6Y28ZYN57DfmfrBBaMft 301s mVjoJYJwR49JgmTogAvMKlLvrMbC0+Fp3Wj1ilaqEUAobw2mWjTmjah3IhfRz1HH 301s 2aMPnx/E50h53okHA3ul3DIUmkNjLaWPP464DSoLmbdtsh/YMP1aU9/0DgexQYCh 301s SBG71Gn951YxSJa8iIXoPi3ogXdorKDDTV2gcHINmF7p 301s -----END ENCRYPTED PRIVATE KEY----- 301s Setting log level to 99 301s MAC info: 301s MAC: PBMAC1 (1.2.840.113549.1.5.14) 301s Salt: 4e4f542055534544 301s Salt size: 8 301s Iteration count: 1 301s 301s BAG #0 301s Type: Encrypted 301s Cipher: AES-256-CBC 301s Schema: PBES2-AES256-CBC (2.16.840.1.101.3.4.1.42) 301s Salt: acaea2fca1b48169 301s Salt size: 8 301s Iteration count: 2048 301s 301s Decrypting... 301s Elements: 1 301s Type: Certificate 301s Key ID: C1:63:B9:0E:8A:EF:55:66:05:DC:15:94:98:0C:34:AD:41:1A:8D:27 301s -----BEGIN CERTIFICATE----- 301s MIIDfTCCAmWgAwIBAgIUeOdebExxNTjUFCilWX9HoXcdFu8wDQYJKoZIhvcNAQEL 301s BQAwTjELMAkGA1UEBhMCWFgxCzAJBgNVBAgMAnFxMQswCQYDVQQHDAJ3dzELMAkG 301s A1UECgwCZWUxCzAJBgNVBAsMAnJyMQswCQYDVQQDDAJ0dDAeFw0yMzA1MjIxMzE0 301s MjFaFw0yMzA2MjExMzE0MjFaME4xCzAJBgNVBAYTAlhYMQswCQYDVQQIDAJxcTEL 301s MAkGA1UEBwwCd3cxCzAJBgNVBAoMAmVlMQswCQYDVQQLDAJycjELMAkGA1UEAwwC 301s dHQwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC8oOL1jSEa7l1HWxta 301s vRbx0LbgzDPe8JVZJMlK5/HRpoBbwp72WHISizxA2PgUT+hwdUtpOVrw02arA/8Z 301s YfSG5nvhwJPf3C+Pf5vr9sbNPAc6kWWp76oCVy4H8LvL1agDpbS+jdMnkz8YJhMk 301s rxQpAk9ZBytWJqiT6aGiYnMJyBs2YgWMlwKyud6za1FX+UobRNiR8oxv8bfKdyEd 301s 6eWqX9Ujny/roPaWKTQZCCpiZl5eXVFaWJX9pjj6gjFUTBLcV+ULZx213XBCS38f 301s 3TTSHS+25Q+mmf+ZzSmZ7fm/zy3tzHgEWBfl6tEEQ0xb+wh8Yi2MUCnG6xvbui0K 301s ksjPAgMBAAGjUzBRMB0GA1UdDgQWBBQ3wPwMQ6XJ4ZCGwOG3J3KQLP2fdjAfBgNV 301s HSMEGDAWgBQ3wPwMQ6XJ4ZCGwOG3J3KQLP2fdjAPBgNVHRMBAf8EBTADAQH/MA0G 301s CSqGSIb3DQEBCwUAA4IBAQAiU46Xg8ThhuI41U5g5y5lO9MXeiriYFqT5IEr5IXY 301s fX4u9grqKeHwqluk4jhyM/Gg+mdc1KdqIEVqWcVFBXim6cyeWIhdiGeujv5388oh 301s 5xRtSZNkHA8c7odBpYPjpVkOYNo1fZqwto76uvZT+XukhKUvReazxNP0kE1eh6PS 301s yung98M+gYU7xfYW/J9kxd9igZpKfFoqvOZJx3srKql2at6E1i7YZKbxtlbSTM+5 301s XKCSVOftBEhpszrv08fbVgiAeIr8L490GbIo2atSh5aWXzE2RBVJESDGfoItddK6 301s UwsNw3X8Vlg7btxl3XlhA/ISU4HzEl8okMocUDcozDKS 301s -----END CERTIFICATE----- 301s 301s BAG #1 301s Elements: 1 301s Type: PKCS #8 Encrypted key 301s PKCS #8 information: 301s Cipher: AES-256-CBC 301s Schema: PBES2-AES256-CBC (2.16.840.1.101.3.4.1.42) 301s Salt: b573b4b92041bbef 301s Salt size: 8 301s Iteration count: 2048 301s 301s Key ID: C1:63:B9:0E:8A:EF:55:66:05:DC:15:94:98:0C:34:AD:41:1A:8D:27 301s -----BEGIN ENCRYPTED PRIVATE KEY----- 301s MIIFLTBXBgkqhkiG9w0BBQ0wSjApBgkqhkiG9w0BBQwwHAQItXO0uSBBu+8CAggA 301s MAwGCCqGSIb3DQIJBQAwHQYJYIZIAWUDBAEqBBDeq80bSHWMajp2Pmg0twBWBIIE 301s 0DXcFKGQ1wq8jhQVCP8+9b36MgMZZ8CS0RzV0FJSO8NCpB9tmjZ0psYmlx6Aj9R4 301s HJrGDkUu6fyE4v/WrQh6pxkeMx5njzYaDKTRxXoXY5VFFoLdNOL1CeWcE3V8HjPi 301s uFnugn1gP7cr7MhjQLLrp3pfvNuN2bL9JhiyqYwPmcgC7edbNJJ5lzg9g1uPRXJC 301s JlFZzQuS5rxCAJlQv2TcnK8mUCPthAZCSnvgQt/N+BnsSZ0sLVAYN14N92Ve1+up 301s MPLStVrOczQ+RkACciLuO5p42ZCFkAWPl21qMKwWfLlyELsTGQtKfLutqCALWWlU 301s KFU0dS8kf+zyEhVugKcLW05+rkMbG9eqhfJRDNEtfsdAHyWOmZtdbcgqm29rWGRf 301s l9+DKFJEfyGAvygqvyiXaZ3fGKoH68I4PHUdlhiMW6dhgR6ugSvwyHoTizHC3LDr 301s j9AxF6aX3HpTDhjSLPuIeCrI1oh1QzD7Ki3aMwXZuhSxnJ6N5WORTvmr1a5RJQDg 301s fvXr4GgWw9pUqxDKDowKA9PdLYF18GARJ1pyKXZPuenH+SKbIaywQP/h9dywS3rP 301s l9aOXXdDLvt2m6eUbQL+8yz0UbV5A2CT84DXE7ydlscNgvs6wHJc2eyEXXCxElGu 301s ArDdNWhL0IDrZAjVY0grZCRj9BbLbFjOIT+5X0gez9rQy/roMuhrwV9bM/XzAu0D 301s ABS/fJw5v8qnJ3oxtQXEF2YaPJ9LL0n23FQchpT2RjLiPbduftAdjEwMdH+s6A/P 301s nxZoXFYEujED8mxihWsHJGJdM7pbHj6rPhuL6CFte6MBirEYr9OiZmUsHdyqBpoz 301s OPQA87hvcq0OT0mtJ4VZNbcmzWqXuBzWB6wJpjdCC5TfhNAbPxHc+J7WGbqHP2d+ 301s bQoJu/XVeP1Zeh1GdSay7C6xFggclcrcFRcn9/zME1nX/gHPl8wbgshDKj5b5z1r 301s MHZ2ond+acYqLO/Xz5dR69P0Ovg6AORsmKvEhXT+xGC6xjBmuRifseZ0u8+lOFJm 301s drF7imB57oQdM4umNOGvn4U+9cdNnk3gu2j5RAd9fVKsrLoyVSZ7KG5HMDrvyY9C 301s LPWHhXevd3QeOMXmbmMr5cKA9fZanIptE0mtk8Ow9Vv8ruO3Sq1T9lSsUaqJrgED 301s qaGYrkn6tf+8rK1fFOISJSFNr560lSfBLT0CrKAVuZe9HUBsF8sQZAVEx6nyeCxv 301s 5DxkTDrVM4KhcNg4ybW8ptatTGYKdsnDKJ+L6ew3kCxrNl3xADQfmJ0cLY6Xr6gJ 301s yLiuit2NNi2OBV0zUKQt+129OG5nSEAHBNDGqD+P4WPO2kvNj0OvIN2yO/biqOMH 301s toPlmhCZRM0O9eO2c1dsGw6vPVuvcdTFk32g8JRLXeFGmnGHIQL+wU1WmlRYkQFM 301s sFmhxnj6WRtlldX3h/83frXpsVkfajBYAWckoNY4qQT1XIsJdC6pVrP62iAWJi5g 301s GjDIDN++fVJDVc5w6BR62OM9hAA16dERx1cyUtcfsmL6f/SPgHFueaDdFD/97kOn 301s ss/4sdtrKL0MITCfK5oEegn8kTypl7tUTyt6bjb+5mxU3016WDdr174RGUXl2PIS 301s Rf/aOBt1KydRdDIFBzAhvOnMNc9G4T0ml1aLnzp8f30a 301s -----END ENCRYPTED PRIVATE KEY----- 301s Setting log level to 99 301s MAC info: 301s MAC: PBMAC1 (1.2.840.113549.1.5.14) 301s Salt: 203ad82b117c7b05 301s Salt size: 8 301s Iteration count: 2048 301s 301s BAG #0 301s Type: Encrypted 301s Cipher: AES-256-CBC 301s Schema: PBES2-AES256-CBC (2.16.840.1.101.3.4.1.42) 301s Salt: 044114e54ca74641 301s Salt size: 8 301s Iteration count: 2048 301s 301s Decrypting... 301s Elements: 1 301s Type: Certificate 301s Key ID: 7A:00:45:5D:1D:93:1A:8B:5B:F0:C1:16:05:A9:63:B4:04:BB:74:1E 301s -----BEGIN CERTIFICATE----- 301s MIIDZTCCAk2gAwIBAgIUPwNhX2dXIFfhmIfav1IfwgSjRYMwDQYJKoZIhvcNAQEL 301s BQAwQjELMAkGA1UEBhMCWFgxFTATBgNVBAcMDERlZmF1bHQgQ2l0eTEcMBoGA1UE 301s CgwTRGVmYXVsdCBDb21wYW55IEx0ZDAeFw0yMjA4MTkxMDAxMTBaFw0yMjA5MTgx 301s MDAxMTBaMEIxCzAJBgNVBAYTAlhYMRUwEwYDVQQHDAxEZWZhdWx0IENpdHkxHDAa 301s BgNVBAoME0RlZmF1bHQgQ29tcGFueSBMdGQwggEiMA0GCSqGSIb3DQEBAQUAA4IB 301s DwAwggEKAoIBAQC7UnID9tzVZ8zGL/zAjV6FdZ7DPwGnl+WBs0S+D0IVKTiOrVvJ 301s W+bxC4jquba8jK8h/BKYNbi/4UjvteRG3n5+GzyJuL8p9ovXKn0jrKykGVgsn9Bo 301s 6f+Yd0M6soR5Y4AhFmJFKgLVlbk3IgPpKaF4hBukvPfNBhEMWMK9FOEcSYEZNV68 301s hCT1vtMPg7J2kwX/i9e76gK0ZnNU6odM+lx7veZ7kgWCmn5j7Fr6F1kxM9uOmMZx 301s 2mneZThMEwG/0unUdfLWuCEKUuG0hJAGXrUbPWphXIFr8rR9NzhjOW6yptjAbm/6 301s kb+Im6ED77WeG2Ql6QvcWSVOWtDn4qNnnqAHAgMBAAGjUzBRMB0GA1UdDgQWBBSP 301s WBge9gMQwhb1lpNh7PGQw/ln+zAfBgNVHSMEGDAWgBSPWBge9gMQwhb1lpNh7PGQ 301s w/ln+zAPBgNVHRMBAf8EBTADAQH/MA0GCSqGSIb3DQEBCwUAA4IBAQCIvqFeoAsf 301s yWVD07ev1fBb4GcxT91ZPBZRjLu5cNeZZn4nOHTMilC0Ck2C8y6Mum+qTwPID69U 301s RlmgmIpIs+86KjYsw6j373NSLdhZZPB22KOv98i4mBjg7ot7AVG3gWwV30Zk/f3k 301s vIw0IxkbcxM19C3xknLoN0NJhdBo+Ntd4w57TMcWa7QZc22kGAcUBtD56NEGlGMG 301s cilsHCtg7sSpO2XEPPUKrF4u2EWAdiz4GoeWi5NEQHOEnTmCUqp9tHMxKpDZAtk4 301s s+MKiVXmCHU1gFWPYqdYOSVXQwaoOLyYiTm0+2ZjHtDN/jDVTPX+cBjKtAG63S6V 301s Sk4Clw3hNWij 301s -----END CERTIFICATE----- 301s 301s BAG #1 301s Elements: 1 301s Type: PKCS #8 Encrypted key 301s PKCS #8 information: 301s Cipher: AES-256-CBC 301s Schema: PBES2-AES256-CBC (2.16.840.1.101.3.4.1.42) 301s Salt: cf843f4b901fc97d 301s Salt size: 8 301s Iteration count: 2048 301s 301s Key ID: 7A:00:45:5D:1D:93:1A:8B:5B:F0:C1:16:05:A9:63:B4:04:BB:74:1E 301s -----BEGIN ENCRYPTED PRIVATE KEY----- 301s MIIFLTBXBgkqhkiG9w0BBQ0wSjApBgkqhkiG9w0BBQwwHAQIz4Q/S5AfyX0CAggA 301s MAwGCCqGSIb3DQIJBQAwHQYJYIZIAWUDBAEqBBBLT+yOw5AN8OFFV6OyKsmhBIIE 301s 0DMb6iGIuDDXki/D/81UyBN9PSLax5dKSehgcIb6FW4CAqStZ4/6m49CcMzEmD2O 301s o6Zi+bsMk7cTj+Gkm2kociZS5dWjtJA1kv4l8vTk9wQSW+v3I/fZ9JJ+z7ert7S/ 301s jcxgCTemYb2YCWto/blyrKBt8/7W2qfOUfGUMv9M89DjukXklnQX/byJtMsXnMDt 301s t3aH/BqZp9V9ETpBjw4a82ulXwUvEpF2qzgMMBad6YZBMtJo8U9wJsQZjTYh9Xja 301s NBl4VlvNcTBWY3/OhC88vESN0Go4APny+/hxw3EQTHkCX/EOeQFroSS4nv9pD0B9 301s TqkCN5dOoAvC9er0T8obKFn8du05GfVd+3wkDH9HMMAGx+XFUGIjl9KRVexpl5+p 301s rda4nAUIWRd9upoUmHKySJOyApobe4N8/5pVqtCSe0OzyQFHnMmAMNjK1GcU+2hu 301s wHEFTOS11gA6uo1waPlhGGEnm1sszZlPArrnWGPdPjZBo5lZO3xm/mC/USECmXE9 301s kKi4URd3os8alYl0pzA9RSmeZRn9iSjnryae0OlZsmC7yASqZ+UNVlPurJT4vJ/4 301s M3gEENTz+y8lkUZgolkN5sjo47jMBb6bmYi5mZkhyOkvnpY2rpUmhEaifQMM8sJg 301s S5CF03dL9PY2IlPuF1Z3vADzvqmZDklTre8NuJHsnLLWq9Xr+/qd+i5bJi1nloKG 301s a81r0rfR5hcTknyJ4vZighxgHW9uo+pHWVHXB4X2idd9WbjBiFlRzfNJpxC93H/8 301s gOTXRzmz4Ed9yx1+KEwbfJZNt8p9/7PQxwJQ5QHkLKBViJwCPnSwq9HheVQ54/iD 301s luLyBzowzLhAaOYgpv8eDUXTavDQwxu3AOXY6xv3ZjVVPjnU4iZZaz9f9ROTVcH+ 301s vs3EaNHOqz4nafk3NkJyETRe1zpopObDpus2vGIOS33+CqRd7PMFq7N+WeWWzsHl 301s JBWi0wDbK6W8tlRpeoW3/Sa66/CkmkFxy50RL0EIVVrFsIJERsnJN77R/9fNbKkP 301s gMmPkMQ/J3Ua9ooh/ew5R9kpftYNq3cw/spd+rcJTeYrvyFydhYXemlCKHTwbw+h 301s 8390ZqOIHhZ7O8F8yJ/lFIDk6Z4nioW1fbkQ9wdJcVJy7lRlAnYo2OJGL5YZVG4S 301s vESfk5X8aOVKam1TwSaH01cN1U95ufWLpfdMbO0xjzzoFEdblXkbgau9VgjrPke/ 301s 7rElpFu7XOPd21afXrhYlogmLbb5Up753nJhPFknZ30v9oW1MTGHCeRZtIMkIazs 301s N5+4mWip9VBcOLKnjWlBNNGcD6c16Y2Jsz+w7NxLnTPOIPL1NbelUzNXhDzZHGdn 301s uGf3oGUIUU/IFABo1UaiYDQYCdZfFjHhs+0I7ebBuR1D5x9T4h2m8WMWJTY07O+A 301s XKet0ZGWJrL6RhR/Yy4JxdK4HGh3QCJvDbfttD3s9YJDm7LjLzo36iXKjWDBSCT/ 301s txSGgRIVcVf2Ph2XRSHhMfld8MKsmFtvrJ6F5WKzhU0l90s9k1/1J92DA73gDjO8 301s ez9whwMZt+ofDmGyrjjTomr2O3Opo9jUkqKaEtXFh/93GOnNxysMQ1j32sUiSse5 301s T2wG52/1jL4SWCDgCxaxpygOADsm/ZODLk99jxVyFNtm 301s -----END ENCRYPTED PRIVATE KEY----- 301s Setting log level to 99 301s MAC info: 301s MAC: PBMAC1 (1.2.840.113549.1.5.14) 301s Salt: 4e4f542055534544 301s Salt size: 8 301s Iteration count: 2048 301s 301s BAG #0 301s Type: Encrypted 301s Cipher: AES-256-CBC 301s Schema: PBES2-AES256-CBC (2.16.840.1.101.3.4.1.42) 301s Salt: 3da715f1636cac73 301s Salt size: 8 301s Iteration count: 2048 301s 301s Decrypting... 301s Elements: 1 301s Type: Certificate 301s Key ID: C1:63:B9:0E:8A:EF:55:66:05:DC:15:94:98:0C:34:AD:41:1A:8D:27 301s -----BEGIN CERTIFICATE----- 301s MIIDfTCCAmWgAwIBAgIUeOdebExxNTjUFCilWX9HoXcdFu8wDQYJKoZIhvcNAQEL 301s BQAwTjELMAkGA1UEBhMCWFgxCzAJBgNVBAgMAnFxMQswCQYDVQQHDAJ3dzELMAkG 301s A1UECgwCZWUxCzAJBgNVBAsMAnJyMQswCQYDVQQDDAJ0dDAeFw0yMzA1MjIxMzE0 301s MjFaFw0yMzA2MjExMzE0MjFaME4xCzAJBgNVBAYTAlhYMQswCQYDVQQIDAJxcTEL 301s MAkGA1UEBwwCd3cxCzAJBgNVBAoMAmVlMQswCQYDVQQLDAJycjELMAkGA1UEAwwC 301s dHQwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC8oOL1jSEa7l1HWxta 301s vRbx0LbgzDPe8JVZJMlK5/HRpoBbwp72WHISizxA2PgUT+hwdUtpOVrw02arA/8Z 301s YfSG5nvhwJPf3C+Pf5vr9sbNPAc6kWWp76oCVy4H8LvL1agDpbS+jdMnkz8YJhMk 301s rxQpAk9ZBytWJqiT6aGiYnMJyBs2YgWMlwKyud6za1FX+UobRNiR8oxv8bfKdyEd 301s 6eWqX9Ujny/roPaWKTQZCCpiZl5eXVFaWJX9pjj6gjFUTBLcV+ULZx213XBCS38f 301s 3TTSHS+25Q+mmf+ZzSmZ7fm/zy3tzHgEWBfl6tEEQ0xb+wh8Yi2MUCnG6xvbui0K 301s ksjPAgMBAAGjUzBRMB0GA1UdDgQWBBQ3wPwMQ6XJ4ZCGwOG3J3KQLP2fdjAfBgNV 301s HSMEGDAWgBQ3wPwMQ6XJ4ZCGwOG3J3KQLP2fdjAPBgNVHRMBAf8EBTADAQH/MA0G 301s CSqGSIb3DQEBCwUAA4IBAQAiU46Xg8ThhuI41U5g5y5lO9MXeiriYFqT5IEr5IXY 301s fX4u9grqKeHwqluk4jhyM/Gg+mdc1KdqIEVqWcVFBXim6cyeWIhdiGeujv5388oh 301s 5xRtSZNkHA8c7odBpYPjpVkOYNo1fZqwto76uvZT+XukhKUvReazxNP0kE1eh6PS 301s yung98M+gYU7xfYW/J9kxd9igZpKfFoqvOZJx3srKql2at6E1i7YZKbxtlbSTM+5 301s XKCSVOftBEhpszrv08fbVgiAeIr8L490GbIo2atSh5aWXzE2RBVJESDGfoItddK6 301s UwsNw3X8Vlg7btxl3XlhA/ISU4HzEl8okMocUDcozDKS 301s -----END CERTIFICATE----- 301s 301s BAG #1 301s Elements: 1 301s Type: PKCS #8 Encrypted key 301s PKCS #8 information: 301s Cipher: AES-256-CBC 301s Schema: PBES2-AES256-CBC (2.16.840.1.101.3.4.1.42) 301s Salt: 53c73c3e569b6b60 301s Salt size: 8 301s Iteration count: 2048 301s 301s Key ID: C1:63:B9:0E:8A:EF:55:66:05:DC:15:94:98:0C:34:AD:41:1A:8D:27 301s -----BEGIN ENCRYPTED PRIVATE KEY----- 301s MIIFLTBXBgkqhkiG9w0BBQ0wSjApBgkqhkiG9w0BBQwwHAQIU8c8Plaba2ACAggA 301s MAwGCCqGSIb3DQIJBQAwHQYJYIZIAWUDBAEqBBCvZ0qnNSNreLTFRm1h6XbUBIIE 301s 0MwsCO49+IAk734+p7jkp3QI0oRr+5jdo+1jFdKbJU6atm/QZ9759WNCTLy+BO7C 301s 61MzVNNqXTnHwpxKTBXHDb9rEKy6dZjgisbvDo0qh2S6ClS9ETlbGfHTBAiy4oA5 301s TykYksixK5deLRK1+P825FGljETjtvJBW027m0PGKB5UVMLCltcS4L34tIEZBv8x 301s 10X0B41//DUrb+4V5XoZ+/xsthCj7ERYWnZv4lBwH5gjJDIB01NuPCREffp7F5bX 301s efR/iHg6Y/5G8WfmLx6MPV1GSrvNvHdzEJ1KS2dQXyRoTAT1cG1VAwONAokAVXQq 301s BrTycmpS9vMaEtx9CCxQp8EDq+rtB8JXjSTxh6u/B1Mh+h8MZ4dG9OaNet6+sExW 301s Z+XDDsaW7P07Xft068Zq2KXdl57kZnt3J2mCdCC76XP/Hiy0e0iow0+CYWdIfwn3 301s Fdllr4aULoJGNKVq2fhCDJ3gdXWQfepiVS8TotePDnkoItD7MWTDYmDN9606cEE+ 301s VqjrBMg8FEKZ3uW/CpLf7OxDdCyTZz8iSUS9S3Kjna+o/umKkbT2u2vaFiajHLkz 301s /m6sxkSYftxw5RQcNmM6fYmnb+CpgdjM4UrS1KItjEo7555JHeS3nbLIQHelmynx 301s e5CwB0B0+AIunTBDuBCpBFRfSQbcQkeCRJ+gvfC6YPi5Pq32O4Bzn2cbYBlEcIF0 301s WN2i1K3U+eWSoJNxMVSj84uRIXaQGruySoaTsMiqMwKfziljDa8+oaG7tjG59Qfi 301s AOtKbGBx8cpwYLCR7+1kJm2IfB8hnx4Fb2gPKWQmKscY6S40ia0fAQbvR/cZE4ey 301s pYcYK3l2L9fbgGG1HfeZHKMfYs2nelT56L4BUm/jpncujyQAj4+oRVujyW7nD9GD 301s 6TtFbVrUHWWd3X9T9IWe6rysDjxQPoCmUnJIKgEn8oIj/Vd2XPIyIsIzc6AzNkE/ 301s lFCSoohmFyVBDjvYccxR5Ro++fQ3DUYaYJeQIEee6HyEg/cgbggCWD0P2mRzxbkU 301s 63FRt0WiGwgEu95xM5yshWizl388n8mkpsobB9ud7Z8i9THowvtm0RJKP8pXYBVM 301s b1OSSPkNyiegMI/j53bh18e9ROFMErrtsV2DKcZ0MCOq66EKWQV/Nh4aoHC1fNz/ 301s Jac0MD3R4x+c5KMZlnQtPo1P7XEHzV2KSXcqGl+7Q5lXJS4cJfabPzvONaSLDSyV 301s l8L8Rugftyzf5MOEI8DdfeD6KYjg+/qA5uZobbTu/Aqwa0cRzA/9EKp4mYys0mXq 301s cZWavie/drvL7TJ7s8wocbtAX9z4SF3CTXFYcFLa9MinvzfjbwtLZqfMMopPwZZ3 301s cTfXim3UzotsCIuuIdkBvJzpOusEPz0iCWMGZengzREEsx/9Zhgn1EJ1E9e1Av6f 301s kIHp3+gLmqdhlpb7Cawe7v6crc+ua7Y7f6LqOiIehMFqsFVaRl2Q9O4FVh9Cnv1a 301s +mjxjb5C3Jn7T7g2bJ/Y4ooN4LoXXskVX9dDsd+vZClnBu+au+4cRCM0sw8lJQTW 301s 56JvUiI7rd6/qlWJljjWrQuqv+A9CONi543d3RMmce45h94P0tgEjBc1q/ab13Ot 301s XbGDpHWeD2GvVz1GcVxWoGbKEtxdbFO/ffiCVVNLQtDB 301s -----END ENCRYPTED PRIVATE KEY----- 301s |<9>| keyDerivationFunc.algorithm: 1.2.840.113549.1.5.12 301s |<9>| salt.specified.size: 8 301s |<9>| iterationCount: 2048 301s |<9>| keyLength: 0 301s |<9>| encryptionScheme.algorithm: 2.16.840.1.101.3.4.1.42 301s |<9>| IV.size: 16 301s |<9>| keyDerivationFunc.algorithm: 1.2.840.113549.1.5.12 301s |<9>| salt.specified.size: 8 301s |<9>| iterationCount: 2048 301s |<9>| keyLength: 0 301s |<9>| encryptionScheme.algorithm: 2.16.840.1.101.3.4.1.42 301s |<9>| IV.size: 16 301s |<3>| ASSERT: ../../../lib/x509/privkey_pkcs8.c[check_for_decrypted]:815 301s |<9>| keyDerivationFunc.algorithm: 1.2.840.113549.1.5.12 301s |<9>| salt.specified.size: 8 301s |<9>| iterationCount: 2048 301s |<9>| keyLength: 0 301s |<9>| encryptionScheme.algorithm: 2.16.840.1.101.3.4.1.42 301s |<9>| IV.size: 16 301s |<9>| keyDerivationFunc.algorithm: 1.2.840.113549.1.5.12 301s |<9>| salt.specified.size: 8 301s |<9>| iterationCount: 2048 301s |<9>| keyLength: 64 301s |<9>| messageAuthScheme.algorithm: 1.2.840.113549.2.11 301s |<9>| keyDerivationFunc.algorithm: 1.2.840.113549.1.5.12 301s |<9>| salt.specified.size: 8 301s |<9>| iterationCount: 2048 301s |<9>| keyLength: 0 301s |<9>| encryptionScheme.algorithm: 2.16.840.1.101.3.4.1.42 301s |<9>| IV.size: 16 301s |<9>| keyDerivationFunc.algorithm: 1.2.840.113549.1.5.12 301s |<9>| salt.specified.size: 8 301s |<9>| iterationCount: 2048 301s |<9>| keyLength: 0 301s |<9>| encryptionScheme.algorithm: 2.16.840.1.101.3.4.1.42 301s |<9>| IV.size: 16 301s |<3>| ASSERT: ../../../lib/x509/privkey_pkcs8.c[check_for_decrypted]:815 301s |<9>| keyDerivationFunc.algorithm: 1.2.840.113549.1.5.12 301s |<9>| salt.specified.size: 8 301s |<9>| iterationCount: 2048 301s |<9>| keyLength: 0 301s |<9>| encryptionScheme.algorithm: 2.16.840.1.101.3.4.1.42 301s |<9>| IV.size: 16 301s |<9>| keyDerivationFunc.algorithm: 1.2.840.113549.1.5.12 301s |<9>| salt.specified.size: 8 301s |<9>| iterationCount: 2048 301s |<9>| keyLength: 32 301s |<9>| messageAuthScheme.algorithm: 1.2.840.113549.2.9 301s |<9>| keyDerivationFunc.algorithm: 1.2.840.113549.1.5.12 301s |<9>| salt.specified.size: 8 301s |<9>| iterationCount: 2048 301s |<9>| keyLength: 0 301s |<9>| encryptionScheme.algorithm: 2.16.840.1.101.3.4.1.42 301s |<9>| IV.size: 16 301s |<9>| keyDerivationFunc.algorithm: 1.2.840.113549.1.5.12 301s |<9>| salt.specified.size: 8 301s |<9>| iterationCount: 2048 301s |<9>| keyLength: 0 301s |<9>| encryptionScheme.algorithm: 2.16.840.1.101.3.4.1.42 301s |<9>| IV.size: 16 301s |<3>| ASSERT: ../../../lib/x509/privkey_pkcs8.c[check_for_decrypted]:815 301s |<9>| keyDerivationFunc.algorithm: 1.2.840.113549.1.5.12 301s |<9>| salt.specified.size: 8 301s |<9>| iterationCount: 2048 301s |<9>| keyLength: 0 301s |<9>| encryptionScheme.algorithm: 2.16.840.1.101.3.4.1.42 301s |<9>| IV.size: 16 301s |<9>| keyDerivationFunc.algorithm: 1.2.840.113549.1.5.12 301s |<9>| salt.specified.size: 8 301s |<9>| iterationCount: 2049 301s |<9>| keyLength: 32 301s |<9>| messageAuthScheme.algorithm: 1.2.840.113549.2.9 301s |<3>| ASSERT: ../../../lib/x509/pkcs12.c[pkcs12_verify_mac_pbmac1]:1162 301s verify_mac: The Message Authentication Code verification failed. 301s |<9>| keyDerivationFunc.algorithm: 1.2.840.113549.1.5.12 301s |<9>| salt.specified.size: 8 301s |<9>| iterationCount: 2048 301s |<9>| keyLength: 0 301s |<9>| encryptionScheme.algorithm: 2.16.840.1.101.3.4.1.42 301s |<9>| IV.size: 16 301s |<9>| keyDerivationFunc.algorithm: 1.2.840.113549.1.5.12 301s |<9>| salt.specified.size: 8 301s |<9>| iterationCount: 2048 301s |<9>| keyLength: 0 301s |<9>| encryptionScheme.algorithm: 2.16.840.1.101.3.4.1.42 301s |<9>| IV.size: 16 301s |<3>| ASSERT: ../../../lib/x509/privkey_pkcs8.c[check_for_decrypted]:815 301s |<9>| keyDerivationFunc.algorithm: 1.2.840.113549.1.5.12 301s |<9>| salt.specified.size: 8 301s |<9>| iterationCount: 2048 301s |<9>| keyLength: 0 301s |<9>| encryptionScheme.algorithm: 2.16.840.1.101.3.4.1.42 301s |<9>| IV.size: 16 301s There were errors parsing the structure 301s |<9>| keyDerivationFunc.algorithm: 1.2.840.113549.1.5.12 301s |<9>| salt.specified.size: 8 301s |<9>| iterationCount: 2048 301s |<9>| keyLength: 32 301s |<9>| messageAuthScheme.algorithm: 1.2.840.113549.2.9 301s |<3>| ASSERT: ../../../lib/x509/pkcs12.c[pkcs12_verify_mac_pbmac1]:1162 301s verify_mac: The Message Authentication Code verification failed. 301s |<9>| keyDerivationFunc.algorithm: 1.2.840.113549.1.5.12 301s |<9>| salt.specified.size: 8 301s |<9>| iterationCount: 2048 301s |<9>| keyLength: 0 301s |<9>| encryptionScheme.algorithm: 2.16.840.1.101.3.4.1.42 301s |<9>| IV.size: 16 301s |<9>| keyDerivationFunc.algorithm: 1.2.840.113549.1.5.12 301s |<9>| salt.specified.size: 8 301s |<9>| iterationCount: 2048 301s Setting log level to 99 301s MAC info: 301s MAC: PBMAC1 (1.2.840.113549.1.5.14) 301s Salt: 6f473c38b02e3173 301s Salt size: 8 301s Iteration count: 1 301s 301s BAG #0 301s Type: Encrypted 301s Cipher: AES-256-CBC 301s Schema: PBES2-AES256-CBC (2.16.840.1.101.3.4.1.42) 301s Salt: 3da715f1636cac73 301s Salt size: 8 301s Iteration count: 2048 301s 301s Decrypting... 301s Elements: 1 301s Type: Certificate 301s Key ID: C1:63:B9:0E:8A:EF:55:66:05:DC:15:94:98:0C:34:AD:41:1A:8D:27 301s -----BEGIN CERTIFICATE----- 301s MIIDfTCCAmWgAwIBAgIUeOdebExxNTjUFCilWX9HoXcdFu8wDQYJKoZIhvcNAQEL 301s BQAwTjELMAkGA1UEBhMCWFgxCzAJBgNVBAgMAnFxMQswCQYDVQQHDAJ3dzELMAkG 301s A1UECgwCZWUxCzAJBgNVBAsMAnJyMQswCQYDVQQDDAJ0dDAeFw0yMzA1MjIxMzE0 301s MjFaFw0yMzA2MjExMzE0MjFaME4xCzAJBgNVBAYTAlhYMQswCQYDVQQIDAJxcTEL 301s MAkGA1UEBwwCd3cxCzAJBgNVBAoMAmVlMQswCQYDVQQLDAJycjELMAkGA1UEAwwC 301s dHQwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC8oOL1jSEa7l1HWxta 301s vRbx0LbgzDPe8JVZJMlK5/HRpoBbwp72WHISizxA2PgUT+hwdUtpOVrw02arA/8Z 301s YfSG5nvhwJPf3C+Pf5vr9sbNPAc6kWWp76oCVy4H8LvL1agDpbS+jdMnkz8YJhMk 301s rxQpAk9ZBytWJqiT6aGiYnMJyBs2YgWMlwKyud6za1FX+UobRNiR8oxv8bfKdyEd 301s 6eWqX9Ujny/roPaWKTQZCCpiZl5eXVFaWJX9pjj6gjFUTBLcV+ULZx213XBCS38f 301s 3TTSHS+25Q+mmf+ZzSmZ7fm/zy3tzHgEWBfl6tEEQ0xb+wh8Yi2MUCnG6xvbui0K 301s ksjPAgMBAAGjUzBRMB0GA1UdDgQWBBQ3wPwMQ6XJ4ZCGwOG3J3KQLP2fdjAfBgNV 301s HSMEGDAWgBQ3wPwMQ6XJ4ZCGwOG3J3KQLP2fdjAPBgNVHRMBAf8EBTADAQH/MA0G 301s CSqGSIb3DQEBCwUAA4IBAQAiU46Xg8ThhuI41U5g5y5lO9MXeiriYFqT5IEr5IXY 301s fX4u9grqKeHwqluk4jhyM/Gg+mdc1KdqIEVqWcVFBXim6cyeWIhdiGeujv5388oh 301s 5xRtSZNkHA8c7odBpYPjpVkOYNo1fZqwto76uvZT+XukhKUvReazxNP0kE1eh6PS 301s yung98M+gYU7xfYW/J9kxd9igZpKfFoqvOZJx3srKql2at6E1i7YZKbxtlbSTM+5 301s XKCSVOftBEhpszrv08fbVgiAeIr8L490GbIo2atSh5aWXzE2RBVJESDGfoItddK6 301s UwsNw3X8Vlg7btxl3XlhA/ISU4HzEl8okMocUDcozDKS 301s -----END CERTIFICATE----- 301s 301s BAG #1 301s Elements: 1 301s Type: PKCS #8 Encrypted key 301s PKCS #8 information: 301s Cipher: AES-256-CBC 301s Schema: PBES2-AES256-CBC (2.16.840.1.101.3.4.1.42) 301s Salt: 53c73c3e569b6b60 301s Salt size: 8 301s Iteration count: 2048 301s 301s Key ID: C1:63:B9:0E:8A:EF:55:66:05:DC:15:94:98:0C:34:AD:41:1A:8D:27 301s -----BEGIN ENCRYPTED PRIVATE KEY----- 301s MIIFLTBXBgkqhkiG9w0BBQ0wSjApBgkqhkiG9w0BBQwwHAQIU8c8Plaba2ACAggA 301s MAwGCCqGSIb3DQIJBQAwHQYJYIZIAWUDBAEqBBCvZ0qnNSNreLTFRm1h6XbUBIIE 301s 0MwsCO49+IAk734+p7jkp3QI0oRr+5jdo+1jFdKbJU6atm/QZ9759WNCTLy+BO7C 301s 61MzVNNqXTnHwpxKTBXHDb9rEKy6dZjgisbvDo0qh2S6ClS9ETlbGfHTBAiy4oA5 301s TykYksixK5deLRK1+P825FGljETjtvJBW027m0PGKB5UVMLCltcS4L34tIEZBv8x 301s 10X0B41//DUrb+4V5XoZ+/xsthCj7ERYWnZv4lBwH5gjJDIB01NuPCREffp7F5bX 301s efR/iHg6Y/5G8WfmLx6MPV1GSrvNvHdzEJ1KS2dQXyRoTAT1cG1VAwONAokAVXQq 301s BrTycmpS9vMaEtx9CCxQp8EDq+rtB8JXjSTxh6u/B1Mh+h8MZ4dG9OaNet6+sExW 301s Z+XDDsaW7P07Xft068Zq2KXdl57kZnt3J2mCdCC76XP/Hiy0e0iow0+CYWdIfwn3 301s Fdllr4aULoJGNKVq2fhCDJ3gdXWQfepiVS8TotePDnkoItD7MWTDYmDN9606cEE+ 301s VqjrBMg8FEKZ3uW/CpLf7OxDdCyTZz8iSUS9S3Kjna+o/umKkbT2u2vaFiajHLkz 301s /m6sxkSYftxw5RQcNmM6fYmnb+CpgdjM4UrS1KItjEo7555JHeS3nbLIQHelmynx 301s e5CwB0B0+AIunTBDuBCpBFRfSQbcQkeCRJ+gvfC6YPi5Pq32O4Bzn2cbYBlEcIF0 301s WN2i1K3U+eWSoJNxMVSj84uRIXaQGruySoaTsMiqMwKfziljDa8+oaG7tjG59Qfi 301s AOtKbGBx8cpwYLCR7+1kJm2IfB8hnx4Fb2gPKWQmKscY6S40ia0fAQbvR/cZE4ey 301s pYcYK3l2L9fbgGG1HfeZHKMfYs2nelT56L4BUm/jpncujyQAj4+oRVujyW7nD9GD 301s 6TtFbVrUHWWd3X9T9IWe6rysDjxQPoCmUnJIKgEn8oIj/Vd2XPIyIsIzc6AzNkE/ 301s lFCSoohmFyVBDjvYccxR5Ro++fQ3DUYaYJeQIEee6HyEg/cgbggCWD0P2mRzxbkU 301s 63FRt0WiGwgEu95xM5yshWizl388n8mkpsobB9ud7Z8i9THowvtm0RJKP8pXYBVM 301s b1OSSPkNyiegMI/j53bh18e9ROFMErrtsV2DKcZ0MCOq66EKWQV/Nh4aoHC1fNz/ 301s Jac0MD3R4x+c5KMZlnQtPo1P7XEHzV2KSXcqGl+7Q5lXJS4cJfabPzvONaSLDSyV 301s l8L8Rugftyzf5MOEI8DdfeD6KYjg+/qA5uZobbTu/Aqwa0cRzA/9EKp4mYys0mXq 301s cZWavie/drvL7TJ7s8wocbtAX9z4SF3CTXFYcFLa9MinvzfjbwtLZqfMMopPwZZ3 301s cTfXim3UzotsCIuuIdkBvJzpOusEPz0iCWMGZengzREEsx/9Zhgn1EJ1E9e1Av6f 301s kIHp3+gLmqdhlpb7Cawe7v6crc+ua7Y7f6LqOiIehMFqsFVaRl2Q9O4FVh9Cnv1a 301s +mjxjb5C3Jn7T7g2bJ/Y4ooN4LoXXskVX9dDsd+vZClnBu+au+4cRCM0sw8lJQTW 301s 56JvUiI7rd6/qlWJljjWrQuqv+A9CONi543d3RMmce45h94P0tgEjBc1q/ab13Ot 301s XbGDpHWeD2GvVz1GcVxWoGbKEtxdbFO/ffiCVVNLQtDB 301s -----END ENCRYPTED PRIVATE KEY----- 301s |<9>| keyLength: 0 301s |<9>| encryptionScheme.algorithm: 2.16.840.1.101.3.4.1.42 301s |<9>| IV.size: 16 301s |<3>| ASSERT: ../../../lib/x509/privkey_pkcs8.c[check_for_decrypted]:815 301s |<9>| keyDerivationFunc.algorithm: 1.2.840.113549.1.5.12 301s |<9>| salt.specified.size: 8 301s |<9>| iterationCount: 2048 301s |<9>| keyLength: 0 301s |<9>| encryptionScheme.algorithm: 2.16.840.1.101.3.4.1.42 301s |<9>| IV.size: 16 301s There were errors parsing the structure 301s |<9>| keyDerivationFunc.algorithm: 1.2.840.113549.1.5.12 301s |<9>| salt.specified.size: 8 301s |<9>| iterationCount: 2048 301s |<9>| keyLength: 0 301s |<9>| messageAuthScheme.algorithm: 1.2.840.113549.2.9 301s |<3>| ASSERT: ../../../lib/x509/pkcs7-crypt.c[_gnutls_read_pbmac1_params]:1824 301s |<3>| ASSERT: ../../../lib/x509/pkcs12.c[pkcs12_verify_mac_pbmac1]:1123 301s verify_mac: One of the involved algorithms has insufficient security level. 301s |<9>| keyDerivationFunc.algorithm: 1.2.840.113549.1.5.12 301s |<9>| salt.specified.size: 8 301s |<9>| iterationCount: 2048 301s |<9>| keyLength: 0 301s |<9>| encryptionScheme.algorithm: 2.16.840.1.101.3.4.1.42 301s |<9>| IV.size: 16 301s |<9>| keyDerivationFunc.algorithm: 1.2.840.113549.1.5.12 301s |<9>| salt.specified.size: 8 301s |<9>| iterationCount: 2048 301s |<9>| keyLength: 0 301s |<9>| encryptionScheme.algorithm: 2.16.840.1.101.3.4.1.42 301s |<9>| IV.size: 16 301s |<3>| ASSERT: ../../../lib/x509/privkey_pkcs8.c[check_for_decrypted]:815 301s |<9>| keyDerivationFunc.algorithm: 1.2.840.113549.1.5.12 301s |<9>| salt.specified.size: 8 301s |<9>| iterationCount: 2048 301s |<9>| keyLength: 0 301s |<9>| encryptionScheme.algorithm: 2.16.840.1.101.3.4.1.42 301s |<9>| IV.size: 16 301s There were errors parsing the structure 301s |<9>| keyDerivationFunc.algorithm: 1.2.840.113549.1.5.12 301s |<9>| salt.specified.size: 8 301s |<9>| iterationCount: 600000 301s |<9>| keyLength: 19 301s |<9>| messageAuthScheme.algorithm: 1.2.840.113549.2.9 301s |<3>| ASSERT: ../../../lib/x509/pkcs7-crypt.c[_gnutls_read_pbmac1_params]:1824 301s |<3>| ASSERT: ../../../lib/x509/pkcs12.c[pkcs12_verify_mac_pbmac1]:1123 301s verify_mac: One of the involved algorithms has insufficient security level. 301s |<9>| keyDerivationFunc.algorithm: 1.2.840.113549.1.5.12 301s |<9>| salt.specified.size: 13 301s |<9>| iterationCount: 600000 301s |<9>| keyLength: 16 301s |<9>| encryptionScheme.algorithm: 2.16.840.1.101.3.4.1.2 301s |<9>| IV.size: 16 301s |<9>| keyDerivationFunc.algorithm: 1.2.840.113549.1.5.12 301s |<9>| salt.specified.size: 13 301s |<9>| iterationCount: 600000 301s |<9>| keyLength: 16 301s |<9>| encryptionScheme.algorithm: 2.16.840.1.101.3.4.1.2 301s |<9>| IV.size: 16 301s |<3>| ASSERT: ../../../lib/x509/privkey_pkcs8.c[check_for_decrypted]:815 301s |<9>| keyDerivationFunc.algorithm: 1.2.840.113549.1.5.12 301s |<9>| salt.specified.size: 16 301s |<9>| iterationCount: 600000 301s |<9>| keyLength: 16 301s |<9>| encryptionScheme.algorithm: 2.16.840.1.101.3.4.1.2 301s |<9>| IV.size: 16 301s There were errors parsing the structure 301s |<9>| keyDerivationFunc.algorithm: 1.2.840.113549.1.5.12 301s |<9>| salt.specified.size: 8 301s |<9>| iterationCount: 2048 301s |<9>| keyLength: 32 301s |<9>| messageAuthScheme.algorithm: 1.2.840.113549.2.9 301s |<3>| ASSERT: ../../../lib/x509/pkcs12.c[pkcs12_verify_mac_pbmac1]:1162 301s verify_mac: The Message Authentication Code verification failed. 301s |<9>| keyDerivationFunc.algorithm: 1.2.840.113549.1.5.12 301s |<9>| salt.specified.size: 8 301s |<9>| iterationCount: 2048 301s |<9>| keyLength: 0 301s |<9>| encryptionScheme.algorithm: 2.16.840.1.101.3.4.1.42 301s |<9>| IV.size: 16 301s |<9>| keyDerivationFunc.algorithm: 1.2.840.113549.1.5.12 301s Setting log level to 99 301s MAC info: 301s MAC: PBMAC1 (1.2.840.113549.1.5.14) 301s Salt: 6f473c38b02e3173 301s Salt size: 8 301s Iteration count: 2048 301s 301s BAG #0 301s Type: Encrypted 301s Cipher: AES-256-CBC 301s Schema: PBES2-AES256-CBC (2.16.840.1.101.3.4.1.42) 301s Salt: 3da715f1636cac73 301s Salt size: 8 301s Iteration count: 2048 301s 301s Decrypting... 301s Elements: 1 301s Type: Certificate 301s Key ID: C1:63:B9:0E:8A:EF:55:66:05:DC:15:94:98:0C:34:AD:41:1A:8D:27 301s -----BEGIN CERTIFICATE----- 301s MIIDfTCCAmWgAwIBAgIUeOdebExxNTjUFCilWX9HoXcdFu8wDQYJKoZIhvcNAQEL 301s BQAwTjELMAkGA1UEBhMCWFgxCzAJBgNVBAgMAnFxMQswCQYDVQQHDAJ3dzELMAkG 301s A1UECgwCZWUxCzAJBgNVBAsMAnJyMQswCQYDVQQDDAJ0dDAeFw0yMzA1MjIxMzE0 301s MjFaFw0yMzA2MjExMzE0MjFaME4xCzAJBgNVBAYTAlhYMQswCQYDVQQIDAJxcTEL 301s MAkGA1UEBwwCd3cxCzAJBgNVBAoMAmVlMQswCQYDVQQLDAJycjELMAkGA1UEAwwC 301s dHQwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC8oOL1jSEa7l1HWxta 301s vRbx0LbgzDPe8JVZJMlK5/HRpoBbwp72WHISizxA2PgUT+hwdUtpOVrw02arA/8Z 301s YfSG5nvhwJPf3C+Pf5vr9sbNPAc6kWWp76oCVy4H8LvL1agDpbS+jdMnkz8YJhMk 301s rxQpAk9ZBytWJqiT6aGiYnMJyBs2YgWMlwKyud6za1FX+UobRNiR8oxv8bfKdyEd 301s 6eWqX9Ujny/roPaWKTQZCCpiZl5eXVFaWJX9pjj6gjFUTBLcV+ULZx213XBCS38f 301s 3TTSHS+25Q+mmf+ZzSmZ7fm/zy3tzHgEWBfl6tEEQ0xb+wh8Yi2MUCnG6xvbui0K 301s ksjPAgMBAAGjUzBRMB0GA1UdDgQWBBQ3wPwMQ6XJ4ZCGwOG3J3KQLP2fdjAfBgNV 301s HSMEGDAWgBQ3wPwMQ6XJ4ZCGwOG3J3KQLP2fdjAPBgNVHRMBAf8EBTADAQH/MA0G 301s CSqGSIb3DQEBCwUAA4IBAQAiU46Xg8ThhuI41U5g5y5lO9MXeiriYFqT5IEr5IXY 301s fX4u9grqKeHwqluk4jhyM/Gg+mdc1KdqIEVqWcVFBXim6cyeWIhdiGeujv5388oh 301s 5xRtSZNkHA8c7odBpYPjpVkOYNo1fZqwto76uvZT+XukhKUvReazxNP0kE1eh6PS 301s yung98M+gYU7xfYW/J9kxd9igZpKfFoqvOZJx3srKql2at6E1i7YZKbxtlbSTM+5 301s XKCSVOftBEhpszrv08fbVgiAeIr8L490GbIo2atSh5aWXzE2RBVJESDGfoItddK6 301s UwsNw3X8Vlg7btxl3XlhA/ISU4HzEl8okMocUDcozDKS 301s -----END CERTIFICATE----- 301s 301s BAG #1 301s Elements: 1 301s Type: PKCS #8 Encrypted key 301s PKCS #8 information: 301s Cipher: AES-256-CBC 301s Schema: PBES2-AES256-CBC (2.16.840.1.101.3.4.1.42) 301s Salt: 53c73c3e569b6b60 301s Salt size: 8 301s Iteration count: 2048 301s 301s Key ID: C1:63:B9:0E:8A:EF:55:66:05:DC:15:94:98:0C:34:AD:41:1A:8D:27 301s -----BEGIN ENCRYPTED PRIVATE KEY----- 301s MIIFLTBXBgkqhkiG9w0BBQ0wSjApBgkqhkiG9w0BBQwwHAQIU8c8Plaba2ACAggA 301s MAwGCCqGSIb3DQIJBQAwHQYJYIZIAWUDBAEqBBCvZ0qnNSNreLTFRm1h6XbUBIIE 301s 0MwsCO49+IAk734+p7jkp3QI0oRr+5jdo+1jFdKbJU6atm/QZ9759WNCTLy+BO7C 301s 61MzVNNqXTnHwpxKTBXHDb9rEKy6dZjgisbvDo0qh2S6ClS9ETlbGfHTBAiy4oA5 301s TykYksixK5deLRK1+P825FGljETjtvJBW027m0PGKB5UVMLCltcS4L34tIEZBv8x 301s 10X0B41//DUrb+4V5XoZ+/xsthCj7ERYWnZv4lBwH5gjJDIB01NuPCREffp7F5bX 301s efR/iHg6Y/5G8WfmLx6MPV1GSrvNvHdzEJ1KS2dQXyRoTAT1cG1VAwONAokAVXQq 301s BrTycmpS9vMaEtx9CCxQp8EDq+rtB8JXjSTxh6u/B1Mh+h8MZ4dG9OaNet6+sExW 301s Z+XDDsaW7P07Xft068Zq2KXdl57kZnt3J2mCdCC76XP/Hiy0e0iow0+CYWdIfwn3 301s Fdllr4aULoJGNKVq2fhCDJ3gdXWQfepiVS8TotePDnkoItD7MWTDYmDN9606cEE+ 301s VqjrBMg8FEKZ3uW/CpLf7OxDdCyTZz8iSUS9S3Kjna+o/umKkbT2u2vaFiajHLkz 301s /m6sxkSYftxw5RQcNmM6fYmnb+CpgdjM4UrS1KItjEo7555JHeS3nbLIQHelmynx 301s e5CwB0B0+AIunTBDuBCpBFRfSQbcQkeCRJ+gvfC6YPi5Pq32O4Bzn2cbYBlEcIF0 301s WN2i1K3U+eWSoJNxMVSj84uRIXaQGruySoaTsMiqMwKfziljDa8+oaG7tjG59Qfi 301s AOtKbGBx8cpwYLCR7+1kJm2IfB8hnx4Fb2gPKWQmKscY6S40ia0fAQbvR/cZE4ey 301s pYcYK3l2L9fbgGG1HfeZHKMfYs2nelT56L4BUm/jpncujyQAj4+oRVujyW7nD9GD 301s 6TtFbVrUHWWd3X9T9IWe6rysDjxQPoCmUnJIKgEn8oIj/Vd2XPIyIsIzc6AzNkE/ 301s lFCSoohmFyVBDjvYccxR5Ro++fQ3DUYaYJeQIEee6HyEg/cgbggCWD0P2mRzxbkU 301s 63FRt0WiGwgEu95xM5yshWizl388n8mkpsobB9ud7Z8i9THowvtm0RJKP8pXYBVM 301s b1OSSPkNyiegMI/j53bh18e9ROFMErrtsV2DKcZ0MCOq66EKWQV/Nh4aoHC1fNz/ 301s Jac0MD3R4x+c5KMZlnQtPo1P7XEHzV2KSXcqGl+7Q5lXJS4cJfabPzvONaSLDSyV 301s l8L8Rugftyzf5MOEI8DdfeD6KYjg+/qA5uZobbTu/Aqwa0cRzA/9EKp4mYys0mXq 301s cZWavie/drvL7TJ7s8wocbtAX9z4SF3CTXFYcFLa9MinvzfjbwtLZqfMMopPwZZ3 301s cTfXim3UzotsCIuuIdkBvJzpOusEPz0iCWMGZengzREEsx/9Zhgn1EJ1E9e1Av6f 301s kIHp3+gLmqdhlpb7Cawe7v6crc+ua7Y7f6LqOiIehMFqsFVaRl2Q9O4FVh9Cnv1a 301s +mjxjb5C3Jn7T7g2bJ/Y4ooN4LoXXskVX9dDsd+vZClnBu+au+4cRCM0sw8lJQTW 301s 56JvUiI7rd6/qlWJljjWrQuqv+A9CONi543d3RMmce45h94P0tgEjBc1q/ab13Ot 301s XbGDpHWeD2GvVz1GcVxWoGbKEtxdbFO/ffiCVVNLQtDB 301s -----END ENCRYPTED PRIVATE KEY----- 301s Setting log level to 99 301s MAC info: 301s MAC: PBMAC1 (1.2.840.113549.1.5.14) 301s Salt: ab3705b0eeb5d7dc 301s Salt size: 8 301s Iteration count: 600000 301s 301s BAG #0 301s Type: Encrypted 301s Cipher: AES-128-CBC 301s Schema: PBES2-AES128-CBC (2.16.840.1.101.3.4.1.2) 301s Salt: 4a3a38ce1e1baff2e97e006a3d 301s Salt size: 13 301s Iteration count: 600000 301s 301s Decrypting... 301s Elements: 1 301s Type: Certificate 301s Friendly name: my-key 301s Key ID: 56:70:F4:A6:3B:92:7D:1E:96:E8:2F:F6:5E:AD:EC:BB:6A:47:5D:AD 301s -----BEGIN CERTIFICATE----- 301s MIIDfTCCAmWgAwIBAgIUeOdebExxNTjUFCilWX9HoXcdFu8wDQYJKoZIhvcNAQEL 301s BQAwTjELMAkGA1UEBhMCWFgxCzAJBgNVBAgMAnFxMQswCQYDVQQHDAJ3dzELMAkG 301s A1UECgwCZWUxCzAJBgNVBAsMAnJyMQswCQYDVQQDDAJ0dDAeFw0yMzA1MjIxMzE0 301s MjFaFw0yMzA2MjExMzE0MjFaME4xCzAJBgNVBAYTAlhYMQswCQYDVQQIDAJxcTEL 301s MAkGA1UEBwwCd3cxCzAJBgNVBAoMAmVlMQswCQYDVQQLDAJycjELMAkGA1UEAwwC 301s dHQwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC8oOL1jSEa7l1HWxta 301s vRbx0LbgzDPe8JVZJMlK5/HRpoBbwp72WHISizxA2PgUT+hwdUtpOVrw02arA/8Z 301s YfSG5nvhwJPf3C+Pf5vr9sbNPAc6kWWp76oCVy4H8LvL1agDpbS+jdMnkz8YJhMk 301s rxQpAk9ZBytWJqiT6aGiYnMJyBs2YgWMlwKyud6za1FX+UobRNiR8oxv8bfKdyEd 301s 6eWqX9Ujny/roPaWKTQZCCpiZl5eXVFaWJX9pjj6gjFUTBLcV+ULZx213XBCS38f 301s 3TTSHS+25Q+mmf+ZzSmZ7fm/zy3tzHgEWBfl6tEEQ0xb+wh8Yi2MUCnG6xvbui0K 301s ksjPAgMBAAGjUzBRMB0GA1UdDgQWBBQ3wPwMQ6XJ4ZCGwOG3J3KQLP2fdjAfBgNV 301s HSMEGDAWgBQ3wPwMQ6XJ4ZCGwOG3J3KQLP2fdjAPBgNVHRMBAf8EBTADAQH/MA0G 301s CSqGSIb3DQEBCwUAA4IBAQAiU46Xg8ThhuI41U5g5y5lO9MXeiriYFqT5IEr5IXY 301s fX4u9grqKeHwqluk4jhyM/Gg+mdc1KdqIEVqWcVFBXim6cyeWIhdiGeujv5388oh 301s 5xRtSZNkHA8c7odBpYPjpVkOYNo1fZqwto76uvZT+XukhKUvReazxNP0kE1eh6PS 301s yung98M+gYU7xfYW/J9kxd9igZpKfFoqvOZJx3srKql2at6E1i7YZKbxtlbSTM+5 301s XKCSVOftBEhpszrv08fbVgiAeIr8L490GbIo2atSh5aWXzE2RBVJESDGfoItddK6 301s UwsNw3X8Vlg7btxl3XlhA/ISU4HzEl8okMocUDcozDKS 301s -----END CERTIFICATE----- 301s 301s BAG #1 301s Elements: 1 301s Type: PKCS #8 Encrypted key 301s PKCS #8 information: 301s Cipher: AES-128-CBC 301s Schema: PBES2-AES128-CBC (2.16.840.1.101.3.4.1.2) 301s Salt: 65c9e9fa55c1c5de85ab89d34b9a5cdb 301s Salt size: 16 301s Iteration count: 600000 301s 301s Friendly name: my-key 301s Key ID: 56:70:F4:A6:3B:92:7D:1E:96:E8:2F:F6:5E:AD:EC:BB:6A:47:5D:AD 301s -----BEGIN ENCRYPTED PRIVATE KEY----- 301s MIIFNzBhBgkqhkiG9w0BBQ0wVDAzBgkqhkiG9w0BBQwwJgQQZcnp+lXBxd6Fq4nT 301s S5pc2wIDCSfAAgEQMAoGCCqGSIb3DQIJMB0GCWCGSAFlAwQBAgQQhPUnObpbX1bU 301s NvIYOdXSmwSCBNBL3aGVlx6GBump88n1lzu1JrGSk2ZowBLpB+nSrNFpUQw4iQnc 301s rtwddlH/ZfokkLMu/irt3vbelNU8OV4IcQYakUSXqS1Fs6XVuGzQYYFxKtYucRcM 301s NC/2FeQlZ5i7Y5dwQK+vRxQkWFtuEvwc/nkoJAKfbNnUVuIEL1eX4/CksotdxZZd 301s bWNic22bFkZED89gXL9weUFJCozpf9+8eZt11OW7zJYc05/+kT04YgjpXF3FveMp 301s SWdxmXq7l718jWC9Tma53D0mhJ5lOLHg+YXP/h9/OaKxCgsOXwOD8yyEJxue48FU 301s A6MYsZ48rk0kDqo+CtozGtARH0+1Y+jk20ZHuuegjgL0lpZgagfRSJnvHFY3gcIK 301s HfaHo/4ggimHCptqnKZGyqp/uWwslqO/nobok0qbRX/NYP4cNqA7yf6qgh/48MPD 301s rdxAh3BzHvPN/hvZ615T4ZXP0YY5+dHYVc4HuGJOBMnOMvdVDNNkM8k1TDdJ4hjl 301s JvXFBpd4meIg2GiYcsmUaMCWqc7IR8lhygiUyURejYoDVQi0b5Kus6wF+TgFgGB4 301s 8gWw48LIPwyawVpraUadlJtZyNebNXGYKvbJRZMrnKTTTv5Zp9dh57WAl86kcury 301s hPHNV8F3m+f2QU33U5rPvD0uUAHcXY3/0THj3O8HN3rGtBf3gCelIKvS4IHavwlY 301s NfY5JSjChholkRP4zsTyfDaurkJPPB0XLxC+MjZC/s5YxfHF6W9XU2IiavRTF7nf 301s YJYtJlfLDHus3TC95QtZ4/7MJRyR/CRvtW/nR+nyXM2dslql76tWqeCqneJL//Ls 301s EGN+EKLNOXmM+8yZGup5Pp7PRQGrscxy8iG2+wAM2mDoxBMTGRJaBzvCzrRVz6hu 301s zdFhZ4XMV2/ObKR1MhMJ23xbC7i6dbutnuiICMUCwWToHcpZEWq2F8PXHvtxD0F+ 301s UHGAh6zdwI/8p0Fk5v/RwbQIEYgsJZ1TO5ASXGn+lOx5YHQqmNqGxRUCX0pwwLc3 301s zFt8X5HDnhcIePNeoTe9ACmheJphEvoq71icDsZvKFi0jS5ClFYiyFHhyWCg2XJ4 301s herbj887AItOaDnj7aJTwHfLsv+Cf93RKWHv8MJsvZKrGbkwKVo76HK0IdRAVbdh 301s cVCWWKlyAyHiU6/m7pOuuysoulv9M5hi32QpJTFHPWA5yeyvFc96KPvrpfg3RSDM 301s C2gI1RTn7xNoKRsthbnPCE4Zdzs7cREyO1ZjUtFADRtY++sOk0b/W/yRcKkc8Ndb 301s O7WhbARjWkxQ22vWgkQS4Ye2LOqgEpsVC7JY3974hmFXtuHor3HlD5HxnWmxKTxg 301s kMKvhJaLoYkQ2ZbdRYFxps92GTF+xcna/2ghgEuDEQ38s+BBKBIbyl4GsX6k+c4n 301s WQ7p10GvFJ1gKiHC6SoSZqgHnAv0tOcNHH1wKBGXi2cjvD2d3CwTvzIaoPkpt3AX 301s nit2qVpzyxtCx3sYsHPNMIDAwCtf+r8gTJ6WFg6IFs/yXB2ktsi6i4ppEmH2x12G 301s LTp8O73hZB50qNYyEFDPx+Q2/jWPAbpRYQKIq40tBCdZ1KYd80PMTGgf+AIK42XV 301s hvNTQadHKtD5cQgV1gMWB8DAtSrwLjZ/+mu0s+QiizOoQ5plE4mrFyxCUA== 301s -----END ENCRYPTED PRIVATE KEY----- 301s Setting log level to 99 301s MAC info: 301s MAC: PBMAC1 (1.2.840.113549.1.5.14) 301s Salt: 4e4f542055534544 301s Salt size: 8 301s Iteration count: 1 301s 301s BAG #0 301s Type: Encrypted 301s Cipher: AES-256-CBC 301s Schema: PBES2-AES256-CBC (2.16.840.1.101.3.4.1.42) 301s Salt: 3da715f1636cac73 301s Salt size: 8 301s Iteration count: 2048 301s 301s Decrypting... 301s Elements: 1 301s Type: Certificate 301s Key ID: C1:63:B9:0E:8A:EF:55:66:05:DC:15:94:98:0C:34:AD:41:1A:8D:27 301s -----BEGIN CERTIFICATE----- 301s MIIDfTCCAmWgAwIBAgIUeOdebExxNTjUFCilWX9HoXcdFu8wDQYJKoZIhvcNAQEL 301s BQAwTjELMAkGA1UEBhMCWFgxCzAJBgNVBAgMAnFxMQswCQYDVQQHDAJ3dzELMAkG 301s A1UECgwCZWUxCzAJBgNVBAsMAnJyMQswCQYDVQQDDAJ0dDAeFw0yMzA1MjIxMzE0 301s MjFaFw0yMzA2MjExMzE0MjFaME4xCzAJBgNVBAYTAlhYMQswCQYDVQQIDAJxcTEL 301s MAkGA1UEBwwCd3cxCzAJBgNVBAoMAmVlMQswCQYDVQQLDAJycjELMAkGA1UEAwwC 301s dHQwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC8oOL1jSEa7l1HWxta 301s vRbx0LbgzDPe8JVZJMlK5/HRpoBbwp72WHISizxA2PgUT+hwdUtpOVrw02arA/8Z 301s YfSG5nvhwJPf3C+Pf5vr9sbNPAc6kWWp76oCVy4H8LvL1agDpbS+jdMnkz8YJhMk 301s rxQpAk9ZBytWJqiT6aGiYnMJyBs2YgWMlwKyud6za1FX+UobRNiR8oxv8bfKdyEd 301s 6eWqX9Ujny/roPaWKTQZCCpiZl5eXVFaWJX9pjj6gjFUTBLcV+ULZx213XBCS38f 301s 3TTSHS+25Q+mmf+ZzSmZ7fm/zy3tzHgEWBfl6tEEQ0xb+wh8Yi2MUCnG6xvbui0K 301s ksjPAgMBAAGjUzBRMB0GA1UdDgQWBBQ3wPwMQ6XJ4ZCGwOG3J3KQLP2fdjAfBgNV 301s HSMEGDAWgBQ3wPwMQ6XJ4ZCGwOG3J3KQLP2fdjAPBgNVHRMBAf8EBTADAQH/MA0G 301s CSqGSIb3DQEBCwUAA4IBAQAiU46Xg8ThhuI41U5g5y5lO9MXeiriYFqT5IEr5IXY 301s fX4u9grqKeHwqluk4jhyM/Gg+mdc1KdqIEVqWcVFBXim6cyeWIhdiGeujv5388oh 301s 5xRtSZNkHA8c7odBpYPjpVkOYNo1fZqwto76uvZT+XukhKUvReazxNP0kE1eh6PS 301s yung98M+gYU7xfYW/J9kxd9igZpKfFoqvOZJx3srKql2at6E1i7YZKbxtlbSTM+5 301s XKCSVOftBEhpszrv08fbVgiAeIr8L490GbIo2atSh5aWXzE2RBVJESDGfoItddK6 301s UwsNw3X8Vlg7btxl3XlhA/ISU4HzEl8okMocUDcozDKS 301s -----END CERTIFICATE----- 301s 301s BAG #1 301s Elements: 1 301s Type: PKCS #8 Encrypted key 301s PKCS #8 information: 301s Cipher: AES-256-CBC 301s Schema: PBES2-AES256-CBC (2.16.840.1.101.3.4.1.42) 301s Salt: 53c73c3e569b6b60 301s Salt size: 8 301s Iteration count: 2048 301s 301s Key ID: C1:63:B9:0E:8A:EF:55:66:05:DC:15:94:98:0C:34:AD:41:1A:8D:27 301s -----BEGIN ENCRYPTED PRIVATE KEY----- 301s MIIFLTBXBgkqhkiG9w0BBQ0wSjApBgkqhkiG9w0BBQwwHAQIU8c8Plaba2ACAggA 301s MAwGCCqGSIb3DQIJBQAwHQYJYIZIAWUDBAEqBBCvZ0qnNSNreLTFRm1h6XbUBIIE 301s 0MwsCO49+IAk734+p7jkp3QI0oRr+5jdo+1jFdKbJU6atm/QZ9759WNCTLy+BO7C 301s 61MzVNNqXTnHwpxKTBXHDb9rEKy6dZjgisbvDo0qh2S6ClS9ETlbGfHTBAiy4oA5 301s TykYksixK5deLRK1+P825FGljETjtvJBW027m0PGKB5UVMLCltcS4L34tIEZBv8x 301s 10X0B41//DUrb+4V5XoZ+/xsthCj7ERYWnZv4lBwH5gjJDIB01NuPCREffp7F5bX 301s efR/iHg6Y/5G8WfmLx6MPV1GSrvNvHdzEJ1KS2dQXyRoTAT1cG1VAwONAokAVXQq 301s BrTycmpS9vMaEtx9CCxQp8EDq+rtB8JXjSTxh6u/B1Mh+h8MZ4dG9OaNet6+sExW 301s Z+XDDsaW7P07Xft068Zq2KXdl57kZnt3J2mCdCC76XP/Hiy0e0iow0+CYWdIfwn3 301s Fdllr4aULoJGNKVq2fhCDJ3gdXWQfepiVS8TotePDnkoItD7MWTDYmDN9606cEE+ 301s VqjrBMg8FEKZ3uW/CpLf7OxDdCyTZz8iSUS9S3Kjna+o/umKkbT2u2vaFiajHLkz 301s /m6sxkSYftxw5RQcNmM6fYmnb+CpgdjM4UrS1KItjEo7555JHeS3nbLIQHelmynx 301s e5CwB0B0+AIunTBDuBCpBFRfSQbcQkeCRJ+gvfC6YPi5Pq32O4Bzn2cbYBlEcIF0 301s WN2i1K3U+eWSoJNxMVSj84uRIXaQGruySoaTsMiqMwKfziljDa8+oaG7tjG59Qfi 301s AOtKbGBx8cpwYLCR7+1kJm2IfB8hnx4Fb2gPKWQmKscY6S40ia0fAQbvR/cZE4ey 301s pYcYK3l2L9fbgGG1HfeZHKMfYs2nelT56L4BUm/jpncujyQAj4+oRVujyW7nD9GD 301s 6TtFbVrUHWWd3X9T9IWe6rysDjxQPoCmUnJIKgEn8oIj/Vd2XPIyIsIzc6AzNkE/ 301s lFCSoohmFyVBDjvYccxR5Ro++fQ3DUYaYJeQIEee6HyEg/cgbggCWD0P2mRzxbkU 301s 63FRt0WiGwgEu95xM5yshWizl388n8mkpsobB9ud7Z8i9THowvtm0RJKP8pXYBVM 301s b1OSSPkNyiegMI/j53bh18e9ROFMErrtsV2DKcZ0MCOq66EKWQV/Nh4aoHC1fNz/ 301s Jac0MD3R4x+c5KMZlnQtPo1P7XEHzV2KSXcqGl+7Q5lXJS4cJfabPzvONaSLDSyV 301s l8L8Rugftyzf5MOEI8DdfeD6KYjg+/qA5uZobbTu/Aqwa0cRzA/9EKp4mYys0mXq 301s cZWavie/drvL7TJ7s8wocbtAX9z4SF3CTXFYcFLa9MinvzfjbwtLZqfMMopPwZZ3 301s cTfXim3UzotsCIuuIdkBvJzpOusEPz0iCWMGZengzREEsx/9Zhgn1EJ1E9e1Av6f 301s kIHp3+gLmqdhlpb7Cawe7v6crc+ua7Y7f6LqOiIehMFqsFVaRl2Q9O4FVh9Cnv1a 301s +mjxjb5C3Jn7T7g2bJ/Y4ooN4LoXXskVX9dDsd+vZClnBu+au+4cRCM0sw8lJQTW 301s 56JvUiI7rd6/qlWJljjWrQuqv+A9CONi543d3RMmce45h94P0tgEjBc1q/ab13Ot 301s XbGDpHWeD2GvVz1GcVxWoGbKEtxdbFO/ffiCVVNLQtDB 301s -----END ENCRYPTED PRIVATE KEY----- 301s |<9>| salt.specified.size: 8 301s |<9>| iterationCount: 2048 301s |<9>| keyLength: 0 301s |<9>| encryptionScheme.algorithm: 2.16.840.1.101.3.4.1.42 301s |<9>| IV.size: 16 301s |<3>| ASSERT: ../../../lib/x509/privkey_pkcs8.c[check_for_decrypted]:815 301s |<9>| keyDerivationFunc.algorithm: 1.2.840.113549.1.5.12 301s |<9>| salt.specified.size: 8 301s |<9>| iterationCount: 2048 301s |<9>| keyLength: 0 301s |<9>| encryptionScheme.algorithm: 2.16.840.1.101.3.4.1.42 301s |<9>| IV.size: 16 301s There were errors parsing the structure 301s Cannot open ../../tests/cert-tests/data/pbmac1_256_256.truncated-len.p12 for reading 301s Generating a PKCS #12 structure... 301s Loading private key list... 301s Loaded 1 private keys. 301s SUCCESS [42]../../tests/cert-tests/pkcs12-pbmac1.sh 301s running [43]../../tests/cert-tests/pkcs12-utf8.sh ... 301s Testing decoding of known keys 301s ============================== 301s 301s Testing encoding/decoding 301s ========================= 301s Generating a PKCS #12 structure... 301s Loading private key list... 301s Loaded 1 private keys. 302s SUCCESS [43]../../tests/cert-tests/pkcs12-utf8.sh 302s running [44]../../tests/cert-tests/pkcs12.sh ... 302s |<3>| ASSERT: ../../../lib/x509/privkey_pkcs8.c[check_for_decrypted]:815 302s |<9>| keyDerivationFunc.algorithm: 1.2.840.113549.1.5.12 302s |<9>| salt.specified.size: 8 302s |<9>| iterationCount: 2048 302s |<9>| keyLength: 0 302s |<9>| encryptionScheme.algorithm: 2.16.840.1.101.3.4.1.2 302s |<9>| IV.size: 16 302s Setting log level to 99 302s MAC info: 302s MAC: SHA1 (1.3.14.3.2.26) 302s Salt: 6a5a70a22b14fca1 302s Salt size: 8 302s Iteration count: 2048 302s 302s BAG #0 302s Elements: 1 302s Type: PKCS #8 Encrypted key 302s PKCS #8 information: 302s Cipher: AES-128-CBC 302s Schema: PBES2-AES128-CBC (2.16.840.1.101.3.4.1.2) 302s Salt: 8f9768fe442a3123 302s Salt size: 8 302s Iteration count: 2048 302s 302s Friendly name: localhost 302s -----BEGIN ENCRYPTED PRIVATE KEY----- 302s MIIFHzBJBgkqhkiG9w0BBQ0wPDAbBgkqhkiG9w0BBQwwDgQIj5do/kQqMSMCAggA 302s MB0GCWCGSAFlAwQBAgQQurIuL4cSxHg95+AjR+xOZgSCBNAxqIIsFleFzQ1wqhbB 302s JlMweSFx4BPmw2w/bsdqY9UT2IE+6xwdbQHc8aCTqYLcELe4S0LnTymSfWjWx19h 302s TEbkhZwMXyR7xDJXxXkyzlOzpIhpPcAH4BfchXIam0sxaza4stRLS66e26Vf5wJL 302s lfnL5VfWwoZUKaCYSLfGkRGD824JG6OTZuyQuNZ9q4/FeSGzdh1c2Pxn2jJIegXo 302s s6DKsdrLSs0l0L2eeZmF6XzUdWNxYGr2dL4sC/jHUbWId+W5fv8L79Tw4hGDAoJn 302s 44ZOTBHzotMo96rlHJRbPorS8QcD8AIBL6jXVqcEsrxIzb8DlXAxFISbLmQVao8x 302s /zJczzzGMCsPVutARKtGkyk0pkXhe8otXr0E0xgdG3LaAMxSgaj5df0R6G1beJvo 302s +mHVY+wZb1odljfGON9sqmuNRqOp/+KfN7paYKsYJkiz6+w7KGAre52DpEIDxYoJ 302s H2pRYSPazZoazvtYBT4AC2VEuYag03KFm9hpN1k8yfI6ZZecohbk/cLNp+QeNzv6 302s T7Xiku+EcZUXds3qUon81cvuTxmQnZcrTlilaNGsg5E/nVbv8fYhY/bYHp844GaH 302s lzuLK+hRAVYy7FAdYUgHkDGCFlYgoJqdxXjyvn7oj0rWFeuUvk6fbbYxAP88fy/R 302s FjdnTjmNLnpDByrkxisDvj+Nti/BXNcDQ24aDWMoH5bhYUovb8fwsLieYUrEIDca 302s NfC+xBWznKj1GXdJkJ8dt19nM2entGB3cdK8wRBLqxUzb/CGY7WbaHRpz8wVVubi 302s NkT1gwFe0ZNGSjCGKsyMe9QAWrAJpgbteWBifEw+YAOP1UUa1Qs75II7cJxGoy0m 302s VOhtKXUr6/5StcI59poXjls2/1iAGzq0gN4/rQ9BqG94FIUQE+7qlEBWF+cainBN 302s KGIVK/qVhtMHI5QNmxetWYUsYV99MhNBsKlYPnkiQys/4XIMMA/e7TSem6hqHc/3 302s tbGpXUibx1Fg0/j4Vy+ieUtWEN8igqCGlEisDPfDgWJ4yZx5uBd+39a/WxIvoCvH 302s sU06kMzAD0SWe9WKqfBz12IFQDbHkOQSfksC9jveF50DNRBlRHemDThZvITB6tQq 302s PNJnRJiWAqlNNCNjr161044utJu/OG1CEn5BizrjHCp0g15AZpcV7aVh3QbhjEze 302s p26SxDQ19J+SB4zD2GobDexw87A5tq3qcFAlRl50t70ZnHSl50E9X3kFxzSRJaxA 302s JTHPWFLe+ldZ4hyfT2JAd/0+fFT2WkXUPQSQZ6wi8WnKxaxvDAghbmWj0asbkVPb 302s +q0CbzIOHLOHoL3p8DhfA/1f563ngMjRWRkA6cweK8W+gtCxZo6/+sE4CRTuaqzz 302s 1qInoiOCh1fwLQTUWkJ8o8KmKVmND8pfBzDYlYSvx9IeLE5vsGMmlzbJbp/KzxhV 302s hcE5xSvpwlBww1OCyudRKpxCMYvi+w6SqY3pSQ/5H8pRwMt5DqBRZxNnQtPzslZP 302s IIlp6GE4xD8xiNXdKSndzWBHTMzn4k/DscsAS8FfOvqsARKtxHi3aT6sbLGPSAiZ 302s tevuAmtWZ34dmZZGreN+ycva9NtFv2NNDgfJlHPohq6LlapyfoxloB3cwaaNzR9K 302s mrCHP6uaanRDaXfVv4jxzDYGyw== 302s -----END ENCRYPTED PRIVATE KEY----- 302s |<9>| salt.size: 0 302s Setting log level to 99 302s MAC info: 302s MAC: SHA1 (1.3.14.3.2.26) 302s Salt: 15858adb65af0af6 302s Salt size: 8 302s Iteration count: 2048 302s 302s BAG #0 302s Type: Encrypted 302s Cipher: 3DES-CBC 302s Schema: PKCS12-3DES-SHA1 (1.2.840.113549.1.12.1.3) 302s Salt: 302s Salt size: 0 302s Iteration count: 2048 302s 302s Decrypting... 302s Elements: 1 302s Type: Certificate 302s Friendly name: localhost 302s Key ID: E3:76:B4:62:05:2B:2F:D4:B9:12:5B:B0:EA:E0:4F:10:C8:C0:C5:B0 302s -----BEGIN CERTIFICATE----- 302s MIIC+zCCAeOgAwIBAgIJALcX+trIX5ynMA0GCSqGSIb3DQEBCwUAMBQxEjAQBgNV 302s BAMMCWxvY2FsaG9zdDAeFw0xNzAzMTYxMTAzMTBaFw0xNzA0MTUxMTAzMTBaMBQx 302s EjAQBgNVBAMMCWxvY2FsaG9zdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoC 302s ggEBANykRgfq8TW1B6NNUaR3cG0OW0nzy1RW74k4pfg/3CxOh/JBk6YX9TJ2GJ2j 302s mE9el3mMgItrCAv6cduWvYkl7H/B/iLpLO/8ie5bwL6IDC/s107uxTMBJwE83gwt 302s jE1bgJ02rf602BKqTB9COuCLQAM46u3liukOPOAFhiF6dGSOX7wGm36EqS11EZiO 302s UHRLJeIV6ruLf35Sme26Lzefd1Pj6J5T/vYlrd54QcBqRRL3jBw2j4DUphG4LroR 302s eVCNMiYTx9+kqlqHrz4NWNFsms7r6LYTA1Q3KcwjuDVq7aznVKXRxnI09e919Txk 302s veYoK+E7e4M+X4o/Mc41IUZguAkCAwEAAaNQME4wHQYDVR0OBBYEFJ2pF/DIt1Gf 302s DHgXypnHtptyeghoMB8GA1UdIwQYMBaAFJ2pF/DIt1GfDHgXypnHtptyeghoMAwG 302s A1UdEwQFMAMBAf8wDQYJKoZIhvcNAQELBQADggEBAFO29MmqGIBwP4F3ehNlIBnv 302s pSZiLraBN9HKOCJKOJxSJ69KL4FFV/pqXegdXDHebdx3YfRV0tC+nF0izUtNC+kO 302s 8XKU/sFwwMG4bP+rU1cl2mZZK8vVWA0mippphOe3Jwr/cZWK5rMja6OIGsIQieWx 302s Ot5vBruOYOfoNAOIms7ezEKCIhgi7lhT06Voe8DlVM2/dxmyIgxenl0i45WRVd9u 302s 4C+a2HQULDbBS2GdqHkyD8guY6HFLkeDZrymKZDYDsH6P+qUqK97/WhFqgTCSTQy 302s XcMXQPzfo2bP7KqY/WvwAbekZ4psv22fRs3g6NPxQvMSpqoRZ0sHHvnM40NoBWQ= 302s -----END CERTIFICATE----- 302s 302s BAG #1 302s Elements: 1 302s Type: PKCS #8 Encrypted key 302s PKCS #8 information: 302s Cipher: 3DES-CBC 302s Schema: PKCS12-3DES-SHA1 (1.2.840.113549.1.12.1.3) 302s Salt: 302s Salt size: 0 302s Iteration count: 2048 302s 302s Friendly name: localhost 302s Key ID: E3:76:B4:62:05:2B:2F:D4:B9:12:5B:B0:EA:E0:4F:10:C8:C0:C5:B0 302s -----BEGIN ENCRYPTED PRIVATE KEY----- 302s MIIE4jAUBgoqhkiG9w0BDAEDMAYEAAICCAAEggTIuxclc6IuT+cch9Ku6doUJJD7 302s VUklouMlb5ECyJlM8tBQLUh04RGTdQNUM5RRoZvWJXTcBRiQVbVJTWQPZzPx4hwe 302s oitoaJigRUhgIKzJ7R71ij3t2qCx8f2iULgJBzWY/qOsN2fORxlMV0QrosVgcj8/ 302s VoKxZpts7whAZbvgzD6SpQaVpvFNNN2WUyEyz6UJ5rzQmI7CnWaSaWVVyhpzOhZX 302s X2wVYsT2oPC952hSZ3t8z0CAUbTVtqjtC4eWwFv82Z1cx8bFA7wwTZBJd3x/riUx 302s Jxa5ieOykwuzg8dyysG4meYfZ8VVCIYnsyk/1oZRaBXmEZgDjj3rchTNYoTGyMte 302s yDYeqllb1Rzk3zmbxm2/OnubsYJ9Ra0fs0y46PITC8Jg74AyQ5WGXR8LDSOLogwL 302s z2rWnSJyOgSPMWrBZR99dV4QenRXGLSh4WIJsrB7RJ/7Utfj7TSJtaoHjVHy13MM 302s MmKposnznlBRECWmBeqFRI0GqkLv2DI/CZWBM7VYWxUNHOiCPaoCEx7q38Dmi+O7 302s g2bj7tpTKcW2n0pvm2rE8ULf9ZtmLcGJFGdflnr3ZeSEp+BnmaMmzE0r4TnMscpu 302s PUIra1wOuICcau7HtalguEsppaYW1RL+/OJmV/0x7sDK6trpa1xliDKNDRcoBxrl 302s 9AAmDIqZl4pNe05Z+HFZ94+4gbm+3Ttt3DPUDLE9//nWdKRYBcoQ1DZqTphTLQ3Y 302s kVe2BvmW912fJuiGXDOIpefEyMxwbfeKkuofHaMHd9xIPoP/Q4AOb7FAFNPQlihi 302s rvQw2TlP0p/BqPrbQNr+CYxrISu0FuJopb3YHO9bD421uTuwVJn7nj2J1Yc9x63F 302s x+ysru41o27zIY9c8+9lyRQVjnMqb98HSdBA2WloGXA8GHwq487/H8HPKKOIy5ne 302s p/sgBKAtJHAJGm4affTesqHDnhYC+AuNueNdtPWJZVEo8wH3w08aQJJIa5SWPfdU 302s HqsuHa0C0iUzo8IEYQjq6L2cvNnUVtzJE1ATNLUMz3a8WI7XLGdmPi0A7FTCesi0 302s lQKoTPovqRIF86ZkqFAXXsY8hiNF7xL/DdHTFYxSJWyaQ6AI8syi4amTQBwkMueW 302s j5MpiRt3tbKRT+um1DgMMem5cHSA9/LefuHO2O8CiIQZX1aEQew+4EdUILNd9uTd 302s iGc74LZ7SpNmD0HyUHn8P9V3hltc7hjoAqUfp3oufD7F6wRflsyafVG6A1EIi5ie 302s 6/sjQSFfYQv/bkRTumOLMZQFS3d9O3jI9RhCMGZni4tElctkIucEZ6Aq5pNbMBDu 302s CzfZV1ii+JZ9pceQPIN5ofbHQM5+FSeBvzZN9uAB+wDFka4uAEt5lMUEaCmXIe4J 302s 0Sj9al6R5roebW1/ATA4yBO2kP/lynQW3vshWZWDWjQCWdrgBPUgbucKIGook7Hh 302s J9Sjen3IDxhnu3deuhehXiLErDW+M+hcbp895OuhoUK4kA+ERkTJTjDynFNs9M33 302s HkkTYMeTByr/E1vX5IdPoOqD3Pt8D6KZjVNeGkgVCo/rLLVevo3FMusvRRT0v+mO 302s 4vSFuSwEp3n4DlvRuMOgxJhEeA3iymXZ99PnsMY4QEIaiGm9GluIJfHynoUp6J4i 302s hUGJcW8q 302s -----END ENCRYPTED PRIVATE KEY----- 302s |<9>| iterationCount: 2048 302s |<9>| salt.size: 0 302s |<9>| iterationCount: 2048 302s |<3>| ASSERT: ../../../lib/x509/privkey_pkcs8.c[check_for_decrypted]:815 302s |<9>| salt.size: 0 302s |<9>| iterationCount: 2048 302s |<9>| salt.size: 8 302s |<9>| iterationCount: 2048 302s |<9>| salt.size: 8 302s |<9>| iterationCount: 2048 302s |<3>| ASSERT: ../../../lib/x509/privkey_pkcs8.c[check_for_decrypted]:815 302s |<9>| salt.size: 8 302s |<9>| iterationCount: 2048 302s Setting log level to 99 302s MAC info: 302s MAC: SHA1 (1.3.14.3.2.26) 302s Salt: 302s Salt size: 0 302s Iteration count: 2048 302s 302s BAG #0 302s Type: Encrypted 302s Cipher: RC2-40 302s Schema: PKCS12-RC2-40-SHA1 (1.2.840.113549.1.12.1.6) 302s Salt: 5c444d6d3f7e9be8 302s Salt size: 8 302s Iteration count: 2048 302s 302s Decrypting... 302s Elements: 1 302s Type: Certificate 302s Friendly name: localhost 302s Key ID: E3:76:B4:62:05:2B:2F:D4:B9:12:5B:B0:EA:E0:4F:10:C8:C0:C5:B0 302s -----BEGIN CERTIFICATE----- 302s MIIC+zCCAeOgAwIBAgIJALcX+trIX5ynMA0GCSqGSIb3DQEBCwUAMBQxEjAQBgNV 302s BAMMCWxvY2FsaG9zdDAeFw0xNzAzMTYxMTAzMTBaFw0xNzA0MTUxMTAzMTBaMBQx 302s EjAQBgNVBAMMCWxvY2FsaG9zdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoC 302s ggEBANykRgfq8TW1B6NNUaR3cG0OW0nzy1RW74k4pfg/3CxOh/JBk6YX9TJ2GJ2j 302s mE9el3mMgItrCAv6cduWvYkl7H/B/iLpLO/8ie5bwL6IDC/s107uxTMBJwE83gwt 302s jE1bgJ02rf602BKqTB9COuCLQAM46u3liukOPOAFhiF6dGSOX7wGm36EqS11EZiO 302s UHRLJeIV6ruLf35Sme26Lzefd1Pj6J5T/vYlrd54QcBqRRL3jBw2j4DUphG4LroR 302s eVCNMiYTx9+kqlqHrz4NWNFsms7r6LYTA1Q3KcwjuDVq7aznVKXRxnI09e919Txk 302s veYoK+E7e4M+X4o/Mc41IUZguAkCAwEAAaNQME4wHQYDVR0OBBYEFJ2pF/DIt1Gf 302s DHgXypnHtptyeghoMB8GA1UdIwQYMBaAFJ2pF/DIt1GfDHgXypnHtptyeghoMAwG 302s A1UdEwQFMAMBAf8wDQYJKoZIhvcNAQELBQADggEBAFO29MmqGIBwP4F3ehNlIBnv 302s pSZiLraBN9HKOCJKOJxSJ69KL4FFV/pqXegdXDHebdx3YfRV0tC+nF0izUtNC+kO 302s 8XKU/sFwwMG4bP+rU1cl2mZZK8vVWA0mippphOe3Jwr/cZWK5rMja6OIGsIQieWx 302s Ot5vBruOYOfoNAOIms7ezEKCIhgi7lhT06Voe8DlVM2/dxmyIgxenl0i45WRVd9u 302s 4C+a2HQULDbBS2GdqHkyD8guY6HFLkeDZrymKZDYDsH6P+qUqK97/WhFqgTCSTQy 302s XcMXQPzfo2bP7KqY/WvwAbekZ4psv22fRs3g6NPxQvMSpqoRZ0sHHvnM40NoBWQ= 302s -----END CERTIFICATE----- 302s 302s BAG #1 302s Elements: 1 302s Type: PKCS #8 Encrypted key 302s PKCS #8 information: 302s Cipher: 3DES-CBC 302s Schema: PKCS12-3DES-SHA1 (1.2.840.113549.1.12.1.3) 302s Salt: 66708f882d4a50b8 302s Salt size: 8 302s Iteration count: 2048 302s 302s Friendly name: localhost 302s Key ID: E3:76:B4:62:05:2B:2F:D4:B9:12:5B:B0:EA:E0:4F:10:C8:C0:C5:B0 302s -----BEGIN ENCRYPTED PRIVATE KEY----- 302s MIIE6jAcBgoqhkiG9w0BDAEDMA4ECGZwj4gtSlC4AgIIAASCBMipOHz1mQS9Ovsx 302s WntNF5plwfRoorPFadZE6pFuyy0WmeSycBvwZxmR9R1jQEPtzxUQ8DVHdi08hA7P 302s z9baDI74dRqVoRPT5qqonLZt0wNHPVFOkSpntk2CYb7fJz+GDeT9f/cskpGYiOji 302s 7sHuPedm/8YjwEVbWqAQW766G8LgV8l9XFEQesAqud60lpeDcOqYWmG7X8viy2CS 302s QxKgXV7Lvw1IK2tiP5aypj3T5khMgwQ4X9OETZFoexjbI8yNRmtNFEOTv4WTmoGy 302s URU/629ouCOaRtD0jbRFCazgHxoAZ3Sh4//0OF/a/2mB1JmR+ug6q7zT8ebBkFxc 302s sxv5jhfX5o66nnWZaLvEa5iUgzv4m0oXR72qgEZa5E8n+uyibPvnx0WHLUq34b87 302s TXl/P0CkV3qlOS3Rf3xY/72f3rZ2Bp4PUeyZG1y+9kRMyBBaPh5dwMjGVhOJauel 302s MGyH65210wWGqAhCOR2uOkFGK5KDNYtWjn19xThsd9nx0zhDXdZ5852UOIMdlbqC 302s 8SRcOjm3uqFvVNxS3SbQEstiyHwT5P3CbupnulvqfBqKjXc4xNLffBNfEt88RF+6 302s /7l1/tuapppFO+uyUCfjR6FmB8K5v9HbNUrvBWBf0eEVljdlghYV5A4UsLvrV82Z 302s +/9L2cnBM1jW70vFs8HBTu5UqT4BP/QKbajGk6NXPQnhIVFfIMvKG3j6CaFhKxgO 302s nIkWgDUglSB5JyjWMszMAZY0tKy6G8vZUcGKBT195mftXw4fkPVoZOseCRfOIgDk 302s 5aDAAAs6TkiVm2JhnehP0FLkBrwT3sLEEe/HNri54mvFJdPEG8bA+fDlE7+ZeOm3 302s 84WAuJja26mUjj6zSEytPAsa1n4qtrupLbByIgiBx+oqvW5aWJUhw0jgllchePyd 302s c5hemxNhTUIimiffnMXQbsnjeIh+v82FkxdBV+vQzhfhcGp5wH7PsSquun8Vs4Dd 302s Te54DjjOeHugnIk7a7p4U4hJg8ebLHebkjHnw72YeBVuM2+hm2FcnsyGvvTRFslF 302s bTRd9X5U248VMAIKDqjl8K2YUy7touPXM9D6FzK2EmCZcKwZI4mn4k01A/GDZAvH 302s 5Lm7IAlearbLIzb8TnYHJG6EgszQdU96MhOkBZ9vSviAz9nmZ8tEnq2xRuXovMjX 302s K2FmCPw5diqI0uNUCUM7CkVh2hOwHEfSOpO0Egj1ydECoX4XapY3RF+zJKoynSrs 302s MGsRZ2VSNZAt/Grl6xSt7yemOFJsBJCBj5YYsjQMk0KOFkyqUZ3tGkTrgCkTqEeD 302s Wg2n03iHpopaSVU1pKtFSkLhQ9drmlxQw9ONIxwQU2Kwjqu83kSfUN1BMRhh+5LG 302s amPCGK1MshNNr0xMSk/cU0gBj1C6P4mG87ec1fET7oqk4kl2ckOIbyiAaMS30XS8 302s LjRx7ZaKJpZBeJRw+B4k4VU1j8JoHsIFKXBWl/g73yCN8kJOY0AviU4u5ZW9+WRe 302s TOpwI0T+xioi0LHgImOQpqNSNVVkCeMQGlQgkGOCv7eP8hINHXovC3vli6i03xoj 302s SgwGCyhMQJDQRLrDmqwyrNfAUtkTYVWBDqQu5brMWvAW2hhJCcNlX7V+Xj3iWAyt 302s 5VxpB11meNNurDzvc9s= 302s -----END ENCRYPTED PRIVATE KEY----- 302s Setting log level to 99 302s MAC info: 302s MAC: SHA512 (2.16.840.1.101.3.4.2.3) 302s Salt: 22bea5019a50e7aa 302s Salt size: 8 302s Iteration count: 2048 302s 302s BAG #0 302s Type: Encrypted 302s Cipher: RC2-40 302s Schema: PKCS12-RC2-40-SHA1 (1.2.840.113549.1.12.1.6) 302s Salt: fdfabd44165a2ae7 302s Salt size: 8 302s Iteration count: 2048 302s 302s Decrypting... 302s Elements: 1 302s Type: Certificate 302s Friendly name: localhost 302s Key ID: E3:76:B4:62:05:2B:2F:D4:B9:12:5B:B0:EA:E0:4F:10:C8:C0:C5:B0 302s -----BEGIN CERTIFICATE----- 302s MIIC+zCCAeOgAwIBAgIJALcX+trIX5ynMA0GCSqGSIb3DQEBCwUAMBQxEjAQBgNV 302s BAMMCWxvY2FsaG9zdDAeFw0xNzAzMTYxMTAzMTBaFw0xNzA0MTUxMTAzMTBaMBQx 302s EjAQBgNVBAMMCWxvY2FsaG9zdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoC 302s ggEBANykRgfq8TW1B6NNUaR3cG0OW0nzy1RW74k4pfg/3CxOh/JBk6YX9TJ2GJ2j 302s mE9el3mMgItrCAv6cduWvYkl7H/B/iLpLO/8ie5bwL6IDC/s107uxTMBJwE83gwt 302s jE1bgJ02rf602BKqTB9COuCLQAM46u3liukOPOAFhiF6dGSOX7wGm36EqS11EZiO 302s UHRLJeIV6ruLf35Sme26Lzefd1Pj6J5T/vYlrd54QcBqRRL3jBw2j4DUphG4LroR 302s eVCNMiYTx9+kqlqHrz4NWNFsms7r6LYTA1Q3KcwjuDVq7aznVKXRxnI09e919Txk 302s veYoK+E7e4M+X4o/Mc41IUZguAkCAwEAAaNQME4wHQYDVR0OBBYEFJ2pF/DIt1Gf 302s DHgXypnHtptyeghoMB8GA1UdIwQYMBaAFJ2pF/DIt1GfDHgXypnHtptyeghoMAwG 302s A1UdEwQFMAMBAf8wDQYJKoZIhvcNAQELBQADggEBAFO29MmqGIBwP4F3ehNlIBnv 302s pSZiLraBN9HKOCJKOJxSJ69KL4FFV/pqXegdXDHebdx3YfRV0tC+nF0izUtNC+kO 302s 8XKU/sFwwMG4bP+rU1cl2mZZK8vVWA0mippphOe3Jwr/cZWK5rMja6OIGsIQieWx 302s Ot5vBruOYOfoNAOIms7ezEKCIhgi7lhT06Voe8DlVM2/dxmyIgxenl0i45WRVd9u 302s 4C+a2HQULDbBS2GdqHkyD8guY6HFLkeDZrymKZDYDsH6P+qUqK97/WhFqgTCSTQy 302s XcMXQPzfo2bP7KqY/WvwAbekZ4psv22fRs3g6NPxQvMSpqoRZ0sHHvnM40NoBWQ= 302s -----END CERTIFICATE----- 302s 302s BAG #1 302s Elements: 1 302s Type: PKCS #8 Encrypted key 302s PKCS #8 information: 302s Cipher: 3DES-CBC 302s Schema: PKCS12-3DES-SHA1 (1.2.840.113549.1.12.1.3) 302s Salt: 9c50941085b66613 302s Salt size: 8 302s Iteration count: 2048 302s 302s Friendly name: localhost 302s Key ID: E3:76:B4:62:05:2B:2F:D4:B9:12:5B:B0:EA:E0:4F:10:C8:C0:C5:B0 302s -----BEGIN ENCRYPTED PRIVATE KEY----- 302s MIIE6jAcBgoqhkiG9w0BDAEDMA4ECJxQlBCFtmYTAgIIAASCBMhJaY9wQqh13Znw 302s X+Ox40Vs5oxYxV/F1rUFvLaVeL283k1Ru3KaNE+lzMLkG6mYqK21O5bzCSE5Ep6+ 302s wlgGgSkJmhxqzS132k3Xv0uUQgc6iJfPuvG3AHLbdZDSjBkW5jTTnRjX4srK1XDe 302s LPyPicdgiJXfoFMNSylJyDZ74FzwLETsO3MFkGyZC9KcZj8+1dL1yx7Wf9RdPzKg 302s bYsaGhmK0y6HiS99r3OerBd3TVHXHDvTzFq7goNglkQpBbhC/PZCEYw+h5V4vTIF 302s envVvma13wLy2/JJSd8ixtT2aiZ/Phe1N1mH9/xNXKH1F0Nzse2gWIwx6RkBTWcy 302s tYmedNqEKgMw/p7uYHvSEvTdnFvJIzGvbUMEGQT+6jjJWzXaYkRsZ4ptfBHNWpuH 302s 3whx5FZN4hIsK0N/GPPZ05+d1GMQVt03qzz9jmG/SDxBEl/GD+UJ3RCXfZxPCKhZ 302s Uvi6nxyAm/gZLxY/u5lcx0XOSCae+FKC8FjOhE92rhrsnUjlfeoEflZFe7VZkYiZ 302s t0Knp5QfZCcrXSLcJJhlPQoISsbe9IwRCosmpBwNi/dd5nqxQ0YQLI31rQDajvY8 302s h8B5TW90Lt44G3zAELjz6FH1YzhOwxqtqdcz7W+GzfRrMiPFFz8eorF+9e44X14Y 302s OTo+a0awOctxFc/k51wNAqnhDLqn1C7anPsEGwj/uZ1UPyO3NjAiKfexn8vSwKvp 302s 94sgMVYzcxBnyZQT1uNn/WDFJXDFoLzeu2ktyXEYVP+saeSvYAK0NNMVpJqO8nA/ 302s +fW5pb4xolkjhmPJ7srYmR1DJfM5huevuEPAMtMmIbrXQUcLb8si7nKo5Z5C81SH 302s H3do1xeRkE6flKkYnZX25gpSvcN6QKfPJzAItpqR6HghjvF3y4EycrQg0gD6kVuF 302s nR8HuntM6EpK2XGgvcc+3o0eTCH+sZEozB0UNncLqi8mGtpxL6qCtXwWAYVf8UAI 302s Iuy5Ug45CJMXRIpF5OG6anKyD54BMttAcxkYR2lJ5GplusPrVLMsh2ag3+gwepO0 302s dQh5c5jjwFtzgzukko+PDMjL4GJSyzF2+dHvd05SB8OP2MWZpNZ6fAgnF9epR3U0 302s h1I16Af4qfSJt56Cgzzx0j3bvBoFIhFkZ5W97FOcWmkHnLQ3eolR6hjt8HBmDiFU 302s DUTKeXkQg0XElqGX9JGj5zLLCNwgde7GEgdC/9zE6n1gb8nzaphfYwCDYMqiECza 302s Qy1hGu4KME15wc3Sj3pVRCFzdwYDtgFIeJ9aMeERK6mYYKwrzh2/pU7hvoNYTvXl 302s rM0Q1fB0mbZorVcDYnvyeMOhkAgYPapCRadEN0R3HLt3CEu1mTo/kuWgkcfqkh/q 302s fdF6ticNjFWfTBLHWyUa/h8fV5x02sbOLfAfvBDLCCkpXH2M8mJDrghX25XcbQyp 302s dNFB4Gu2PsdJHIX9oy3efIlYrhDx4maJgXM1Zk0mXVVOoqBK4w+0alE2UU9ZRvFU 302s 9LzSKlG67x8l8ULaIlVAlLndXVbZQN8tc66iSJHY4/SHrP9Y4IzTBA/13A9WoohB 302s lxD26yYdgvLiVt9CqZ4rCI3ntXvjH6mZCKQqxeXceVZVo+UywGCudHfRrKg7oRcw 302s Wmxf9VNIh6FAdjvgk9k= 302s -----END ENCRYPTED PRIVATE KEY----- 302s |<9>| salt.size: 8 302s |<9>| iterationCount: 2048 302s |<9>| salt.size: 8 302s |<9>| iterationCount: 2048 302s |<3>| ASSERT: ../../../lib/x509/privkey_pkcs8.c[check_for_decrypted]:815 302s |<9>| salt.size: 8 302s |<9>| iterationCount: 2048 302s |<9>| keyDerivationFunc.algorithm: 1.2.840.113549.1.5.12 302s |<9>| salt.specified.size: 15 302s |<9>| iterationCount: 5185 302s |<9>| keyLength: 0 302s |<9>| encryptionScheme.algorithm: 2.16.840.1.101.3.4.1.2 302s |<9>| IV.size: 16 302s |<9>| keyDerivationFunc.algorithm: 1.2.840.113549.1.5.12 302s |<9>| salt.specified.size: 15 302s |<9>| iterationCount: 5185 302s |<9>| keyLength: 0 302s |<9>| encryptionScheme.algorithm: 2.16.840.1.101.3.4.1.2 302s |<9>| IV.size: 16 302s |<9>| keyDerivationFunc.algorithm: 1.2.840.113549.1.5.12 302s |<9>| salt.specified.size: 15 302s |<9>| iterationCount: 5171 302s |<9>| keyLength: 0 302s |<9>| encryptionScheme.algorithm: 2.16.840.1.101.3.4.1.2 302s |<9>| IV.size: 16 302s |<9>| keyDerivationFunc.algorithm: 1.2.840.113549.1.5.12 302s |<9>| salt.specified.size: 15 302s |<9>| iterationCount: 5171 302s |<9>| keyLength: 0 302s |<9>| encryptionScheme.algorithm: 2.16.840.1.101.3.4.1.2 302s |<9>| IV.size: 16 302s |<3>| ASSERT: ../../../lib/x509/privkey_pkcs8.c[check_for_decrypted]:815 302s |<9>| keyDerivationFunc.algorithm: 1.2.840.113549.1.5.12 302s |<9>| salt.specified.size: 12 302s |<9>| iterationCount: 5250 302s |<9>| keyLength: 0 302s |<9>| encryptionScheme.algorithm: 2.16.840.1.101.3.4.1.2 302s |<9>| IV.size: 16 302s Setting log level to 99 302s MAC info: 302s MAC: SHA1 (1.3.14.3.2.26) 302s Salt: 950d56ea02d811b8 302s Salt size: 8 302s Iteration count: 10240 302s 302s BAG #0 302s Type: Encrypted 302s Cipher: AES-128-CBC 302s Schema: PBES2-AES128-CBC (2.16.840.1.101.3.4.1.2) 302s Salt: a58e219e72cc0fc85d353fac9768c5 302s Salt size: 15 302s Iteration count: 5185 302s 302s Decrypting... 302s Elements: 1 302s Type: Certificate 302s Friendly name: key and cert with CRL 302s Key ID: D9:FF:25:58:CE:CB:13:91:A4:30:B4:29:CB:27:E9:68:E8:E1:71:9F 302s -----BEGIN CERTIFICATE----- 302s MIIDmDCCAoCgAwIBAgIBATANBgkqhkiG9w0BAQsFADBQMQswCQYDVQQGEwJVUzEf 302s MB0GA1UEChMWVGVzdCBDZXJ0aWZpY2F0ZXMgMjAxMTEgMB4GA1UEAxMXUDEgTWFw 302s cGluZyAxdG8yMzQgc3ViQ0EwHhcNMTAwMTAxMDgzMDAwWhcNMzAxMjMxMDgzMDAw 302s WjBiMQswCQYDVQQGEwJVUzEfMB0GA1UEChMWVGVzdCBDZXJ0aWZpY2F0ZXMgMjAx 302s MTEyMDAGA1UEAxMpVmFsaWQgUG9saWN5IE1hcHBpbmcgRUUgQ2VydGlmaWNhdGUg 302s VGVzdDUwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCmiGMLjXA2ijC5 302s itMpJVXTbHXhguDwZQ2mcSY5FmZ2nPuO2JBp2lA6yUG7fCuxTKeC1mGSOej41Pz8 302s zTkOGiXC/UtDy73yQhJJPHFn/ka7HzC3UlIOzRbY3nXg89sqIrO4wFLKUvrM1VkW 302s FqXJw5XbDwrL/0vIhqHh7jyK64snUiP0AAm6kgR1r3aufS1/QwjozIkRGmP4Cxm/ 302s 8Gzz5is4kfB2NuaR8xE/i8BubAM8TnAyIXX6hy99TlyyXSD2tc8dlxTskD8lt6IY 302s w0NwwNTi9Rqq41ZKkLtixase00o+s345noAcI5SfLdnTKXM6zUwooJzBW/av+8C7 302s YyqmOjS1AgMBAAGjazBpMB8GA1UdIwQYMBaAFAMX5ZUA/So5eK/LRvZAmGUKAu27 302s MB0GA1UdDgQWBBRLgjD1Mqn9+vaGwm3k1zO/qu1RFTAOBgNVHQ8BAf8EBAMCBPAw 302s FwYDVR0gBBAwDjAMBgpghkgBZQMCATAGMA0GCSqGSIb3DQEBCwUAA4IBAQBSG/qP 302s hRrenfviZJK/kxNaJzIM2ppVq3YbCxbjSApzL/tqPFEKtJuw2r7UlAY05rqzaZyE 302s 1sxWuvyenub6f/K9BCQRBXHO5cPOnWS142x9komCqDUP7I7F4pnptXAp8nyc8eoL 302s zmsOJ8dlZv2aD//mISoFMZ69fvfIku/MAOZCTnSks1CPyT9omAfT6zdnMiDfk/kY 302s lZAWFas9/pm16Z88QP8y0z/IMrri12dOLMnFyKNBy/9TXNZof/VPkkD2keJ6eQGn 302s MUamXI/OIlBJXqu3AYiUDP9FQbxKxj4uTOtS1MhrZbAtTAI+3eqPKU92T8YFamCr 302s A1Z483lYO5ntY6/Z 302s -----END CERTIFICATE----- 302s 302s BAG #1 302s Type: Encrypted 302s Cipher: AES-128-CBC 302s Schema: PBES2-AES128-CBC (2.16.840.1.101.3.4.1.2) 302s Salt: 17ad7c697582811483dcc3ec95f649 302s Salt size: 15 302s Iteration count: 5171 302s 302s Decrypting... 302s Elements: 1 302s Type: CRL 302s -----BEGIN CRL----- 302s MIIByTCBsgIBATANBgkqhkiG9w0BAQsFADBPMQswCQYDVQQGEwJVUzEfMB0GA1UE 302s ChMWVGVzdCBDZXJ0aWZpY2F0ZXMgMjAxMTEfMB0GA1UEAxMWbmFtZUNvbnN0cmFp 302s bnRzIERONCBDQRcNMTAwMTAxMDgzMDAwWhcNMzAxMjMxMDgzMDAwWqAvMC0wHwYD 302s VR0jBBgwFoAUbEk2rS5YiRI2UUE7VFImJADTynUwCgYDVR0UBAMCAQEwDQYJKoZI 302s hvcNAQELBQADggEBAH6NXW4G6VFh6lalxV0HfwwV4W70J+q058P1U/nVsOOg7s46 302s v+bhzKwJrIovS+fGE+WmDCMbeeIzvmMnkF7ZSGmZarmGDzNGsxghmiNHW9eP2Wk2 302s 7QjyePG/cAff8ILOqzCHw1WZMtIgyVM3tQY492xqKPRTBac5P5DN6COtBGzKsk7O 302s mtOvhcqtwMt5ejXil9ibRhAKHcgoNtzOoZoaQOvTajOP0vdFYnHHkF+bFDd+lxUE 302s IHgX9IOmk1xGFgdEcSpQL+6mvV0aKk9iavdbVBQCeWzul24GRr21EVO2emR3oceI 302s vBeEL509yRgDMZoosPcUPzU3MCre4KHexkxNGKg= 302s -----END CRL----- 302s 302s BAG #2 302s Elements: 1 302s Type: PKCS #8 Encrypted key 302s PKCS #8 information: 302s Cipher: AES-128-CBC 302s Schema: PBES2-AES128-CBC (2.16.840.1.101.3.4.1.2) 302s Salt: 9657f49edbc989d67e172505 302s Salt size: 12 302s Iteration count: 5250 302s 302s Friendly name: key and cert with CRL 302s Key ID: D9:FF:25:58:CE:CB:13:91:A4:30:B4:29:CB:27:E9:68:E8:E1:71:9F 302s -----BEGIN ENCRYPTED PRIVATE KEY----- 302s MIIFIzBNBgkqhkiG9w0BBQ0wQDAfBgkqhkiG9w0BBQwwEgQMllf0ntvJidZ+FyUF 302s AgIUgjAdBglghkgBZQMEAQIEEEczYFMNNfnMXzNRc1q3f7gEggTQ+rlhcOd3s8Tq 302s H+d2CJDTbhxMNwCZCNHZ0EfjcgJh+xwGYhhyyiKHnheriXmAmIso9ssOlMwdXigm 302s N+Iks78102CFdMk2BoqYBIglDc4lL4wlmELHo+2g7xX+Bu2E9UeqJY1rpP7k5ilI 302s HrgzQ0A575RIfN0t7ZRiAKKJ9+ZvYKX4ZI1ieuvqVqjqGZY5ugjCjqAM9nqHzdRn 302s rbrSQusi85k/EU5vWxA7WRhx3B0MMjeNKoJU8uvWfhU2xp968n0zDn4yUjA291g/ 302s 4BZ6chCS+zAeCE2YdXZm9kPKrxTu0VemtTnOKA6GxBnToybFQM5nhsEmzHiWOv7c 302s 6noNptMMaMzZfj2u6aNMb/ctvqyB7VgkxTq0rcAfGAUW2uiAYLdZaGtM6/KemrA9 302s ypiY9lnikFNbHmXAisZrNzItwNslVV4MkqwiY5n2tPCSaQ9pDi3/556iTnlW0xN9 302s boJADUJzU7MgHwi2haM45yj16lUxfqGxQPH7rVzXxmd/DoWQqZKHEPy9tybxtK6L 302s XnIma8+NElYENUANmGWyDHyJS7Cr8cL7syv6qx+x4pYkwu0N98J/3eaLvZAqOcSO 302s 2Nhci8lYo3JK6f71eG59ae6YXOhRXdBMWOXQAp6FjO5ssfiH2vymZueuPCpnTuiS 302s rvlnkYIy1/5fGQcYiVhX2C8qei5h8qZJUnZv+G9ozvktTqQotbW6y8+WzMX3CNM3 302s VuRb5rScinTylCTO8h3NKnqhtWhyRZrSqYT7Uu+ioF2hOWVTShNWTB4AEcvd8cMo 302s HB7B+luoZWiZ67ApAhxAicEhbPJVVmAnjCH3SZ8GF7Y1487rJK/khppUKERAIDBB 302s 11w5k8MLJ4fB8xXApTAN4zKGV1Yl3aZr0+x+QaLdXRUd0xtJmfZqwXnk1jtQBtQc 302s 985yPPr8KmLlg5YtcxDMglGJ48V3uva3c29QNPE5JoFmrydhGXO49bNXcUU7yFIX 302s Q0V0hNwZkRx6aNgE/TNb4ZWi+x/yZZYjwgBPjldpnYgs+5YPzN+GQ/71Xxqm93Th 302s sa7Xpqyh9D7m6VdNYV2FGl8gy61kFU4NL4dzBhcd1y2StP7+bOvkjIpg/UX8SU2k 302s VGqXwpW0xAKE3G9avJGFD3pp2pUakTFHcq0ZbuWcYWW26bJc7ajkmoglYtXsH/39 302s /RUNASf+f/Gv20xpLGFSLU9Vxwn4r6oDPBU0bvUr1FDLnin1dKBEdFI9RdQsyjN3 302s sjmz5QRR8tQ2t3WB0l6qSdeWo/dFDaNQkmpgjUtqeojeKYWu1EzmL5T9U4k8tLKc 302s 047zvqc25IS0HtmxXIj/OWWXiAAH41aQpwvfJOw2PHfwFLRwnCgerZW9bxBvzIDA 302s kNpBvgCA/7wjzMa1vXq7KyjbS/X8H6jShwPg1jG4YtXzcjNk4wK62MZgR5ys2vYI 302s HDrh6hm9mlYmA4jRXPjwqTb2uFn95WbnGq0kYTpFqsctM7r74m1fQIH4yO1UK8Hv 302s o7Zvoat8IyMwJRB5SYl1ley80Qq7Qi15ELrgOSyVXLT3rJNYwwpzyqLFSkdoGkT1 302s EmBH6M6BI9UxyVF9EZ9MZt2X9g99KlwDqUjTYYT5I5LQy909dsVSBMG74xsWTUPs 302s JLqhdb98EgNcwKZDJ96URN9ztqjp31g= 302s -----END ENCRYPTED PRIVATE KEY----- 302s Setting log level to 99 302s MAC info: 302s MAC: SHA1 (1.3.14.3.2.26) 302s Salt: 8a0359c5490849ff 302s Salt size: 8 302s Iteration count: 2048 302s 302s BAG #0 302s Type: Encrypted 302s Cipher: RC2-40 302s Schema: PKCS12-RC2-40-SHA1 (1.2.840.113549.1.12.1.6) 302s Salt: e3501cdba64f1b76 302s Salt size: 8 302s Iteration count: 2048 302s 302s Decrypting... 302s Elements: 1 302s Type: Certificate 302s Friendly name: Just A Neon Client Cert 302s Key ID: 01:C4:94:FA:F3:47:EA:DF:6D:1F:E6:27:53:8D:B4:AD:6D:F0:A1:6F 302s -----BEGIN CERTIFICATE----- 302s MIICSDCCAfKgAwIBAgIBAzANBgkqhkiG9w0BAQQFADCBmjELMAkGA1UEBhMCVVMx 302s EzARBgNVBAgTCkNhbGlmb3JuaWExEDAOBgNVBAcTB09ha2xhbmQxEDAOBgNVBAoT 302s B05lb3NpZ24xFDASBgNVBAsTC1JhbmRvbSBEZXB0MRwwGgYDVQQDExNub3doZXJl 302s LmV4YW1wbGUuY29tMR4wHAYJKoZIhvcNAQkBFg9uZW9uQHdlYmRhdi5vcmcwHhcN 302s MDQxMDE3MjAwMzQ1WhcNMDcwNDA1MjAwMzQ1WjCBrjELMAkGA1UEBhMCR0IxFzAV 302s BgNVBAgTDkNhbWJyaWRnZXNoaXJlMRIwEAYDVQQHEwlDYW1icmlkZ2UxGTAXBgNV 302s BAoTEE5lb24gSGFja2VycyBMdGQxGTAXBgNVBAsTEE5lb24gQ2xpZW50IENlcnQx 302s HDAaBgNVBAMTE2lnbm9yZWQuZXhhbXBsZS5jb20xHjAcBgkqhkiG9w0BCQEWD25l 302s b25Ad2ViZGF2Lm9yZzBcMA0GCSqGSIb3DQEBAQUAA0sAMEgCQQDHQNEbyP1PUcT6 302s hqV0OrTcQ+ImR5Zd4RbAMBg4cs4+R7kpBKqaU8zpp7naxIOlg6OZI//3LDURC2ys 302s mAv+0oWJAgMBAAGjDTALMAkGA1UdEwQCMAAwDQYJKoZIhvcNAQEEBQADQQANaI7Y 302s 8JJJhg8P09QMLKRr0kGVso4tGkGVLGse8QpMGxqONQMrZumoZLIzmNuldv6ypw6k 302s 0yH6H2lfVjF6BkOX 302s -----END CERTIFICATE----- 302s 302s BAG #1 302s Elements: 1 302s Type: PKCS #8 Encrypted key 302s PKCS #8 information: 302s Cipher: 3DES-CBC 302s Schema: PKCS12-3DES-SHA1 (1.2.840.113549.1.12.1.3) 302s Salt: cd313968962e5cc1 302s Salt size: 8 302s Iteration count: 2048 302s 302s Friendly name: Just A Neon Client Cert 302s Key ID: 01:C4:94:FA:F3:47:EA:DF:6D:1F:E6:27:53:8D:B4:AD:6D:F0:A1:6F 302s -----BEGIN ENCRYPTED PRIVATE KEY----- 302s MIIBgjAcBgoqhkiG9w0BDAEDMA4ECM0xOWiWLlzBAgIIAASCAWBzyJrv5aSpv/jQ 302s WEQWHfnHtoC3Ihcuuj3k6KzLPyC3Vx9YNRIofC8tHJZYljt/LCXAzc3fxcVhIKw3 302s 5u439xoQW/6n8q5o9M2OGk46mzHS8PxdM+CsrtYzNhER4q+6IFeYfuhTQzjWPhrS 302s Qrd+Da6YlxDE+4jK1bdGMXeywRTFY38Q5w04KC95NwKS73w2CDSvPhc9DqtdGL70 302s qGct1ijUPKSU2/DXeQ/skaj6yua6zeH4CaLgelXep0eOLYWdoTStZ9Zco/ZRcQt7 302s 4Aq09rYGClxSSP5xvY2CZKquCZJPUM5UE4i3RISnuejxQpUqGhVpV6LgPYd1gDDl 302s suobhJjdUM4jcQX3d58W6qdBfQ15jCMmpGhbvlmP+231lGs9iXTLA5GTucXO41sj 302s E69zr4DuZ7ckxgU5p3SPqvzJWbLnDVTK/a9+j6JWSPK0zT8xqTsOnkyq9kqjtdnI 302s h5RTg034 302s -----END ENCRYPTED PRIVATE KEY----- 302s |<9>| salt.size: 8 302s |<9>| iterationCount: 2048 302s |<9>| salt.size: 8 302s |<9>| iterationCount: 2048 302s |<3>| ASSERT: ../../../lib/x509/privkey_pkcs8.c[check_for_decrypted]:815 302s |<9>| salt.size: 8 302s |<9>| iterationCount: 2048 302s |<9>| salt.size: 8 302s |<9>| iterationCount: 2048 302s |<9>| salt.size: 8 302s |<9>| iterationCount: 2048 302s |<3>| ASSERT: ../../../lib/x509/privkey_pkcs8.c[check_for_decrypted]:815 302s |<9>| salt.size: 8 302s |<9>| iterationCount: 2048 302s Setting log level to 99 302s MAC info: 302s MAC: SHA1 (1.3.14.3.2.26) 302s Salt: ead3fe09dfca8d42 302s Salt size: 8 302s Iteration count: 2048 302s 302s BAG #0 302s Type: Encrypted 302s Cipher: RC2-40 302s Schema: PKCS12-RC2-40-SHA1 (1.2.840.113549.1.12.1.6) 302s Salt: 85e3f593f7599d4b 302s Salt size: 8 302s Iteration count: 2048 302s 302s Decrypting... 302s Elements: 2 302s Type: Certificate 302s Key ID: 28:04:07:6F:5A:73:95:5F:E7:D9:2B:65:69:83:EB:A5:BD:48:A2:76 302s -----BEGIN CERTIFICATE----- 302s MIIDtDCCAmygAwIBAgIETeC0yjANBgkqhkiG9w0BAQsFADAZMRcwFQYDVQQDEw5H 302s bnVUTFMgVGVzdCBDQTAeFw0xMTA1MjgwODM5MzlaFw0zODEwMTIwODM5NDBaMC8x 302s LTArBgNVBAMTJEdudVRMUyBUZXN0IFNlcnZlciAoUlNBIGNlcnRpZmljYXRlKTCC 302s AVIwDQYJKoZIhvcNAQEBBQADggE/ADCCAToCggExALRrJ5glr8H/HsqwfvTYvO1D 302s hmdUXdq0HsKQX4M8AhH8E3KFsoikZUELdl8jvoqf/nlLczsux0s8vxbJl1U1F/Oh 302s ckswwuAnlBLzVgDmzoJLEV2kHpv6+rkbKk0Ytbql5gzHqKihbaqIhNyWDrJsHDWq 302s 58eUPfnVx8KiDUuzbnr3CF/FCc0Vkxr3mN8qTGaJJO0f0BZjgWWlWDuhzSVim5mB 302s VAgXGOx8LwiiOyhXMp0XRwqG+2KxQZnm+96o6iB+8xvuuuqaIWQpkvKtc+UZBZ03 302s U+IRnxhfIrriiw0AjJ4vp4c9QL5KoqWSCAwuYcBYfJqZ4dasgzklzz4b7eujbZ3L 302s xTjewcdumzQUvjA+gpAeuUqaduTvMwxGojFy9sNhC/iqZ4n0peV2N6Epn4B5qnUC 302s AwEAAaOBjTCBijAMBgNVHRMBAf8EAjAAMBQGA1UdEQQNMAuCCWxvY2FsaG9zdDAT 302s BgNVHSUEDDAKBggrBgEFBQcDATAPBgNVHQ8BAf8EBQMDB6AAMB0GA1UdDgQWBBR2 302s B1hM6rUp9S2ABoyDSoINCeyT3jAfBgNVHSMEGDAWgBRNVrdqAFjxZ5L0pnVVG45T 302s AQPvzzANBgkqhkiG9w0BAQsFAAOCATEAdNWmTsh5uIfngyhOWwm7pK2+vgUMY8nH 302s gMoMFHt0yuxuImcUMXu3LRS1dZSoCJACBpTFGi/Dg2U0qvOHQcEmc3OwNqHB90R3 302s LG5jUSCtq/bYW7h/6Gd9KeWCgZczaHbQ9IPTjLH1dLswVPt+fXKB6Eh0ggSrGATE 302s /wRZT/XgDCW8t4C+2+TmJ8ZEzvU87KAPQ9rUBS1+p3EUAR/FfMApApsEig1IZ+ZD 302s 5joaGBW7zh1H0B9mEKidRvD7yuRJyzAcvD25nT15NLW0QR3dEeXosLc720xxJl1h 302s h8NJ7YOvn323mOjR9er4i4D6iJlXmJ8tvN9vakCankWvBzb7plFn2sfMQqICFpRc 302s w075D8hdQxfpGffL2tEeKSgjyNHXS7x3dFhUpN3IQjUi2x4f2e/ZXg== 302s -----END CERTIFICATE----- 302s Type: Certificate 302s -----BEGIN CERTIFICATE----- 302s MIIDUDCCAgigAwIBAgIBADANBgkqhkiG9w0BAQsFADAZMRcwFQYDVQQDEw5HbnVU 302s TFMgVGVzdCBDQTAeFw0xMTA1MjgwODM2MzBaFw0zODEwMTIwODM2MzNaMBkxFzAV 302s BgNVBAMTDkdudVRMUyBUZXN0IENBMIIBUjANBgkqhkiG9w0BAQEFAAOCAT8AMIIB 302s OgKCATEAnORCsX1unl//fy2d1054XduIg/3CqVBaT3Hca65SEoDwh0KiPtQoOgZL 302s dKY2cobGs/ojYtOjcs0KnlPYdmtjEh6WEhuJU95v4TQdC4OLMiE56eIGq252hZAb 302s HoTL84Q14DxQWGuzQK830iml7fbw2WcIcRQ8vFGs8SzfXw63+MI6Fq6iMAQIqP08 302s WzGmRRzL5wvCiPhCVkrPmwbXoABub6AAsYwWPJB91M9/lx5gFH5k9/iPfi3s2Kg3 302s F8MOcppqFYjxDSnsfiz6eMh1+bYVIAo367vGVYHigXMEZC2FezlwIHaZzpEoFlY3 302s a7LFJ00yrjQ910r8UE+CEMTYzE40D0olCMo7FA9RCjeO3bUIoYaIdVTUGWEGHWSe 302s oxGei9Gkm6u+ASj8f+i0jxdD2qXsewIDAQABo0MwQTAPBgNVHRMBAf8EBTADAQH/ 302s MA8GA1UdDwEB/wQFAwMHBgAwHQYDVR0OBBYEFE1Wt2oAWPFnkvSmdVUbjlMBA+/P 302s MA0GCSqGSIb3DQEBCwUAA4IBMQAesOgjGFi1zOYpA/N3gkUVRcBHDxmN7g2yOcqH 302s VfhFc+e4zhOehR11WCt2RgzNlnYVmV5zBmQBdTAt8Po/MVhLCDW1BULHlLvL0DFc 302s 4sB1RlcGeQcCKQa4b+Q9VWf4f6TfuEWZQC5j5stiXjVgOqrOMrzKZ2eKWA4JsL9s 302s V+7ANSZE+hOt1X1mA8moyqe95U2Ecih+nFJSWSBd1WFiEzVnXv4FVWPXbH9HERDK 302s VbasjofWWmQO1YlQPishLgm1IbwqOkOk4sDgoLuUZ4GgP0DDeN6EmRDOzByrv+9u 302s f45Bl9IQf4IJNPLU9lEqjyMOydqT6kBi7fjV5ICuQZ4EeVJsOGuX7PqNyoDzJHLv 302s ferRfNLr6eQSHSxBhS0cVyDjb5gCawK6u7xTU+b7xikEie9k 302s -----END CERTIFICATE----- 302s 302s BAG #1 302s Elements: 1 302s Type: PKCS #8 Encrypted key 302s PKCS #8 information: 302s Cipher: 3DES-CBC 302s Schema: PKCS12-3DES-SHA1 (1.2.840.113549.1.12.1.3) 302s Salt: cf11aabb54d2c2e3 302s Salt size: 8 302s Iteration count: 2048 302s 302s Key ID: 28:04:07:6F:5A:73:95:5F:E7:D9:2B:65:69:83:EB:A5:BD:48:A2:76 302s -----BEGIN ENCRYPTED PRIVATE KEY----- 302s MIIFwjAcBgoqhkiG9w0BDAEDMA4ECM8RqrtU0sLjAgIIAASCBaC8QSAiFiXuas0w 302s dzf0MrWaF/3vaVEjx595o2t+BXgFJjBkc2ctaEMzAE6je7TWSeeKT7IauNbHle50 302s oPUB0418xuWoN2DHlNnE4z5JnXFcRXPBiuG0Xb6TB/bXQMiB6hKZqLQUlxS2Fv+U 302s G5jOUShmCP9CqUJnJs30zMHChlQRxexbGw7GYSRzBNuxayr2bA2+Yk/dRlsjIPno 302s ltpY+CLlZZER0/fA7gW5mX9+QRm6OsoECDUCm3c5y2x+mFigbnFVMDU19rCOezHT 302s ujShGMhfamqUCDu+xenjHh85DRM/685N4Ie1DxrPA3pOJpkAlQHRigUMQF99Jqlp 302s l9pfdQ1Qn7MGORr+RPRyI50Cy7cjHL0sI8MrimiC/nZ/KGd/5t/taYVTs7NMwjut 302s iOV7jmVjYYOUgh1jibT7K9SOwFCYrcTKG9BDLTmrylcd0eId4QOvdlo2n8roetNa 302s AQ10a9/u1f5QX0gPmy3c7Mg5H/gitQBO4VtWXlsp7mR0CVCIDx+TJMpJsVJYXr7v 302s FT0VauIl8SCtGdx1hDGaMaoiwXJ/H55LifM6QB+CVs4BOGHe4ULpL1p3HxHA6JVW 302s 6QwPECDriQaOEnmG1O++qItt5sbMw8zZNcrxT4EcnDni5StrIXPU3oSwfNmrY1yP 302s GTmWDOzdF6fkxZSN9ffR93JXj2a5Gu54btfHY0vKv6byNWB5nEUYMQQpTgThPXjn 302s BfCIVjSMStD0liCgn8Lh3F4Nieq8BdM4B5ET1s3c6y9aQK8OhVXeE1+SQdqICzIj 302s 7BwX0k/UO2brXWt2I6yHNeo8tP3kXYnHLxZGLKzvaKv9CeRSC4+w0LuMTX9JkCKF 302s mxSGKwcmgA1lquBfMSvw5mHIlVj7/zcPAOh1rIKSI8fP7e/C8P/5UXvvUGZBwLS9 302s ZCfKquP8Whddq5q6vO3I6o7mQG0RcXwidPsvUGMc2+aN0S8rIH25cS1UFwYL2WZM 302s Qr7kOpQ1zOfcA/Jzay/UsObcGClu3agtKqPxlCkqK1ULA/Ydx9hz2l6K6aSBLxnb 302s zIFq+LEghy2wro3ydY+rUbk4UhVNHrDwwbr6IsLHch0JwMBdfTbsJBTmb6SryrEY 302s Oad5yNk4oG5s6uyrl5y57Crmz4W+4kKWPwzE13B8RJq7N0/w37yI4WCZYhpEokrH 302s p7kjghRZSwTPUbGEopZq6vgnd27PhYVoMWNL1b/OUYi675rN7qc8hV1nfjjRp+4Z 302s rmWC9Z3uSI9vR4L94iKKS+0eQrsuREWd5CZxYYnN+P1dUMXRehVjDTCawLk5H7RG 302s RaORlyC7uA0tsFVNogz+xGyIcRNFT3s7u7CziCpGigbBT91zbIDVD0j+ADBrEt43 302s 7eKvY9bJSEmSQzpUbh17KqKji1PyF3eof8rglXLn9XT0DB0/LmPGdPZps/mvlsuc 302s 0sc1q9nJffgVF+71J4+TPY/tJ9pHHdWz2bV0Ujy20b3HxhcCVRwtJxvJaaEm1XHm 302s KZABN/3Ua1HvPnShacif5UtWBE8czX0yGJSvmqBMcxtLc4OUuW/3keyIO+wJ8dlG 302s E9A/AL5+sfr0MwnU605lAuvHFFcf6rx36AbuUIJv368dbRglbJ6UznhDhO6y77dX 302s EfH0g662KV5q/1sBX5OL2Pe1cYG81e1ZKDxI82DCJIjGwizPQPRzAVyzR6RosNHs 302s Vbopxq5mnXJxxcPxwGT+TU1s9f1QrfDInYyd0EoxKa64nMJbgArMaAx2njFkxpYn 302s NK5hFgDl+QgJO6IktS/auW9O6Or5v6CcabAVIw8an4QeY0ssVYKPAtTYSE4mOWF5 302s Wu7nZCwL9sZ3kciFcPYi5HEa5T7M4s/s4AphwAWTZmZq5i6Xg5vqnU/YAKHj6ioP 302s TyaXor1HXZfdjjxj4Ze8WUFLqE7apK1ho/38OM1nw9PCLRtGG7k= 302s -----END ENCRYPTED PRIVATE KEY----- 302s Setting log level to 99 302s MAC info: 302s MAC: SHA1 (1.3.14.3.2.26) 302s Salt: abd24fb650c1619b 302s Salt size: 8 302s Iteration count: 2048 302s 302s BAG #0 302s Type: Encrypted 302s Cipher: RC2-40 302s Schema: PKCS12-RC2-40-SHA1 (1.2.840.113549.1.12.1.6) 302s Salt: 2286d3fd44ede135 302s Salt size: 8 302s Iteration count: 2048 302s 302s Decrypting... 302s Elements: 1 302s Type: Certificate 302s Key ID: 01:C4:94:FA:F3:47:EA:DF:6D:1F:E6:27:53:8D:B4:AD:6D:F0:A1:6F 302s -----BEGIN CERTIFICATE----- 302s MIICSDCCAfKgAwIBAgIBAzANBgkqhkiG9w0BAQQFADCBmjELMAkGA1UEBhMCVVMx 302s EzARBgNVBAgTCkNhbGlmb3JuaWExEDAOBgNVBAcTB09ha2xhbmQxEDAOBgNVBAoT 302s B05lb3NpZ24xFDASBgNVBAsTC1JhbmRvbSBEZXB0MRwwGgYDVQQDExNub3doZXJl 302s LmV4YW1wbGUuY29tMR4wHAYJKoZIhvcNAQkBFg9uZW9uQHdlYmRhdi5vcmcwHhcN 302s MDQxMDE3MjAwMzQ1WhcNMDcwNDA1MjAwMzQ1WjCBrjELMAkGA1UEBhMCR0IxFzAV 302s BgNVBAgTDkNhbWJyaWRnZXNoaXJlMRIwEAYDVQQHEwlDYW1icmlkZ2UxGTAXBgNV 302s BAoTEE5lb24gSGFja2VycyBMdGQxGTAXBgNVBAsTEE5lb24gQ2xpZW50IENlcnQx 302s HDAaBgNVBAMTE2lnbm9yZWQuZXhhbXBsZS5jb20xHjAcBgkqhkiG9w0BCQEWD25l 302s b25Ad2ViZGF2Lm9yZzBcMA0GCSqGSIb3DQEBAQUAA0sAMEgCQQDHQNEbyP1PUcT6 302s hqV0OrTcQ+ImR5Zd4RbAMBg4cs4+R7kpBKqaU8zpp7naxIOlg6OZI//3LDURC2ys 302s mAv+0oWJAgMBAAGjDTALMAkGA1UdEwQCMAAwDQYJKoZIhvcNAQEEBQADQQANaI7Y 302s 8JJJhg8P09QMLKRr0kGVso4tGkGVLGse8QpMGxqONQMrZumoZLIzmNuldv6ypw6k 302s 0yH6H2lfVjF6BkOX 302s -----END CERTIFICATE----- 302s 302s BAG #1 302s Elements: 1 302s Type: PKCS #8 Encrypted key 302s PKCS #8 information: 302s Cipher: 3DES-CBC 302s Schema: PKCS12-3DES-SHA1 (1.2.840.113549.1.12.1.3) 302s Salt: 5b73204da508c557 302s Salt size: 8 302s Iteration count: 2048 302s 302s Key ID: 01:C4:94:FA:F3:47:EA:DF:6D:1F:E6:27:53:8D:B4:AD:6D:F0:A1:6F 302s -----BEGIN ENCRYPTED PRIVATE KEY----- 302s MIIBgjAcBgoqhkiG9w0BDAEDMA4ECFtzIE2lCMVXAgIIAASCAWBBAT5KiEY0q0oa 302s PiGb9qb0ts8x+/TXyP+AoUGw0dq5HMWqlE+AENzgf4tu3Yo0kJ8K+PHoptNEE3Uq 302s K+IvGjU80Pqk4uqYvmwuI3PECbKyXCWs1nWo7cfeieXL4EiY5pwJKbA28iXMpnA7 302s Toh4nOpuuctlBzb/CXvSeKOMgZnyG5VMjy4RrM9Uf6BuVvjXC4e5d2bcyHz+YWzb 302s rHIyMat2RIyRO9CwY4jTDqmlxEBkQ+S1vgReETcIbSIaaDDp5ZlwS/WvWZObUKc3 302s vpHap1MM4aBmItKU4jZTJU9A3tY0nguARMAUTST2ZpxSuOWWnYbNmO1FaI8fEVdX 302s IPddGyKuAr8uaPVIYmqCcNLpjR32le7GHUHnwOwilE6WFm8urrzNiuC10uI/BkMD 302s a4lhuWLpwy1mGz7Woj27aMwGaUKMzHt80jarlasv3QwC6uOddVr0EnkDy8skf/j0 302s +ePHosDb 302s -----END ENCRYPTED PRIVATE KEY----- 302s |<9>| salt.size: 8 302s |<9>| iterationCount: 2048 302s |<9>| salt.size: 8 302s |<9>| iterationCount: 2048 302s |<3>| ASSERT: ../../../lib/x509/privkey_pkcs8.c[check_for_decrypted]:815 302s |<9>| salt.size: 8 302s |<9>| iterationCount: 2048 302s |<9>| salt.size: 8 302s |<9>| iterationCount: 2048 302s |<9>| salt.size: 8 302s |<9>| iterationCount: 2048 302s |<3>| ASSERT: ../../../lib/x509/privkey_pkcs8.c[check_for_decrypted]:815 302s |<9>| salt.size: 8 302s |<9>| iterationCount: 2048 302s Setting log level to 99 302s MAC info: 302s MAC: SHA1 (1.3.14.3.2.26) 302s Salt: 7fc8e45f09b49270 302s Salt size: 8 302s Iteration count: 2048 302s 302s BAG #0 302s Type: Encrypted 302s Cipher: RC2-40 302s Schema: PKCS12-RC2-40-SHA1 (1.2.840.113549.1.12.1.6) 302s Salt: 276d84cc87c4698c 302s Salt size: 8 302s Iteration count: 2048 302s 302s Decrypting... 302s Elements: 1 302s Type: Certificate 302s Friendly name: An Unencrypted Neon Client Cert 302s Key ID: 01:C4:94:FA:F3:47:EA:DF:6D:1F:E6:27:53:8D:B4:AD:6D:F0:A1:6F 302s -----BEGIN CERTIFICATE----- 302s MIICSDCCAfKgAwIBAgIBAzANBgkqhkiG9w0BAQQFADCBmjELMAkGA1UEBhMCVVMx 302s EzARBgNVBAgTCkNhbGlmb3JuaWExEDAOBgNVBAcTB09ha2xhbmQxEDAOBgNVBAoT 302s B05lb3NpZ24xFDASBgNVBAsTC1JhbmRvbSBEZXB0MRwwGgYDVQQDExNub3doZXJl 302s LmV4YW1wbGUuY29tMR4wHAYJKoZIhvcNAQkBFg9uZW9uQHdlYmRhdi5vcmcwHhcN 302s MDQxMDE3MjAwMzQ1WhcNMDcwNDA1MjAwMzQ1WjCBrjELMAkGA1UEBhMCR0IxFzAV 302s BgNVBAgTDkNhbWJyaWRnZXNoaXJlMRIwEAYDVQQHEwlDYW1icmlkZ2UxGTAXBgNV 302s BAoTEE5lb24gSGFja2VycyBMdGQxGTAXBgNVBAsTEE5lb24gQ2xpZW50IENlcnQx 302s HDAaBgNVBAMTE2lnbm9yZWQuZXhhbXBsZS5jb20xHjAcBgkqhkiG9w0BCQEWD25l 302s b25Ad2ViZGF2Lm9yZzBcMA0GCSqGSIb3DQEBAQUAA0sAMEgCQQDHQNEbyP1PUcT6 302s hqV0OrTcQ+ImR5Zd4RbAMBg4cs4+R7kpBKqaU8zpp7naxIOlg6OZI//3LDURC2ys 302s mAv+0oWJAgMBAAGjDTALMAkGA1UdEwQCMAAwDQYJKoZIhvcNAQEEBQADQQANaI7Y 302s 8JJJhg8P09QMLKRr0kGVso4tGkGVLGse8QpMGxqONQMrZumoZLIzmNuldv6ypw6k 302s 0yH6H2lfVjF6BkOX 302s -----END CERTIFICATE----- 302s 302s BAG #1 302s Elements: 1 302s Type: PKCS #8 Encrypted key 302s PKCS #8 information: 302s Cipher: 3DES-CBC 302s Schema: PKCS12-3DES-SHA1 (1.2.840.113549.1.12.1.3) 302s Salt: 8326cd3b338b9fe2 302s Salt size: 8 302s Iteration count: 2048 302s 302s Friendly name: An Unencrypted Neon Client Cert 302s Key ID: 01:C4:94:FA:F3:47:EA:DF:6D:1F:E6:27:53:8D:B4:AD:6D:F0:A1:6F 302s -----BEGIN ENCRYPTED PRIVATE KEY----- 302s MIIBgjAcBgoqhkiG9w0BDAEDMA4ECIMmzTszi5/iAgIIAASCAWAbyomJIeBPWa8z 302s elKlYF3sEOB55of8A9KpkHwYQiJiB6qhav2+6EWWcluBDGqGKP1/ai3RA7Azp9HO 302s yhlyXmaIpf7QX48x+sq4AGwRRNcOMHfhxUGEbJN4JDEoz0py00Yb03PkMudd7r2E 302s mh1qcZTLBjKeB/3O/XydBkKbw+MCBDU6aqwisob4E0S+bKqWiIjdbs0n6bBorAst 302s Dftvw1DlPkZrZg3mTlFRms1V080E6ztjsQoz6w7hHoTZ65jUroZTQKp3xBkeV0PU 302s cOZRvR5/kz+q2P/OiIMQMqq3jSgVrpd3ZcZ2U9gb9Fj+i1ADk+GgpLZZf0xOJV4T 302s jGC8hUHPwLV+duJ860nMFG25WYZCwTaR5gZHs0TASZCO19GRK4pv3yWEwMuBQbTi 302s fDva7di039AU/tiU0Puf6oApYLpmFDFx5+TR8E9Gl8iTk6Dvv+IzFhfYFKB07irk 302s FI7cdo/K 302s -----END ENCRYPTED PRIVATE KEY----- 302s |<9>| salt.size: 8 302s |<9>| iterationCount: 2048 302s |<9>| salt.size: 8 302s |<9>| iterationCount: 2048 302s |<3>| ASSERT: ../../../lib/x509/privkey_pkcs8.c[check_for_decrypted]:815 302s Setting log level to 99 302s MAC info: 302s MAC: SHA1 (1.3.14.3.2.26) 302s Salt: f2f5cb820c6947b7 302s Salt size: 8 302s Iteration count: 2048 302s 302s BAG #0 302s Type: Encrypted 302s Cipher: RC2-40 302s Schema: PKCS12-RC2-40-SHA1 (1.2.840.113549.1.12.1.6) 302s Salt: c8e1873a2e741021 302s Salt size: 8 302s Iteration count: 2048 302s 302s Decrypting... 302s Elements: 2 302s Type: Certificate 302s Key ID: 27:21:58:56:24:6E:2A:2B:EE:01:AA:45:CB:9D:92:DA:F4:E3:EC:9E 302s -----BEGIN CERTIFICATE----- 302s MIIGaDCCBVCgAwIBAgICAQAwDQYJKoZIhvcNAQEFBQAwga8xCzAJBgNVBAYTAlVT 302s MRAwDgYDVQQIEwdBbGFiYW1hMRMwEQYDVQQHEwpIdW50c3ZpbGxlMRUwEwYDVQQK 302s EwxEaWdpdW0sIEluYy4xIjAgBgNVBAsTGUFzdGVyaXNrIERldmVsb3BtZW50IFRl 302s YW0xFjAUBgNVBAMTDURpZ2l1bSBTVk4gQ0ExJjAkBgkqhkiG9w0BCQEWF2FzdGVy 302s aXNrdGVhbUBkaWdpdW0uY29tMB4XDTA4MTAzMDE1MzAzNVoXDTA4MTEwOTE1MzAz 302s NVowgZkxCzAJBgNVBAYTAlVTMRAwDgYDVQQIEwdBbGFiYW1hMRMwEQYDVQQHEwpI 302s dW50c3ZpbGxlMQ8wDQYDVQQKEwZEaWdpdW0xIjAgBgNVBAsTGUFzdGVyaXNrIERl 302s dmVsb3BtZW50IFRlYW0xEzARBgNVBAMTCmdudXRsc3Rlc3QxGTAXBgkqhkiG9w0B 302s CQEWCmdudXRsc3Rlc3QwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDJ 302s 6tn3P/3gJc/sP4DKX8UluUChCZuZwaCES0pPa8okBGd9n6aB1C8z0+0/9eDe9D43 302s dI39I5Zl4tk2q1N9IGcyrUqQuUhURp7tAyAlBui5nys0vpP/5zZM97Nfi4arSVXJ 302s CkCVJx5uoGhbTo8yHGr/PSmrJsF/ayeaM9qJZ6J8QRx6cQ8LAaD0SSPOhbfyWaqN 302s lft0sjEEYONAL4oLg6F2Lw0mj00U8rw+Y9qBinzx9cGpo/baNHVvMa2ZpX5jGPcR 302s EQsLmt1WTceWqIg8tIsSHbOAOpSNHzeXKuCo4yW6V8OTBWUlJTkFAKMWLDHu8gmc 302s f+xQPGtGQcNspwqQCGOwMU3e6GJ4DGPso9ffssWmnms6zMRt/UP1+qB3P1V2PgGD 302s p+EF5j3CPcGe4eeTCriLbRG2WGbYKRTXSdkFmo7vrmv8ED79SH2xew4XfGiHjXOs 302s SiOQl0mUe3hN1MYXJ0/IK8/H3PbOrxTRkdhQaVb7bhIQZ97+LzbEci7qrvIQytaH 302s Q/fGg0cNonB1+4CsyyA9v+l1euxsyBjCFvat9K64whGcGSgJjVXeUThWuM/OcHAv 302s IjrY20EeZHudxANhpxjEsPEev3kJ4SInLO6/Ti1dQin7OuxEXJpFAqLdxXoYKhp6 302s OJqukyp9WRgWW+HxiDtHxB3EZFclv+CknFnIGB9clwIDAQABo4IBoDCCAZwwCQYD 302s VR0TBAIwADARBglghkgBhvhCAQEEBAMCBLAwKwYJYIZIAYb4QgENBB4WHFRpbnlD 302s QSBHZW5lcmF0ZWQgQ2VydGlmaWNhdGUwHQYDVR0OBBYEFFd6yvxTb+C5Wu2VqXeJ 302s urBszzl/MIHkBgNVHSMEgdwwgdmAFFDT7v0IlQYmFkkEkL81AhEwkr0noYG1pIGy 302s MIGvMQswCQYDVQQGEwJVUzEQMA4GA1UECBMHQWxhYmFtYTETMBEGA1UEBxMKSHVu 302s dHN2aWxsZTEVMBMGA1UEChMMRGlnaXVtLCBJbmMuMSIwIAYDVQQLExlBc3Rlcmlz 302s ayBEZXZlbG9wbWVudCBUZWFtMRYwFAYDVQQDEw1EaWdpdW0gU1ZOIENBMSYwJAYJ 302s KoZIhvcNAQkBFhdhc3Rlcmlza3RlYW1AZGlnaXVtLmNvbYIJAMVFWVbZp6wSMCIG 302s A1UdEgQbMBmBF2FzdGVyaXNrdGVhbUBkaWdpdW0uY29tMBUGA1UdEQQOMAyBCmdu 302s dXRsc3Rlc3QwDgYDVR0PAQH/BAQDAgWgMA0GCSqGSIb3DQEBBQUAA4IBAQAi0VEb 302s iFbqUO2CyPs91ocvoEg4a7SvD3J9whrWtD5+CGb0d2YrmLaA20NDa7YEURO+YI23 302s Ura7z2y5W7bAYSeUqM4+7rljx/hVxabl/NgK0wJLNdilL3VAKO0XZK17Zebwr8Bt 302s q+3/7be3v2iIAT03aglV3gh8MmFmlO2FS9UwOeWLHLBfUWWPr/+CqeUx3KcXeo4w 302s ORZg1L+ANl2xcZ49nyLG24QCEshjF4llzZkIcZB5xmW4PHfUlcng1J8KOB4Sm+5v 302s XO6mRsE02ejXhlE6EqpkBaWOhcGFRcyHnIEV6r17EU9WPl40dlrJBybwMbV0t3BC 302s 0sTB4iw3Vhca1y1Y 302s -----END CERTIFICATE----- 302s Type: Certificate 302s -----BEGIN CERTIFICATE----- 302s MIIFfzCCBGegAwIBAgIJAMVFWVbZp6wSMA0GCSqGSIb3DQEBBAUAMIGvMQswCQYD 302s VQQGEwJVUzEQMA4GA1UECBMHQWxhYmFtYTETMBEGA1UEBxMKSHVudHN2aWxsZTEV 302s MBMGA1UEChMMRGlnaXVtLCBJbmMuMSIwIAYDVQQLExlBc3RlcmlzayBEZXZlbG9w 302s bWVudCBUZWFtMRYwFAYDVQQDEw1EaWdpdW0gU1ZOIENBMSYwJAYJKoZIhvcNAQkB 302s Fhdhc3Rlcmlza3RlYW1AZGlnaXVtLmNvbTAeFw0wNTExMjUyMzMxNDdaFw0xNTEx 302s MjMyMzMxNDdaMIGvMQswCQYDVQQGEwJVUzEQMA4GA1UECBMHQWxhYmFtYTETMBEG 302s A1UEBxMKSHVudHN2aWxsZTEVMBMGA1UEChMMRGlnaXVtLCBJbmMuMSIwIAYDVQQL 302s ExlBc3RlcmlzayBEZXZlbG9wbWVudCBUZWFtMRYwFAYDVQQDEw1EaWdpdW0gU1ZO 302s IENBMSYwJAYJKoZIhvcNAQkBFhdhc3Rlcmlza3RlYW1AZGlnaXVtLmNvbTCCASIw 302s DQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAOGY3YY5JL8a9ivUw+TEJmnoLNq8 302s ETgDZormPDctHEqnS09Kcj7ggAjxwheatdXxpthk88zRGwTLsH11h1Kaeuqr8mTx 302s DtSV+mClHvrWXYpVqDiYTacEKUytLSEn1Ye2iJPi/BWCbrXMfEWliAxdcSnynZXq 302s nP8BVXvH3o15JEkAAmmprPo55TddSfFAp2LAnqIh2cUhoqmDmWWCjnNhiYwdGC84 302s KWMZIGpCoyJMCHOKVv0NqKcQ6Lrp65CuSBBjWjMTvSK4UKYNGEvRgdJgJ304xvK1 302s Ls7vWuGGM84N34Dpt4Tz9tHP4biqrZ8j6wRYD8ZoXzvl8XybLGO7i/r91SUCAwEA 302s AaOCAZowggGWMB0GA1UdDgQWBBRQ0+79CJUGJhZJBJC/NQIRMJK9JzCB5AYDVR0j 302s BIHcMIHZgBRQ0+79CJUGJhZJBJC/NQIRMJK9J6GBtaSBsjCBrzELMAkGA1UEBhMC 302s VVMxEDAOBgNVBAgTB0FsYWJhbWExEzARBgNVBAcTCkh1bnRzdmlsbGUxFTATBgNV 302s BAoTDERpZ2l1bSwgSW5jLjEiMCAGA1UECxMZQXN0ZXJpc2sgRGV2ZWxvcG1lbnQg 302s VGVhbTEWMBQGA1UEAxMNRGlnaXVtIFNWTiBDQTEmMCQGCSqGSIb3DQEJARYXYXN0 302s ZXJpc2t0ZWFtQGRpZ2l1bS5jb22CCQDFRVlW2aesEjAPBgNVHRMBAf8EBTADAQH/ 302s MBEGCWCGSAGG+EIBAQQEAwIBBjAJBgNVHRIEAjAAMCsGCWCGSAGG+EIBDQQeFhxU 302s aW55Q0EgR2VuZXJhdGVkIENlcnRpZmljYXRlMCIGA1UdEQQbMBmBF2FzdGVyaXNr 302s dGVhbUBkaWdpdW0uY29tMA4GA1UdDwEB/wQEAwIBBjANBgkqhkiG9w0BAQQFAAOC 302s AQEAWR9wMp3GtC0nAmY42GbD5l6+770kPMO5BXbt9jwLZNprzf8Oir4maE2J/zPO 302s COkfQoAFz9D2M6SCmcDwRX+6lub1rvPR6bt1i2kqMrJED/UN+7P3X+hQHh/b3fQG 302s Q3HMH1fdWuNMDqB2eQqTvEKq9bC8WeLwY48DnlGX1iGQFOSWwdbXmmF283xI7jtX 302s I8vNdvvchBGZx/5MNm4QJzw4Obky/PN1uNhyfMJLhT/ooNwCu6CBkNeCCsfhXaGZ 302s nocWKFBeRzI0xp0rGgZ0iWGXmXuGaKPvHzpYxmkqiXX/gnVS1vad1QpCLWVdpDnW 302s TNq9dm+vncMrcoDDaHnGTgtLag== 302s -----END CERTIFICATE----- 302s 302s BAG #1 302s Elements: 1 302s Type: PKCS #8 Encrypted key 302s PKCS #8 information: 302s Cipher: 3DES-CBC 302s Schema: PKCS12-3DES-SHA1 (1.2.840.113549.1.12.1.3) 302s Salt: d3c56c53bf052346 302s Salt size: 8 302s Iteration count: 2048 302s 302s Key ID: 27:21:58:56:24:6E:2A:2B:EE:01:AA:45:CB:9D:92:DA:F4:E3:EC:9E 302s -----BEGIN ENCRYPTED PRIVATE KEY----- 302s MIIJajAcBgoqhkiG9w0BDAEDMA4ECNPFbFO/BSNGAgIIAASCCUje/AHGOnkChHn3 302s pQN+V9+PiDnO0c8nSbh49XqafKN+Z8X3pPk2wqQKnRQ0z4adHkVe2ArWJ949O9rV 302s EQ1l/8DrrhA2maqbrttWTtX+DRyqFqTSB6VTkpiX3mjLA5PPlb4F3FwJ/QOFQBvK 302s ohHEd4BagB1S6I84uqFmJe8JURSOvbc5LXAOrAscIf/sIoBwbHrexq4KNqDKx4Xx 302s tBdyATIWrLQe2HO58PzgEUu/IRn8sAnGjVU3+h+DG6rJKJsx7gq0rkXU5E50Emk4 302s 9blvT+uaUFNpW7Usm0Nm2K5O3DmZR82VMEB57lZ8guG573LYIBrSp7bQIpyXao9f 302s Vfqkrvd7TF9RVTa/TigTaT30ep8tm+KzWiGNkXhBBHfwEZIcRKiPEC5tihqV5QBS 302s xo68SCAgP/TDQLGvOXE6O1z/Z2nd28tMF5XsrN7/F2pEn0cfQLrK+hB6FTwRtblE 302s TVQB6QDDxOR8wIjqnw7Jo21nactdWp914SnD2JmC/OWv1lNphcSdawmKYi5S9RIZ 302s KF/qevgWsz+L5zWPljD+eFTQeyBr/cm+nC0/NG1CWUoJEK0pNvyZKK3YswYub+se 302s knCokbUFq/WipPE5+Z7ZjoITGBjHFvWUEl7i87bLkkyyHj8pm5RwhoN1FHdM/Sez 302s kq+olMx8d+dXtnS+R9MtECEN4ONfuYHuDj10dMOiK+YAWOKj8lJhxKvkH+miuxcQ 302s 1/pbtuxwB6KcCJGQRz9yzN206VlGeb87hRnn74rPMm4pIVaxnZoteB0GW/uCAENP 302s z1wDtWnvRyzs/1cJuvjDvFHM8AtL9dKH7FUUh9aPGDm6guDq+6iz8xvL9zfY6V/d 302s EnAWWqExMd5doBj7OIFic+SQ36+NbdlTYsCjfPuwqYSDhgl0g00a7L+QU1BHPSu8 302s v0ecMeVH5GiclCRGhzYqo0PwVsj1pzR2vM2+ccf1+7YXwOzyaYkXLxjiDfGZyFgx 302s Ta/YW1uUpckheFVypb0RPZLZsD19fspLypK4VYh1gzWoWyrwBr9opP6Bc8dfCQj9 302s Xw/wa91xTZJXCzTK1Dhj3aLGJ1rN/lJ1Mlh0VfggdNIyMpBsBFoBMda0IhfOTL5d 302s 4gSgt+CTs1BpV+0o5VbtB6yXuf0446GQTVKDBpF3riFlvVPkCR78UquH3YcEnRmm 302s ydI6000C1AV0+54yUAIfbXpnlh0JQ9tfjUvNouvnWfEstfpjweeWNcyjufogkhYZ 302s d881lkY9YEYqCEdZg4iPBK53cJ0nWq9HmXzr34JbihBlz9QaQ1xYpOvILE+bAU// 302s y/OM6LO9hv1okbEroRpC0hHIR1pUSt/2yzN5yiQqqihyu1H+llKtG4xk7bNI8RMM 302s fP8nT/W8nkOswxK4+DeGllQzCTlx+s/7pTrjqxQlvyfRReMXR3HgvDRxrkDXrpAO 302s CHCixjX72D6iA+yYtC64pZvUsRb71sQI3trh0UjuT2vkQPD+gZSwWPjdjDySMPcb 302s Vt18vzR0E+7VSD4i66VaUHX2DBUYiSp0dWjTh0T0t6HKNzTKOm9eQmK7KX8Lgbx1 302s JP3iq1yqnbcKT4KirHySDYpiYCeiBTTXx4arV2NdTzikJ40EJu7PERFyo6yaXf0p 302s F4ZTHLj1E2pqHcoci5EPvVxZXfYcYQ4qtoLrUYk1oUw7Ny9RH+5yHGRAumniYqdP 302s T2yD6NP7dtvj8+mV+2OJ3Kp6/dfjooCN1e9EooEy+GcwnqVguV/kqQ0/5ya+b+P3 302s BoJdy+wJ1lta+SCgC+46nhfDXL2XOi+DqJnQ87aSCGaUOOxqpJLoEg/MNMM5PsYR 302s wpCd+G1K7DFxDUcml4YwqOyCoBzMNzhVm8X/Dq3ZMwHfO+drL3iFEKaGstdenHha 302s EEVlO8y88wfnLH9GhyoTAFt1EEcM6OoBL1D20N7Uy9+shX8V2pdX1qqBU7qQfDyI 302s Uelk2pzPslovrb2DkhjO+9llMuAp1J9neXQREFL3nSV2raYfmtPnpYeOWMGwiIhZ 302s Cr4bo6Hn6OWvrqQWnqibqaU4XOdik9cgo/CXEjayLBpyUPMemXQmG3aiBmTKx6LH 302s 0MP4gvz5j2dE6Qd5QSKpvozJWC3Ey9v0W9LjEf5kUwO5LYSobeIDxfoDwzQcjNBJ 302s QYi62QxhgqGjOiVa0p2fSQzSjiRxyFN1VoXW9JBhphE+59dr3h+xQmm5yYdlM3L/ 302s DhtPOI61ea8w8DExQP0zrV0CFmidvPvutKUMs/CwPUnoRTOeQXM1hDkzIQ+H2BL6 302s uHLJUYVEMq5iP78xwAeNWVJi1wFBH67F0jYbDvI6DR9Mx98I6IJnaePA0KENBnQt 302s XIx/xsEvdFdAbh6cKaNSoxsGTuNqIPtIMDcBJztsaKIskG7L/qdko1OX4GopQ9vv 302s NYwIRtTaQx3rniXnnbvCdZtJHGjMLXEBp7D1p2VonXZy/SeqpON5QLsQszWEG56i 302s 8pXzo/LJyH0UF3K8Ju7zW4o/Lle72il/f8Y1Tv3RyoGY0ZPgywKF300e2u2nwtVl 302s Nh4Yo0QgBZZ6hRiRoKMjB/Uo2BrLYfaZzvAaKCw3dD7lp6E0H8CsTBYCJZvl/QUJ 302s iMGY5FcCn9LRQVpwQr8HD0jR4kzmd4XiPUsR38OIVBvp980lqcDsWpcJedq7lXXQ 302s wREN3HUb76uZLmM3qISOfaxYqVd4/+2roGOh323X5cDIT9LqKWYRBTcgnbt0Lm5Q 302s 15sd4kXOp9ekQjQhEAEdjxp3MF0G1m8TJxXRANlMGVYf7X3Rge9b5LqCw1xZyJEc 302s Uo5uUST+r9F1VebeEMuEB2V7mOmnA5XXvoeDb8YtlAg+mX0IU64JdFUNnop2ya9/ 302s PcoKMfgPxVzT+9PC5Mi98NFBuXgeqhRJ1jjOpFsEJk86OWkiaRQrmJ4sPCjx/LxO 302s 3WI1UiLduNF8nzc3Igc09mp7P2BbiJKhNUBUu6wPJlLUv0kxUVH/AgL9CiZpKeob 302s r8k2FmmWWxxDZDSFOlpAfgzuuQClFyE3WknJtl5ZRTad7mnrAkK9/mzLzA29lK7Z 302s PBv6bB+cIN+F6SuK1rx77XYedbMLkZ5JYXtyLsAVI4XVwztmtmCg+GdhGNCXrJMN 302s 8YKK3fdvGYatERtZkDpSIVh+ZBJRLXRx/MkZozx0gzSg/SAKO4KCp+TZG9Lyhq9Y 302s Cf/lvqsNruKVsis3hWk= 302s -----END ENCRYPTED PRIVATE KEY----- 302s |<9>| salt.size: 8 302s |<9>| iterationCount: 2048 302s Generating a PKCS #12 structure... 302s Loading private key list... 302s Loaded 1 private keys. 302s SUCCESS [44]../../tests/cert-tests/pkcs12.sh 302s running [45]../../tests/cert-tests/pkcs7-broken-sigs.sh ... 302s Warning: MD5 is broken, and should not be used any more for digital signatures. 302s eContent Type: 1.2.840.113549.1.7.1 302s Signers: 302s Signer's issuer DN: CN=GnuTLS Test CA 302s Signer's serial: 4de0b4ca 302s Signature Algorithm: RSA-MD5 302s 302s eContent Type: 1.2.840.113549.1.7.1 302s Signers: 302s Signer's issuer DN: CN=GnuTLS Test CA 302s Signer's serial: 4de0b4ca 302s Signature Algorithm: RSA-MD5 302s 302s SUCCESS [45]../../tests/cert-tests/pkcs7-broken-sigs.sh 302s running [46]../../tests/cert-tests/pkcs7-cat.sh ... 302s Signature status: verification failed: One of the involved algorithms has insufficient security level. 302s Signature status: ok 302s eContent Type: 1.3.6.1.4.1.311.10.1 302s Signers: 302s Signer's issuer DN: CN=Microsoft Windows Hardware Compatibility PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=US 302s Signer's serial: 330000001e258e7c4251c5d1fa00010000001e 302s Signature Algorithm: RSA-SHA1 302s 302s SUCCESS [46]../../tests/cert-tests/pkcs7-cat.sh 302s running [47]../../tests/cert-tests/pkcs7-constraints.sh ... 302s Loaded CAs (1 available) 302s Signature status: ok 302s test: signing 302s 302s test: signing-verify-no-purpose 302s Loaded CAs (1 available) 302s Signature status: ok 302s eContent Type: 1.2.840.113549.1.7.1 302s Signers: 302s Signer's issuer DN: CN=CA-0 302s Signer's serial: 5805d9f803a4ec9c60cf71bc 302s Signature Algorithm: RSA-SHA256 302s 302s Loaded CAs (1 available) 302s Signature status: ok 302s Loaded CAs (1 available) 302s 302s test: signing-verify-valid-purpose 302s eContent Type: 1.2.840.113549.1.7.1 302s Signers: 302s Signer's issuer DN: CN=CA-0 302s Signer's serial: 5805d9f803a4ec9c60cf71bc 302s Signature Algorithm: RSA-SHA256 302s 302s 302s test: signing-verify-invalid-purpose 302s Signature status: verification failed: Public key signature verification has failed. 302s Loaded CAs (1 available) 302s Signature status: verification failed: Public key signature verification has failed. 302s Loaded CAs (1 available) 302s Signature status: verification failed: Public key signature verification has failed. 302s eContent Type: 1.2.840.113549.1.7.1 302s Signers: 302s Signer's issuer DN: CN=CA-0 302s Signer's serial: 5805d9f803a4ec9c60cf71bc 302s Signature Algorithm: RSA-SHA256 302s 302s 302s test: signing-verify-invalid-date-1 302s eContent Type: 1.2.840.113549.1.7.1 302s Signers: 302s Signer's issuer DN: CN=CA-0 302s Signer's serial: 5805d9f803a4ec9c60cf71bc 302s Signature Algorithm: RSA-SHA256 302s 302s 302s test: signing-verify-invalid-date-2 302s eContent Type: 1.2.840.113549.1.7.1 302s Signers: 302s Signer's issuer DN: CN=CA-0 302s Signer's serial: 5805d9f803a4ec9c60cf71bc 302s Signature Algorithm: RSA-SHA256 302s 302s SUCCESS [47]../../tests/cert-tests/pkcs7-constraints.sh 302s running [48]../../tests/cert-tests/pkcs7-constraints2.sh ... 302s test: signing 302s 302s test: signing-verify-no-purpose 302s Signature status: ok 302s eContent Type: 1.2.840.113549.1.7.1 302s Signers: 302s Signer's issuer DN: CN=CA-0 302s Signer's serial: 5805d9f803a4ec9c60cf71bc 302s Signature Algorithm: RSA-SHA256 302s 302s Signature status: ok 302s Signature status: verification failed: Some constraint limits were reached. 302s 302s test: signing-verify-valid-purpose 302s eContent Type: 1.2.840.113549.1.7.1 302s Signers: 302s Signer's issuer DN: CN=CA-0 302s Signer's serial: 5805d9f803a4ec9c60cf71bc 302s Signature Algorithm: RSA-SHA256 302s 302s 302s test: signing-verify-invalid-purpose 302s Signature status: verification failed: The certificate is not yet activated. 302s Signature status: verification failed: The session or certificate has expired. 302s eContent Type: 1.2.840.113549.1.7.1 302s Signers: 302s Signer's issuer DN: CN=CA-0 302s Signer's serial: 5805d9f803a4ec9c60cf71bc 302s Signature Algorithm: RSA-SHA256 302s 302s 302s test: signing-verify-invalid-date-1 302s eContent Type: 1.2.840.113549.1.7.1 302s Signers: 302s Signer's issuer DN: CN=CA-0 302s Signer's serial: 5805d9f803a4ec9c60cf71bc 302s Signature Algorithm: RSA-SHA256 302s 302s 302s test: signing-verify-invalid-date-2 302s eContent Type: 1.2.840.113549.1.7.1 302s Signers: 302s Signer's issuer DN: CN=CA-0 302s Signer's serial: 5805d9f803a4ec9c60cf71bc 302s Signature Algorithm: RSA-SHA256 302s 302s SUCCESS [48]../../tests/cert-tests/pkcs7-constraints2.sh 302s running [49]../../tests/cert-tests/pkcs7-eddsa.sh ... 302s Signature status: ok 302s Signature status: ok 302s Signature status: ok 302s Signature status: ok 302s eContent Type: 1.2.840.113549.1.7.1 302s Signers: 302s Signer's issuer DN: CN=GnuTLS certificate authority,ST=Leuven,OU=GnuTLS certificate authority,O=GnuTLS,C=BE 302s Signer's serial: 59365ab105863551 302s Signature Algorithm: EdDSA-Ed25519 302s 302s eContent Type: 1.2.840.113549.1.7.1 302s Signers: 302s Signer's issuer DN: CN=GnuTLS certificate authority,ST=Leuven,OU=GnuTLS certificate authority,O=GnuTLS,C=BE 302s Signer's serial: 59365ab105863551 302s Signature Algorithm: EdDSA-Ed25519 302s 302s eContent Type: 1.2.840.113549.1.7.1 302s Signers: 302s Signer's issuer DN: CN=GnuTLS certificate authority,ST=Leuven,OU=GnuTLS certificate authority,O=GnuTLS,C=BE 302s Signer's serial: 59365ab105863551 302s Signing time: Thu Feb 20 21:26:51 UTC 2025 302s Signature Algorithm: EdDSA-Ed25519 302s 302s SUCCESS [49]../../tests/cert-tests/pkcs7-eddsa.sh 302s running [50]../../tests/cert-tests/pkcs7-list-sign.sh ... 302s Loaded CAs (1 available) 302s Signature status: ok 302s eContent Type: 1.2.840.113549.1.7.1 302s Signers: 302s Signer's issuer DN: CN=CA-1 302s Signer's serial: 59155c6808a0431a4730b125 302s Signature Algorithm: RSA-SHA256 302s 302s SUCCESS [50]../../tests/cert-tests/pkcs7-list-sign.sh 302s Loaded CAs (1 available) 302s Signature status: ok 302s running [51]../../tests/cert-tests/pkcs7.sh ... 302s Loaded CAs (1 available) 302s Signature status: verification failed: Public key signature verification has failed. 302s Loaded CAs (1 available) 302s Signature status: verification failed: Public key signature verification has failed. 302s Loaded CAs (1 available) 302s Signature status: verification failed: Public key signature verification has failed. 302s Loaded CAs (1 available) 302s Signature status: ok 302s Loaded CAs (1 available) 302s Signature status: verification failed: Public key signature verification has failed. 302s Loaded CAs (1 available) 302s Signature status: verification failed: Public key signature verification has failed. 302s Loaded CAs (1 available) 302s Signature status: verification failed: Public key signature verification has failed. 302s Loaded CAs (1 available) 302s Signature status: ok 302s Loaded CAs (1 available) 302s Signature status: verification failed: Public key signature verification has failed. 302s Loaded CAs (1 available) 302s Signature status: verification failed: Public key signature verification has failed. 302s Loaded CAs (1 available) 302s Signature status: verification failed: Public key signature verification has failed. 302s Loaded CAs (1 available) 302s Signature status: ok 302s Loaded CAs (1 available) 302s Signature status: ok 302s Loaded CAs (1 available) 302s Signature status: verification failed: Public key signature verification has failed. 302s eContent Type: 1.2.840.113549.1.7.1 302s Signers: 302s Signer's issuer DN: CN=GnuTLS Test CA 302s Signer's serial: 4de0b4ca 302s Signing time: Tue Jun 02 06:59:45 UTC 2015 302s Signature Algorithm: RSA-SHA256 302s 302s eContent Type: 1.2.840.113549.1.7.1 302s Signers: 302s Signer's issuer DN: CN=GnuTLS Test CA 302s Signer's serial: 4de0b4ca 302s Signing time: Tue Jun 02 06:59:45 UTC 2015 302s Signature Algorithm: RSA-SHA256 302s 302s Loaded CAs (1 available) 302s Signature status: verification failed: There are no embedded data in the structure. 302s Loaded CAs (1 available) 302s Signature status: ok 302s eContent Type: 1.2.840.113549.1.7.1 302s Signers: 302s Signer's issuer DN: CN=GnuTLS Test CA 302s Signer's serial: 4de0b4ca 302s Signature Algorithm: RSA-SHA256 302s 302s eContent Type: 1.2.840.113549.1.7.1 302s Signers: 302s Signer's issuer DN: CN=GnuTLS Test CA 302s Signer's serial: 4de0b4ca 302s Signature Algorithm: RSA-SHA256 302s 302s Signature status: ok 302s Signature status: ok 302s Signature status: ok 302s Warning: MD5 is broken, and should not be used any more for digital signatures. 302s eContent Type: 1.2.840.113549.1.7.1 302s Signers: 302s Signer's issuer DN: CN=GnuTLS Test CA 302s Signer's serial: 4de0b4ca 302s Signature Algorithm: RSA-MD5 302s 302s Signature status: verification failed: One of the involved algorithms has insufficient security level. 302s eContent Type: 1.2.840.113549.1.7.1 302s Signers: 302s Signer's issuer DN: CN=GnuTLS Test CA 302s Signer's serial: 4de0b4ca 302s Signing time: Thu Feb 20 21:26:51 UTC 2025 302s Signature Algorithm: RSA-SHA256 302s 302s Signature status: ok 302s eContent Type: 1.2.840.113549.1.7.1 302s Signers: 302s Signer's issuer DN: CN=GnuTLS Test CA 302s Signer's serial: 59897b84004ff2ed 302s Signature Algorithm: RSA-PSS-SHA256 302s 302s Signature status: ok 302s Loaded CAs (1 available) 302s Signature status: ok 302s eContent Type: 1.2.840.113549.1.7.1 302s Signers: 302s Signer's issuer DN: CN=CarlRSA 302s Signer's serial: 46346bc7800056bc11d36e2ec410b3b0 302s Signature Algorithm: RSA-SHA1 302s 302s eContent Type: 1.2.840.113549.1.7.1 302s Signers: 302s Signer's issuer DN: CN=GnuTLS Test CA 302s Signer's serial: 583cfd8e18750e00 302s Signature Algorithm: GOSTR341001 302s 302s Signature status: verification failed: One of the involved algorithms has insufficient security level. 302s eContent Type: 1.2.840.113549.1.7.1 302s Signers: 302s Signer's issuer DN: CN=GnuTLS Test CA 302s Signer's serial: 583cfd8e18750e00 302s Signature Algorithm: GOSTR341001 302s 302s Signature status: ok 302s SUCCESS [51]../../tests/cert-tests/pkcs7.sh 302s running [52]../../tests/cert-tests/pkcs8-decode.sh ... 302s PKCS #8 information: 302s Cipher: DES-CBC 302s Schema: PBES1-DES-CBC-MD5 (1.2.840.113549.1.5.3) 302s Salt: 302s Salt size: 0 302s Iteration count: 2048 302s 302s Public Key Info: 302s Public Key Algorithm: RSA 302s Key Security Level: Medium (2432 bits) 302s 302s modulus: 302s 00:ab:54:98:fc:a9:c6:15:95:9d:a6:c1:94:84:94:91 302s 79:1e:78:db:2d:48:51:99:65:01:02:c0:40:52:49:5d 302s eb:70:bc:26:ef:68:39:1e:04:91:e2:db:cb:6f:93:40 302s 45:1e:22:8e:71:5a:58:89:28:79:5e:1a:32:25:3e:8b 302s 9d:3b:34:7f:19:f8:d0:2f:37:b7:62:32:b7:53:a5:43 302s 2c:c5:5d:ec:ac:f9:35:fa:14:2b:34:66:f1:d6:a7:a1 302s d0:83:9a:56:f4:19:83:bc:bf:11:74:30:2d:a8:28:5b 302s a2:ab:7a:c6:cd:9c:5c:f8:51:e9:a9:0c:48:db:71:bb 302s b1:34:77:f7:ee:de:5d:78:c0:48:0a:37:0d:65:1e:3b 302s 2b:14:03:89:72:f2:52:ed:5f:00:c5:06:60:ea:80:20 302s d0:43:ec:66:bc:d2:26:db:f0:29:3e:6a:f9:62:20:be 302s 58:26:44:ba:d7:8c:6f:76:a6:05:20:e4:98:b7:c4:72 302s 7a:5d:df:4f:0d:23:ec:2e:9c:71:ec:30:f9:14:5f:c8 302s 75:0b:ab:67:f6:7d:fb:4d:76:64:4a:a5:d5:fa:b4:08 302s 50:9d:13:c7:8f:c2:79:b0:b4:3e:2f:89:d3:33:27:4d 302s 9f:8b:d3:60:24:07:ab:b2:72:3d:29:a5:c4:4a:ec:3c 302s 04:d2:49:3e:26:1b:ec:7a:10:3d:ca:45:5a:80:8b:4d 302s 2a:96:63:4f:2d:63:28:0f:3b:47:47:ca:7c:2c:15:41 302s 32:d5:e0:c9:be:a5:55:2c:b3:6b:46:2a:56:b1:1b:ed 302s 29: 302s 302s public exponent: 302s 01:00:01: 302s 302s private exponent: 302s 5d:97:20:db:24:82:a8:57:ca:7e:c5:50:33:fc:54:5b 302s 2d:62:27:98:5c:e0:f6:42:4e:83:0a:32:18:c1:2b:24 302s e9:b8:5e:2c:79:6a:7a:13:54:fd:ef:c2:f9:78:1e:ab 302s a3:02:8d:7d:2e:35:1e:f7:95:14:ea:8a:69:fd:f8:96 302s 33:39:42:15:15:ed:e3:5d:34:37:d8:2c:7c:ec:d1:fd 302s 2a:f3:5b:ce:41:74:52:df:a1:9a:46:81:e5:18:3d:34 302s 82:2f:55:40:92:8f:7c:13:83:9d:4c:94:24:3f:a7:8e 302s fc:cd:5c:bc:04:a6:64:9f:9a:5c:55:f1:96:ae:52:31 302s 42:d0:26:07:be:40:a1:2d:a8:2c:ac:56:0c:de:ae:c3 302s a1:73:2d:2a:35:65:47:74:b0:9b:70:b9:d8:ad:12:74 302s 50:b3:00:fb:86:72:d5:00:e8:02:b2:d1:e3:d5:87:3f 302s cc:b6:f3:26:fe:25:c1:b5:59:bd:e0:c9:fa:d9:ba:47 302s f8:43:ea:af:cf:4d:92:ae:db:9d:11:49:ec:50:33:2a 302s b6:44:40:ac:06:c7:f6:64:2e:42:25:81:20:d5:f6:76 302s 79:b9:fb:bd:d2:c5:5d:f7:28:16:9d:cc:13:cd:d9:55 302s e3:ca:c7:d2:38:f1:92:32:d6:ba:db:73:b6:dc:b6:5f 302s 66:89:e3:4c:9e:d6:b8:d2:01:ee:a8:d2:69:64:dd:5c 302s 1a:7e:4c:e4:1d:5b:37:94:29:3c:93:3d:43:bb:33:8f 302s 10:23:14:12:b0:33:24:58:c3:ae:97:4c:3d:c5:c1:81 302s 302s 302s prime1: 302s 00:c1:9c:0d:4e:aa:1b:2e:c4:14:e6:78:ed:0b:76:90 302s af:da:3d:5e:15:6f:7d:9c:97:4d:71:a3:1d:6a:47:94 302s 25:20:9d:98:f4:d0:3b:d6:be:be:12:39:e7:d7:82:3d 302s 54:3d:f7:76:06:e2:ac:5d:e6:1f:34:fd:bc:9d:9c:8b 302s f5:4f:83:89:8f:79:ea:9e:5e:a5:5c:e9:b4:71:ae:59 302s 43:ff:ec:03:f6:57:3c:d6:33:0b:ba:4d:39:3f:90:62 302s b2:4f:af:e0:21:7a:5a:0f:93:f4:fc:5f:ba:29:b9:af 302s 67:18:3f:0e:23:3d:de:d9:bc:47:ad:de:56:11:d1:e3 302s c0:7e:29:bb:67:ac:1b:6a:af:5a:30:19:0c:14:49:af 302s db:1a:82:10:60:e1:d1:98:dd: 302s 302s prime2: 302s 00:e2:8a:9d:80:b5:29:33:06:44:d2:e3:77:bd:34:3e 302s c0:df:98:cc:ab:f3:ba:73:3c:19:5c:d8:ed:c8:22:bc 302s b9:8f:4f:1a:d8:0d:08:e2:e2:ca:e8:3c:13:aa:23:1b 302s 3d:75:d4:7c:e2:4e:cd:ca:d0:fc:b7:77:70:57:54:e1 302s 1c:22:a2:3e:0f:a7:59:c0:5a:4f:b1:e8:62:55:85:07 302s 7d:03:a4:8f:82:eb:2d:21:fc:cb:d5:b7:3c:77:a5:9d 302s 67:a6:ab:95:5d:1e:d3:a3:49:78:9b:75:2c:07:e9:bd 302s ba:0f:66:69:7e:2e:50:2f:76:5f:e9:28:f8:e1:c9:ce 302s 77:4a:48:ee:92:d1:d5:dc:29:2f:3f:29:7a:12:b0:d6 302s f9:8d:68:e4:82:45:ec:3a:bd: 302s 302s coefficient: 302s 00:82:d2:e4:3b:e3:aa:9e:99:75:0d:73:e4:e9:38:f5 302s 5e:73:e4:c2:3a:24:55:4e:ea:58:f7:2a:f2:0f:ff:42 302s d7:e2:ef:49:d2:25:8d:86:02:a7:2b:c9:45:1e:ee:a0 302s 1c:60:58:3e:4c:bb:40:99:42:20:ff:c7:3f:4e:68:8c 302s 8b:f4:e8:41:fe:f4:79:00:a4:7e:64:67:95:8e:bf:c3 302s 45:28:dc:da:57:b9:aa:20:ac:66:b0:c8:11:b2:9a:c2 302s 60:ac:24:32:7f:17:e4:6c:dc:24:43:56:22:50:86:29 302s a7:38:fb:4e:8c:e1:9a:c8:42:a4:59:ab:49:32:bd:0b 302s 65:30:37:06:95:29:63:88:09:11:0b:0a:f3:34:82:f6 302s 54:68:cc:71:e9:ea:9f:48:0f: 302s 302s exp1: 302s 78:8e:dc:b6:74:34:32:fd:c4:69:f3:38:e0:1f:77:5f 302s 19:4d:87:4d:5f:bc:5f:0a:d4:1d:83:cd:a8:45:64:19 302s 6e:62:d4:40:f5:7d:9d:6d:ee:db:58:95:66:5b:e2:26 302s 97:e3:84:ea:2a:b1:dc:52:94:72:21:e2:16:5e:c9:c3 302s fa:3c:55:27:33:6a:86:2d:37:59:50:e9:9c:b4:4d:3f 302s 8b:98:02:ab:9d:8c:f3:70:9b:c7:e9:98:51:5d:6e:27 302s cc:79:1e:de:99:da:84:c2:c4:15:76:e2:6c:63:04:b6 302s f4:a1:27:03:88:de:40:c4:fd:f9:65:6e:40:f0:6a:9a 302s 8d:b5:1c:ce:24:9c:79:e5:31:0a:ac:3e:1a:4f:fc:22 302s 3a:32:6d:52:76:ab:56:3d: 302s 302s exp2: 302s 00:9b:74:5b:58:72:f8:6e:97:22:ab:44:84:6a:45:6b 302s ba:96:b5:17:dd:f7:46:3e:c5:42:f2:3f:ba:0b:d8:2a 302s 81:7b:21:e1:5d:d8:b3:fc:5d:7c:b7:98:62:36:22:19 302s 13:37:c4:34:5e:67:8d:38:5b:e8:cf:4d:1a:be:12:f4 302s d6:85:bd:a7:b0:be:3a:0c:90:ec:97:3c:cc:1d:bb:47 302s c4:35:b7:ba:f3:2f:c6:ac:c7:f8:68:13:71:5e:f9:3a 302s e6:61:ac:e4:b6:1d:ed:44:e3:a9:eb:a3:a0:2f:5d:ea 302s 5f:bf:29:9b:c2:86:ad:67:a4:67:74:6c:35:3d:5b:6a 302s 5e:d9:8e:ea:87:bd:8e:6f:a1:a3:56:48:74:08:57:69 302s 6d:9d:e8:18:c6:7c:8c:fa:51: 302s 302s 302s Public Key PIN: 302s pin-sha256:RMtdrzhWeBv9f9dYGAe/lLVF+1Dgh65nQzCDUl9tWHU= 302s Public Key ID: 302s sha256:44cb5daf3856781bfd7fd7581807bf94b545fb50e087ae67433083525f6d5875 302s sha1:8b01094b3b91ece321b91dec8d6b4c5d9e40805e 302s 302s -----BEGIN RSA PRIVATE KEY----- 302s MIIFfAIBAAKCATEAq1SY/KnGFZWdpsGUhJSReR542y1IUZllAQLAQFJJXetwvCbv 302s aDkeBJHi28tvk0BFHiKOcVpYiSh5XhoyJT6LnTs0fxn40C83t2Iyt1OlQyzFXeys 302s +TX6FCs0ZvHWp6HQg5pW9BmDvL8RdDAtqChboqt6xs2cXPhR6akMSNtxu7E0d/fu 302s 3l14wEgKNw1lHjsrFAOJcvJS7V8AxQZg6oAg0EPsZrzSJtvwKT5q+WIgvlgmRLrX 302s jG92pgUg5Ji3xHJ6Xd9PDSPsLpxx7DD5FF/IdQurZ/Z9+012ZEql1fq0CFCdE8eP 302s wnmwtD4vidMzJ02fi9NgJAersnI9KaXESuw8BNJJPiYb7HoQPcpFWoCLTSqWY08t 302s YygPO0dHynwsFUEy1eDJvqVVLLNrRipWsRvtKQIDAQABAoIBMF2XINskgqhXyn7F 302s UDP8VFstYieYXOD2Qk6DCjIYwSsk6bheLHlqehNU/e/C+Xgeq6MCjX0uNR73lRTq 302s imn9+JYzOUIVFe3jXTQ32Cx87NH9KvNbzkF0Ut+hmkaB5Rg9NIIvVUCSj3wTg51M 302s lCQ/p478zVy8BKZkn5pcVfGWrlIxQtAmB75AoS2oLKxWDN6uw6FzLSo1ZUd0sJtw 302s uditEnRQswD7hnLVAOgCstHj1Yc/zLbzJv4lwbVZveDJ+tm6R/hD6q/PTZKu250R 302s SexQMyq2RECsBsf2ZC5CJYEg1fZ2ebn7vdLFXfcoFp3ME83ZVePKx9I48ZIy1rrb 302s c7bctl9mieNMnta40gHuqNJpZN1cGn5M5B1bN5QpPJM9Q7szjxAjFBKwMyRYw66X 302s TD3FwYECgZkAwZwNTqobLsQU5njtC3aQr9o9XhVvfZyXTXGjHWpHlCUgnZj00DvW 302s vr4SOefXgj1UPfd2BuKsXeYfNP28nZyL9U+DiY956p5epVzptHGuWUP/7AP2VzzW 302s Mwu6TTk/kGKyT6/gIXpaD5P0/F+6KbmvZxg/DiM93tm8R63eVhHR48B+KbtnrBtq 302s r1owGQwUSa/bGoIQYOHRmN0CgZkA4oqdgLUpMwZE0uN3vTQ+wN+YzKvzunM8GVzY 302s 7cgivLmPTxrYDQji4sroPBOqIxs9ddR84k7NytD8t3dwV1ThHCKiPg+nWcBaT7Ho 302s YlWFB30DpI+C6y0h/MvVtzx3pZ1npquVXR7To0l4m3UsB+m9ug9maX4uUC92X+ko 302s +OHJzndKSO6S0dXcKS8/KXoSsNb5jWjkgkXsOr0CgZh4jty2dDQy/cRp8zjgH3df 302s GU2HTV+8XwrUHYPNqEVkGW5i1ED1fZ1t7ttYlWZb4iaX44TqKrHcUpRyIeIWXsnD 302s +jxVJzNqhi03WVDpnLRNP4uYAqudjPNwm8fpmFFdbifMeR7emdqEwsQVduJsYwS2 302s 9KEnA4jeQMT9+WVuQPBqmo21HM4knHnlMQqsPhpP/CI6Mm1SdqtWPQKBmQCbdFtY 302s cvhulyKrRIRqRWu6lrUX3fdGPsVC8j+6C9gqgXsh4V3Ys/xdfLeYYjYiGRM3xDRe 302s Z404W+jPTRq+EvTWhb2nsL46DJDslzzMHbtHxDW3uvMvxqzH+GgTcV75OuZhrOS2 302s He1E46nro6AvXepfvymbwoatZ6RndGw1PVtqXtmO6oe9jm+ho1ZIdAhXaW2d6BjG 302s fIz6UQKBmQCC0uQ746qemXUNc+TpOPVec+TCOiRVTupY9yryD/9C1+LvSdIljYYC 302s pyvJRR7uoBxgWD5Mu0CZQiD/xz9OaIyL9OhB/vR5AKR+ZGeVjr/DRSjc2le5qiCs 302s ZrDIEbKawmCsJDJ/F+Rs3CRDViJQhimnOPtOjOGayEKkWatJMr0LZTA3BpUpY4gJ 302s EQsK8zSC9lRozHHp6p9IDw== 302s -----END RSA PRIVATE KEY----- 302s PKCS8 OK pkcs8-pbes1-des-md5.pem password 302s PKCS #8 information: 302s Cipher: 3DES-CBC 302s Schema: PKCS12-3DES-SHA1 (1.2.840.113549.1.12.1.3) 302s Salt: 72b4334f90b842fd 302s Salt size: 8 302s Iteration count: 290 302s 302s Public Key Info: 302s Public Key Algorithm: RSA 302s Key Security Level: Low (1024 bits) 302s 302s modulus: 302s 00:be:ec:64:d6:db:57:60:ac:2f:d4:c9:71:14:56:41 302s b9:bd:7f:5c:56:55:8e:ce:60:87:95:c7:98:07:37:6a 302s 7f:e5:b1:9f:95:b3:5c:a3:58:ea:5c:8a:bd:7a:e0:51 302s d4:9c:d2:f1:e4:59:69:a1:ae:94:54:60:3c:14:b2:78 302s 66:4a:0e:41:4e:bc:89:13:ac:b6:20:36:26:98:55:25 302s e1:7a:60:06:11:b0:28:54:2d:d0:56:2a:ad:78:7f:b4 302s f1:65:0a:a3:18:cd:cf:f7:51:e1:b1:87:cb:f6:78:5f 302s be:16:4e:98:09:49:1b:95:dd:68:48:05:67:c9:9b:1a 302s 57: 302s 302s public exponent: 302s 01:00:01: 302s 302s private exponent: 302s 0c:fe:31:6e:9d:c6:b8:81:7f:4f:cf:d5:ae:38:a0:88 302s 6f:68:f7:73:b8:a6:db:4c:9e:6d:87:03:c5:99:f3:d9 302s 78:5c:3a:2c:09:e4:c8:09:09:09:fb:37:21:e1:9a:30 302s 09:ec:21:22:15:23:a7:29:26:57:07:a5:8f:13:06:36 302s 71:c4:2a:40:96:ca:d3:78:ef:25:10:cb:59:e2:30:71 302s 48:9d:88:93:ac:49:34:dd:14:9f:34:f2:d0:94:be:a5 302s 7f:1c:80:27:c3:a7:72:48:ac:9b:91:21:87:37:d0:c3 302s c3:df:a7:d7:82:9e:69:77:cf:7d:99:56:88:c8:6c:81 302s 302s 302s prime1: 302s 00:db:12:2a:c8:57:b2:c0:43:7d:76:16:da:a9:8e:59 302s 7b:b7:5c:a9:ad:3a:47:a7:0b:ec:10:c1:00:36:03:32 302s 87:94:b2:25:c8:e3:ee:e6:ff:d3:fd:6d:22:53:d2:8e 302s 07:1f:e2:7d:62:9a:b0:72:fa:a1:43:77:ce:61:18:cb 302s 67: 302s 302s prime2: 302s 00:df:1b:8a:a8:50:6f:cb:bb:b9:d0:02:57:f2:97:5e 302s 38:b3:3d:26:98:fd:0f:37:e8:2d:7e:f3:8c:56:f2:1b 302s 6c:ed:63:c8:25:38:37:82:a7:11:5c:fc:c0:93:30:09 302s 87:db:d2:85:3b:51:8d:1c:8f:26:38:2a:2d:25:86:d3 302s 91: 302s 302s coefficient: 302s 13:6b:7b:1a:fa:c6:e6:27:9f:71:b2:42:17:b7:08:34 302s 85:a5:e8:27:d1:56:02:46:09:da:e3:9d:48:a6:bd:b5 302s 5a:f2:f0:62:cc:4a:3b:07:74:34:e6:ff:fa:d5:fa:a2 302s 9a:2b:5d:ba:2b:ed:3e:46:21:e4:78:c0:97:cc:fe:7f 302s 302s 302s exp1: 302s 00:be:18:ac:a1:3e:60:71:2f:df:5d:aa:85:42:1e:b1 302s 0d:86:d6:54:b2:69:e1:25:56:56:19:4f:b0:c4:2d:d0 302s 1a:10:70:ea:12:c1:9f:5c:39:e0:95:87:af:02:f7:b1 302s a1:03:0d:01:6a:9f:fa:bf:3b:36:d6:99:ce:af:38:d9 302s bf: 302s 302s exp2: 302s 71:aa:89:78:f9:0a:0c:05:07:44:b7:7c:f1:26:37:25 302s b2:03:ac:9f:73:06:06:d8:ae:1d:28:9d:ce:4a:28:b8 302s d5:34:e9:ea:34:7a:eb:80:8c:73:10:7e:58:3e:b8:0c 302s 54:6d:2b:dd:ad:cd:b3:c8:26:93:a4:c1:3d:86:34:51 302s 302s 302s 302s Public Key PIN: 302s pin-sha256:H0cGsuW/UFNbYVTMRF//JJ+6BkFvLzRkApkX+jR5hqI= 302s Public Key ID: 302s sha256:1f4706b2e5bf50535b6154cc445fff249fba06416f2f3464029917fa347986a2 302s sha1:6f9d79ae5a4b780578320543aa80b17bcc4b7d8c 302s 302s -----BEGIN RSA PRIVATE KEY----- 302s MIICXAIBAAKBgQC+7GTW21dgrC/UyXEUVkG5vX9cVlWOzmCHlceYBzdqf+Wxn5Wz 302s XKNY6lyKvXrgUdSc0vHkWWmhrpRUYDwUsnhmSg5BTryJE6y2IDYmmFUl4XpgBhGw 302s KFQt0FYqrXh/tPFlCqMYzc/3UeGxh8v2eF++Fk6YCUkbld1oSAVnyZsaVwIDAQAB 302s AoGADP4xbp3GuIF/T8/VrjigiG9o93O4pttMnm2HA8WZ89l4XDosCeTICQkJ+zch 302s 4ZowCewhIhUjpykmVweljxMGNnHEKkCWytN47yUQy1niMHFInYiTrEk03RSfNPLQ 302s lL6lfxyAJ8Onckism5EhhzfQw8Pfp9eCnml3z32ZVojIbIECQQDbEirIV7LAQ312 302s Ftqpjll7t1yprTpHpwvsEMEANgMyh5SyJcjj7ub/0/1tIlPSjgcf4n1imrBy+qFD 302s d85hGMtnAkEA3xuKqFBvy7u50AJX8pdeOLM9Jpj9DzfoLX7zjFbyG2ztY8glODeC 302s pxFc/MCTMAmH29KFO1GNHI8mOCotJYbTkQJBAL4YrKE+YHEv312qhUIesQ2G1lSy 302s aeElVlYZT7DELdAaEHDqEsGfXDnglYevAvexoQMNAWqf+r87NtaZzq842b8CQHGq 302s iXj5CgwFB0S3fPEmNyWyA6yfcwYG2K4dKJ3OSii41TTp6jR664CMcxB+WD64DFRt 302s K92tzbPIJpOkwT2GNFECQBNrexr6xuYnn3GyQhe3CDSFpegn0VYCRgna451Ipr21 302s WvLwYsxKOwd0NOb/+tX6oporXbor7T5GIeR4wJfM/n8= 302s -----END RSA PRIVATE KEY----- 302s PKCS8 OK encpkcs8.pem foobar 302s Encrypted structure detected... 302s Encrypted structure detected... 302s Public Key Info: 302s Public Key Algorithm: RSA 302s Key Security Level: Low (1024 bits) 302s 302s modulus: 302s 00:bb:24:7a:09:7e:0e:b2:37:32:cc:39:67:ad:f1:9e 302s 3d:6b:82:83:d1:d0:ac:a4:c0:18:be:8d:98:00:c0:7b 302s ff:07:44:c9:ca:1c:ba:36:e1:27:69:ff:b1:e3:8d:8b 302s ee:57:a9:3a:aa:16:43:39:54:19:7c:ae:69:24:14:f6 302s 64:ff:bc:74:c6:67:6c:4c:f1:02:49:69:c7:2b:e1:e1 302s a1:a3:43:14:f4:77:8f:c8:d0:85:5a:35:95:ac:62:a9 302s c1:21:00:77:a0:8b:97:30:b4:5a:2c:b8:90:2f:48:a0 302s 05:28:4b:f2:0f:8d:ec:8b:4d:03:42:75:d6:ad:81:c0 302s 11: 302s 302s public exponent: 302s 01:00:01: 302s 302s private exponent: 302s 00:fc:b9:4a:26:07:89:51:2b:53:72:91:e0:18:3e:a6 302s 5e:31:ef:9c:0c:16:24:42:d0:28:33:f9:fa:d0:3c:54 302s 04:06:c0:15:f5:1b:9a:b3:24:31:ab:3c:6b:47:43:b0 302s d2:a9:dc:05:e1:81:59:b6:04:e9:66:61:aa:d7:0b:00 302s 8f:3d:e5:bf:a2:f8:5e:25:6c:1e:22:0f:b4:fd:41:e2 302s 03:31:5f:da:20:c5:c0:f3:55:0e:e1:c9:ec:d7:3e:2a 302s 0c:01:ca:7b:22:cb:ac:f4:2b:27:f0:78:5f:b5:c2:f9 302s e8:14:5a:6e:7e:86:bd:6a:9b:20:0c:ba:cc:97:20:11 302s 302s 302s prime1: 302s 00:c9:59:9f:29:8a:5b:9f:e3:2a:d8:7e:c2:40:9f:a8 302s 45:e5:3e:11:8d:3c:ed:6e:ab:ce:d0:65:46:d8:c7:07 302s 63:b5:23:34:f4:9f:7e:1c:c7:c7:f9:65:d1:f4:04:42 302s 38:be:3a:0c:9d:08:25:fc:a3:71:d9:ae:0c:39:61:f4 302s 89: 302s 302s prime2: 302s 00:ed:ef:ab:a9:d5:39:9c:ee:59:1b:ff:cf:48:44:1b 302s b6:32:e7:46:24:f3:04:7f:de:95:08:6d:75:9e:67:17 302s ba:5c:a4:d4:e2:e2:4d:77:ce:eb:66:29:c5:96:e0:62 302s bb:e5:ac:dc:44:62:54:86:ed:64:0c:ce:d0:60:03:9d 302s 49: 302s 302s coefficient: 302s 00:89:ea:6e:6d:70:df:25:5f:18:3f:48:da:63:10:8b 302s fe:a8:0c:94:0f:de:97:56:53:89:94:e2:1e:2c:74:3c 302s 91:81:34:0b:a6:40:f8:cb:2a:60:8c:e0:02:b7:89:93 302s cf:18:9f:49:54:fd:7d:3f:9a:ef:d4:a4:4f:c1:45:99 302s 91: 302s 302s exp1: 302s 54:d9:18:72:27:e4:be:76:bb:1a:6a:28:2f:95:58:12 302s c4:2c:a8:b6:cc:e2:fd:0d:17:64:c8:18:d7:c6:df:3d 302s 4c:1a:9e:f9:2a:b0:b9:2e:12:fd:ec:c3:51:c1:ed:a9 302s fd:b7:76:93:41:d8:c8:22:94:1a:77:f6:9c:c3:c3:89 302s 302s 302s exp2: 302s 00:8e:f9:a7:08:ad:b5:2a:04:db:8d:04:a1:b5:06:20 302s 34:d2:cf:c0:89:b1:72:31:b8:39:8b:cf:e2:8e:a5:da 302s 4f:45:1e:53:42:66:c4:30:4b:29:8e:c1:69:17:29:8c 302s 8a:e6:0f:82:68:a1:41:b3:b6:70:99:75:a9:27:18:e4 302s e9: 302s 302s 302s Public Key PIN: 302s pin-sha256:R8hrzXl3nlSmDJsjs0F9VSmZuh6LjSVaubsjie5iAiQ= 302s Public Key ID: 302s sha256:47c86bcd79779e54a60c9b23b3417d552999ba1e8b8d255ab9bb2389ee620224 302s sha1:58a4a7659444b2f7fd2b211cc5e5631b10551ea9 302s 302s -----BEGIN RSA PRIVATE KEY----- 302s MIICXQIBAAKBgQC7JHoJfg6yNzLMOWet8Z49a4KD0dCspMAYvo2YAMB7/wdEycoc 302s ujbhJ2n/seONi+5XqTqqFkM5VBl8rmkkFPZk/7x0xmdsTPECSWnHK+HhoaNDFPR3 302s j8jQhVo1laxiqcEhAHegi5cwtFosuJAvSKAFKEvyD43si00DQnXWrYHAEQIDAQAB 302s AoGAAPy5SiYHiVErU3KR4Bg+pl4x75wMFiRC0Cgz+frQPFQEBsAV9RuasyQxqzxr 302s R0Ow0qncBeGBWbYE6WZhqtcLAI895b+i+F4lbB4iD7T9QeIDMV/aIMXA81UO4cns 302s 1z4qDAHKeyLLrPQrJ/B4X7XC+egUWm5+hr1qmyAMusyXIBECQQDJWZ8piluf4yrY 302s fsJAn6hF5T4RjTztbqvO0GVG2McHY7UjNPSffhzHx/ll0fQEQji+OgydCCX8o3HZ 302s rgw5YfSJAkEA7e+rqdU5nO5ZG//PSEQbtjLnRiTzBH/elQhtdZ5nF7pcpNTi4k13 302s zutmKcWW4GK75azcRGJUhu1kDM7QYAOdSQJAVNkYcifkvna7GmooL5VYEsQsqLbM 302s 4v0NF2TIGNfG3z1MGp75KrC5LhL97MNRwe2p/bd2k0HYyCKUGnf2nMPDiQJBAI75 302s pwittSoE240EobUGIDTSz8CJsXIxuDmLz+KOpdpPRR5TQmbEMEspjsFpFymMiuYP 302s gmihQbO2cJl1qScY5OkCQQCJ6m5tcN8lXxg/SNpjEIv+qAyUD96XVlOJlOIeLHQ8 302s kYE0C6ZA+MsqYIzgAreJk88Yn0lU/X0/mu/UpE/BRZmR 302s -----END RSA PRIVATE KEY----- 302s PKCS8 OK unencpkcs8.pem 302s PKCS #8 information: 302s Cipher: RC2-40 302s Schema: PKCS12-RC2-40-SHA1 (1.2.840.113549.1.12.1.6) 302s Salt: 1f4071ac00426977 302s Salt size: 8 302s Iteration count: 484 302s 302s Public Key Info: 302s Public Key Algorithm: RSA 302s Key Security Level: Low (1024 bits) 302s 302s modulus: 302s 00:c3:32:18:c8:b0:49:3e:42:eb:3c:32:9e:51:71:2e 302s ec:ed:44:f7:f2:57:af:35:97:b9:21:56:35:ec:31:93 302s d1:29:52:06:d5:85:70:f8:2e:b6:a4:86:33:58:d4:f9 302s d1:93:c0:81:b5:49:85:2d:d0:c4:1f:bd:d1:29:fe:51 302s c5:6e:af:2c:91:cc:d6:24:49:3b:ef:25:9c:62:fb:e0 302s d3:9c:f6:b7:3f:d7:28:41:37:11:34:60:14:b6:83:f5 302s 18:ae:39:eb:ca:6e:53:08:92:4b:58:9c:d4:1d:4e:03 302s a2:be:33:20:d8:c1:94:1f:c7:c4:b4:3a:78:5d:10:e7 302s b9: 302s 302s public exponent: 302s 01:00:01: 302s 302s private exponent: 302s 0c:85:e0:06:58:c8:56:2c:d6:69:33:5e:7f:5f:49:7c 302s 02:01:46:54:0a:06:9a:63:b1:c8:fe:fe:30:ce:ac:75 302s ad:ec:39:36:85:31:63:d1:76:be:74:42:ad:3c:ba:b5 302s ff:55:49:82:64:90:08:0a:08:59:cd:f9:dc:f3:17:f2 302s a6:9b:26:ac:d2:40:f0:aa:00:57:18:8f:b7:90:e7:f6 302s 5c:7a:12:42:a4:6c:89:79:2e:a9:69:a3:cd:4d:fd:32 302s 2d:46:a9:4e:30:73:a2:f8:69:ed:82:ab:3a:1f:8b:c9 302s 21:b0:36:fe:83:50:3d:8e:ca:04:fe:bf:81:37:60:15 302s 302s 302s prime1: 302s 00:db:29:c2:79:b4:f0:61:64:a1:83:87:b5:77:36:e8 302s 53:a4:a8:35:bb:92:52:d1:eb:15:7b:9d:f1:06:07:9a 302s 92:39:5a:db:21:d8:f8:84:d5:35:fa:8b:58:4a:fb:cf 302s 61:8c:ed:b5:02:12:5d:8f:fb:09:5b:3c:f7:4a:69:28 302s 85: 302s 302s prime2: 302s 00:e4:01:0e:80:c7:e9:b9:51:31:69:5d:6c:d1:0d:a4 302s 33:c6:5f:c8:78:a7:60:79:5a:e1:c8:99:cc:af:d0:42 302s 6c:b1:7e:3f:13:f3:43:f8:a4:40:d6:ed:13:1c:44:03 302s 5a:39:26:68:b6:e8:9a:5d:df:18:29:3b:fb:ba:d1:c2 302s a5: 302s 302s coefficient: 302s 38:81:51:91:e9:e7:db:21:2d:19:4e:a7:25:69:c1:c8 302s 96:f1:6d:2d:a0:ce:0f:62:91:2e:6b:34:83:fd:27:94 302s 00:e2:27:bd:e8:e2:10:47:2a:10:ab:62:73:99:99:be 302s b5:3f:72:27:35:77:d7:af:b8:ab:69:05:07:a2:1c:70 302s 302s 302s exp1: 302s 58:f4:12:23:23:f5:8d:12:33:1c:17:b0:e7:ba:39:81 302s f9:8a:ec:84:3d:57:b0:2c:22:84:12:0f:09:cb:7c:49 302s 6d:4e:1b:33:19:c5:84:e4:a5:0c:14:12:ba:1c:8a:87 302s a5:93:b5:ac:29:98:20:20:5c:23:d4:12:ea:f8:d3:a1 302s 302s 302s exp2: 302s 00:b9:4c:9a:8a:d2:ee:02:6c:18:2a:37:81:4e:4d:35 302s db:d6:26:d5:f8:28:9f:61:41:19:2a:3c:c4:7b:46:58 302s 15:9a:12:ae:14:fa:a9:8d:13:80:96:ab:c9:d2:38:fc 302s 38:81:25:d4:08:82:f5:a1:c0:c4:14:0e:e9:c0:a4:e4 302s f9: 302s 302s 302s Public Key PIN: 302s pin-sha256:9F3bpcFKX01Sz/YJHsmzV6WCdR0JAH56cHgpJzevriI= 302s Public Key ID: 302s sha256:f45ddba5c14a5f4d52cff6091ec9b357a582751d09007e7a7078292737afae22 302s sha1:eaee9caf13c9583bb22f4aa81d19a71b6646cfeb 302s 302s -----BEGIN RSA PRIVATE KEY----- 302s MIICXAIBAAKBgQDDMhjIsEk+Qus8Mp5RcS7s7UT38levNZe5IVY17DGT0SlSBtWF 302s cPgutqSGM1jU+dGTwIG1SYUt0MQfvdEp/lHFbq8skczWJEk77yWcYvvg05z2tz/X 302s KEE3ETRgFLaD9RiuOevKblMIkktYnNQdTgOivjMg2MGUH8fEtDp4XRDnuQIDAQAB 302s AoGADIXgBljIVizWaTNef19JfAIBRlQKBppjscj+/jDOrHWt7Dk2hTFj0Xa+dEKt 302s PLq1/1VJgmSQCAoIWc353PMX8qabJqzSQPCqAFcYj7eQ5/ZcehJCpGyJeS6paaPN 302s Tf0yLUapTjBzovhp7YKrOh+LySGwNv6DUD2OygT+v4E3YBUCQQDbKcJ5tPBhZKGD 302s h7V3NuhTpKg1u5JS0esVe53xBgeakjla2yHY+ITVNfqLWEr7z2GM7bUCEl2P+wlb 302s PPdKaSiFAkEA5AEOgMfpuVExaV1s0Q2kM8ZfyHinYHla4ciZzK/QQmyxfj8T80P4 302s pEDW7RMcRANaOSZotuiaXd8YKTv7utHCpQJAWPQSIyP1jRIzHBew57o5gfmK7IQ9 302s V7AsIoQSDwnLfEltThszGcWE5KUMFBK6HIqHpZO1rCmYICBcI9QS6vjToQJBALlM 302s morS7gJsGCo3gU5NNdvWJtX4KJ9hQRkqPMR7RlgVmhKuFPqpjROAlqvJ0jj8OIEl 302s 1AiC9aHAxBQO6cCk5PkCQDiBUZHp59shLRlOpyVpwciW8W0toM4PYpEuazSD/SeU 302s AOInvejiEEcqEKtic5mZvrU/cic1d9evuKtpBQeiHHA= 302s -----END RSA PRIVATE KEY----- 302s PKCS8 OK enc2pkcs8.pem baz 302s Encrypted structure detected... 302s Encrypted structure detected... 302s PKCS #8 information: 302s Cipher: AES-256-CBC 302s Schema: PBES2-AES256-CBC (2.16.840.1.101.3.4.1.42) 302s Salt: d4d8680a69b46e27 302s Salt size: 8 302s Iteration count: 2048 302s 302s Public Key Info: 302s Public Key Algorithm: RSA 302s Key Security Level: Medium (2432 bits) 302s 302s modulus: 302s 00:ab:54:98:fc:a9:c6:15:95:9d:a6:c1:94:84:94:91 302s 79:1e:78:db:2d:48:51:99:65:01:02:c0:40:52:49:5d 302s eb:70:bc:26:ef:68:39:1e:04:91:e2:db:cb:6f:93:40 302s 45:1e:22:8e:71:5a:58:89:28:79:5e:1a:32:25:3e:8b 302s 9d:3b:34:7f:19:f8:d0:2f:37:b7:62:32:b7:53:a5:43 302s 2c:c5:5d:ec:ac:f9:35:fa:14:2b:34:66:f1:d6:a7:a1 302s d0:83:9a:56:f4:19:83:bc:bf:11:74:30:2d:a8:28:5b 302s a2:ab:7a:c6:cd:9c:5c:f8:51:e9:a9:0c:48:db:71:bb 302s b1:34:77:f7:ee:de:5d:78:c0:48:0a:37:0d:65:1e:3b 302s 2b:14:03:89:72:f2:52:ed:5f:00:c5:06:60:ea:80:20 302s d0:43:ec:66:bc:d2:26:db:f0:29:3e:6a:f9:62:20:be 302s 58:26:44:ba:d7:8c:6f:76:a6:05:20:e4:98:b7:c4:72 302s 7a:5d:df:4f:0d:23:ec:2e:9c:71:ec:30:f9:14:5f:c8 302s 75:0b:ab:67:f6:7d:fb:4d:76:64:4a:a5:d5:fa:b4:08 302s 50:9d:13:c7:8f:c2:79:b0:b4:3e:2f:89:d3:33:27:4d 302s 9f:8b:d3:60:24:07:ab:b2:72:3d:29:a5:c4:4a:ec:3c 302s 04:d2:49:3e:26:1b:ec:7a:10:3d:ca:45:5a:80:8b:4d 302s 2a:96:63:4f:2d:63:28:0f:3b:47:47:ca:7c:2c:15:41 302s 32:d5:e0:c9:be:a5:55:2c:b3:6b:46:2a:56:b1:1b:ed 302s 29: 302s 302s public exponent: 302s 01:00:01: 302s 302s private exponent: 302s 5d:97:20:db:24:82:a8:57:ca:7e:c5:50:33:fc:54:5b 302s 2d:62:27:98:5c:e0:f6:42:4e:83:0a:32:18:c1:2b:24 302s e9:b8:5e:2c:79:6a:7a:13:54:fd:ef:c2:f9:78:1e:ab 302s a3:02:8d:7d:2e:35:1e:f7:95:14:ea:8a:69:fd:f8:96 302s 33:39:42:15:15:ed:e3:5d:34:37:d8:2c:7c:ec:d1:fd 302s 2a:f3:5b:ce:41:74:52:df:a1:9a:46:81:e5:18:3d:34 302s 82:2f:55:40:92:8f:7c:13:83:9d:4c:94:24:3f:a7:8e 302s fc:cd:5c:bc:04:a6:64:9f:9a:5c:55:f1:96:ae:52:31 302s 42:d0:26:07:be:40:a1:2d:a8:2c:ac:56:0c:de:ae:c3 302s a1:73:2d:2a:35:65:47:74:b0:9b:70:b9:d8:ad:12:74 302s 50:b3:00:fb:86:72:d5:00:e8:02:b2:d1:e3:d5:87:3f 302s cc:b6:f3:26:fe:25:c1:b5:59:bd:e0:c9:fa:d9:ba:47 302s f8:43:ea:af:cf:4d:92:ae:db:9d:11:49:ec:50:33:2a 302s b6:44:40:ac:06:c7:f6:64:2e:42:25:81:20:d5:f6:76 302s 79:b9:fb:bd:d2:c5:5d:f7:28:16:9d:cc:13:cd:d9:55 302s e3:ca:c7:d2:38:f1:92:32:d6:ba:db:73:b6:dc:b6:5f 302s 66:89:e3:4c:9e:d6:b8:d2:01:ee:a8:d2:69:64:dd:5c 302s 1a:7e:4c:e4:1d:5b:37:94:29:3c:93:3d:43:bb:33:8f 302s 10:23:14:12:b0:33:24:58:c3:ae:97:4c:3d:c5:c1:81 302s 302s 302s prime1: 302s 00:c1:9c:0d:4e:aa:1b:2e:c4:14:e6:78:ed:0b:76:90 302s af:da:3d:5e:15:6f:7d:9c:97:4d:71:a3:1d:6a:47:94 302s 25:20:9d:98:f4:d0:3b:d6:be:be:12:39:e7:d7:82:3d 302s 54:3d:f7:76:06:e2:ac:5d:e6:1f:34:fd:bc:9d:9c:8b 302s f5:4f:83:89:8f:79:ea:9e:5e:a5:5c:e9:b4:71:ae:59 302s 43:ff:ec:03:f6:57:3c:d6:33:0b:ba:4d:39:3f:90:62 302s b2:4f:af:e0:21:7a:5a:0f:93:f4:fc:5f:ba:29:b9:af 302s 67:18:3f:0e:23:3d:de:d9:bc:47:ad:de:56:11:d1:e3 302s c0:7e:29:bb:67:ac:1b:6a:af:5a:30:19:0c:14:49:af 302s db:1a:82:10:60:e1:d1:98:dd: 302s 302s prime2: 302s 00:e2:8a:9d:80:b5:29:33:06:44:d2:e3:77:bd:34:3e 302s c0:df:98:cc:ab:f3:ba:73:3c:19:5c:d8:ed:c8:22:bc 302s b9:8f:4f:1a:d8:0d:08:e2:e2:ca:e8:3c:13:aa:23:1b 302s 3d:75:d4:7c:e2:4e:cd:ca:d0:fc:b7:77:70:57:54:e1 302s 1c:22:a2:3e:0f:a7:59:c0:5a:4f:b1:e8:62:55:85:07 302s 7d:03:a4:8f:82:eb:2d:21:fc:cb:d5:b7:3c:77:a5:9d 302s 67:a6:ab:95:5d:1e:d3:a3:49:78:9b:75:2c:07:e9:bd 302s ba:0f:66:69:7e:2e:50:2f:76:5f:e9:28:f8:e1:c9:ce 302s 77:4a:48:ee:92:d1:d5:dc:29:2f:3f:29:7a:12:b0:d6 302s f9:8d:68:e4:82:45:ec:3a:bd: 302s 302s coefficient: 302s 00:82:d2:e4:3b:e3:aa:9e:99:75:0d:73:e4:e9:38:f5 302s 5e:73:e4:c2:3a:24:55:4e:ea:58:f7:2a:f2:0f:ff:42 302s d7:e2:ef:49:d2:25:8d:86:02:a7:2b:c9:45:1e:ee:a0 302s 1c:60:58:3e:4c:bb:40:99:42:20:ff:c7:3f:4e:68:8c 302s 8b:f4:e8:41:fe:f4:79:00:a4:7e:64:67:95:8e:bf:c3 302s 45:28:dc:da:57:b9:aa:20:ac:66:b0:c8:11:b2:9a:c2 302s 60:ac:24:32:7f:17:e4:6c:dc:24:43:56:22:50:86:29 302s a7:38:fb:4e:8c:e1:9a:c8:42:a4:59:ab:49:32:bd:0b 302s 65:30:37:06:95:29:63:88:09:11:0b:0a:f3:34:82:f6 302s 54:68:cc:71:e9:ea:9f:48:0f: 302s 302s exp1: 302s 78:8e:dc:b6:74:34:32:fd:c4:69:f3:38:e0:1f:77:5f 302s 19:4d:87:4d:5f:bc:5f:0a:d4:1d:83:cd:a8:45:64:19 302s 6e:62:d4:40:f5:7d:9d:6d:ee:db:58:95:66:5b:e2:26 302s 97:e3:84:ea:2a:b1:dc:52:94:72:21:e2:16:5e:c9:c3 302s fa:3c:55:27:33:6a:86:2d:37:59:50:e9:9c:b4:4d:3f 302s 8b:98:02:ab:9d:8c:f3:70:9b:c7:e9:98:51:5d:6e:27 302s cc:79:1e:de:99:da:84:c2:c4:15:76:e2:6c:63:04:b6 302s f4:a1:27:03:88:de:40:c4:fd:f9:65:6e:40:f0:6a:9a 302s 8d:b5:1c:ce:24:9c:79:e5:31:0a:ac:3e:1a:4f:fc:22 302s 3a:32:6d:52:76:ab:56:3d: 302s 302s exp2: 302s 00:9b:74:5b:58:72:f8:6e:97:22:ab:44:84:6a:45:6b 302s ba:96:b5:17:dd:f7:46:3e:c5:42:f2:3f:ba:0b:d8:2a 302s 81:7b:21:e1:5d:d8:b3:fc:5d:7c:b7:98:62:36:22:19 302s 13:37:c4:34:5e:67:8d:38:5b:e8:cf:4d:1a:be:12:f4 302s d6:85:bd:a7:b0:be:3a:0c:90:ec:97:3c:cc:1d:bb:47 302s c4:35:b7:ba:f3:2f:c6:ac:c7:f8:68:13:71:5e:f9:3a 302s e6:61:ac:e4:b6:1d:ed:44:e3:a9:eb:a3:a0:2f:5d:ea 302s 5f:bf:29:9b:c2:86:ad:67:a4:67:74:6c:35:3d:5b:6a 302s 5e:d9:8e:ea:87:bd:8e:6f:a1:a3:56:48:74:08:57:69 302s 6d:9d:e8:18:c6:7c:8c:fa:51: 302s 302s 302s Public Key PIN: 302s pin-sha256:RMtdrzhWeBv9f9dYGAe/lLVF+1Dgh65nQzCDUl9tWHU= 302s Public Key ID: 302s sha256:44cb5daf3856781bfd7fd7581807bf94b545fb50e087ae67433083525f6d5875 302s sha1:8b01094b3b91ece321b91dec8d6b4c5d9e40805e 302s 302s -----BEGIN RSA PRIVATE KEY----- 302s MIIFfAIBAAKCATEAq1SY/KnGFZWdpsGUhJSReR542y1IUZllAQLAQFJJXetwvCbv 302s aDkeBJHi28tvk0BFHiKOcVpYiSh5XhoyJT6LnTs0fxn40C83t2Iyt1OlQyzFXeys 302s +TX6FCs0ZvHWp6HQg5pW9BmDvL8RdDAtqChboqt6xs2cXPhR6akMSNtxu7E0d/fu 302s 3l14wEgKNw1lHjsrFAOJcvJS7V8AxQZg6oAg0EPsZrzSJtvwKT5q+WIgvlgmRLrX 302s jG92pgUg5Ji3xHJ6Xd9PDSPsLpxx7DD5FF/IdQurZ/Z9+012ZEql1fq0CFCdE8eP 302s wnmwtD4vidMzJ02fi9NgJAersnI9KaXESuw8BNJJPiYb7HoQPcpFWoCLTSqWY08t 302s YygPO0dHynwsFUEy1eDJvqVVLLNrRipWsRvtKQIDAQABAoIBMF2XINskgqhXyn7F 302s UDP8VFstYieYXOD2Qk6DCjIYwSsk6bheLHlqehNU/e/C+Xgeq6MCjX0uNR73lRTq 302s imn9+JYzOUIVFe3jXTQ32Cx87NH9KvNbzkF0Ut+hmkaB5Rg9NIIvVUCSj3wTg51M 302s lCQ/p478zVy8BKZkn5pcVfGWrlIxQtAmB75AoS2oLKxWDN6uw6FzLSo1ZUd0sJtw 302s uditEnRQswD7hnLVAOgCstHj1Yc/zLbzJv4lwbVZveDJ+tm6R/hD6q/PTZKu250R 302s SexQMyq2RECsBsf2ZC5CJYEg1fZ2ebn7vdLFXfcoFp3ME83ZVePKx9I48ZIy1rrb 302s c7bctl9mieNMnta40gHuqNJpZN1cGn5M5B1bN5QpPJM9Q7szjxAjFBKwMyRYw66X 302s TD3FwYECgZkAwZwNTqobLsQU5njtC3aQr9o9XhVvfZyXTXGjHWpHlCUgnZj00DvW 302s vr4SOefXgj1UPfd2BuKsXeYfNP28nZyL9U+DiY956p5epVzptHGuWUP/7AP2VzzW 302s Mwu6TTk/kGKyT6/gIXpaD5P0/F+6KbmvZxg/DiM93tm8R63eVhHR48B+KbtnrBtq 302s r1owGQwUSa/bGoIQYOHRmN0CgZkA4oqdgLUpMwZE0uN3vTQ+wN+YzKvzunM8GVzY 302s 7cgivLmPTxrYDQji4sroPBOqIxs9ddR84k7NytD8t3dwV1ThHCKiPg+nWcBaT7Ho 302s YlWFB30DpI+C6y0h/MvVtzx3pZ1npquVXR7To0l4m3UsB+m9ug9maX4uUC92X+ko 302s +OHJzndKSO6S0dXcKS8/KXoSsNb5jWjkgkXsOr0CgZh4jty2dDQy/cRp8zjgH3df 302s GU2HTV+8XwrUHYPNqEVkGW5i1ED1fZ1t7ttYlWZb4iaX44TqKrHcUpRyIeIWXsnD 302s +jxVJzNqhi03WVDpnLRNP4uYAqudjPNwm8fpmFFdbifMeR7emdqEwsQVduJsYwS2 302s 9KEnA4jeQMT9+WVuQPBqmo21HM4knHnlMQqsPhpP/CI6Mm1SdqtWPQKBmQCbdFtY 302s cvhulyKrRIRqRWu6lrUX3fdGPsVC8j+6C9gqgXsh4V3Ys/xdfLeYYjYiGRM3xDRe 302s Z404W+jPTRq+EvTWhb2nsL46DJDslzzMHbtHxDW3uvMvxqzH+GgTcV75OuZhrOS2 302s He1E46nro6AvXepfvymbwoatZ6RndGw1PVtqXtmO6oe9jm+ho1ZIdAhXaW2d6BjG 302s fIz6UQKBmQCC0uQ746qemXUNc+TpOPVec+TCOiRVTupY9yryD/9C1+LvSdIljYYC 302s pyvJRR7uoBxgWD5Mu0CZQiD/xz9OaIyL9OhB/vR5AKR+ZGeVjr/DRSjc2le5qiCs 302s ZrDIEbKawmCsJDJ/F+Rs3CRDViJQhimnOPtOjOGayEKkWatJMr0LZTA3BpUpY4gJ 302s EQsK8zSC9lRozHHp6p9IDw== 302s -----END RSA PRIVATE KEY----- 302s PKCS8 OK pkcs8-pbes2-sha256.pem password 302s PKCS #8 information: 302s Cipher: DES-CBC 302s Schema: PBES1-DES-CBC-SHA1 (1.2.840.113549.1.5.10) 302s Salt: 302s Salt size: 0 302s Iteration count: 2048 302s 302s Public Key Info: 302s Public Key Algorithm: RSA 302s Key Security Level: Low (1024 bits) 302s 302s modulus: 302s 00:c8:21:44:59:dc:ec:ae:35:b5:a7:06:98:0a:4e:0f 302s 2f:b8:5b:97:a9:85:c7:b7:26:64:3f:51:44:37:3c:ae 302s eb:77:21:05:db:c4:6f:9a:f4:1a:7c:58:d3:55:b2:f3 302s 15:f1:ad:82:a6:b4:a0:ca:2b:2c:e6:39:22:38:ff:5f 302s 39:22:55:fa:8a:b8:fa:af:1d:1c:49:49:cd:a2:c2:5b 302s ad:85:bb:c8:ce:e8:cc:f9:fa:5a:1c:10:73:4d:11:80 302s e4:bb:29:ac:40:72:84:d2:1a:2d:ae:e3:53:f2:9b:33 302s 1e:b4:c9:4a:c9:6d:a3:97:3b:b1:59:84:3a:2e:10:f6 302s 4b: 302s 302s public exponent: 302s 01:00:01: 302s 302s private exponent: 302s 00:ad:55:72:d7:ca:2b:0c:2f:e4:a7:47:64:c3:f8:1b 302s db:1e:f7:e5:81:a4:26:f8:10:3e:5f:40:c9:ae:75:d6 302s a2:86:49:89:c3:70:7d:a1:5d:ae:da:e8:2c:12:5b:ad 302s 82:e2:11:7f:c9:57:44:b4:15:75:0b:e9:8c:24:85:ba 302s 38:3f:c9:02:20:28:19:d1:c8:94:09:36:00:6c:11:a6 302s a6:71:fe:95:02:ce:f8:9f:3b:97:32:ee:a6:ec:59:a0 302s 96:cf:39:a9:30:cf:8d:dc:a3:83:fa:9c:57:19:b7:8a 302s 4a:2b:7b:08:16:dc:8e:63:95:41:ed:94:a7:55:3c:36 302s a1: 302s 302s prime1: 302s 00:e6:56:b3:24:08:5e:6e:18:8b:a9:3b:a8:df:48:70 302s 0c:f1:42:ab:e2:89:6e:27:2a:da:cd:69:6f:59:76:c0 302s 58:0a:b4:bf:9e:7f:df:b0:38:d0:29:f0:7b:c4:2a:50 302s 99:e9:30:42:e5:b5:aa:be:48:f7:9b:7b:92:3c:1e:cf 302s 09: 302s 302s prime2: 302s 00:de:6d:02:51:de:d4:5e:60:63:fc:50:17:62:ec:b0 302s 6d:83:a0:be:2b:73:47:c6:b2:10:0c:fc:92:69:2b:95 302s 7e:9c:16:51:c8:37:82:b8:3f:9f:6d:c3:f5:8c:f8:0a 302s d2:6a:1a:58:5e:15:29:8b:e4:0f:a0:cc:07:16:fe:5b 302s b3: 302s 302s coefficient: 302s 46:29:e1:b8:7f:3a:b9:22:5e:36:f3:62:08:4e:42:e6 302s 73:bc:3e:24:9e:0d:34:57:f9:e4:cd:7f:8c:6d:44:0f 302s da:b6:11:13:bd:84:8e:26:50:6f:2b:75:59:eb:08:4d 302s 3b:1e:11:a3:f0:5a:18:49:76:48:fe:59:34:8f:c6:1a 302s 302s 302s exp1: 302s 00:d3:d7:55:36:84:83:e4:99:aa:88:e0:97:b5:93:37 302s 8a:8f:b1:13:c8:6b:40:e5:c0:e2:2f:1d:13:0d:a2:cb 302s cf:ad:39:03:2a:d0:cc:77:94:28:cf:09:9f:aa:90:88 302s 44:a5:54:7f:92:28:7c:7a:39:3d:90:c0:1b:84:33:89 302s 91: 302s 302s exp2: 302s 01:2d:7c:94:a8:64:61:77:8b:2f:fb:d0:93:e2:82:f0 302s a1:80:c9:60:fb:84:46:c6:0c:95:b5:04:a5:6f:e8:a3 302s b9:f9:d8:47:02:1c:3c:13:82:29:97:9f:06:37:0d:ff 302s 9d:36:34:7f:93:07:1c:49:81:d7:ad:1c:e0:7f:4a:47 302s 302s 302s 302s Public Key PIN: 302s pin-sha256:JbSA+Q0YuTazlPZLiX9c8A240Jh07A3BEneUY0GxAOE= 302s Public Key ID: 302s sha256:25b480f90d18b936b394f64b897f5cf00db8d09874ec0dc11277946341b100e1 302s sha1:359207bbf0118d5866f17b349fe24787372745fa 302s 302s -----BEGIN RSA PRIVATE KEY----- 302s MIICXQIBAAKBgQDIIURZ3OyuNbWnBpgKTg8vuFuXqYXHtyZkP1FENzyu63chBdvE 302s b5r0GnxY01Wy8xXxrYKmtKDKKyzmOSI4/185IlX6irj6rx0cSUnNosJbrYW7yM7o 302s zPn6WhwQc00RgOS7KaxAcoTSGi2u41PymzMetMlKyW2jlzuxWYQ6LhD2SwIDAQAB 302s AoGBAK1VctfKKwwv5KdHZMP4G9se9+WBpCb4ED5fQMmuddaihkmJw3B9oV2u2ugs 302s ElutguIRf8lXRLQVdQvpjCSFujg/yQIgKBnRyJQJNgBsEaamcf6VAs74nzuXMu6m 302s 7Fmgls85qTDPjdyjg/qcVxm3ikorewgW3I5jlUHtlKdVPDahAkEA5lazJAhebhiL 302s qTuo30hwDPFCq+KJbicq2s1pb1l2wFgKtL+ef9+wONAp8HvEKlCZ6TBC5bWqvkj3 302s m3uSPB7PCQJBAN5tAlHe1F5gY/xQF2LssG2DoL4rc0fGshAM/JJpK5V+nBZRyDeC 302s uD+fbcP1jPgK0moaWF4VKYvkD6DMBxb+W7MCQQDT11U2hIPkmaqI4Je1kzeKj7ET 302s yGtA5cDiLx0TDaLLz605AyrQzHeUKM8Jn6qQiESlVH+SKHx6OT2QwBuEM4mRAkAB 302s LXyUqGRhd4sv+9CT4oLwoYDJYPuERsYMlbUEpW/oo7n52EcCHDwTgimXnwY3Df+d 302s NjR/kwccSYHXrRzgf0pHAkBGKeG4fzq5Il4282IITkLmc7w+JJ4NNFf55M1/jG1E 302s D9q2ERO9hI4mUG8rdVnrCE07HhGj8FoYSXZI/lk0j8Ya 302s -----END RSA PRIVATE KEY----- 302s PKCS8 OK der-key-PBE-SHA1-DES.p8 booo 302s Encrypted structure detected... 302s PKCS8 DONE (rc 0) 302s SUCCESS [52]../../tests/cert-tests/pkcs8-decode.sh 302s running [53]../../tests/cert-tests/pkcs8-eddsa.sh ... 302s 302s PKCS8 DONE 302s SUCCESS [53]../../tests/cert-tests/pkcs8-eddsa.sh 302s running [54]../../tests/cert-tests/pkcs8-gost.sh ... 302s PKCS8 OK key-gost01.p8 303s PKCS8 OK key-gost12-256.p8 303s PKCS8 OK key-gost01-2.p8 303s PKCS8 OK key-gost12-256-2.p8 303s PKCS8 OK key-gost01-2-enc.p8 Пароль%20для%20PFX 303s Encrypted structure detected... 303s Encrypted structure detected... 303s PKCS8 OK key-gost12-256-2-enc.p8 Пароль%20для%20PFX 303s PKCS8 DONE (rc 0) 303s SUCCESS [54]../../tests/cert-tests/pkcs8-gost.sh 303s running [55]../../tests/cert-tests/pkcs8-invalid.sh ... 303s PKCS8 OK pkcs8-invalid1.der 1234 - errno 1 303s Encrypted structure detected... 303s import error: ASN1 parser: Error in TAG. 303s Encrypted structure detected... 303s PKCS #8 information: 303s Cipher: 3DES-CBC 303s Schema: PKCS12-3DES-SHA1 (1.2.840.113549.1.12.1.3) 303s Salt: 2a3f859d8061db1b 303s Salt size: 8 303s Iteration count: 5170 303s 303s PKCS8 OK pkcs8-invalid2.der 1234 - errno 1 303s import error: Decryption has failed. 303s PKCS #8 information: 303s Cipher: RC2-40 303s Schema: PKCS12-RC2-40-SHA1 (1.2.840.113549.1.12.1.6) 303s Salt: 2a3f859d8061db1b 303s Salt size: 8 303s Iteration count: 5170 303s 303s PKCS8 OK pkcs8-invalid3.der 1234 - errno 1 303s PKCS8 OK pkcs8-invalid4.der 1234 - errno 1 303s PKCS #8 information: 303s Cipher: 3DES-CBC 303s Schema: PKCS12-3DES-SHA1 (1.2.840.113549.1.12.1.3) 303s Salt: 2a3f859d8061db1b 303s Salt size: 8 303s Iteration count: 5121 303s 303s PKCS8 OK pkcs8-invalid5.der 1234 - errno 1 303s PKCS #8 information: 303s Cipher: 3DES-CBC 303s Schema: PKCS12-3DES-SHA1 (1.2.840.113549.1.12.1.3) 303s Salt: 2a3f859d8061db1b 303s Salt size: 8 303s Iteration count: 4 303s 303s PKCS8 OK pkcs8-invalid6.der 1234 - errno 1 303s Encrypted structure detected... 303s import error: Decryption has failed. 303s Encrypted structure detected... 303s import error: ASN1 parser: Error in TAG. 303s Encrypted structure detected... 303s import error: Decryption has failed. 303s Encrypted structure detected... 303s import error: Decryption has failed. 303s Encrypted structure detected... 303s import error: ASN1 parser: Error in TAG. 303s PKCS8 OK pkcs8-invalid7.der 1234 - errno 1 303s PKCS8 OK pkcs8-invalid8.der password - errno 1 303s import error: ASN1 parser: Error in TAG. 303s Encrypted structure detected... 303s import error: ASN1 parser: Error in TAG. 303s PKCS8 OK pkcs8-invalid9.der password - errno 1 303s import error: ASN1 parser: Error in TAG. 303s PKCS8 OK pkcs8-invalid10.der password - errno 1 303s PKCS8 DONE (rc 0) 303s SUCCESS [55]../../tests/cert-tests/pkcs8-invalid.sh 303s running [56]../../tests/cert-tests/pkcs8.sh ... 303s SUCCESS [56]../../tests/cert-tests/pkcs8.sh 303s running [57]../../tests/cert-tests/privkey-import.sh ... 303s Public Key Info: 303s Public Key Algorithm: RSA 303s Key Security Level: Medium (2048 bits) 303s 303s modulus: 303s 00:99:a7:ca:d0:a7:03:91:6f:05:c7:55:d7:92:d1:30 303s 34:59:cd:15:8b:7e:17:88:70:4b:cf:fc:34:92:74:b7 303s 80:5e:68:f0:f0:de:9c:2a:18:05:6a:00:d0:3a:3d:f5 303s e3:ea:11:97:e5:5b:02:98:35:a4:f5:26:0b:af:33:6a 303s 95:41:d0:df:38:34:dc:98:3c:b4:5a:b5:f3:59:e8:f6 303s ac:17:f3:a4:bf:b4:c8:8a:ea:e4:50:6c:1b:ed:1d:c8 303s ff:59:ad:d9:72:08:a8:1f:f2:17:34:34:36:5b:af:c6 303s 22:cd:c2:30:8d:7e:93:9e:3b:79:a9:b7:3c:91:0d:9d 303s fa:1d:ee:f1:d8:c0:2c:b3:cd:3d:f9:79:4b:ad:5c:2f 303s 7d:8c:51:32:42:31:f8:8e:a6:04:e8:5f:45:f7:08:a8 303s 8c:bf:ac:46:8f:b3:d4:83:ed:48:35:34:01:cf:9a:c8 303s e0:1c:95:9b:99:75:24:91:e5:34:1a:75:9e:fc:9d:04 303s 27:9c:7c:65:53:37:32:ff:ea:03:fc:e3:7b:7c:08:80 303s a9:b4:97:ec:85:ee:b9:81:df:93:33:e8:da:3e:4a:cf 303s 7d:e6:12:57:6e:c0:22:a9:88:29:e1:64:ad:50:4c:2b 303s d9:7c:15:09:4d:5f:a9:06:00:db:ee:ab:a6:76:ca:41 303s 2d: 303s 303s public exponent: 303s 01:00:01: 303s 303s private exponent: 303s 26:4d:96:98:56:d9:e3:da:2a:35:9b:a7:86:78:d1:2c 303s 6b:aa:5d:11:8d:d8:2d:f1:d8:64:3b:79:9b:7c:ae:f5 303s b8:13:2e:e4:cc:89:5f:50:e7:a0:9a:1d:4e:37:7d:e1 303s 57:cb:14:f3:5e:b1:91:e1:e5:82:1a:fe:d4:a8:db:8b 303s e3:81:3e:f3:d2:f1:9e:9d:9b:53:f5:81:79:4b:42:9a 303s 79:ca:09:aa:a4:55:4d:93:ea:60:45:e2:dc:44:0d:83 303s e2:06:1d:6b:78:ce:f8:4f:b0:0b:1a:6c:e6:84:35:bf 303s 1d:4d:a8:2e:cd:7b:dc:f8:f4:86:23:20:5d:04:68:f9 303s ba:b4:a3:cb:f6:2f:67:79:7a:59:3f:de:8c:29:5d:51 303s 37:e7:dd:83:83:b4:c6:22:c0:d7:8c:79:93:11:f7:64 303s 33:47:73:d6:1a:06:c5:d4:2c:a7:02:8c:d7:f7:8c:4b 303s 07:8d:95:2e:40:3c:52:64:31:21:85:72:91:b5:13:4d 303s e5:7c:e3:b3:b1:b2:24:aa:e1:f3:22:fb:96:bb:7a:d5 303s 4f:03:e5:91:cd:50:01:85:52:c7:83:cf:a8:23:e5:10 303s 0e:d5:1c:20:11:e6:d3:65:43:de:b8:dc:dd:07:f6:7b 303s a5:c2:bf:c9:6a:c4:2b:ac:03:fb:b5:48:32:3f:ff:dd 303s 303s 303s prime1: 303s 00:c6:f9:eb:a0:38:87:c7:3c:80:06:cd:74:8c:ce:4c 303s 04:43:11:93:88:ac:d2:9f:af:e6:3a:94:10:16:c6:62 303s 4f:4b:1f:22:56:01:33:e9:6c:9d:3c:0b:a5:48:88:82 303s 8d:c0:09:e2:cb:8c:2d:2f:74:6e:18:64:5c:99:93:40 303s 1c:aa:4a:66:9e:1c:81:ea:1f:c4:dd:39:7d:5c:b1:68 303s 9c:70:53:49:ed:51:24:76:30:32:04:3f:0b:a9:59:d4 303s ba:73:00:a2:40:03:ad:94:6d:a4:4a:e9:9c:53:06:fd 303s 9f:b8:a3:32:89:c0:37:f3:e3:65:b0:fc:ef:64:6b:98 303s 4f: 303s 303s prime2: 303s 00:c5:b0:de:28:b4:18:1a:82:f4:87:d8:84:bf:ef:49 303s 15:93:21:8a:f5:7c:4e:49:3a:4c:d6:7b:d3:15:87:3b 303s 08:8f:05:f8:7f:5e:57:35:2e:78:af:7d:73:99:f2:91 303s ff:a0:67:1a:fa:ac:2c:72:e6:ce:99:86:2b:e1:e4:58 303s 84:17:fe:9c:36:70:14:71:4d:58:ee:8a:2f:dd:02:1b 303s 60:8e:09:fd:30:59:7b:cd:d0:a0:66:bb:e3:2c:41:e5 303s 5f:ee:67:9c:6f:d8:29:d8:a9:c5:b9:a1:f3:33:d1:ef 303s 89:48:de:3c:2d:6e:ef:18:e9:b5:9d:53:e4:c1:ca:b3 303s c3: 303s 303s coefficient: 303s 3d:2b:f1:df:96:7e:c8:b8:7f:c5:bb:8b:fe:e9:c2:d6 303s b0:1e:7e:82:f8:22:91:e9:21:32:16:48:da:06:11:49 303s b2:6d:4a:26:7c:87:e4:4d:9d:e1:43:9d:36:e3:5e:0c 303s c6:e0:0c:53:09:71:92:0d:e3:9e:0a:2b:06:a8:86:d3 303s c3:42:a8:7f:23:c1:db:a9:55:a6:a1:51:3f:99:64:85 303s 50:ac:e2:3a:fb:15:86:39:94:f5:bd:5f:5b:0d:a6:cf 303s 41:c1:f5:9a:13:e7:92:a8:71:92:c7:b5:60:ce:38:9e 303s 7b:39:ef:8a:78:ab:34:2f:9d:8e:54:d8:b5:29:59:f4 303s 303s 303s exp1: 303s 00:9e:46:40:b2:d3:24:d6:4b:fe:be:ea:81:52:5b:eb 303s 45:dc:9f:c7:8e:89:82:85:39:a3:56:67:5e:a0:ef:2f 303s 56:49:b8:3b:54:d4:62:19:c4:a7:12:13:65:67:5c:07 303s 15:80:73:9c:af:33:12:e2:53:a8:1b:c9:01:8b:bc:00 303s dc:8c:6c:e0:51:d6:f5:54:69:ee:eb:d6:86:2c:cc:86 303s 1d:22:90:6e:16:d3:5b:c0:93:b7:c5:7e:ec:e4:ca:2b 303s 18:20:d0:99:3f:78:6d:83:ca:ef:4c:13:a5:a0:b9:c7 303s d7:5c:44:9c:b7:cc:69:f5:9b:a5:d1:72:71:6e:9c:d3 303s ab: 303s 303s exp2: 303s 45:f2:32:68:8c:70:0a:d1:52:db:cd:cc:0a:6d:0b:9a 303s ca:98:0f:a6:93:f8:cf:08:05:af:cd:d7:fd:c1:ff:2d 303s 24:0d:a4:c2:cc:0a:67:12:ae:38:c9:56:61:9d:e5:f2 303s 60:3a:9a:dd:1e:96:0b:81:86:8f:e3:5d:1b:6b:c3:b5 303s d9:17:89:05:e9:da:11:cc:a0:2e:a6:4e:11:10:71:c7 303s 53:fa:4c:cf:12:9a:2f:54:25:ac:b3:c5:c9:1e:f7:9d 303s 5d:a8:e3:3c:df:6a:ce:f2:22:b7:6f:89:b1:48:12:4c 303s ac:af:94:f3:2e:51:02:ab:8e:4a:c0:28:2c:39:20:29 303s 303s 303s 303s Public Key PIN: 303s pin-sha256:CQbwG1oy23J3TsxM/MAd4scNQBUE61ylyWsllyVyn68= 303s Public Key ID: 303s sha256:0906f01b5a32db72774ecc4cfcc01de2c70d401504eb5ca5c96b259725729faf 303s sha1:c6197340ba1ad211752c853d1c80e04cde75d9ff 303s 303s -----BEGIN RSA PRIVATE KEY----- 303s MIIEowIBAAKCAQEAmafK0KcDkW8Fx1XXktEwNFnNFYt+F4hwS8/8NJJ0t4BeaPDw 303s 3pwqGAVqANA6PfXj6hGX5VsCmDWk9SYLrzNqlUHQ3zg03Jg8tFq181no9qwX86S/ 303s tMiK6uRQbBvtHcj/Wa3ZcgioH/IXNDQ2W6/GIs3CMI1+k547eam3PJENnfod7vHY 303s wCyzzT35eUutXC99jFEyQjH4jqYE6F9F9wiojL+sRo+z1IPtSDU0Ac+ayOAclZuZ 303s dSSR5TQadZ78nQQnnHxlUzcy/+oD/ON7fAiAqbSX7IXuuYHfkzPo2j5Kz33mEldu 303s wCKpiCnhZK1QTCvZfBUJTV+pBgDb7qumdspBLQIDAQABAoIBACZNlphW2ePaKjWb 303s p4Z40Sxrql0Rjdgt8dhkO3mbfK71uBMu5MyJX1DnoJodTjd94VfLFPNesZHh5YIa 303s /tSo24vjgT7z0vGenZtT9YF5S0KaecoJqqRVTZPqYEXi3EQNg+IGHWt4zvhPsAsa 303s bOaENb8dTaguzXvc+PSGIyBdBGj5urSjy/YvZ3l6WT/ejCldUTfn3YODtMYiwNeM 303s eZMR92QzR3PWGgbF1CynAozX94xLB42VLkA8UmQxIYVykbUTTeV847OxsiSq4fMi 303s +5a7etVPA+WRzVABhVLHg8+oI+UQDtUcIBHm02VD3rjc3Qf2e6XCv8lqxCusA/u1 303s SDI//90CgYEAxvnroDiHxzyABs10jM5MBEMRk4is0p+v5jqUEBbGYk9LHyJWATPp 303s bJ08C6VIiIKNwAniy4wtL3RuGGRcmZNAHKpKZp4cgeofxN05fVyxaJxwU0ntUSR2 303s MDIEPwupWdS6cwCiQAOtlG2kSumcUwb9n7ijMonAN/PjZbD872RrmE8CgYEAxbDe 303s KLQYGoL0h9iEv+9JFZMhivV8Tkk6TNZ70xWHOwiPBfh/Xlc1LnivfXOZ8pH/oGca 303s +qwscubOmYYr4eRYhBf+nDZwFHFNWO6KL90CG2COCf0wWXvN0KBmu+MsQeVf7mec 303s b9gp2KnFuaHzM9HviUjePC1u7xjptZ1T5MHKs8MCgYEAnkZAstMk1kv+vuqBUlvr 303s Rdyfx46JgoU5o1ZnXqDvL1ZJuDtU1GIZxKcSE2VnXAcVgHOcrzMS4lOoG8kBi7wA 303s 3Ixs4FHW9VRp7uvWhizMhh0ikG4W01vAk7fFfuzkyisYINCZP3htg8rvTBOloLnH 303s 11xEnLfMafWbpdFycW6c06sCgYBF8jJojHAK0VLbzcwKbQuaypgPppP4zwgFr83X 303s /cH/LSQNpMLMCmcSrjjJVmGd5fJgOprdHpYLgYaP410ba8O12ReJBenaEcygLqZO 303s ERBxx1P6TM8Smi9UJayzxcke951dqOM832rO8iK3b4mxSBJMrK+U8y5RAquOSsAo 303s LDkgKQKBgD0r8d+Wfsi4f8W7i/7pwtawHn6C+CKR6SEyFkjaBhFJsm1KJnyH5E2d 303s 4UOdNuNeDMbgDFMJcZIN454KKwaohtPDQqh/I8HbqVWmoVE/mWSFUKziOvsVhjmU 303s 9b1fWw2mz0HB9ZoT55KocZLHtWDOOJ57Oe+KeKs0L52OVNi1KVn0 303s -----END RSA PRIVATE KEY----- 303s Public Key Info: 303s Public Key Algorithm: RSA 303s Key Security Level: Medium (2048 bits) 303s 303s modulus: 303s 00:ed:aa:b5:bf:b1:8d:eb:4b:2d:d0:33:ed:c5:20:8d 303s 33:14:e8:35:d3:86:1f:54:92:d1:0b:3f:42:a0:ba:f3 303s 96:b0:b6:1b:92:67:17:79:c0:75:7e:75:87:c2:30:54 303s c5:6d:98:6a:c2:d5:fa:31:f8:9b:38:52:11:6d:df:30 303s 1e:b3:59:75:e1:af:f0:76:5b:af:68:66:a0:0b:b7:56 303s 38:46:87:00:69:38:77:d3:96:f2:aa:b1:9d:4b:9d:47 303s 12:b3:7d:d9:6b:db:e0:b6:9e:6a:60:0c:b1:33:5c:fa 303s 4f:42:20:af:9c:44:da:27:88:79:98:50:96:58:8d:85 303s eb:28:09:30:be:28:95:e2:0c:36:dc:87:fd:a8:59:33 303s 86:e9:7e:60:cb:39:71:fd:e2:ac:92:62:c2:86:40:a6 303s 2f:b6:11:d3:2a:ef:c7:a1:3c:07:f5:ea:4e:1b:a6:42 303s bf:eb:29:be:7d:60:ee:fd:4d:5a:9c:4f:0a:06:5a:61 303s 7e:40:25:2c:2e:47:7a:88:11:19:4d:da:1e:16:f8:fb 303s c5:2c:4c:79:61:c5:e1:47:d0:97:91:61:02:fd:a5:7f 303s 99:ef:76:56:bc:0c:2a:c5:00:7f:b6:b9:de:42:33:44 303s 26:77:7b:c2:5e:5e:73:8a:41:cf:5e:d0:81:2f:9a:3e 303s b5: 303s 303s public exponent: 303s 01:00:01: 303s 303s private exponent: 303s 62:c6:10:d5:03:50:cd:1a:28:87:20:1d:d0:50:6f:fe 303s 6b:d0:fa:15:d7:e7:0b:7a:1d:01:04:a0:87:36:4b:68 303s 34:36:eb:0c:94:65:d0:46:e9:4d:ce:40:c6:b6:d9:74 303s 57:d1:01:85:c9:f2:3a:74:6c:e6:22:4d:76:11:4c:e9 303s 65:76:67:a4:8d:3f:6d:a1:3b:2c:33:82:8e:7b:fa:8c 303s 56:db:62:93:58:51:8c:91:6e:76:fc:6c:37:f1:bc:89 303s 0c:29:e0:83:90:15:3b:30:69:5b:53:cb:0d:62:b5:f0 303s dc:b5:c2:e6:3a:43:44:2c:d7:04:33:71:d8:89:b0:be 303s b6:8e:61:11:7e:33:d2:61:cb:c6:19:43:63:1f:ed:91 303s 75:be:64:86:f9:ba:f7:73:dd:4a:31:d7:79:06:a7:2f 303s 44:dd:10:9a:a9:93:47:b3:8f:75:d5:a1:a9:26:ab:d4 303s cb:a1:b5:da:da:8c:ec:68:4c:0f:fd:f9:06:95:98:36 303s 42:63:62:12:2e:99:24:27:59:3f:59:04:e7:55:1a:f4 303s ed:19:74:7d:87:66:fe:44:8f:7e:ef:49:e4:2c:29:54 303s 5d:93:ba:92:43:68:fb:1d:11:be:b5:15:9b:31:d9:91 303s 74:43:ef:c0:ef:3b:2f:c7:8b:aa:35:e8:8b:a0:e0:21 303s 303s 303s prime1: 303s 00:fa:82:ca:9e:03:b4:17:ee:14:e8:90:b4:fe:87:f5 303s c1:d7:d0:76:be:55:6d:56:22:27:d3:84:1e:68:12:f3 303s 45:f5:10:8b:f7:3d:dc:2d:0b:5f:d1:13:04:2b:0e:55 303s 1c:98:c3:b4:8a:84:05:2c:76:89:e6:d0:18:67:38:c6 303s 17:ea:a0:96:34:46:a7:91:eb:dd:3a:35:44:18:79:ff 303s d9:8c:27:26:c8:c9:aa:a7:49:8f:8f:f6:3c:56:fa:3a 303s 38:55:36:f9:94:f1:ab:49:50:78:70:68:f4:71:71:3e 303s 0a:23:3b:f7:81:42:eb:5a:ae:35:48:e8:56:9b:6c:47 303s 7d: 303s 303s prime2: 303s 00:f2:df:df:10:3d:0b:36:f8:8b:6d:e8:70:33:82:6a 303s 39:2b:f5:d5:2b:f8:7f:c5:52:a3:32:9d:ec:3f:34:91 303s 4b:2e:ec:44:5b:4a:8c:e0:f4:e0:b6:70:90:0e:e9:55 303s 3f:78:df:8d:be:c9:ed:f3:a4:37:55:6d:b7:20:63:bd 303s 7b:58:33:32:1d:d3:6a:20:ab:d5:6c:87:10:55:f1:ad 303s 55:d2:f8:cd:b4:a0:ec:f3:99:8f:12:d8:46:95:eb:67 303s a9:ed:b5:a6:0d:22:61:a5:57:ea:10:93:05:d7:31:21 303s a5:95:7e:44:6c:02:80:58:d4:c9:fe:95:28:26:1a:a9 303s 99: 303s 303s coefficient: 303s 7d:8a:99:32:ed:22:09:e1:f0:2f:64:49:73:ac:c5:93 303s 41:62:77:87:11:6c:bc:79:4c:49:de:75:f1:15:44:bc 303s 50:84:1c:a9:e6:f4:1d:f5:6c:57:4d:e7:cf:cb:cc:88 303s 43:eb:bf:86:74:47:a4:2c:c1:22:8f:74:1c:90:32:cc 303s 97:be:19:00:58:5e:3c:07:80:ea:49:fb:96:72:b7:dd 303s fd:69:5f:4a:44:07:24:d5:ee:56:6f:9f:a2:0a:b3:5a 303s 5c:06:5a:cf:4b:2b:2d:8b:f1:ea:4c:27:8d:25:e5:0e 303s 28:19:e3:6f:06:44:18:2e:36:30:fd:0c:ca:b3:6c:0a 303s 303s 303s exp1: 303s 00:f6:f8:a9:0f:3d:b1:78:82:25:24:df:3d:41:4f:03 303s 2f:d7:37:d3:49:74:69:35:a8:b8:c0:e4:19:22:1b:c4 303s b1:2c:98:e2:94:9e:ed:09:8f:94:28:48:6a:2c:94:95 303s be:7a:b1:3e:b5:ec:d0:38:f4:a8:a1:e0:78:9e:93:2f 303s 60:f6:d4:d9:20:b2:a3:93:ce:08:2d:d1:c3:cf:a9:bf 303s 5e:57:b9:65:98:40:91:b9:19:61:aa:d9:64:c5:8f:2e 303s 84:c9:26:48:ca:d9:b3:37:b5:58:f7:e1:d1:54:62:03 303s 7a:f5:1f:b2:b4:42:28:4c:1f:41:b3:1e:33:fc:48:b4 303s f5: 303s 303s exp2: 303s 0e:88:db:3e:8b:88:aa:47:81:80:98:52:6e:a2:b5:5c 303s aa:86:d1:b5:09:f0:0b:8d:00:7b:3c:fc:30:64:22:f5 303s ce:df:10:d0:2d:cb:f4:82:73:18:37:f0:47:14:2b:a7 303s da:c1:f6:27:9e:ca:00:b4:a9:23:11:a7:cd:e6:6a:26 303s 81:86:be:cf:0e:21:e1:c6:a6:c5:11:e8:26:5c:8a:35 303s 02:a5:25:1a:54:2f:19:fc:ec:95:02:20:67:44:69:35 303s c0:26:08:c3:ec:74:cf:82:4d:5d:a4:8e:ca:ec:03:c9 303s 77:02:d1:71:6d:4c:e5:04:06:fa:97:4e:89:c9:3a:b1 303s 303s 303s 303s Public Key PIN: 303s pin-sha256:+F2/o5lMHvrpHkiQ0SqohliYus2kUUQ+h3xAnglCgTY= 303s Public Key ID: 303s sha256:f85dbfa3994c1efae91e4890d12aa8865898bacda451443e877c409e09428136 303s sha1:32842a8e21552633d964bb5c2b8282d75c64862f 303s 303s -----BEGIN RSA PRIVATE KEY----- 303s MIIEowIBAAKCAQEA7aq1v7GN60st0DPtxSCNMxToNdOGH1SS0Qs/QqC685awthuS 303s Zxd5wHV+dYfCMFTFbZhqwtX6MfibOFIRbd8wHrNZdeGv8HZbr2hmoAu3VjhGhwBp 303s OHfTlvKqsZ1LnUcSs33Za9vgtp5qYAyxM1z6T0Igr5xE2ieIeZhQlliNhesoCTC+ 303s KJXiDDbch/2oWTOG6X5gyzlx/eKskmLChkCmL7YR0yrvx6E8B/XqThumQr/rKb59 303s YO79TVqcTwoGWmF+QCUsLkd6iBEZTdoeFvj7xSxMeWHF4UfQl5FhAv2lf5nvdla8 303s DCrFAH+2ud5CM0Qmd3vCXl5zikHPXtCBL5o+tQIDAQABAoIBAGLGENUDUM0aKIcg 303s HdBQb/5r0PoV1+cLeh0BBKCHNktoNDbrDJRl0EbpTc5AxrbZdFfRAYXJ8jp0bOYi 303s TXYRTOlldmekjT9toTssM4KOe/qMVttik1hRjJFudvxsN/G8iQwp4IOQFTswaVtT 303s yw1itfDctcLmOkNELNcEM3HYibC+to5hEX4z0mHLxhlDYx/tkXW+ZIb5uvdz3Uox 303s 13kGpy9E3RCaqZNHs4911aGpJqvUy6G12tqM7GhMD/35BpWYNkJjYhIumSQnWT9Z 303s BOdVGvTtGXR9h2b+RI9+70nkLClUXZO6kkNo+x0RvrUVmzHZkXRD78DvOy/Hi6o1 303s 6Iug4CECgYEA+oLKngO0F+4U6JC0/of1wdfQdr5VbVYiJ9OEHmgS80X1EIv3Pdwt 303s C1/REwQrDlUcmMO0ioQFLHaJ5tAYZzjGF+qgljRGp5Hr3To1RBh5/9mMJybIyaqn 303s SY+P9jxW+jo4VTb5lPGrSVB4cGj0cXE+CiM794FC61quNUjoVptsR30CgYEA8t/f 303s ED0LNviLbehwM4JqOSv11Sv4f8VSozKd7D80kUsu7ERbSozg9OC2cJAO6VU/eN+N 303s vsnt86Q3VW23IGO9e1gzMh3TaiCr1WyHEFXxrVXS+M20oOzzmY8S2EaV62ep7bWm 303s DSJhpVfqEJMF1zEhpZV+RGwCgFjUyf6VKCYaqZkCgYEA9vipDz2xeIIlJN89QU8D 303s L9c300l0aTWouMDkGSIbxLEsmOKUnu0Jj5QoSGoslJW+erE+tezQOPSooeB4npMv 303s YPbU2SCyo5POCC3Rw8+pv15XuWWYQJG5GWGq2WTFjy6EySZIytmzN7VY9+HRVGID 303s evUfsrRCKEwfQbMeM/xItPUCgYAOiNs+i4iqR4GAmFJuorVcqobRtQnwC40Aezz8 303s MGQi9c7fENAty/SCcxg38EcUK6fawfYnnsoAtKkjEafN5momgYa+zw4h4camxRHo 303s JlyKNQKlJRpULxn87JUCIGdEaTXAJgjD7HTPgk1dpI7K7APJdwLRcW1M5QQG+pdO 303s ick6sQKBgH2KmTLtIgnh8C9kSXOsxZNBYneHEWy8eUxJ3nXxFUS8UIQcqeb0HfVs 303s V03nz8vMiEPrv4Z0R6QswSKPdByQMsyXvhkAWF48B4DqSfuWcrfd/WlfSkQHJNXu 303s Vm+fogqzWlwGWs9LKy2L8epMJ40l5Q4oGeNvBkQYLjYw/QzKs2wK 303s -----END RSA PRIVATE KEY----- 303s Public Key Info: 303s Public Key Algorithm: EC/ECDSA 303s Key Security Level: High (256 bits) 303s 303s curve: SECP256R1 303s private key: 303s 00:d1:5d:86:7a:25:26:ba:3c:be:72:0d:c5:b3:3e:31 303s f5:77:14:8f:4d:f5:2b:21:45:c3:16:a9:ee:3d:1d:f7 303s f0: 303s 303s x: 303s 00:b2:eb:6a:a6:cb:dc:b7:b1:7d:01:68:1d:d5:b9:09 303s 0b:2d:85:b5:fa:ea:94:d2:92:58:6f:8e:12:12:a4:f6 303s ae: 303s 303s y: 303s 1f:54:4f:1f:8f:1f:e3:d9:b0:88:2b:79:f5:63:d2:7a 303s e5:2b:f8:f8:4f:04:6f:59:29:0f:73:f6:2c:f8:ac:9c 303s 303s 303s 303s Public Key PIN: 303s pin-sha256:q9+NARZG9msgShsTEpX3O1ePgz/58N7AW5uFgzHNSoM= 303s Public Key ID: 303s sha256:abdf8d011646f66b204a1b131295f73b578f833ff9f0dec05b9b858331cd4a83 303s sha1:a2f96b300db3659f5ea44a151edf326aa989dfe2 303s 303s -----BEGIN EC PRIVATE KEY----- 303s MHgCAQEEIQDRXYZ6JSa6PL5yDcWzPjH1dxSPTfUrIUXDFqnuPR338KAKBggqhkjO 303s PQMBB6FEA0IABLLraqbL3LexfQFoHdW5CQsthbX66pTSklhvjhISpPauH1RPH48f 303s 49mwiCt59WPSeuUr+PhPBG9ZKQ9z9iz4rJw= 303s -----END EC PRIVATE KEY----- 303s SUCCESS [57]../../tests/cert-tests/privkey-import.sh 303s running [58]../../tests/cert-tests/provable-dh-default.sh ... 303s Generating DH parameters (3072 bits)... 303s (might take long time) 306s Key was verified 306s SUCCESS [58]../../tests/cert-tests/provable-dh-default.sh 306s running [59]../../tests/cert-tests/provable-dh.sh ... 306s ** Note: You may use '--sec-param Medium' instead of '--bits 2048' 306s Generating DH parameters (2048 bits)... 306s (might take long time) 315s Key was verified 315s Key was verified 315s SUCCESS [59]../../tests/cert-tests/provable-dh.sh 315s running [60]../../tests/cert-tests/provable-privkey-dsa2048.sh ... 316s ** Note: You may use '--sec-param Medium' instead of '--bits 2048' 316s Generating a 2048 bit DSA private key... 316s Note that DSA keys with size over 1024 may cause incompatibility problems when used with earlier than TLS 1.2 versions. 316s 319s Key was verified 319s Key was verified 319s SUCCESS [60]../../tests/cert-tests/provable-privkey-dsa2048.sh 319s running [61]../../tests/cert-tests/provable-privkey-gen-default.sh ... 319s Generating a 3072 bit RSA private key... 320s SUCCESS [61]../../tests/cert-tests/provable-privkey-gen-default.sh 320s running [62]../../tests/cert-tests/provable-privkey-rsa2048.sh ... 320s ** Note: You may use '--sec-param Medium' instead of '--bits 2048' 320s Generating a 2048 bit RSA private key... 321s Key was verified 321s Key was verified 321s SUCCESS [62]../../tests/cert-tests/provable-privkey-rsa2048.sh 321s running [63]../../tests/cert-tests/provable-privkey.sh ... 321s Key was verified 322s Key was verified 322s Key was verified 322s Key was verified 322s Error verifying private key: Error in the private key verification; seed doesn't match. 325s Error verifying private key: Error in the private key verification; seed doesn't match. 325s Hash: SHA384 325s Seed: ab499ea55a5f4cb743434e49ca1ee3a491544309c6f59ab2cd5507de 325s SUCCESS [63]../../tests/cert-tests/provable-privkey.sh 325s ../../tests/cert-tests/reject-invalid-time.sh: 35: pkg-config: not found 325s running [64]../../tests/cert-tests/reject-invalid-time.sh ... 325s SKIPPED [64]../../tests/cert-tests/reject-invalid-time.sh 325s running [65]../../tests/cert-tests/reject-negative-serial.sh ... 325s SKIPPED [65]../../tests/cert-tests/reject-negative-serial.sh 325s running [66]../../tests/cert-tests/rsa-pss-pad.sh ... 325s Generating a self signed certificate... 325s X.509 Certificate Information: 325s Version: 3 325s Serial Number (hex): 07 325s Validity: 325s Not Before: Sun Apr 22 00:00:00 UTC 2007 325s Not After: Sun May 25 00:00:00 UTC 2014 325s Subject: EMAIL=none@none.org,pseudonym=jackal,title=Dr.,UID=clauper,CN=Cindy Lauper,OU=sleeping dept.,O=Koko inc.,ST=Attiki,C=GR 325s Subject Public Key Algorithm: RSA-PSS 325s Algorithm Security Level: Medium (2048 bits) 325s Parameters: 325s Hash Algorithm: SHA256 325s Salt Length: 32 325s Modulus (bits 2048): 325s 00:99:a7:ca:d0:a7:03:91:6f:05:c7:55:d7:92:d1:30 325s 34:59:cd:15:8b:7e:17:88:70:4b:cf:fc:34:92:74:b7 325s 80:5e:68:f0:f0:de:9c:2a:18:05:6a:00:d0:3a:3d:f5 325s e3:ea:11:97:e5:5b:02:98:35:a4:f5:26:0b:af:33:6a 325s 95:41:d0:df:38:34:dc:98:3c:b4:5a:b5:f3:59:e8:f6 325s ac:17:f3:a4:bf:b4:c8:8a:ea:e4:50:6c:1b:ed:1d:c8 325s ff:59:ad:d9:72:08:a8:1f:f2:17:34:34:36:5b:af:c6 325s 22:cd:c2:30:8d:7e:93:9e:3b:79:a9:b7:3c:91:0d:9d 325s fa:1d:ee:f1:d8:c0:2c:b3:cd:3d:f9:79:4b:ad:5c:2f 325s 7d:8c:51:32:42:31:f8:8e:a6:04:e8:5f:45:f7:08:a8 325s 8c:bf:ac:46:8f:b3:d4:83:ed:48:35:34:01:cf:9a:c8 325s e0:1c:95:9b:99:75:24:91:e5:34:1a:75:9e:fc:9d:04 325s 27:9c:7c:65:53:37:32:ff:ea:03:fc:e3:7b:7c:08:80 325s a9:b4:97:ec:85:ee:b9:81:df:93:33:e8:da:3e:4a:cf 325s 7d:e6:12:57:6e:c0:22:a9:88:29:e1:64:ad:50:4c:2b 325s d9:7c:15:09:4d:5f:a9:06:00:db:ee:ab:a6:76:ca:41 325s 2d 325s Exponent (bits 24): 325s 01:00:01 325s Extensions: 325s Basic Constraints (critical): 325s Certificate Authority (CA): TRUE 325s Subject Alternative Name (not critical): 325s DNSname: www.none.org 325s DNSname: www.morethanone.org 325s DNSname: www.evenmorethanone.org 325s IPAddress: 192.168.1.1 325s RFC822Name: none@none.org 325s RFC822Name: where@none.org 325s Key Purpose (not critical): 325s OCSP signing. 325s Key Usage (critical): 325s Digital signature. 325s Certificate signing. 325s Subject Key Identifier (not critical): 325s c6197340ba1ad211752c853d1c80e04cde75d9ff 325s CRL Distribution points (not critical): 325s URI: http://www.getcrl.crl/getcrl1/ 325s URI: http://www.getcrl.crl/getcrl2/ 325s URI: http://www.getcrl.crl/getcrl3/ 325s Other Information: 325s Public Key ID: 325s sha1:78a4aa159f5af1774313cb42ad9e171a974cb4d7 325s sha256:0225fb04fe3ab4c94abd6486090e785e71882e8b663541ed9b0c135ed3e168b0 325s Public Key PIN: 325s pin-sha256:AiX7BP46tMlKvWSGCQ54XnGILotmNUHtmwwTXtPhaLA= 325s 325s 325s 325s Signing certificate... 325s Generating a self signed certificate... 325s SUCCESS [66]../../tests/cert-tests/rsa-pss-pad.sh 325s running [67]../../tests/cert-tests/sha2-dsa-test.sh ... 325s X.509 Certificate Information: 325s Version: 3 325s Serial Number (hex): 07 325s Validity: 325s Not Before: Sun Apr 22 00:00:00 UTC 2007 325s Not After: Sun May 25 00:00:00 UTC 2014 325s Subject: EMAIL=none@none.org,pseudonym=jackal,title=Dr.,UID=clauper,CN=Cindy Lauper,OU=sleeping dept.,O=Koko inc.,ST=Attiki,C=GR 325s Subject Public Key Algorithm: RSA-PSS 325s Algorithm Security Level: Medium (2048 bits) 325s Parameters: 325s Hash Algorithm: SHA384 325s Salt Length: 48 325s Modulus (bits 2048): 325s 00:99:a7:ca:d0:a7:03:91:6f:05:c7:55:d7:92:d1:30 325s 34:59:cd:15:8b:7e:17:88:70:4b:cf:fc:34:92:74:b7 325s 80:5e:68:f0:f0:de:9c:2a:18:05:6a:00:d0:3a:3d:f5 325s e3:ea:11:97:e5:5b:02:98:35:a4:f5:26:0b:af:33:6a 325s 95:41:d0:df:38:34:dc:98:3c:b4:5a:b5:f3:59:e8:f6 325s ac:17:f3:a4:bf:b4:c8:8a:ea:e4:50:6c:1b:ed:1d:c8 325s ff:59:ad:d9:72:08:a8:1f:f2:17:34:34:36:5b:af:c6 325s 22:cd:c2:30:8d:7e:93:9e:3b:79:a9:b7:3c:91:0d:9d 325s fa:1d:ee:f1:d8:c0:2c:b3:cd:3d:f9:79:4b:ad:5c:2f 325s 7d:8c:51:32:42:31:f8:8e:a6:04:e8:5f:45:f7:08:a8 325s 8c:bf:ac:46:8f:b3:d4:83:ed:48:35:34:01:cf:9a:c8 325s e0:1c:95:9b:99:75:24:91:e5:34:1a:75:9e:fc:9d:04 325s 27:9c:7c:65:53:37:32:ff:ea:03:fc:e3:7b:7c:08:80 325s a9:b4:97:ec:85:ee:b9:81:df:93:33:e8:da:3e:4a:cf 325s 7d:e6:12:57:6e:c0:22:a9:88:29:e1:64:ad:50:4c:2b 325s d9:7c:15:09:4d:5f:a9:06:00:db:ee:ab:a6:76:ca:41 325s 2d 325s Exponent (bits 24): 325s 01:00:01 325s Extensions: 325s Basic Constraints (critical): 325s Certificate Authority (CA): TRUE 325s Subject Alternative Name (not critical): 325s DNSname: www.none.org 325s DNSname: www.morethanone.org 325s DNSname: www.evenmorethanone.org 325s IPAddress: 192.168.1.1 325s RFC822Name: none@none.org 325s RFC822Name: where@none.org 325s Key Purpose (not critical): 325s OCSP signing. 325s Key Usage (critical): 325s Digital signature. 325s Certificate signing. 325s Subject Key Identifier (not critical): 325s c6197340ba1ad211752c853d1c80e04cde75d9ff 325s CRL Distribution points (not critical): 325s URI: http://www.getcrl.crl/getcrl1/ 325s URI: http://www.getcrl.crl/getcrl2/ 325s URI: http://www.getcrl.crl/getcrl3/ 325s Other Information: 325s Public Key ID: 325s sha1:21ed33e4cca314f84914fb4247ed9763fe58f302 325s sha256:eb9076b59a55e58fb922b915b6cd200591dcb55b9a09ee1f3ac4571b00378b79 325s Public Key PIN: 325s pin-sha256:65B2tZpV5Y+5IrkVts0gBZHctVuaCe4fOsRXGwA3i3k= 325s 325s 325s 325s Signing certificate... 325s Generating a self signed certificate... 325s X.509 Certificate Information: 325s Version: 3 325s Serial Number (hex): 07 325s Validity: 325s Not Before: Sun Apr 22 00:00:00 UTC 2007 325s Not After: Sun May 25 00:00:00 UTC 2014 325s Subject: EMAIL=none@none.org,pseudonym=jackal,title=Dr.,UID=clauper,CN=Cindy Lauper,OU=sleeping dept.,O=Koko inc.,ST=Attiki,C=GR 325s Subject Public Key Algorithm: RSA-PSS 325s Algorithm Security Level: Medium (2048 bits) 325s Parameters: 325s Hash Algorithm: SHA512 325s Salt Length: 64 325s Modulus (bits 2048): 325s 00:99:a7:ca:d0:a7:03:91:6f:05:c7:55:d7:92:d1:30 325s 34:59:cd:15:8b:7e:17:88:70:4b:cf:fc:34:92:74:b7 325s 80:5e:68:f0:f0:de:9c:2a:18:05:6a:00:d0:3a:3d:f5 325s e3:ea:11:97:e5:5b:02:98:35:a4:f5:26:0b:af:33:6a 325s 95:41:d0:df:38:34:dc:98:3c:b4:5a:b5:f3:59:e8:f6 325s ac:17:f3:a4:bf:b4:c8:8a:ea:e4:50:6c:1b:ed:1d:c8 325s ff:59:ad:d9:72:08:a8:1f:f2:17:34:34:36:5b:af:c6 325s 22:cd:c2:30:8d:7e:93:9e:3b:79:a9:b7:3c:91:0d:9d 325s fa:1d:ee:f1:d8:c0:2c:b3:cd:3d:f9:79:4b:ad:5c:2f 325s 7d:8c:51:32:42:31:f8:8e:a6:04:e8:5f:45:f7:08:a8 325s 8c:bf:ac:46:8f:b3:d4:83:ed:48:35:34:01:cf:9a:c8 325s e0:1c:95:9b:99:75:24:91:e5:34:1a:75:9e:fc:9d:04 325s 27:9c:7c:65:53:37:32:ff:ea:03:fc:e3:7b:7c:08:80 325s a9:b4:97:ec:85:ee:b9:81:df:93:33:e8:da:3e:4a:cf 325s 7d:e6:12:57:6e:c0:22:a9:88:29:e1:64:ad:50:4c:2b 325s d9:7c:15:09:4d:5f:a9:06:00:db:ee:ab:a6:76:ca:41 325s 2d 325s Exponent (bits 24): 325s 01:00:01 325s Extensions: 325s Basic Constraints (critical): 325s Certificate Authority (CA): TRUE 325s Subject Alternative Name (not critical): 325s DNSname: www.none.org 325s DNSname: www.morethanone.org 325s DNSname: www.evenmorethanone.org 325s IPAddress: 192.168.1.1 325s RFC822Name: none@none.org 325s RFC822Name: where@none.org 325s Key Purpose (not critical): 325s OCSP signing. 325s Key Usage (critical): 325s Digital signature. 325s Certificate signing. 325s Subject Key Identifier (not critical): 325s c6197340ba1ad211752c853d1c80e04cde75d9ff 325s CRL Distribution points (not critical): 325s URI: http://www.getcrl.crl/getcrl1/ 325s URI: http://www.getcrl.crl/getcrl2/ 325s URI: http://www.getcrl.crl/getcrl3/ 325s Other Information: 325s Public Key ID: 325s sha1:29b7b958d46609dc0d68d92dfee1e3ae0ada5033 325s sha256:0ffc107e1044e38328a95f8a1ccc80b026e9cb7810aa40dc68e3fe2cf66475bf 325s Public Key PIN: 325s pin-sha256:D/wQfhBE44MoqV+KHMyAsCbpy3gQqkDcaOP+LPZkdb8= 325s 325s 325s 325s Signing certificate... 325s Note that no verification profile was selected. In the future the medium profile will be enabled by default. 325s Use --verify-profile low to apply the default verification of NORMAL priority string. 325s SUCCESS [67]../../tests/cert-tests/sha2-dsa-test.sh 325s running [68]../../tests/cert-tests/sha2-test.sh ... 325s Note that no verification profile was selected. In the future the medium profile will be enabled by default. 325s Use --verify-profile low to apply the default verification of NORMAL priority string. 325s SUCCESS [68]../../tests/cert-tests/sha2-test.sh 325s running [69]../../tests/cert-tests/sha3-test.sh ... 325s SUCCESS [69]../../tests/cert-tests/sha3-test.sh 325s running [70]../../tests/cert-tests/smime.sh ... 325s Signature status: ok 325s eContent Type: 1.2.840.113549.1.7.1 325s Signers: 325s Signer's issuer DN: CN=GnuTLS Test CA 325s Signer's serial: 4de0b4ca 325s Signing time: Wed Apr 05 11:50:32 UTC 2017 325s Signature Algorithm: RSA-SHA256 325s 325s SUCCESS [70]../../tests/cert-tests/smime.sh 325s running [71]../../tests/cert-tests/template-exts-test.sh ... 325s Generating a self signed certificate... 325s X.509 Certificate Information: 325s Version: 3 325s Serial Number (hex): 09 325s Validity: 325s Not Before: Sun Apr 22 00:00:00 UTC 2007 325s Not After: Sun May 25 00:00:00 UTC 2014 325s Subject: UID=clauper,CN=Cindy Lauper,OU=sleeping dept.,O=Koko inc.,ST=Attiki,C=GR 325s Subject Public Key Algorithm: RSA 325s Algorithm Security Level: Low (1024 bits) 325s Modulus (bits 1024): 325s 00:a5:c6:ce:75:43:84:bf:64:9e:02:27:13:f1:03:59 325s f7:79:2d:92:ed:7c:2f:50:a4:03:f1:2d:79:b9:86:8b 325s 05:7e:3a:bb:44:aa:af:84:cf:13:98:1e:1c:4a:38:f7 325s 33:2d:7a:9f:72:d4:6b:6d:26:b0:31:37:70:10:fb:42 325s e9:d8:9d:18:65:7e:19:49:fc:05:96:04:68:83:1e:77 325s 86:bf:ed:f5:e5:12:3b:13:fe:33:18:9c:1a:7a:1d:69 325s af:47:02:60:7a:1f:b9:e8:cf:db:c8:34:30:51:96:3d 325s 8c:96:5c:00:bc:61:de:08:0f:b1:36:21:7f:a9:00:e3 325s 05 325s Exponent (bits 24): 325s 01:00:01 325s Extensions: 325s Unknown extension 1.2.3.4 (not critical): 325s ASCII: ........... 325s Hexdump: 0001020304050607aaabcd 325s Unknown extension 1.6.7.8 (not critical): 325s ASCII: ........... 325s Hexdump: 0001020304050607aaabcd 325s Unknown extension 1.2.3.4.5.6.7 (not critical): 325s ASCII: .4.Z.e.'.~.G.... 325s Hexdump: 1d34cd5ad065dc27c17e9447b0aaaca7 325s Unknown extension 1.2.3.4294967295.7 (not critical): 325s ASCII: ...A?....J.K..l|...4..~.L..&.ap.E........}!'...s.....b=...K..6Sb.4.Z.e.'.~.G.... 325s Hexdump: 178f0e413f041cc9d64af64bf3b66c7ceac6fa34a4d77ed64c968b26c761709445f40d9ca0a00091af7d212789c00b7387b1d0d7ab623dd4029d4b86db3653621d34cd5ad065dc27c17e9447b0aaaca7 325s Unknown extension 1.2.6710656.7 (not critical): 325s ASCII: .J.K..l|...4..~.L..&.ap.E........}!'...s.....b=...K..6Sb.4.Z.e.'.~.G.... 325s Hexdump: d64af64bf3b66c7ceac6fa34a4d77ed64c968b26c761709445f40d9ca0a00091af7d212789c00b7387b1d0d7ab623dd4029d4b86db3653621d34cd5ad065dc27c17e9447b0aaaca7 325s Unknown extension 1.0.1.5 (not critical): 325s ASCII: ...... 325s Hexdump: 0404cafebeaf 325s Unknown extension 1.10.11.12.13.14.15.16.17.1.5 (critical): 325s ASCII: .. 325s Hexdump: cafe 325s Unknown extension 1.0.1.5.1 (critical): 325s ASCII: ........ 325s Hexdump: 0406beafcafefafa 325s Basic Constraints (critical): 325s Certificate Authority (CA): FALSE 325s Key Purpose (not critical): 325s Email protection. 325s Subject Key Identifier (not critical): 325s 5d40adf0ce9440958b7e99941d925422ca72365f 325s Other Information: 325s Public Key ID: 325s sha1:5d40adf0ce9440958b7e99941d925422ca72365f 325s sha256:472f7ef457b70a57a585094b285fdaef7ad72553495701ecd4f2a6dcb477b50e 325s Public Key PIN: 325s pin-sha256:Ry9+9Fe3ClelhQlLKF/a73rXJVNJVwHs1PKm3LR3tQ4= 325s 325s 325s 325s Signing certificate... 325s Generating a self signed certificate... 325s X.509 Certificate Information: 325s Version: 3 325s Serial Number (hex): 09 325s Validity: 325s Not Before: Sun Apr 22 00:00:00 UTC 2007 325s Not After: Sun May 25 00:00:00 UTC 2014 325s Subject: UID=clauper,CN=Cindy Lauper,OU=sleeping dept.,O=Koko inc.,ST=Attiki,C=GR 325s Subject Public Key Algorithm: RSA 325s Algorithm Security Level: Low (1024 bits) 325s Modulus (bits 1024): 325s 00:a5:c6:ce:75:43:84:bf:64:9e:02:27:13:f1:03:59 325s f7:79:2d:92:ed:7c:2f:50:a4:03:f1:2d:79:b9:86:8b 325s 05:7e:3a:bb:44:aa:af:84:cf:13:98:1e:1c:4a:38:f7 325s 33:2d:7a:9f:72:d4:6b:6d:26:b0:31:37:70:10:fb:42 325s e9:d8:9d:18:65:7e:19:49:fc:05:96:04:68:83:1e:77 325s 86:bf:ed:f5:e5:12:3b:13:fe:33:18:9c:1a:7a:1d:69 325s af:47:02:60:7a:1f:b9:e8:cf:db:c8:34:30:51:96:3d 325s 8c:96:5c:00:bc:61:de:08:0f:b1:36:21:7f:a9:00:e3 325s 05 325s Exponent (bits 24): 325s 01:00:01 325s Extensions: 325s Unknown extension 1.10.11.12.13.14.15.16.17.1.5 (critical): 325s ASCII: .. 325s Hexdump: cafe 325s Unknown extension 1.2.1.5.1 (critical): 325s ASCII: ........ 325s Hexdump: 0406beafcafefafa 325s Basic Constraints (critical): 325s Certificate Authority (CA): FALSE 325s Subject Key Identifier (not critical): 325s 5d40adf0ce9440958b7e99941d925422ca72365f 325s Other Information: 325s Public Key ID: 325s sha1:5d40adf0ce9440958b7e99941d925422ca72365f 325s sha256:472f7ef457b70a57a585094b285fdaef7ad72553495701ecd4f2a6dcb477b50e 325s Public Key PIN: 325s pin-sha256:Ry9+9Fe3ClelhQlLKF/a73rXJVNJVwHs1PKm3LR3tQ4= 325s 325s 325s 325s Signing certificate... 325s SUCCESS [71]../../tests/cert-tests/template-exts-test.sh 325s running [72]../../tests/cert-tests/template-policy-test.sh ... 325s Generating a self signed certificate... 325s X.509 Certificate Information: 325s Version: 3 325s Serial Number (hex): 0a 325s Validity: 325s Not Before: Sun Apr 22 00:00:00 UTC 2007 325s Not After: Sun May 25 00:00:00 UTC 2014 325s Subject: UID=clauper,CN=Cindy Lauper,OU=sleeping dept.,O=Koko inc.,ST=Attiki,C=GR 325s Subject Public Key Algorithm: RSA 325s Algorithm Security Level: Low (1024 bits) 325s Modulus (bits 1024): 325s 00:a5:c6:ce:75:43:84:bf:64:9e:02:27:13:f1:03:59 325s f7:79:2d:92:ed:7c:2f:50:a4:03:f1:2d:79:b9:86:8b 325s 05:7e:3a:bb:44:aa:af:84:cf:13:98:1e:1c:4a:38:f7 325s 33:2d:7a:9f:72:d4:6b:6d:26:b0:31:37:70:10:fb:42 325s e9:d8:9d:18:65:7e:19:49:fc:05:96:04:68:83:1e:77 325s 86:bf:ed:f5:e5:12:3b:13:fe:33:18:9c:1a:7a:1d:69 325s af:47:02:60:7a:1f:b9:e8:cf:db:c8:34:30:51:96:3d 325s 8c:96:5c:00:bc:61:de:08:0f:b1:36:21:7f:a9:00:e3 325s 05 325s Exponent (bits 24): 325s 01:00:01 325s Extensions: 325s Basic Constraints (critical): 325s Certificate Authority (CA): FALSE 325s Certificate Policies (not critical): 325s 2.16.840.1.101.3.2.1.48.1 325s Subject Key Identifier (not critical): 325s 5d40adf0ce9440958b7e99941d925422ca72365f 325s Other Information: 325s Public Key ID: 325s sha1:5d40adf0ce9440958b7e99941d925422ca72365f 325s sha256:472f7ef457b70a57a585094b285fdaef7ad72553495701ecd4f2a6dcb477b50e 325s Public Key PIN: 325s pin-sha256:Ry9+9Fe3ClelhQlLKF/a73rXJVNJVwHs1PKm3LR3tQ4= 325s 325s 325s 325s Signing certificate... 325s SUCCESS [72]../../tests/cert-tests/template-policy-test.sh 325s running [73]../../tests/cert-tests/template-test.sh ... 325s Running test for 8-byte time_t 326s Running test for certificate generation with --generate-self-signed 326s SUCCESS [73]../../tests/cert-tests/template-test.sh 326s running [74]../../tests/cert-tests/tlsfeature-test.sh ... 326s Generating a PKCS #10 certificate request... 326s |<3>| ASSERT: ../../../lib/x509/attributes.c[_x509_parse_attribute]:97 326s |<3>| ASSERT: ../../../lib/x509/attributes.c[_x509_parse_attribute]:163 326s |<3>| ASSERT: ../../../lib/x509/crq.c[gnutls_x509_crq_get_attribute_by_oid]:515 326s |<3>| ASSERT: ../../../lib/x509/crq.c[gnutls_x509_crq_get_extension_info]:1308 326s |<3>| ASSERT: ../../../lib/x509/crq.c[gnutls_x509_crq_get_extension_by_oid]:1797 326s |<3>| ASSERT: ../../../lib/x509/attributes.c[_x509_parse_attribute]:97 326s |<3>| ASSERT: ../../../lib/x509/attributes.c[_x509_parse_attribute]:163 326s |<3>| ASSERT: ../../../lib/x509/crq.c[gnutls_x509_crq_get_attribute_by_oid]:515 326s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 326s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 326s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_copy_data]:1578 326s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 326s Setting log level to 4 326s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 326s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 326s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 326s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 326s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_copy_data]:1578 326s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 326s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 326s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 326s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 326s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 326s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_copy_data]:1578 326s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 326s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 326s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 326s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 326s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 326s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_copy_data]:1578 326s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 326s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 326s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 326s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 326s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 326s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_copy_data]:1578 326s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 326s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 326s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 326s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 326s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 326s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 326s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 326s |<3>| ASSERT: ../../../lib/x509/crq.c[gnutls_x509_crq_get_extension_by_oid]:1797 326s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 326s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 326s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 326s |<3>| ASSERT: ../../../lib/nettle/mpi.c[wrap_nettle_mpi_print]:59 326s |<3>| ASSERT: ../../../lib/nettle/mpi.c[wrap_nettle_mpi_print]:59 326s |<3>| ASSERT: ../../../lib/x509/crq.c[gnutls_x509_crq_get_version]:614 326s |<3>| ASSERT: ../../../lib/nettle/mpi.c[wrap_nettle_mpi_print]:59 326s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 326s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 326s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 326s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 326s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 326s |<3>| ASSERT: ../../../lib/nettle/mpi.c[wrap_nettle_mpi_print]:59 326s |<3>| ASSERT: ../../../lib/nettle/mpi.c[wrap_nettle_mpi_print]:59 326s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 326s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 326s |<3>| ASSERT: ../../../lib/x509/x509_ext.c[gnutls_subject_alt_names_get]:107 326s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 326s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 326s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 326s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 326s |<3>| ASSERT: ../../../lib/x509/x509_ext.c[gnutls_x509_key_purpose_get]:3026 326s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 326s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 326s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 326s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 326s |<3>| ASSERT: ../../../lib/x509/tls_features.c[gnutls_x509_tlsfeatures_get]:93 326s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 326s |<3>| ASSERT: ../../../lib/nettle/mpi.c[wrap_nettle_mpi_print]:59 326s |<3>| ASSERT: ../../../lib/nettle/mpi.c[wrap_nettle_mpi_print]:59 326s |<3>| ASSERT: ../../../lib/nettle/mpi.c[wrap_nettle_mpi_print]:59 326s |<3>| ASSERT: ../../../lib/nettle/mpi.c[wrap_nettle_mpi_print]:59 326s SUCCESS [74]../../tests/cert-tests/tlsfeature-test.sh 326s running [75]../../tests/cert-tests/x25519-and-x448.sh ... 326s Note that no verification profile was selected. In the future the medium profile will be enabled by default. 326s Use --verify-profile low to apply the default verification of NORMAL priority string. 326s Note that no verification profile was selected. In the future the medium profile will be enabled by default. 326s Use --verify-profile low to apply the default verification of NORMAL priority string. 326s SUCCESS [75]../../tests/cert-tests/x25519-and-x448.sh 326s running [76]../../tests/cert-tests/x509-duplicate-ext.sh ... 326s import error: Duplicate extension in X.509 certificate. 326s SUCCESS [76]../../tests/cert-tests/x509-duplicate-ext.sh 326s running [77]../../tests/certtool-pkcs11.sh ... 326s Testing PKCS11 verification 326s * Initializing smart card... ok 326s * Token: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=34772db387ddfb0b;token=GnuTLS-Test 326s * Writing the CA certificate... ok 326s * Verifying a certificate... ok 326s * Verifying a certificate... ok 326s * Generating a certificate... ok 326s * Writing the CA private key... ok 326s * Generating a certificate (privkey in pkcs11)... ok 326s * All tests succeeded 326s SUCCESS [77]../../tests/certtool-pkcs11.sh 326s running [78]../../tests/cfg-test.sh ... 326s SKIPPED [78]../../tests/cfg-test.sh 326s running [79]../../tests/cipher-listings.sh ... 326s Checking ciphersuite listings 326s library is NOT in FIPS140-2 mode 326s Running without support for SSL3.0 326s checking NORMAL:-VERS-ALL:+VERS-TLS1.0:+VERS-SSL3.0:+VERS-TLS1.1 326s checking NORMAL:-VERS-ALL:+VERS-TLS1.0 326s checking NORMAL:-VERS-ALL:+VERS-TLS1.1 326s checking NORMAL:-VERS-ALL:+VERS-DTLS1.0 326s checking NONE:+VERS-TLS-ALL:+MAC-ALL:+RSA:+AES-128-GCM:+SIGN-ALL:+COMP-NULL 326s checking NONE:+VERS-TLS-ALL:+MAC-ALL:+RSA:+CAMELLIA-256-GCM:+SIGN-ALL:+COMP-NULL 326s checking NONE:+VERS-TLS-ALL:+MAC-ALL:+RSA:+CAMELLIA-256-GCM:+SIGN-ALL:+COMP-NULL:+CTYPE-OPENPGP 326s checking NONE:+VERS-TLS-ALL:+MAC-ALL:+RSA:+CAMELLIA-256-GCM:+SIGN-ALL:+COMP-NULL:-CTYPE-OPENPGP 326s SUCCESS [79]../../tests/cipher-listings.sh 326s running [80]../../tests/danetool.sh ... 326s SUCCESS [80]../../tests/danetool.sh 326s running [81]../../tests/dh-fips-approved.sh ... 326s Checking with approved DH params: rfc3526-group-14-2048 326s reserved port 61878 326s HTTP Server listening on IPv4 0.0.0.0 port 61878...done 326s HTTP Server listening on IPv6 :: port 61878...done 327s Checking with approved DH params: rfc3526-group-15-3072 327s Exiting via signal 15 327s reserved port 60987 327s HTTP Server listening on IPv4 0.0.0.0 port 60987...done 327s HTTP Server listening on IPv6 :: port 60987...done 328s Checking with approved DH params: rfc3526-group-16-4096 328s reserved port 3878 328s Exiting via signal 15 328s HTTP Server listening on IPv4 0.0.0.0 port 3878...done 328s HTTP Server listening on IPv6 :: port 3878...done 329s Checking with approved DH params: rfc3526-group-17-6144 329s reserved port 28884 329s Exiting via signal 15 329s HTTP Server listening on IPv4 0.0.0.0 port 28884...done 329s HTTP Server listening on IPv6 :: port 28884...done 330s Exiting via signal 15 330s Checking with approved DH params: rfc3526-group-18-8192 330s reserved port 56434 330s HTTP Server listening on IPv4 0.0.0.0 port 56434...done 330s HTTP Server listening on IPv6 :: port 56434...done 331s Checking with approved DH params: rfc7919-ffdhe2048 331s Exiting via signal 15 331s reserved port 58022 331s HTTP Server listening on IPv4 0.0.0.0 port 58022...done 331s HTTP Server listening on IPv6 :: port 58022...done 332s Exiting via signal 15 332s Checking with approved DH params: rfc7919-ffdhe3072 332s reserved port 5810 332s HTTP Server listening on IPv4 0.0.0.0 port 5810...done 332s HTTP Server listening on IPv6 :: port 5810...done 333s Exiting via signal 15 333s Checking with approved DH params: rfc7919-ffdhe4096 333s reserved port 10434 333s HTTP Server listening on IPv4 0.0.0.0 port 10434...done 333s HTTP Server listening on IPv6 :: port 10434...done 334s Exiting via signal 15 334s Checking with approved DH params: rfc7919-ffdhe6144 334s reserved port 40211 334s HTTP Server listening on IPv4 0.0.0.0 port 40211...done 334s HTTP Server listening on IPv6 :: port 40211...done 335s Checking with approved DH params: rfc7919-ffdhe8192 335s Exiting via signal 15 335s reserved port 25247 335s HTTP Server listening on IPv4 0.0.0.0 port 25247...done 335s HTTP Server listening on IPv6 :: port 25247...done 337s Checking with non-approved DH params: rfc2409-group-2-1024 337s Exiting via signal 15 337s reserved port 56616 337s HTTP Server listening on IPv4 0.0.0.0 port 56616...done 337s HTTP Server listening on IPv6 :: port 56616...done 338s Checking with non-approved DH params: rfc3526-group-5-1536 338s Exiting via signal 15 338s reserved port 30641 338s HTTP Server listening on IPv4 0.0.0.0 port 30641...done 338s HTTP Server listening on IPv6 :: port 30641...done 339s Exiting via signal 15 339s Checking with non-approved DH params: rfc5054-1024 339s reserved port 6784 339s HTTP Server listening on IPv4 0.0.0.0 port 6784...done 339s HTTP Server listening on IPv6 :: port 6784...done 340s Exiting via signal 15 340s Checking with non-approved DH params: rfc5054-1536 340s reserved port 46258 340s HTTP Server listening on IPv4 0.0.0.0 port 46258...done 340s HTTP Server listening on IPv6 :: port 46258...done 341s Exiting via signal 15 341s Checking with non-approved DH params: rfc5054-2048 341s reserved port 13275 341s HTTP Server listening on IPv4 0.0.0.0 port 13275...done 341s HTTP Server listening on IPv6 :: port 13275...done 342s Checking with non-approved DH params: rfc5054-3072 342s Exiting via signal 15 342s reserved port 17672 342s HTTP Server listening on IPv4 0.0.0.0 port 17672...done 342s HTTP Server listening on IPv6 :: port 17672...done 343s Checking with non-approved DH params: rfc5054-4096 343s Exiting via signal 15 343s reserved port 33644 343s HTTP Server listening on IPv4 0.0.0.0 port 33644...done 343s HTTP Server listening on IPv6 :: port 33644...done 344s Checking with non-approved DH params: rfc5054-6144 344s reserved port 59161 344s Exiting via signal 15 344s HTTP Server listening on IPv4 0.0.0.0 port 59161...done 344s HTTP Server listening on IPv6 :: port 59161...done 345s Exiting via signal 15 345s Checking with non-approved DH params: rfc5054-8192 345s reserved port 54777 345s HTTP Server listening on IPv4 0.0.0.0 port 54777...done 345s HTTP Server listening on IPv6 :: port 54777...done 346s Exiting via signal 15 346s Checking with non-approved DH params: rfc5114-group-22-1024 346s reserved port 16783 346s HTTP Server listening on IPv4 0.0.0.0 port 16783...done 346s HTTP Server listening on IPv6 :: port 16783...done 347s Exiting via signal 15 347s Checking with non-approved DH params: rfc5114-group-23-2048 347s reserved port 17634 347s HTTP Server listening on IPv4 0.0.0.0 port 17634...done 347s HTTP Server listening on IPv6 :: port 17634...done 348s Exiting via signal 15 348s Checking with non-approved DH params: rfc5114-group-24-2048 348s reserved port 59674 348s HTTP Server listening on IPv4 0.0.0.0 port 59674...done 348s HTTP Server listening on IPv6 :: port 59674...done 349s unreserved port 59674 349s Exiting via signal 15 349s SUCCESS [81]../../tests/dh-fips-approved.sh 349s running [82]../../tests/fastopen.sh ... 349s Checking Fast open 349s reserved port 38508 349s Echo Server listening on IPv4 0.0.0.0 port 38508...done 349s Echo Server listening on IPv6 :: port 38508...done 350s Processed 1 CA certificate(s). 350s Resolving 'localhost:38508'... 350s Connecting to '::1:38508' (TFO)... 350s - Certificate type: X.509 350s - Got a certificate list of 1 certificates. 350s - Certificate[0] info: 350s - subject `CN=GnuTLS Test Server (RSA certificate)', issuer `CN=GnuTLS Test CA', serial 0x4de0b4ca, RSA key 2432 bits, signed using RSA-SHA256, activated `2011-05-28 08:39:39 UTC', expires `2038-10-12 08:39:40 UTC', pin-sha256="ZCnc2x+EUztg6ShnEvwtcHxusyXqJ5RJLNCDLc+lVNE=" 350s Public Key ID: 350s sha1:482334530a8931384a5aeacab6d2a6dece1d2b18 350s sha256:6429dcdb1f84533b60e9286712fc2d707c6eb325ea2794492cd0832dcfa554d1 350s Public Key PIN: 350s pin-sha256:ZCnc2x+EUztg6ShnEvwtcHxusyXqJ5RJLNCDLc+lVNE= 350s 350s - Status: The certificate is trusted. 350s - Successfully sent 0 certificate(s) to server. 350s - Description: (TLS1.2-X.509)-(ECDHE-SECP256R1)-(RSA-SHA256)-(AES-256-GCM) 350s - Session ID: DD:9B:E6:8C:E4:38:2F:5F:39:CB:3A:D3:BD:9E:DC:B4:32:31:84:6C:67:AB:5E:B6:67:4E:3E:94:7D:34:57:6A 350s - Options: extended master secret, safe renegotiation, 350s - Handshake was completed 350s 350s - Simple Client Mode: 350s 350s - Peer has closed the GnuTLS connection 350s Processed 1 CA certificate(s). 350s Resolving 'localhost:38508'... 350s Connecting to '::1:38508' (TFO)... 350s - Successfully sent 0 certificate(s) to server. 350s - Server has requested a certificate. 350s - Certificate type: X.509 350s - Got a certificate list of 1 certificates. 350s - Certificate[0] info: 350s - subject `CN=GnuTLS Test Server (RSA certificate)', issuer `CN=GnuTLS Test CA', serial 0x4de0b4ca, RSA key 2432 bits, signed using RSA-SHA256, activated `2011-05-28 08:39:39 UTC', expires `2038-10-12 08:39:40 UTC', pin-sha256="ZCnc2x+EUztg6ShnEvwtcHxusyXqJ5RJLNCDLc+lVNE=" 350s Public Key ID: 350s sha1:482334530a8931384a5aeacab6d2a6dece1d2b18 350s sha256:6429dcdb1f84533b60e9286712fc2d707c6eb325ea2794492cd0832dcfa554d1 350s Public Key PIN: 350s pin-sha256:ZCnc2x+EUztg6ShnEvwtcHxusyXqJ5RJLNCDLc+lVNE= 350s 350s - Status: The certificate is trusted. 350s - Description: (TLS1.3-X.509)-(ECDHE-SECP256R1)-(RSA-PSS-RSAE-SHA256)-(AES-256-GCM) 350s - Session ID: 18:68:B6:13:D5:74:AB:0F:2C:97:EA:E8:98:C9:0B:D6:EE:04:02:36:AE:E1:52:F2:77:70:F0:41:40:43:FC:EE 350s - Options: 350s - Handshake was completed 350s 350s - Simple Client Mode: 350s 350s - Peer has closed the GnuTLS connection 350s Exiting via signal 15 350s unreserved port 38508 350s SUCCESS [82]../../tests/fastopen.sh 350s running [83]../../tests/gnutls-cli-invalid-crl.sh ... 350s Checking whether connecting to a server but with an invalid CRL provided, returns the expected error 350s reserved port 54535 350s Echo Server listening on IPv4 0.0.0.0 port 54535...done 350s Echo Server listening on IPv6 :: port 54535...done 351s Exiting via signal 15 351s Error setting the x509 CRL file: Error in the CRL verification. 351s unreserved port 54535 351s SUCCESS [83]../../tests/gnutls-cli-invalid-crl.sh 351s running [84]../../tests/gnutls-cli-rawpk.sh ... 351s Checking whether we can connect with raw public-keys 351s * testing server X.509, client RAW 351s reserved port 46616 351s Echo Server listening on IPv4 0.0.0.0 port 46616...done 351s Echo Server listening on IPv6 :: port 46616...done 352s - Handshake was completed 352s - Handshake was completed 352s Error in handshake: Certificate is required. 352s Exiting via signal 15 352s *** Received alert [116]: Certificate is required 352s * testing server RAW, client none 352s reserved port 19463 352s Echo Server listening on IPv4 0.0.0.0 port 19463...done 352s Echo Server listening on IPv6 :: port 19463...done 353s - Handshake was completed 353s - Handshake was completed 353s Error in handshake: No supported cipher suites have been found. 353s Exiting via signal 15 353s * testing server RAW, client RAW 353s reserved port 35378 353s Echo Server listening on IPv4 0.0.0.0 port 35378...done 353s Echo Server listening on IPv6 :: port 35378...done 355s - Handshake was completed 355s - Handshake was completed 355s Error in handshake: No supported cipher suites have been found. 355s Exiting via signal 15 355s * testing server X.509+RAW, client none 355s reserved port 2638 355s Echo Server listening on IPv4 0.0.0.0 port 2638...done 355s Echo Server listening on IPv6 :: port 2638...done 356s - Handshake was completed 356s - Handshake was completed 356s - Handshake was completed 356s - Handshake was completed 356s Exiting via signal 15 356s unreserved port 2638 356s SUCCESS [84]../../tests/gnutls-cli-rawpk.sh 356s running [85]../../tests/gnutls-cli-resume.sh ... 356s reserved port 37242 356s Echo Server listening on IPv4 0.0.0.0 port 37242...done 356s Echo Server listening on IPv6 :: port 37242...done 357s Checking whether session resumption works reliably under TLS1.3 357s resume.4002-0.tmp:*** This is a resumed session 357s resume.4002-1.tmp:*** This is a resumed session 357s resume.4002-2.tmp:*** This is a resumed session 357s resume.4002-3.tmp:*** This is a resumed session 357s resume.4002-4.tmp:*** This is a resumed session 357s resume.4002-5.tmp:*** This is a resumed session 357s resume.4002-6.tmp:*** This is a resumed session 357s resume.4002-8.tmp:*** This is a resumed session 357s resume.4002-9.tmp:*** This is a resumed session 357s resume.4002-7.tmp:*** This is a resumed session 357s Checking whether session resumption works reliably under TLS1.2 357s resume.4002-0.tmp:*** This is a resumed session 357s resume.4002-2.tmp:*** This is a resumed session 357s resume.4002-1.tmp:*** This is a resumed session 357s resume.4002-3.tmp:*** This is a resumed session 357s resume.4002-4.tmp:*** This is a resumed session 357s resume.4002-5.tmp:*** This is a resumed session 357s resume.4002-6.tmp:*** This is a resumed session 357s resume.4002-8.tmp:*** This is a resumed session 357s resume.4002-7.tmp:*** This is a resumed session 357s resume.4002-9.tmp:*** This is a resumed session 357s Checking whether session resumption works reliably under TLS1.2 (no tickets) 357s resume.4002-0.tmp:*** This is a resumed session 357s resume.4002-1.tmp:*** This is a resumed session 357s resume.4002-2.tmp:*** This is a resumed session 357s resume.4002-4.tmp:*** This is a resumed session 357s resume.4002-5.tmp:*** This is a resumed session 357s resume.4002-6.tmp:*** This is a resumed session 357s resume.4002-3.tmp:*** This is a resumed session 357s resume.4002-8.tmp:*** This is a resumed session 357s Exiting via signal 15 357s resume.4002-7.tmp:*** This is a resumed session 357s resume.4002-9.tmp:*** This is a resumed session 357s unreserved port 37242 357s SUCCESS [85]../../tests/gnutls-cli-resume.sh 357s running [86]../../tests/gnutls-cli-save-data.sh ... 357s Checking whether saving OCSP response and cert succeeds 357s reserved port 2820 357s |<3>| ASSERT: ../../../lib/x509/x509_ext.c[gnutls_subject_alt_names_get]:107 357s |<3>| ASSERT: ../../../lib/x509/x509.c[get_alt_name]:2012 357s |<3>| ASSERT: ../../../lib/nettle/mpi.c[wrap_nettle_mpi_print]:59 357s |<3>| ASSERT: ../../../lib/x509/ocsp.c[gnutls_ocsp_resp_get_single]:1563 357s |<3>| ASSERT: ../../../lib/x509/ocsp.c[gnutls_ocsp_resp_get_single]:1577 357s |<2>| The OCSP response is old 357s |<3>| ASSERT: ../../../lib/x509/ocsp.c[_gnutls_ocsp_get_validity]:2518 357s Echo Server listening on IPv4 0.0.0.0 port 2820...done 357s Echo Server listening on IPv6 :: port 2820...done 358s |<5>| REC[0x579fdec75710]: Allocating epoch #0 358s |<2>| added 3 protocols, 29 ciphersuites, 19 sig algos and 10 groups into priority list 358s |<5>| REC[0x579fdec75710]: Allocating epoch #1 358s |<3>| ASSERT: ../../lib/buffers.c[get_last_packet]:1138 358s |<5>| REC[0x579fdec75710]: SSL 3.3 Handshake packet received. Epoch 0, length: 364 358s |<5>| REC[0x579fdec75710]: Expected Packet Handshake(22) 358s |<5>| REC[0x579fdec75710]: Received Packet Handshake(22) with length: 364 358s |<5>| REC[0x579fdec75710]: Decrypted Packet[0] Handshake(22) with length: 364 358s |<4>| HSK[0x579fdec75710]: CLIENT HELLO (1) was received. Length 360[360], frag offset 0, frag length: 360, sequence: 0 358s |<4>| HSK[0x579fdec75710]: Client's version: 3.3 358s |<4>| EXT[0x579fdec75710]: Parsing extension 'Supported Versions/43' (5 bytes) 358s |<4>| EXT[0x579fdec75710]: Found version: 3.4 358s |<4>| EXT[0x579fdec75710]: Found version: 3.3 358s |<4>| EXT[0x579fdec75710]: Negotiated version: 3.4 358s |<4>| EXT[0x579fdec75710]: Parsing extension 'Safe Renegotiation/65281' (1 bytes) 358s |<4>| EXT[0x579fdec75710]: Parsing extension 'Record Size Limit/28' (2 bytes) 358s |<4>| EXT[0x579fdec75710]: record_size_limit 16385 negotiated 358s |<4>| EXT[0x579fdec75710]: Parsing extension 'Extended Master Secret/23' (0 bytes) 358s |<4>| EXT[0x579fdec75710]: Parsing extension 'Encrypt-then-MAC/22' (0 bytes) 358s |<4>| EXT[0x579fdec75710]: Parsing extension 'PSK Key Exchange Modes/45' (3 bytes) 358s |<4>| EXT[0x579fdec75710]: PSK KE mode 01 received 358s |<4>| EXT[0x579fdec75710]: PSK KE mode 00 received 358s |<4>| EXT[0x579fdec75710]: Parsing extension 'Session Ticket/35' (0 bytes) 358s |<4>| EXT[0x579fdec75710]: Parsing extension 'Signature Algorithms/13' (34 bytes) 358s |<4>| EXT[0x579fdec75710]: rcvd signature algo (4.1) RSA-SHA256 358s |<4>| EXT[0x579fdec75710]: rcvd signature algo (8.9) RSA-PSS-SHA256 358s |<4>| EXT[0x579fdec75710]: rcvd signature algo (8.4) RSA-PSS-RSAE-SHA256 358s unreserved port 2820 358s SUCCESS [86]../../tests/gnutls-cli-save-data.sh 358s running [87]../../tests/gnutls-cli-self-signed.sh ... 358s Checking whether connecting to a self signed certificate returns the expected error 358s reserved port 59057 358s |<4>| EXT[0x579fdec75710]: rcvd signature algo (4.3) ECDSA-SECP256R1-SHA256 358s |<4>| EXT[0x579fdec75710]: rcvd signature algo (8.7) EdDSA-Ed25519 358s |<4>| EXT[0x579fdec75710]: rcvd signature algo (5.1) RSA-SHA384 358s |<4>| EXT[0x579fdec75710]: rcvd signature algo (8.10) RSA-PSS-SHA384 358s |<4>| EXT[0x579fdec75710]: rcvd signature algo (8.5) RSA-PSS-RSAE-SHA384 358s |<4>| EXT[0x579fdec75710]: rcvd signature algo (5.3) ECDSA-SECP384R1-SHA384 358s |<4>| EXT[0x579fdec75710]: rcvd signature algo (8.8) EdDSA-Ed448 358s |<4>| EXT[0x579fdec75710]: rcvd signature algo (6.1) RSA-SHA512 358s |<4>| EXT[0x579fdec75710]: rcvd signature algo (8.11) RSA-PSS-SHA512 358s |<4>| EXT[0x579fdec75710]: rcvd signature algo (8.6) RSA-PSS-RSAE-SHA512 358s |<4>| EXT[0x579fdec75710]: rcvd signature algo (6.3) ECDSA-SECP521R1-SHA512 358s |<4>| EXT[0x579fdec75710]: rcvd signature algo (2.1) RSA-SHA1 358s |<4>| EXT[0x579fdec75710]: rcvd signature algo (2.3) ECDSA-SHA1 358s |<4>| EXT[0x579fdec75710]: Parsing extension 'Supported Groups/10' (22 bytes) 358s |<4>| EXT[0x579fdec75710]: Received group SECP256R1 (0x17) 358s |<4>| EXT[0x579fdec75710]: Received group SECP384R1 (0x18) 358s |<4>| EXT[0x579fdec75710]: Received group SECP521R1 (0x19) 358s |<4>| EXT[0x579fdec75710]: Received group X25519 (0x1d) 358s |<4>| EXT[0x579fdec75710]: Received group X448 (0x1e) 358s |<4>| EXT[0x579fdec75710]: Received group FFDHE2048 (0x100) 358s |<4>| EXT[0x579fdec75710]: Received group FFDHE3072 (0x101) 358s |<4>| EXT[0x579fdec75710]: Received group FFDHE4096 (0x102) 358s |<4>| EXT[0x579fdec75710]: Received group FFDHE6144 (0x103) 358s |<4>| EXT[0x579fdec75710]: Received group FFDHE8192 (0x104) 358s |<4>| EXT[0x579fdec75710]: Selected group SECP256R1 358s |<4>| EXT[0x579fdec75710]: Parsing extension 'Supported EC Point Formats/11' (2 bytes) 358s |<2>| checking 13.02 (GNUTLS_AES_256_GCM_SHA384) for compatibility 358s |<3>| ASSERT: ../../../lib/ext/server_name.c[gnutls_server_name_get]:234 358s |<4>| HSK[0x579fdec75710]: Requested server name: '' 358s |<4>| HSK[0x579fdec75710]: checking compat of GNUTLS_AES_256_GCM_SHA384 with certificate[0] (RSA/X.509) 358s |<4>| checking cert compat with RSA-SHA256 358s |<3>| ASSERT: ../../../lib/ext/signature.c[_gnutls_session_sign_algo_enabled]:428 358s |<4>| Signature algorithm RSA-SHA256 is not enabled 358s |<4>| checking cert compat with RSA-PSS-SHA256 358s |<4>| checking cert compat with RSA-PSS-RSAE-SHA256 358s |<4>| Selected signature algorithm: RSA-PSS-RSAE-SHA256 358s |<2>| Selected (RSA) cert based on ciphersuite 13.2: GNUTLS_AES_256_GCM_SHA384 358s |<4>| HSK[0x579fdec75710]: Selected cipher suite: GNUTLS_AES_256_GCM_SHA384 358s |<4>| HSK[0x579fdec75710]: Selected version TLS1.3 358s |<4>| EXT[0x579fdec75710]: Parsing extension 'OCSP Status Request/5' (5 bytes) 358s |<4>| EXT[0x579fdec75710]: OCSP status was requested 358s |<4>| EXT[0x579fdec75710]: Parsing extension 'Key Share/51' (107 bytes) 358s |<4>| EXT[0x579fdec75710]: Received key share for SECP256R1 358s |<4>| HSK[0x579fdec75710]: Selected group SECP256R1 (2) 358s |<2>| EXT[0x579fdec75710]: server generated SECP256R1 shared key 358s |<4>| HSK[0x579fdec75710]: Safe renegotiation succeeded 358s |<4>| HSK[0x579fdec75710]: SessionID: b09ebc2a1d3adb2fe7ca5915587e43ee11857aab05219afc8f4f59ac37056cf9 358s |<4>| EXT[0x579fdec75710]: Not sending extension (Safe Renegotiation/65281) for 'TLS 1.3 server hello' 358s |<4>| EXT[0x579fdec75710]: Not sending extension (Compress Certificate/27) for 'TLS 1.3 server hello' 358s |<4>| EXT[0x579fdec75710]: Not sending extension (Post Handshake Auth/49) for 'TLS 1.3 server hello' 358s |<4>| EXT[0x579fdec75710]: Not sending extension (SRTP/14) for 'TLS 1.3 server hello' 358s |<4>| EXT[0x579fdec75710]: Not sending extension (Signature Algorithms/13) for 'TLS 1.3 server hello' 358s |<4>| EXT[0x579fdec75710]: Preparing extension (PSK Key Exchange Modes/45) for 'TLS 1.3 server hello' 358s |<4>| EXT[0x579fdec75710]: Not sending extension (Server Name Indication/0) for 'TLS 1.3 server hello' 358s |<4>| EXT[0x579fdec75710]: Not sending extension (Encrypt-then-MAC/22) for 'TLS 1.3 server hello' 358s |<4>| EXT[0x579fdec75710]: Not sending extension (Record Size Limit/28) for 'TLS 1.3 server hello' 358s |<4>| EXT[0x579fdec75710]: Not sending extension (Supported EC Point Formats/11) for 'TLS 1.3 server hello' 358s |<4>| EXT[0x579fdec75710]: Not sending extension (Session Ticket/35) for 'TLS 1.3 server hello' 358s |<4>| EXT[0x579fdec75710]: Preparing extension (Key Share/51) for 'TLS 1.3 server hello' 358s |<4>| EXT[0x579fdec75710]: sending key share for SECP256R1 358s |<4>| EXT[0x579fdec75710]: Sending extension Key Share/51 (69 bytes) 358s |<4>| EXT[0x579fdec75710]: Not sending extension (Extended Master Secret/23) for 'TLS 1.3 server hello' 358s |<4>| EXT[0x579fdec75710]: Not sending extension (ALPN/16) for 'TLS 1.3 server hello' 358s |<4>| EXT[0x579fdec75710]: Not sending extension (Early Data/42) for 'TLS 1.3 server hello' 358s |<4>| EXT[0x579fdec75710]: Not sending extension (Client Certificate Type/19) for 'TLS 1.3 server hello' 358s |<4>| EXT[0x579fdec75710]: Not sending extension (Supported Groups/10) for 'TLS 1.3 server hello' 358s |<4>| EXT[0x579fdec75710]: Preparing extension (Supported Versions/43) for 'TLS 1.3 server hello' 358s |<4>| EXT[0x579fdec75710]: Sending extension Supported Versions/43 (2 bytes) 358s |<4>| EXT[0x579fdec75710]: Not sending extension (Cookie/44) for 'TLS 1.3 server hello' 358s |<4>| EXT[0x579fdec75710]: Not sending extension (OCSP Status Request/5) for 'TLS 1.3 server hello' 358s |<4>| EXT[0x579fdec75710]: Not sending extension (Server Certificate Type/20) for 'TLS 1.3 server hello' 358s |<4>| EXT[0x579fdec75710]: Not sending extension (Maximum Record Size/1) for 'TLS 1.3 server hello' 358s |<4>| EXT[0x579fdec75710]: Not sending extension (ClientHello Padding/21) for 'TLS 1.3 server hello' 358s |<4>| EXT[0x579fdec75710]: Preparing extension (Pre Shared Key/41) for 'TLS 1.3 server hello' 358s |<4>| HSK[0x579fdec75710]: SERVER HELLO was queued [155 bytes] 358s |<5>| REC[0x579fdec75710]: Preparing Packet Handshake(22) with length: 155 and min pad: 0 358s |<5>| REC[0x579fdec75710]: Sent Packet[1] Handshake(22) in epoch 0 and length: 160 358s |<5>| REC[0x579fdec75710]: Preparing Packet ChangeCipherSpec(20) with length: 1 and min pad: 0 358s |<5>| REC[0x579fdec75710]: Sent Packet[2] ChangeCipherSpec(20) in epoch 0 and length: 6 358s |<4>| REC[0x579fdec75710]: Sent ChangeCipherSpec 358s |<5>| REC[0x579fdec75710]: Initializing epoch #1 358s |<5>| REC[0x579fdec75710]: Epoch #1 ready 358s |<4>| HSK[0x579fdec75710]: TLS 1.3 re-key with cipher suite: GNUTLS_AES_256_GCM_SHA384 358s |<4>| EXT[0x579fdec75710]: Preparing extension (ALPN/16) for 'encrypted extensions' 358s |<4>| EXT[0x579fdec75710]: Preparing extension (Early Data/42) for 'encrypted extensions' 358s |<4>| EXT[0x579fdec75710]: Not sending extension (Post Handshake Auth/49) for 'encrypted extensions' 358s |<4>| EXT[0x579fdec75710]: Preparing extension (Client Certificate Type/19) for 'encrypted extensions' 358s |<4>| EXT[0x579fdec75710]: Not sending extension (Encrypt-then-MAC/22) for 'encrypted extensions' 358s |<4>| EXT[0x579fdec75710]: Not sending extension (Key Share/51) for 'encrypted extensions' 358s |<4>| EXT[0x579fdec75710]: Preparing extension (Maximum Record Size/1) for 'encrypted extensions' 358s |<4>| EXT[0x579fdec75710]: Not sending extension (Cookie/44) for 'encrypted extensions' 358s |<4>| EXT[0x579fdec75710]: Preparing extension (Server Name Indication/0) for 'encrypted extensions' 358s |<4>| EXT[0x579fdec75710]: Not sending extension (PSK Key Exchange Modes/45) for 'encrypted extensions' 358s |<4>| EXT[0x579fdec75710]: Not sending extension (Signature Algorithms/13) for 'encrypted extensions' 358s |<4>| EXT[0x579fdec75710]: Preparing extension (SRTP/14) for 'encrypted extensions' 358s |<4>| EXT[0x579fdec75710]: Not sending extension (Session Ticket/35) for 'encrypted extensions' 358s |<4>| EXT[0x579fdec75710]: Not sending extension (Supported EC Point Formats/11) for 'encrypted extensions' 358s |<4>| EXT[0x579fdec75710]: Not sending extension (Supported Versions/43) for 'encrypted extensions' 358s |<4>| EXT[0x579fdec75710]: Preparing extension (Supported Groups/10) for 'encrypted extensions' 358s |<4>| EXT[0x579fdec75710]: Not sending extension (Compress Certificate/27) for 'encrypted extensions' 358s |<4>| EXT[0x579fdec75710]: Not sending extension (Safe Renegotiation/65281) for 'encrypted extensions' 358s |<4>| EXT[0x579fdec75710]: Not sending extension (OCSP Status Request/5) for 'encrypted extensions' 358s |<4>| EXT[0x579fdec75710]: Not sending extension (Extended Master Secret/23) for 'encrypted extensions' 358s |<4>| EXT[0x579fdec75710]: Preparing extension (Server Certificate Type/20) for 'encrypted extensions' 358s |<4>| EXT[0x579fdec75710]: Preparing extension (Record Size Limit/28) for 'encrypted extensions' 358s |<4>| EXT[0x579fdec75710]: Sending extension Record Size Limit/28 (2 bytes) 358s |<4>| EXT[0x579fdec75710]: Not sending extension (ClientHello Padding/21) for 'encrypted extensions' 358s |<4>| EXT[0x579fdec75710]: Not sending extension (Pre Shared Key/41) for 'encrypted extensions' 358s |<4>| HSK[0x579fdec75710]: ENCRYPTED EXTENSIONS was queued [12 bytes] 358s |<4>| EXT[0x579fdec75710]: sent signature algo (4.1) RSA-SHA256 358s |<4>| EXT[0x579fdec75710]: sent signature algo (8.9) RSA-PSS-SHA256 358s |<4>| EXT[0x579fdec75710]: sent signature algo (8.4) RSA-PSS-RSAE-SHA256 358s |<4>| EXT[0x579fdec75710]: sent signature algo (4.3) ECDSA-SHA256 358s |<4>| EXT[0x579fdec75710]: sent signature algo (8.7) EdDSA-Ed25519 358s |<4>| EXT[0x579fdec75710]: sent signature algo (5.1) RSA-SHA384 358s |<4>| EXT[0x579fdec75710]: sent signature algo (8.10) RSA-PSS-SHA384 358s |<4>| EXT[0x579fdec75710]: sent signature algo (8.5) RSA-PSS-RSAE-SHA384 358s |<4>| EXT[0x579fdec75710]: sent signature algo (5.3) ECDSA-SHA384 358s |<4>| EXT[0x579fdec75710]: sent signature algo (8.8) EdDSA-Ed448 358s |<4>| EXT[0x579fdec75710]: sent signature algo (6.1) RSA-SHA512 358s |<4>| EXT[0x579fdec75710]: sent signature algo (8.11) RSA-PSS-SHA512 358s |<4>| EXT[0x579fdec75710]: sent signature algo (8.6) RSA-PSS-RSAE-SHA512 358s |<4>| EXT[0x579fdec75710]: sent signature algo (6.3) ECDSA-SHA512 358s |<4>| EXT[0x579fdec75710]: sent signature algo (2.1) RSA-SHA1 358s |<4>| EXT[0x579fdec75710]: sent signature algo (2.3) ECDSA-SHA1 358s |<4>| HSK[0x579fdec75710]: CERTIFICATE REQUEST was queued [49 bytes] 358s |<4>| HSK[0x579fdec75710]: CERTIFICATE was queued [2193 bytes] 358s |<4>| checking cert compat with RSA-SHA256 358s |<3>| ASSERT: ../../../lib/ext/signature.c[_gnutls_session_sign_algo_enabled]:428 358s |<4>| Signature algorithm RSA-SHA256 is not enabled 358s |<4>| checking cert compat with RSA-PSS-SHA256 358s |<4>| checking cert compat with RSA-PSS-RSAE-SHA256 358s |<4>| HSK[0x579fdec75710]: signing TLS 1.3 handshake data: using RSA-PSS-RSAE-SHA256 and PRF: SHA384 358s |<3>| ASSERT: ../../../lib/nettle/mpi.c[wrap_nettle_mpi_print]:59 358s |<4>| HSK[0x579fdec75710]: CERTIFICATE VERIFY was queued [312 bytes] 358s |<4>| HSK[0x579fdec75710]: sending finished 358s |<4>| HSK[0x579fdec75710]: FINISHED was queued [52 bytes] 358s |<5>| REC[0x579fdec75710]: Preparing Packet Handshake(22) with length: 12 and min pad: 0 358s |<5>| REC[0x579fdec75710]: Sent Packet[1] Handshake(22) in epoch 1 and length: 34 358s |<5>| REC[0x579fdec75710]: Preparing Packet Handshake(22) with length: 49 and min pad: 0 358s |<5>| REC[0x579fdec75710]: Sent Packet[2] Handshake(22) in epoch 1 and length: 71 358s |<5>| REC[0x579fdec75710]: Preparing Packet Handshake(22) with length: 2193 and min pad: 0 358s |<5>| REC[0x579fdec75710]: Sent Packet[3] Handshake(22) in epoch 1 and length: 2215 358s |<5>| REC[0x579fdec75710]: Preparing Packet Handshake(22) with length: 312 and min pad: 0 358s |<5>| REC[0x579fdec75710]: Sent Packet[4] Handshake(22) in epoch 1 and length: 334 358s |<5>| REC[0x579fdec75710]: Preparing Packet Handshake(22) with length: 52 and min pad: 0 358s |<5>| REC[0x579fdec75710]: Sent Packet[5] Handshake(22) in epoch 1 and length: 74 358s |<3>| ASSERT: ../../lib/constate.c[_gnutls_epoch_get]:965 358s |<5>| REC[0x579fdec75710]: Allocating epoch #2 358s |<5>| REC[0x579fdec75710]: Initializing epoch #2 358s |<5>| REC[0x579fdec75710]: Epoch #2 ready 358s |<4>| HSK[0x579fdec75710]: TLS 1.3 set write key with cipher suite: GNUTLS_AES_256_GCM_SHA384 358s |<4>| HSK[0x579fdec75710]: switching early to application traffic keys 358s |<3>| ASSERT: ../../lib/buffers.c[get_last_packet]:1138 358s |<5>| REC[0x579fdec75710]: SSL 3.3 ChangeCipherSpec packet received. Epoch 1, length: 1 358s |<5>| REC[0x579fdec75710]: Expected Packet Handshake(22) 358s |<5>| REC[0x579fdec75710]: Received Packet ChangeCipherSpec(20) with length: 1 358s |<1>| Got OCSP response with an unrelated certificate. 358s *** Fatal error: Error in the certificate. 358s |<5>| REC[0x579fdec75710]: SSL 3.3 Application Data packet received. Epoch 1, length: 19 358s |<5>| REC[0x579fdec75710]: Expected Packet Handshake(22) 358s |<5>| REC[0x579fdec75710]: Received Packet Application Data(23) with length: 19 358s |<5>| REC[0x579fdec75710]: Decrypted Packet[0] Alert(21) with length: 2 358s |<5>| REC[0x579fdec75710]: Alert[2|42] - Certificate is bad - was received 358s |<3>| ASSERT: ../../lib/record.c[record_add_to_buffers]:887 358s |<3>| ASSERT: ../../lib/record.c[record_add_to_buffers]:893 358s |<3>| ASSERT: ../../lib/record.c[_gnutls_recv_in_buffers]:1565 358s |<3>| ASSERT: ../../lib/buffers.c[_gnutls_handshake_io_recv_int]:1412 358s |<3>| ASSERT: ../../lib/handshake.c[_gnutls_recv_handshake]:1594 358s |<3>| ASSERT: ../../lib/tls13/certificate.c[_gnutls13_recv_certificate]:85 358s |<3>| ASSERT: ../../lib/handshake-tls13.c[_gnutls13_handshake_server]:556 358s Error in handshake: A TLS fatal alert has been received. 358s |<3>| ASSERT: ../../lib/alert.c[gnutls_alert_send_appropriate]:382 358s |<5>| REC[0x579fdec75710]: Start of epoch cleanup 358s |<5>| REC[0x579fdec75710]: Epoch #0 freed 358s |<5>| REC[0x579fdec75710]: End of epoch cleanup 358s |<5>| REC[0x579fdec75710]: Epoch #1 freed 358s |<5>| REC[0x579fdec75710]: Epoch #2 freed 358s Exiting via signal 15 358s Echo Server listening on IPv4 0.0.0.0 port 59057...done 358s Echo Server listening on IPv6 :: port 59057...done 359s Error in handshake: A TLS fatal alert has been received. 359s Exiting via signal 15 359s - Status: The certificate is NOT trusted. The certificate issuer is unknown. 359s unreserved port 59057 359s SUCCESS [87]../../tests/gnutls-cli-self-signed.sh 359s running [88]../../tests/logfile-option.sh ... 359s Checking whether logfile option works. 359s reserved port 52754 359s Warning: no private key and certificate pairs were set. 359s Echo Server listening on IPv4 0.0.0.0 port 52754...done 359s Echo Server listening on IPv6 :: port 52754...done 360s Exiting via signal 15 360s Find the expected output! 360s reserved port 44410 360s Warning: no private key and certificate pairs were set. 360s Echo Server listening on IPv4 0.0.0.0 port 44410...done 360s Echo Server listening on IPv6 :: port 44410...done 361s Found the expected output! 361s Exiting via signal 15 361s x509 functionality test 361s reserved port 60672 361s Echo Server listening on IPv4 0.0.0.0 port 60672...done 361s Echo Server listening on IPv6 :: port 60672...done 362s Find the expected output! 362s Exiting via signal 15 363s reserved port 41844 363s Echo Server listening on IPv4 0.0.0.0 port 41844...done 363s Echo Server listening on IPv6 :: port 41844...done 364s Exiting via signal 15 364s Found the expected output! 364s unreserved port 41844 364s SUCCESS [88]../../tests/logfile-option.sh 364s running [89]../../tests/long-crl.sh ... 364s SUCCESS [89]../../tests/long-crl.sh 364s running [90]../../tests/ocsp-tests/ocsp-load-chain.sh ... 364s OCSP Response Information: 364s Response Status: Successful 364s Response Type: Basic OCSP Response 364s Version: 1 364s Responder Key ID: b1a06212090b2c833135f92f8b3a8e849de471fe 364s Produced At: Fri Jun 16 13:54:55 UTC 2017 364s Responses: 364s Certificate ID: 364s Hash Algorithm: SHA1 364s Issuer Name Hash: d1b1648b8c9f0dd16ba38acd2b5017d5f9cfc064 364s Issuer Key Hash: 5f60cf619055df8443148a602ab2f57af44318ef 364s Serial Number: 1d4abdaa78d09afe799d41bceb7a7662 364s Certificate Status: good 364s This Update: Fri Jun 16 13:54:55 UTC 2017 364s Next Update: Fri Jun 23 13:54:55 UTC 2017 364s Extensions: 364s Signature Algorithm: RSA-SHA1 364s 364s 364s Verifying OCSP Response: Success. 364s OCSP Response Information: 364s Response Status: Successful 364s Response Type: Basic OCSP Response 364s Version: 1 364s Responder Key ID: b1a06212090b2c833135f92f8b3a8e849de471fe 364s Produced At: Fri Jun 16 13:54:55 UTC 2017 364s Responses: 364s Certificate ID: 364s Hash Algorithm: SHA1 364s Issuer Name Hash: d1b1648b8c9f0dd16ba38acd2b5017d5f9cfc064 364s Issuer Key Hash: 5f60cf619055df8443148a602ab2f57af44318ef 364s Serial Number: 1d4abdaa78d09afe799d41bceb7a7662 364s Certificate Status: good 364s This Update: Fri Jun 16 13:54:55 UTC 2017 364s Next Update: Fri Jun 23 13:54:55 UTC 2017 364s Extensions: 364s Signature Algorithm: RSA-SHA1 364s 364s 364s Verifying OCSP Response: Success. 364s |<3>| ASSERT: ../../../lib/x509/dn.c[_gnutls_x509_get_dn]:211 364s |<3>| ASSERT: ../../../lib/x509/ocsp.c[gnutls_ocsp_resp_get_single]:1577 364s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_x509_get_raw_field2]:1536 364s |<3>| ASSERT: ../../../lib/x509/ocsp.c[find_signercert]:1914 364s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_x509_der_encode]:876 364s |<3>| checking whether signed against: subject `CN=Symantec Class 3 ECC 256 bit SSL CA - G2 OCSP Responder', issuer `CN=Symantec Class 3 ECC 256 bit SSL CA - G2,OU=Symantec Trust Network,O=Symantec Corporation,C=US', serial 0x3c75f538018e89f764ae24298f515602, EC/ECDSA key 256 bits, signed using ECDSA-SHA256, activated `2017-04-15 00:00:00 UTC', expires `2017-07-14 23:59:59 UTC', pin-sha256="zcJoPfD6XQLwGkAFiLJCW9pX2yt3g/GW4ZrLtyshdcE=" 364s |<2>| checking key ID against SPK identifier 364s |<3>| ASSERT: ../../../lib/x509/name_constraints.c[gnutls_x509_crt_get_name_constraints]:592 364s |<3>| ocsp signer: subject `CN=Symantec Class 3 ECC 256 bit SSL CA - G2 OCSP Responder', issuer `CN=Symantec Class 3 ECC 256 bit SSL CA - G2,OU=Symantec Trust Network,O=Symantec Corporation,C=US', serial 0x3c75f538018e89f764ae24298f515602, EC/ECDSA key 256 bits, signed using ECDSA-SHA256, activated `2017-04-15 00:00:00 UTC', expires `2017-07-14 23:59:59 UTC', pin-sha256="zcJoPfD6XQLwGkAFiLJCW9pX2yt3g/GW4ZrLtyshdcE=" 364s OCSP Response Information: 364s Response Status: Successful 364s Response Type: Basic OCSP Response 364s Version: 1 364s Responder Key ID: df4e8dc89de7896a6a4a7f5716a03b881e640565 364s Produced At: Fri Jun 23 23:57:22 UTC 2017 364s Responses: 364s Certificate ID: 364s Hash Algorithm: SHA1 364s Issuer Name Hash: 7d14ca1e3e08269e1a333d0e0e6ff31361215eea 364s Issuer Key Hash: 25f08ae14b7ad901950aedc653f18c781fd9f3f8 364s Serial Number: 63b9ec7eff988335f113d67d2f864d35 364s Certificate Status: good 364s This Update: Fri Jun 23 23:57:22 UTC 2017 364s Next Update: Fri Jun 30 23:57:22 UTC 2017 364s Extensions: 364s Signature Algorithm: ECDSA-SHA256 364s 364s 364s Verifying OCSP Response: Success. 364s SUCCESS [90]../../tests/ocsp-tests/ocsp-load-chain.sh 364s running [91]../../tests/ocsp-tests/ocsp-must-staple-connection.sh ... 364s SKIPPED [91]../../tests/ocsp-tests/ocsp-must-staple-connection.sh 364s running [92]../../tests/ocsp-tests/ocsp-signer-verify.sh ... 364s verifying ../../tests//ocsp-tests/signer-verify/response-ca.der using ../../tests//ocsp-tests/signer-verify/trust.pem 364s OCSP Response Information: 364s Response Status: Successful 364s Response Type: Basic OCSP Response 364s Version: 1 364s Responder ID: CN=Sub CA 364s Produced At: Tue Jul 13 18:50:26 UTC 2021 364s Responses: 364s Certificate ID: 364s Hash Algorithm: SHA1 364s Issuer Name Hash: 1dfc0a78ecdd2b4e005ce93dfb2663e50256b362 364s Issuer Key Hash: b733d82dc4bb44afb0f45943615b26946aef648e 364s Serial Number: 22fff0da 364s Certificate Status: good 364s This Update: Tue Jul 13 18:50:26 UTC 2021 364s Next Update: Wed Jul 14 18:50:26 UTC 2021 364s Extensions: 364s Signature Algorithm: RSA-SHA256 364s 364s 364s Verifying OCSP Response: Success. 364s |<3>| ASSERT: ../../../lib/x509/ocsp.c[gnutls_ocsp_resp_get_single]:1563 364s |<3>| ASSERT: ../../../lib/x509/ocsp.c[gnutls_ocsp_resp_get_single]:1577 364s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_x509_der_encode]:876 364s |<3>| ASSERT: ../../../lib/nettle/mpi.c[wrap_nettle_mpi_print]:59 364s |<3>| ASSERT: ../../../lib/nettle/mpi.c[wrap_nettle_mpi_print]:59 364s |<3>| checking whether signed against: subject `CN=Testing Authority OCSP Responder', issuer `CN=Testing Authority', serial 0x56f318d612de99176ccaa1e0, RSA key 2048 bits, signed using RSA-SHA256, activated `2016-03-23 22:29:42 UTC', expires `2017-03-23 22:29:42 UTC', pin-sha256="9/MUMGO4USOKxFhAZukKhfJRT4Vsx31KvyAghzq5TU4=" 364s |<2>| checking issuer DN 364s |<3>| ASSERT: ../../../lib/x509/name_constraints.c[gnutls_x509_crt_get_name_constraints]:592 364s |<3>| ASSERT: ../../../lib/nettle/mpi.c[wrap_nettle_mpi_print]:59 364s |<3>| ASSERT: ../../../lib/nettle/mpi.c[wrap_nettle_mpi_print]:59 364s |<3>| ocsp signer: subject `CN=Testing Authority OCSP Responder', issuer `CN=Testing Authority', serial 0x56f318d612de99176ccaa1e0, RSA key 2048 bits, signed using RSA-SHA256, activated `2016-03-23 22:29:42 UTC', expires `2017-03-23 22:29:42 UTC', pin-sha256="9/MUMGO4USOKxFhAZukKhfJRT4Vsx31KvyAghzq5TU4=" 364s verifying ../../tests//ocsp-tests/signer-verify/response-delegated.der using ../../tests//ocsp-tests/signer-verify/trust.pem 364s OCSP Response Information: 364s Response Status: Successful 364s Response Type: Basic OCSP Response 364s Version: 1 364s Responder ID: CN=Sub CA OCSP Responder 364s Produced At: Tue Jul 13 18:50:26 UTC 2021 364s Responses: 364s Certificate ID: 364s Hash Algorithm: SHA1 364s Issuer Name Hash: 1dfc0a78ecdd2b4e005ce93dfb2663e50256b362 364s Issuer Key Hash: b733d82dc4bb44afb0f45943615b26946aef648e 364s Serial Number: 22fff0da 364s Certificate Status: good 364s This Update: Tue Jul 13 18:50:26 UTC 2021 364s Next Update: Wed Jul 14 18:50:26 UTC 2021 364s Extensions: 364s Signature Algorithm: RSA-SHA256 364s 364s 364s Verifying OCSP Response: Success. 364s verifying ../../tests//ocsp-tests/signer-verify/response-non-delegated.der using ../../tests//ocsp-tests/signer-verify/trust.pem 364s OCSP Response Information: 364s Response Status: Successful 364s Response Type: Basic OCSP Response 364s Version: 1 364s Responder ID: CN=localhost 364s Produced At: Tue Jul 13 18:50:26 UTC 2021 364s Responses: 364s Certificate ID: 364s Hash Algorithm: SHA1 364s Issuer Name Hash: 1dfc0a78ecdd2b4e005ce93dfb2663e50256b362 364s Issuer Key Hash: b733d82dc4bb44afb0f45943615b26946aef648e 364s Serial Number: 22fff0da 364s Certificate Status: good 364s This Update: Tue Jul 13 18:50:26 UTC 2021 364s Next Update: Wed Jul 14 18:50:26 UTC 2021 364s Extensions: 364s Signature Algorithm: RSA-SHA256 364s 364s 364s Verifying OCSP Response: Failure, Signer cert is not trusted. 364s SUCCESS [92]../../tests/ocsp-tests/ocsp-signer-verify.sh 364s running [93]../../tests/ocsp-tests/ocsp-test.sh ... 364s OCSP Response Information: 364s Response Status: Successful 364s Response Type: Basic OCSP Response 364s Version: 1 364s Responder ID: CN=Testing Authority 364s Produced At: Wed Mar 23 21:55:28 UTC 2016 364s Responses: 364s Certificate ID: 364s Hash Algorithm: SHA1 364s Issuer Name Hash: bac68790352ceb4c4de1534445348f8b4b5309b3 364s Issuer Key Hash: e865fcb9123c7285fc28c803149f06ad94dfd934 364s Serial Number: 56f304a1326dc9b2d51b31b3 364s Certificate Status: unknown 364s This Update: Wed Mar 23 21:55:28 UTC 2016 364s Extensions: 364s Signature Algorithm: RSA-SHA256 364s 364s 364s Verifying OCSP Response: Success. 364s OCSP Response Information: 364s Response Status: Successful 364s Response Type: Basic OCSP Response 364s Version: 1 364s Responder ID: CN=Testing Authority OCSP Responder 364s Produced At: Wed Mar 23 22:31:19 UTC 2016 364s Responses: 364s Certificate ID: 364s Hash Algorithm: SHA1 364s Issuer Name Hash: bac68790352ceb4c4de1534445348f8b4b5309b3 364s Issuer Key Hash: e865fcb9123c7285fc28c803149f06ad94dfd934 364s Serial Number: 56f318d612de99176ccaa1e0 364s Certificate Status: unknown 364s This Update: Wed Mar 23 22:31:19 UTC 2016 364s Extensions: 364s Signature Algorithm: RSA-SHA256 364s 364s 364s Verifying OCSP Response: Success. 364s OCSP Response Information: 364s Response Status: Successful 364s Response Type: Basic OCSP Response 364s Version: 1 364s Responder ID: CN=Testing Authority OCSP Responder 364s Produced At: Wed Mar 23 22:31:19 UTC 2016 364s Responses: 364s Certificate ID: 364s Hash Algorithm: SHA1 364s Issuer Name Hash: bac68790352ceb4c4de1534445348f8b4b5309b3 364s Issuer Key Hash: e865fcb9123c7285fc28c803149f06ad94dfd934 364s Serial Number: 56f318d612de99176ccaa1e0 364s Certificate Status: unknown 364s This Update: Wed Mar 23 22:31:19 UTC 2016 364s Extensions: 364s Signature Algorithm: RSA-SHA256 364s 364s 364s Verifying OCSP Response: Success. 364s SUCCESS [93]../../tests/ocsp-tests/ocsp-test.sh 364s running [94]../../tests/ocsp-tests/ocsp-tls-connection.sh ... 364s reserved port 36142 364s unreserved port 61878 364s reserved port 39397 364s === Generating good server certificate === 364s === Bringing OCSP server up === 364s ocsp: waiting for OCSP client connections... 365s Connecting to OCSP server: localhost... 365s ocsp: received request, 1st line: POST /ocsp/ HTTP/1.0 365s ocsp: sending response, 1st line: HTTP/1.0 200 OK 365s 365s Assuming response's signer = issuer (use --load-signer to override). 365s === Verifying OCSP server is up === 365s Resolving 'localhost:39397'... 365s Connecting to '::1:39397'... 365s Connecting to '127.0.0.1:39397'... 365s OCSP Response Information: 365s Response Status: Successful 365s Response Type: Basic OCSP Response 365s Version: 1 365s Responder ID: CN=Testing Authority OCSP Responder 365s Produced At: Thu Feb 20 21:27:54 UTC 2025 365s Responses: 365s Certificate ID: 365s Hash Algorithm: SHA1 365s Issuer Name Hash: bac68790352ceb4c4de1534445348f8b4b5309b3 365s Issuer Key Hash: e865fcb9123c7285fc28c803149f06ad94dfd934 365s Serial Number: 02 365s Certificate Status: good 365s This Update: Thu Feb 20 21:27:54 UTC 2025 365s Extensions: 365s Signature Algorithm: RSA-SHA256 365s 365s -----BEGIN OCSP RESPONSE----- 365s MIIFFwoBAKCCBRAwggUMBgkrBgEFBQcwAQEEggT9MIIE+TCBk6EtMCsxKTAnBgNV 365s BAMTIFRlc3RpbmcgQXV0aG9yaXR5IE9DU1AgUmVzcG9uZGVyGA8yMDI1MDIyMDIx 365s Mjc1NFowUTBPMDowCQYFKw4DAhoFAAQUusaHkDUs60xN4VNERTSPi0tTCbMEFOhl 365s /LkSPHKF/CjIAxSfBq2U39k0AgECgAAYDzIwMjUwMjIwMjEyNzU0WjANBgkqhkiG 365s 9w0BAQsFAAOCAQEAdPIoozZoAyhPZsTehVn3D9/6w/d0Iofqm6L6zP2CnzEB73yu 365s xo6QdjPwWgQb2HCO2XQ2ssgybiLVBYpcZCjaVadseHOCJsp8okNrHkiARepiWhnA 365s X+OO9MIBQ2Qv35xD6Q98Kvqk7MSBvHlAdqB9+x54Qg7T27ZA9Cf4+FLuRJ01lkyy 365s hymCwyfdeoCS9sxVkfJXeOvKiaBM8QWtdv5vtt1rVxzfr8e1GCnzslX6s2Ug68QP 365s scp44ItkkRWVF1cpnsSeoa0+1lpNPCv6qamsMB8EPeWnUhMM4EqDGxCz+acm7OiB 365s n4K0upXXRFTzA9eMdJ9tLnQDzM9yG9tmS7qAKKCCA0swggNHMIIDQzCCAiugAwIB 365s AgIMVvMY1hLemRdsyqHgMA0GCSqGSIb3DQEBCwUAMBwxGjAYBgNVBAMTEVRlc3Rp 365s bmcgQXV0aG9yaXR5MB4XDTE2MDMyMzIyMjk0MloXDTE3MDMyMzIyMjk0MlowKzEp 365s MCcGA1UEAxMgVGVzdGluZyBBdXRob3JpdHkgT0NTUCBSZXNwb25kZXIwggEiMA0G 365s CSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDTAmQKDWIlbuH07G3whNxFOG5e6yQr 365s jKmSgRFR2eNEz21cP9GyEhZ7Pu6yuZWs02L70rkydXQmR5p8Fq/fyZOeFy64nmcl 365s YfXzz+sIHndx/qwvI3gQGKoM4y46efURdhY3D7Y+m7X7By2x7wjYxnjoXZek8MdP 365s zDGABL612tkZQHP9WxQ+k20gTsx6zYKUBgxFP84zr7EiVS33XoM4Hb9zWmHCc9Qd 365s wm1mXx25Dp6oOR97oQS/Sa+pBM+hgf8bgUgWd1GXKOa1c8RWAsJH/FmkTTkKMdDT 365s cBk6ICsz+pf5jBZe2q2Gxq8Gh/jsk54Y0KDBkc6rCYnsRz1OWmQYc9SVAgMBAAGj 365s djB0MAwGA1UdEwEB/wQCMAAwEwYDVR0lBAwwCgYIKwYBBQUHAwkwDwYDVR0PAQH/ 365s BAUDAweAADAdBgNVHQ4EFgQU5z6hcBUBqNrycEPvTMiHGsOYdD0wHwYDVR0jBBgw 365s FoAULdgUmhbVbf77sODe8fXFIwvTYr4wDQYJKoZIhvcNAQELBQADggEBAHqmxPdE 365s tXJAcLZnvfyExhlkS4QHxj9dw8OWYma1HHAyEiNxLlvXgcngYspTVNHHHiErluOa 365s 3TdDkBlgdTdQ14aRJqEIT+EDXorU8MvvT7ujvDW/hm2IDDbrbd4Cyd1g6sQJpuil 365s BUvm4RV/LpkkAhRhd4dEhngHsoV0q1FbA7IxiPSNSixVjpBou2EhOPQFp4nFxFQv 365s nEFK1gzltj22+plrekuiZtMS7Ofhg+ZaHb2QB0bhvqbMyL6jb0/sxQZyy1qjID54 365s G6nrr7j+PzN+SHqo1dfWhuYbHBQMJdp+AGmusGFhwGem1PmO5AadPjc6lXs9mS// 365s /txyiheLGJJodQY= 365s -----END OCSP RESPONSE----- 365s 365s Verifying OCSP Response: Success. 365s 365s === Test 1: Server with valid certificate === 365s Echo Server listening on IPv4 0.0.0.0 port 36142...done 365s Echo Server listening on IPv6 :: port 36142...done 367s Connecting to OCSP server: localhost... 367s ocsp: received request, 1st line: POST /ocsp/ HTTP/1.0 367s ocsp: sending response, 1st line: HTTP/1.0 200 OK 367s Processed 1 CA certificate(s). 367s Resolving 'localhost:36142'... 367s Connecting to '::1:36142'... 367s - Certificate type: X.509 367s - Got a certificate list of 1 certificates. 367s - Certificate[0] info: 367s - subject `CN=localhost', issuer `CN=Testing Authority', serial 0x02, RSA key 3072 bits, signed using RSA-SHA256, activated `2016-03-29 16:21:42 UTC', expires `2026-03-29 16:24:41 UTC', pin-sha256="STXenSH9WZlVDOcNBE5ZyyxqWxNFTswpvo5NAOdKVW0=" 367s Public Key ID: 367s sha1:e4d27568778399f943e2efe21575b3a6bd47ec22 367s sha256:4935de9d21fd5999550ce70d044e59cb2c6a5b13454ecc29be8e4d00e74a556d 367s Public Key PIN: 367s pin-sha256:STXenSH9WZlVDOcNBE5ZyyxqWxNFTswpvo5NAOdKVW0= 367s 367s - Status: The certificate is trusted. 367s Resolving 'localhost:39397'... 367s Connecting to '::1:39397'... 367s Connecting to '127.0.0.1:39397'... 367s - OCSP server flags certificate not revoked as of Thu Feb 20 21:27:56 2025 367s *** OCSP: verified 1 certificate(s). 367s - Description: (TLS1.3-X.509)-(ECDHE-SECP256R1)-(RSA-PSS-RSAE-SHA256)-(AES-256-GCM) 367s - Session ID: 5B:F7:10:ED:57:46:5A:23:A2:72:B7:42:FD:72:90:BA:8F:B6:DE:1B:77:89:76:99:D3:B0:0C:5F:DF:85:83:CA 367s - Options: 367s - Handshake was completed 367s 367s - Simple Client Mode: 367s 367s test 123456 367s - Peer has closed the GnuTLS connection 367s === Generating bad server certificate === 367s received cmd: test 123456 367s 367s *** Processing 12 bytes command: test 123456 367s 367s Exiting via signal 15 367s Generating a signed certificate... 367s === Test 2: Server with revoked certificate === 367s reserved port 43458 367s X.509 Certificate Information: 367s Version: 3 367s Serial Number (hex): 03 367s Validity: 367s Not Before: Tue Mar 29 16:21:42 UTC 2016 367s Not After: Sun Mar 29 16:24:41 UTC 2026 367s Subject: CN=localhost 367s Subject Public Key Algorithm: RSA 367s Algorithm Security Level: High (3072 bits) 367s Modulus (bits 3072): 367s 00:af:0b:b6:b9:e8:98:8a:7e:db:d7:be:ce:81:28:d6 367s 63:41:2d:ef:2a:44:d6:05:d3:b9:77:60:4f:2b:be:2c 367s 7d:a9:62:6b:1b:1f:16:c0:14:80:df:d8:e7:8e:b3:ff 367s 33:f8:52:b4:56:ac:6f:71:1c:36:cd:bd:e5:9e:c2:d8 367s 0f:77:e0:1c:d8:fc:6d:97:59:b2:c8:97:cb:cf:ae:9b 367s f3:2d:9d:e7:36:27:cb:64:6a:97:63:51:59:1d:ee:f4 367s ec:52:a6:ab:74:e4:d1:71:3c:0c:d1:25:8e:81:05:e2 367s ad:93:12:76:45:35:7a:8a:a4:cc:07:33:c6:c3:c9:4c 367s f5:4a:9e:a5:43:2a:10:44:70:fc:ff:ec:e4:7e:fe:87 367s 18:99:07:40:68:e7:65:f6:6e:a0:26:7e:25:04:1a:f6 367s bc:2a:33:8f:1d:0b:c9:68:a0:ef:37:f9:8f:a0:a0:91 367s 91:02:6f:b8:e0:ac:03:61:0c:4d:e0:0f:d8:87:0b:c0 367s b2:69:53:cb:ba:e0:e4:96:5c:08:7a:d0:53:7d:61:83 367s 8b:4b:5d:1e:fd:66:63:72:ba:62:eb:83:b2:37:54:9e 367s 63:9e:16:b3:cb:de:2d:f3:be:74:04:30:b0:03:d5:fd 367s 06:79:1c:d4:30:d4:c7:50:e7:b9:6c:a2:00:c4:a5:bd 367s 86:58:49:6a:dd:74:fd:56:72:b8:fd:52:8e:6d:60:76 367s 9a:09:91:4e:33:83:91:cf:ca:bf:c2:ee:61:c7:0b:6a 367s 1f:25:96:7a:f1:0e:1b:43:62:97:02:ae:39:33:03:cf 367s 92:ad:23:10:5c:cf:76:b0:d1:f7:6e:42:46:ff:b7:1c 367s ee:ab:c3:ed:be:6a:d2:32:96:f6:73:cd:dc:17:7c:1b 367s 81:e5:b3:8a:a5:c5:3a:f2:d6:e3:19:2a:b9:f0:dd:d5 367s ff:bd:83:19:2c:43:74:d7:a9:84:64:cc:02:6b:66:ba 367s 6d:b6:4f:ed:fc:29:23:ca:8a:e2:16:4f:f6:ec:49:e7 367s db 367s Exponent (bits 24): 367s 01:00:01 367s Extensions: 367s Basic Constraints (critical): 367s Certificate Authority (CA): FALSE 367s Subject Alternative Name (not critical): 367s DNSname: localhost 367s Key Purpose (not critical): 367s TLS WWW Server. 367s Authority Information Access (not critical): 367s Access Method: 1.3.6.1.5.5.7.48.1 (id-ad-ocsp) 367s Access Location URI: http://localhost:39397/ocsp/ 367s Key Usage (critical): 367s Digital signature. 367s Key encipherment. 367s Subject Key Identifier (not critical): 367s cdabeaf4406b11227396e52b6041726ec50c780e 367s Authority Key Identifier (not critical): 367s 2dd8149a16d56dfefbb0e0def1f5c5230bd362be 367s Other Information: 367s Public Key ID: 367s sha1:cdabeaf4406b11227396e52b6041726ec50c780e 367s sha256:878b4e38ac81aabecb9701f2d5c0c0d2c59065bf2c8a5540a4930afdb6407f3b 367s Public Key PIN: 367s pin-sha256:h4tOOKyBqr7LlwHy1cDA0sWQZb8silVApJMK/bZAfzs= 367s 367s 367s 367s Signing certificate... 367s Echo Server listening on IPv4 0.0.0.0 port 43458...done 367s Echo Server listening on IPv6 :: port 43458...done 369s Connecting to OCSP server: localhost... 369s ocsp: received request, 1st line: POST /ocsp/ HTTP/1.0 369s ocsp: sending response, 1st line: HTTP/1.0 200 OK 369s *** Fatal error: Error in the certificate. 369s Error in handshake: A TLS fatal alert has been received. 369s Processed 1 CA certificate(s). 369s Resolving 'localhost:43458'... 369s Connecting to '::1:43458'... 369s - Certificate type: X.509 369s - Got a certificate list of 1 certificates. 369s - Certificate[0] info: 369s - subject `CN=localhost', issuer `CN=Testing Authority', serial 0x03, RSA key 3072 bits, signed using RSA-SHA256, activated `2016-03-29 16:21:42 UTC', expires `2026-03-29 16:24:41 UTC', pin-sha256="h4tOOKyBqr7LlwHy1cDA0sWQZb8silVApJMK/bZAfzs=" 369s Public Key ID: 369s sha1:cdabeaf4406b11227396e52b6041726ec50c780e 369s sha256:878b4e38ac81aabecb9701f2d5c0c0d2c59065bf2c8a5540a4930afdb6407f3b 369s Public Key PIN: 369s pin-sha256:h4tOOKyBqr7LlwHy1cDA0sWQZb8silVApJMK/bZAfzs= 369s 369s - Status: The certificate is trusted. 369s Resolving 'localhost:39397'... 369s Connecting to '::1:39397'... 369s Connecting to '127.0.0.1:39397'... 369s *** Certificate was revoked at Thu Apr 28 14:24:41 2016 369s *** Verifying (with OCSP) server certificate chain failed... 369s Exiting via signal 15 369s Terminated 369s unreserved port 43458 369s SUCCESS [94]../../tests/ocsp-tests/ocsp-tls-connection.sh 369s running [95]../../tests/ocsp-tests/ocsptool.sh ... 369s OCSP Response Information: 369s Response Status: Successful 369s Response Type: Basic OCSP Response 369s Version: 1 369s Responder ID: CN=Testing Authority 369s Produced At: Wed Mar 23 21:55:28 UTC 2016 369s Responses: 369s Certificate ID: 369s Hash Algorithm: SHA1 369s Issuer Name Hash: bac68790352ceb4c4de1534445348f8b4b5309b3 369s Issuer Key Hash: e865fcb9123c7285fc28c803149f06ad94dfd934 369s Serial Number: 56f304a1326dc9b2d51b31b3 369s Certificate Status: unknown 369s This Update: Wed Mar 23 21:55:28 UTC 2016 369s Extensions: 369s Signature Algorithm: RSA-SHA256 369s 369s -----BEGIN OCSP RESPONSE----- 369s MIIEwAoBAKCCBLkwggS1BgkrBgEFBQcwAQEEggSmMIIEojCBj6EeMBwxGjAYBgNV 369s BAMTEVRlc3RpbmcgQXV0aG9yaXR5GA8yMDE2MDMyMzIxNTUyOFowXDBaMEUwCQYF 369s Kw4DAhoFAAQUusaHkDUs60xN4VNERTSPi0tTCbMEFOhl/LkSPHKF/CjIAxSfBq2U 369s 39k0AgxW8wShMm3JstUbMbOCABgPMjAxNjAzMjMyMTU1MjhaMA0GCSqGSIb3DQEB 369s CwUAA4IBAQBKkt+j9Rd5Pjq67WsiWIc9rVjxA0vdiZahZUAYlCCauKpLN+FxSsda 369s uCUzYmotc4Jq4Erbmpl0pfvR5Y3nFArCQuKiLayOKk5NevUgnVMLbcaojrtwfPl/ 369s puf8zPFGOo+Ue2SQH+H8YX3wmQqeMEIblF2GonPVWm8pY+Gjx9ElBjUMCqAoCtig 369s CWcS9BbOm1BON0IEOsCb9gJ+VtRrLxpaOzLsc0lZGip74IuqHEyb6foA/bME8Ydy 369s T8v28oA9pfMdW0xoB/drpeq+lJfO3Hiu7QmHC56zRNyWNv3ovU9R87cEGEM2QD7o 369s /23eXMmoFODYx7Y5B6UOmiD34ufq7UaRoIIC+DCCAvQwggLwMIIB2KADAgECAghW 369s 8wrgLlKayzANBgkqhkiG9w0BAQsFADAcMRowGAYDVQQDExFUZXN0aW5nIEF1dGhv 369s cml0eTAiGA8yMDE2MDMyMzIxMzAxNVoYDzk5OTkxMjMxMjM1OTU5WjAcMRowGAYD 369s VQQDExFUZXN0aW5nIEF1dGhvcml0eTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCC 369s AQoCggEBAKBV6T5EMSijMfx/e9MkasHxLi5VDv4gYb5Y/nuxilR1CpCRg6Twnqpu 369s /tmkj9XU23ewZuIxjb+ePdOH7AmiFZKYxZpo6+x1h6GCBqBpjniWN1ygt/mLs6jA 369s pJAlGOfgrjgFWzg8hwsgnN6T5gn3nFS7CLhFkJRav6DvgGcfRnSGQv9O/eGZDUAI 369s UGPou0lRpiON77UzDRmvENke6+60LBygJZD470YiQHbU6WZERQHEq1JCbh3iXB1S 369s uCRqe3R075I/u/+zOkDygDmVCPQYqoHJ+3AnfXpjsnTTjoMuqYXe0QVyCgzAeFga 369s tyXUuxSvPq8rVTVYvb6+AOXBVTDidp0CAwEAAaMyMDAwDwYDVR0TAQH/BAUwAwEB 369s /zAdBgNVHQ4EFgQULdgUmhbVbf77sODe8fXFIwvTYr4wDQYJKoZIhvcNAQELBQAD 369s ggEBAGGF8as/0Ew1prrQKOKSbVB3nrILF7D9fOxKIEUEOprtYGgjvvfkqG7xDQRP 369s SvIiVy3X0wZQpzytCgvkjXeQ8QsIIMnrYpjy6iRCRkDlti3iUqx6zo7B7iYaEIdK 369s Ky6uCn5z/RPti5WJIeqvg3WqTNeOXjWIK3ac6cROqUcUlLxy1AukNRYuvpVszQu9 369s FDs9ecdA5aOvBvb0WlVjbEU37EVuoveayBpgP0c2I7xu2zAkobNdn7JYNOGJx4x9 369s 8WMlcCP0ZU7O0wwk9y/U/FxARqfFIzDC2JanTi2LxyHdQw8iWAvaBksb7vLdMnn2 369s 9prXtfKhcCXLVECxSJuI1swHETA= 369s -----END OCSP RESPONSE----- 369s OCSP Response Information: 369s Response Status: Successful 369s Response Type: Basic OCSP Response 369s Version: 1 369s Responder ID: CN=Testing Authority 369s Produced At: Wed Mar 23 21:55:28 UTC 2016 369s Responses: 369s Certificate ID: 369s Hash Algorithm: SHA1 369s Issuer Name Hash: bac68790352ceb4c4de1534445348f8b4b5309b3 369s Issuer Key Hash: e865fcb9123c7285fc28c803149f06ad94dfd934 369s Serial Number: 56f304a1326dc9b2d51b31b3 369s Certificate Status: unknown 369s This Update: Wed Mar 23 21:55:28 UTC 2016 369s Extensions: 369s Signature Algorithm: RSA-SHA256 369s 369s -----BEGIN OCSP RESPONSE----- 369s MIIEwAoBAKCCBLkwggS1BgkrBgEFBQcwAQEEggSmMIIEojCBj6EeMBwxGjAYBgNV 369s BAMTEVRlc3RpbmcgQXV0aG9yaXR5GA8yMDE2MDMyMzIxNTUyOFowXDBaMEUwCQYF 369s Kw4DAhoFAAQUusaHkDUs60xN4VNERTSPi0tTCbMEFOhl/LkSPHKF/CjIAxSfBq2U 369s 39k0AgxW8wShMm3JstUbMbOCABgPMjAxNjAzMjMyMTU1MjhaMA0GCSqGSIb3DQEB 369s CwUAA4IBAQBKkt+j9Rd5Pjq67WsiWIc9rVjxA0vdiZahZUAYlCCauKpLN+FxSsda 369s uCUzYmotc4Jq4Erbmpl0pfvR5Y3nFArCQuKiLayOKk5NevUgnVMLbcaojrtwfPl/ 369s puf8zPFGOo+Ue2SQH+H8YX3wmQqeMEIblF2GonPVWm8pY+Gjx9ElBjUMCqAoCtig 369s CWcS9BbOm1BON0IEOsCb9gJ+VtRrLxpaOzLsc0lZGip74IuqHEyb6foA/bME8Ydy 369s T8v28oA9pfMdW0xoB/drpeq+lJfO3Hiu7QmHC56zRNyWNv3ovU9R87cEGEM2QD7o 369s /23eXMmoFODYx7Y5B6UOmiD34ufq7UaRoIIC+DCCAvQwggLwMIIB2KADAgECAghW 369s 8wrgLlKayzANBgkqhkiG9w0BAQsFADAcMRowGAYDVQQDExFUZXN0aW5nIEF1dGhv 369s cml0eTAiGA8yMDE2MDMyMzIxMzAxNVoYDzk5OTkxMjMxMjM1OTU5WjAcMRowGAYD 369s VQQDExFUZXN0aW5nIEF1dGhvcml0eTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCC 369s AQoCggEBAKBV6T5EMSijMfx/e9MkasHxLi5VDv4gYb5Y/nuxilR1CpCRg6Twnqpu 369s /tmkj9XU23ewZuIxjb+ePdOH7AmiFZKYxZpo6+x1h6GCBqBpjniWN1ygt/mLs6jA 369s pJAlGOfgrjgFWzg8hwsgnN6T5gn3nFS7CLhFkJRav6DvgGcfRnSGQv9O/eGZDUAI 369s UGPou0lRpiON77UzDRmvENke6+60LBygJZD470YiQHbU6WZERQHEq1JCbh3iXB1S 369s uCRqe3R075I/u/+zOkDygDmVCPQYqoHJ+3AnfXpjsnTTjoMuqYXe0QVyCgzAeFga 369s tyXUuxSvPq8rVTVYvb6+AOXBVTDidp0CAwEAAaMyMDAwDwYDVR0TAQH/BAUwAwEB 369s /zAdBgNVHQ4EFgQULdgUmhbVbf77sODe8fXFIwvTYr4wDQYJKoZIhvcNAQELBQAD 369s ggEBAGGF8as/0Ew1prrQKOKSbVB3nrILF7D9fOxKIEUEOprtYGgjvvfkqG7xDQRP 369s SvIiVy3X0wZQpzytCgvkjXeQ8QsIIMnrYpjy6iRCRkDlti3iUqx6zo7B7iYaEIdK 369s Ky6uCn5z/RPti5WJIeqvg3WqTNeOXjWIK3ac6cROqUcUlLxy1AukNRYuvpVszQu9 369s FDs9ecdA5aOvBvb0WlVjbEU37EVuoveayBpgP0c2I7xu2zAkobNdn7JYNOGJx4x9 369s 8WMlcCP0ZU7O0wwk9y/U/FxARqfFIzDC2JanTi2LxyHdQw8iWAvaBksb7vLdMnn2 369s 9prXtfKhcCXLVECxSJuI1swHETA= 369s -----END OCSP RESPONSE----- 369s SUCCESS [95]../../tests/ocsp-tests/ocsptool.sh 369s running [96]../../tests/p11-kit-load.sh ... 369s located 369s SKIPPED [96]../../tests/p11-kit-load.sh 369s running [97]../../tests/p11-kit-trust.sh ... 369s p11-kit trust module was not found 369s SKIPPED [97]../../tests/p11-kit-trust.sh 369s running [98]../../tests/pkcs11-tool.sh ... 369s located 369s Need pkcs11-tool from opensc package to run this test. 369s SKIPPED [98]../../tests/pkcs11-tool.sh 369s running [99]../../tests/pkcs7-cat.sh ... 369s eContent Type: 1.3.6.1.4.1.311.10.1 369s Signers: 369s Signer's issuer DN: CN=Microsoft Windows Hardware Compatibility PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=US 369s Signer's serial: 330000001e258e7c4251c5d1fa00010000001e 369s Signature Algorithm: RSA-SHA1 369s 369s eContent Type: 1.3.6.1.4.1.311.10.1 369s Signers: 369s Signer's issuer DN: CN=Microsoft Windows Hardware Compatibility PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=US 369s Signer's serial: 330000001e258e7c4251c5d1fa00010000001e 369s Signature Algorithm: RSA-SHA1 369s 369s ../../tests/p11-kit-load.sh: 33: pkg-config: not found 369s ../../tests/p11-kit-load.sh: 51: pkg-config: not found 369s ../../tests/p11-kit-trust.sh: 32: pkg-config: not found 369s + : ../../tests/ 369s + : /tmp/autopkgtest.QFIdzS/build.fab/src/nonexist-builddir 369s + : /usr/bin/certtool 369s + : /usr/bin/p11tool 369s + : diff 369s + test = 1 369s + . ../../tests//scripts/common.sh 369s + export TZ=UTC 369s + GETPORT= 369s rc=0 369s while test $rc = 0; do 369s unset myrandom 369s if test -n "$RANDOM"; then myrandom=$(($RANDOM + $RANDOM)); fi 369s if test -z "$myrandom"; then myrandom=$(date +%N | sed s/^0*//); fi 369s if test -z "$myrandom"; then myrandom=0; fi 369s PORT="$(((($$<<15)|$myrandom) % 63001 + 2000))" 369s check_if_port_in_use $PORT;rc=$? 369s done 369s 369s + create_testdir pkcs11-tool 369s + local PREFIX=pkcs11-tool 369s + mktemp -d -t pkcs11-tool.XXXXXX 369s + d=/tmp/pkcs11-tool.JYUJxO 369s + test 0 -ne 0 369s + trap test -e "/tmp/pkcs11-tool.JYUJxO" && rm -rf "/tmp/pkcs11-tool.JYUJxO" 1 15 2 369s + echo /tmp/pkcs11-tool.JYUJxO 369s + testdir=/tmp/pkcs11-tool.JYUJxO 369s + TMP_SOFTHSM_DIR=/tmp/pkcs11-tool.JYUJxO/softhsm-load.4405.tmp 369s + TEMPLATE=/tmp/pkcs11-tool.JYUJxO/cert.cfg 369s + PIN=1234 369s + PUK=1234 369s + test -x /usr/bin/p11tool 369s + test -x /usr/bin/certtool 369s + test -f /pkcs11/libsofthsm2.so 369s + test -f /usr/lib64/pkcs11//libsofthsm2.so 369s + test -f /usr/lib/pkcs11//libsofthsm2.so 369s + test -f /usr/lib/x86_64-linux-gnu/pkcs11//libsofthsm2.so 369s + test -f /usr/lib/softhsm//libsofthsm2.so 369s + SOFTHSM_MODULE=/usr/lib/softhsm//libsofthsm2.so 369s + echo located 369s + break 369s + test -f /usr/lib/softhsm//libsofthsm2.so 369s + which pkcs11-tool 369s + [ -z ] 369s + echo Need pkcs11-tool from opensc package to run this test. 369s + exit 77 369s Signature status: verification failed: The certificate is not yet activated. 369s Signature status: ok 369s SUCCESS [99]../../tests/pkcs7-cat.sh 369s running [100]../../tests/pqc-hybrid-kx.sh ... 369s X25519-KYBER768 is not supported nor enabled, skipping 369s SECP256R1-MLKEM768 is not supported nor enabled, skipping 369s SECP384R1-MLKEM1024 is not supported nor enabled, skipping 369s X25519-MLKEM768 is not supported nor enabled, skipping 369s ../../tests/pqc-hybrid-kx.sh: 106: KYBER768 is not supported, skipping: not found 369s ../../tests/pqc-hybrid-kx.sh: 106: MLKEM768 is not supported, skipping: not found 369s ../../tests/pqc-hybrid-kx.sh: 106: MLKEM1024 is not supported, skipping: not found 369s X25519-KYBER768 is not supported, skipping 369s SECP256R1-MLKEM768 is not supported, skipping 369s SUCCESS [100]../../tests/pqc-hybrid-kx.sh 369s running [101]../../tests/profile-tests.sh ... 369s SECP384R1-MLKEM1024 is not supported, skipping 369s X25519-MLKEM768 is not supported, skipping 369s Testing with a 256 bit ECDSA key 369s reserved port 45981 369s Echo Server listening on IPv4 0.0.0.0 port 45981...done 369s Echo Server listening on IPv6 :: port 45981...done 370s *** Fatal error: Error in the certificate. 370s Error in handshake: A TLS fatal alert has been received. 370s *** Fatal error: Error in the certificate. 370s Error in handshake: A TLS fatal alert has been received. 370s Exiting via signal 15 370s Testing with a 384 bit ECDSA key 370s reserved port 64071 370s Echo Server listening on IPv4 0.0.0.0 port 64071...done 370s Echo Server listening on IPv6 :: port 64071...done 371s Testing with a 521 bit ECDSA key 371s *** Fatal error: Error in the certificate. 371s Error in handshake: A TLS fatal alert has been received. 371s Exiting via signal 15 371s reserved port 8627 371s Echo Server listening on IPv4 0.0.0.0 port 8627...done 371s Echo Server listening on IPv6 :: port 8627...done 372s unreserved port 8627 372s SUCCESS [101]../../tests/profile-tests.sh 372s running [102]../../tests/psktool.sh ... 372s Checking PSK tool basic operations 372s Exiting via signal 15 372s Generating a random key for user 'test' 372s Key stored to psktool.4535.tmp 372s Generating a random key for user 'user2' 372s Key stored to psktool.4535.tmp 372s Generating a random key for user 'user:3' 372s Key stored to psktool.4535.tmp 372s Generating a random key for user 'user:3' 372s Key stored to psktool.4535.tmp 372s SUCCESS [102]../../tests/psktool.sh 372s running [103]../../tests/rfc2253-escape-test.sh ... 372s SUCCESS [103]../../tests/rfc2253-escape-test.sh 372s running [104]../../tests/rsa-md5-collision/rsa-md5-collision.sh ... 372s Output: Not verified. The certificate is NOT trusted. The certificate chain uses insecure algorithm. 372s Output: Not verified. The certificate is NOT trusted. The certificate issuer is unknown. The certificate chain uses insecure algorithm. 372s Chain verification output: Not verified. The certificate is NOT trusted. The certificate chain uses insecure algorithm. 372s Output: Not verified. The certificate is NOT trusted. The certificate chain uses insecure algorithm. 372s Output: Not verified. The certificate is NOT trusted. The certificate issuer is unknown. The certificate chain uses insecure algorithm. 372s Chain verification output: Not verified. The certificate is NOT trusted. The certificate chain uses insecure algorithm. 372s SUCCESS [104]../../tests/rsa-md5-collision/rsa-md5-collision.sh 372s running [105]../../tests/sanity-lib.sh ... 372s SKIPPED [105]../../tests/sanity-lib.sh 372s running [106]../../tests/scripts/common.sh ... 372s SUCCESS [106]../../tests/scripts/common.sh 372s running [107]../../tests/scripts/starttls-common.sh ... 372s SKIPPED [107]../../tests/scripts/starttls-common.sh 372s running [108]../../tests/serv-udp.sh ... 372s Checking whether UDP server works 372s reserved port 22273 372s Note that no verification profile was selected. In the future the medium profile will be enabled by default. 372s Use --verify-profile low to apply the default verification of NORMAL priority string. 372s Note that no verification profile was selected. In the future the medium profile will be enabled by default. 372s Use --verify-profile low to apply the default verification of NORMAL priority string. 372s UDP HTTP Server listening on IPv4 0.0.0.0 port 22273...done 372s UDP HTTP Server listening on IPv6 :: port 22273...done 376s |<2>| added 3 protocols, 29 ciphersuites, 19 sig algos and 10 groups into priority list 376s |<2>| checking c0.2c (GNUTLS_ECDHE_ECDSA_AES_256_GCM_SHA384) for compatibility 376s |<2>| checking cc.a9 (GNUTLS_ECDHE_ECDSA_CHACHA20_POLY1305) for compatibility 376s |<2>| checking c0.ad (GNUTLS_ECDHE_ECDSA_AES_256_CCM) for compatibility 376s |<2>| checking c0.0a (GNUTLS_ECDHE_ECDSA_AES_256_CBC_SHA1) for compatibility 376s |<2>| checking c0.2b (GNUTLS_ECDHE_ECDSA_AES_128_GCM_SHA256) for compatibility 376s |<2>| checking c0.ac (GNUTLS_ECDHE_ECDSA_AES_128_CCM) for compatibility 376s |<2>| checking c0.09 (GNUTLS_ECDHE_ECDSA_AES_128_CBC_SHA1) for compatibility 376s |<2>| checking c0.30 (GNUTLS_ECDHE_RSA_AES_256_GCM_SHA384) for compatibility 376s |<2>| Selected (RSA) cert based on ciphersuite c0.30: GNUTLS_ECDHE_RSA_AES_256_GCM_SHA384 376s |<2>| EdDSA (Ed25519) is unsupported for cert request 376s |<2>| EdDSA (Ed448) is unsupported for cert request 379s |<2>| added 3 protocols, 29 ciphersuites, 19 sig algos and 10 groups into priority list 379s |<2>| checking c0.2c (GNUTLS_ECDHE_ECDSA_AES_256_GCM_SHA384) for compatibility 379s |<2>| checking cc.a9 (GNUTLS_ECDHE_ECDSA_CHACHA20_POLY1305) for compatibility 379s |<2>| checking c0.ad (GNUTLS_ECDHE_ECDSA_AES_256_CCM) for compatibility 379s |<2>| checking c0.0a (GNUTLS_ECDHE_ECDSA_AES_256_CBC_SHA1) for compatibility 379s |<2>| checking c0.2b (GNUTLS_ECDHE_ECDSA_AES_128_GCM_SHA256) for compatibility 379s |<2>| checking c0.ac (GNUTLS_ECDHE_ECDSA_AES_128_CCM) for compatibility 379s |<2>| checking c0.09 (GNUTLS_ECDHE_ECDSA_AES_128_CBC_SHA1) for compatibility 379s |<2>| checking c0.30 (GNUTLS_ECDHE_RSA_AES_256_GCM_SHA384) for compatibility 379s |<2>| Selected (RSA) cert based on ciphersuite c0.30: GNUTLS_ECDHE_RSA_AES_256_GCM_SHA384 379s |<2>| EdDSA (Ed25519) is unsupported for cert request 379s |<2>| EdDSA (Ed448) is unsupported for cert request 381s Exiting via signal 15 381s unreserved port 22273 381s SUCCESS [108]../../tests/serv-udp.sh 381s running [109]../../tests/server-multi-keys.sh ... 381s Checking whether server can utilize multiple keys 381s reserved port 26971 381s Echo Server listening on IPv4 0.0.0.0 port 26971...done 381s Echo Server listening on IPv6 :: port 26971...done 382s Processed 1 CA certificate(s). 382s Resolving 'localhost:26971'... 382s Connecting to '::1:26971'... 382s - Successfully sent 0 certificate(s) to server. 382s - Server has requested a certificate. 382s - Certificate type: X.509 382s - Got a certificate list of 1 certificates. 382s - Certificate[0] info: 382s - no subject,issuer `CN=GnuTLS Test CA', serial 0x59897b84004ff2ed, RSA-PSS key 2048 bits, signed using RSA-SHA256, activated `2017-08-08 08:51:16 UTC', expires `9999-12-31 23:59:59 UTC', pin-sha256="NN1idWI1043ahir5N4qSOKf/6IXzP/X1Kj4Ki5Z97xo=" 382s Public Key ID: 382s sha1:6a7ea695c72a532d59eb8c2f46fdf1c60e21db29 382s sha256:34dd62756235d38dda862af9378a9238a7ffe885f33ff5f52a3e0a8b967def1a 382s Public Key PIN: 382s pin-sha256:NN1idWI1043ahir5N4qSOKf/6IXzP/X1Kj4Ki5Z97xo= 382s 382s - Status: The certificate is trusted. 382s - Description: (TLS1.3-X.509)-(ECDHE-SECP256R1)-(RSA-PSS-SHA256)-(AES-256-GCM) 382s - Session ID: FC:7F:C7:78:1A:27:9C:B9:0C:13:D7:CF:9E:AB:E0:87:CA:B0:1E:22:1D:DC:AC:B0:B8:88:70:38:3E:BD:CC:CA 382s - Options: 382s - Handshake was completed 382s 382s - Simple Client Mode: 382s 382s - Peer has closed the GnuTLS connection 382s Processed 1 CA certificate(s). 382s Resolving 'localhost:26971'... 382s Connecting to '::1:26971'... 382s - Successfully sent 0 certificate(s) to server. 382s - Server has requested a certificate. 382s - Certificate type: X.509 382s - Got a certificate list of 1 certificates. 382s - Certificate[0] info: 382s - no subject,issuer `CN=GnuTLS Test CA', serial 0x59897b84004ff2ed, RSA-PSS key 2048 bits, signed using RSA-SHA256, activated `2017-08-08 08:51:16 UTC', expires `9999-12-31 23:59:59 UTC', pin-sha256="NN1idWI1043ahir5N4qSOKf/6IXzP/X1Kj4Ki5Z97xo=" 382s Public Key ID: 382s sha1:6a7ea695c72a532d59eb8c2f46fdf1c60e21db29 382s sha256:34dd62756235d38dda862af9378a9238a7ffe885f33ff5f52a3e0a8b967def1a 382s Public Key PIN: 382s pin-sha256:NN1idWI1043ahir5N4qSOKf/6IXzP/X1Kj4Ki5Z97xo= 382s 382s - Status: The certificate is trusted. 382s - Description: (TLS1.3-X.509)-(ECDHE-SECP256R1)-(RSA-PSS-SHA256)-(AES-256-GCM) 382s - Session ID: 43:F0:84:96:05:7C:D3:8F:7E:BC:7B:68:21:3A:9D:67:2D:40:FE:22:81:BF:D5:A5:DE:52:9B:5D:7C:11:67:06 382s - Options: 382s - Handshake was completed 382s 382s - Simple Client Mode: 382s 382s - Peer has closed the GnuTLS connection 382s Processed 1 CA certificate(s). 382s Resolving 'localhost:26971'... 382s Connecting to '::1:26971'... 382s - Certificate type: X.509 382s - Got a certificate list of 1 certificates. 382s - Certificate[0] info: 382s - subject `CN=GnuTLS Test Server (RSA certificate)', issuer `CN=GnuTLS Test CA', serial 0x4de0b4ca, RSA key 2432 bits, signed using RSA-SHA256, activated `2011-05-28 08:39:39 UTC', expires `2038-10-12 08:39:40 UTC', pin-sha256="ZCnc2x+EUztg6ShnEvwtcHxusyXqJ5RJLNCDLc+lVNE=" 382s Public Key ID: 382s sha1:482334530a8931384a5aeacab6d2a6dece1d2b18 382s sha256:6429dcdb1f84533b60e9286712fc2d707c6eb325ea2794492cd0832dcfa554d1 382s Public Key PIN: 382s pin-sha256:ZCnc2x+EUztg6ShnEvwtcHxusyXqJ5RJLNCDLc+lVNE= 382s 382s - Status: The certificate is trusted. 382s - Successfully sent 0 certificate(s) to server. 382s - Description: (TLS1.2-X.509)-(ECDHE-SECP256R1)-(RSA-SHA256)-(AES-256-GCM) 382s - Session ID: 1E:6C:18:3A:40:78:7D:A2:F9:0E:DE:DB:05:98:0C:9F:6A:D4:AE:86:1C:E1:62:50:73:EF:C0:4D:42:C8:FF:01 382s - Options: extended master secret, safe renegotiation, 382s - Handshake was completed 382s 382s - Simple Client Mode: 382s 382s - Peer has closed the GnuTLS connection 382s Processed 1 CA certificate(s). 382s Resolving 'localhost:26971'... 382s Connecting to '::1:26971'... 382s - Successfully sent 0 certificate(s) to server. 382s - Server has requested a certificate. 382s - Certificate type: X.509 382s - Got a certificate list of 1 certificates. 382s - Certificate[0] info: 382s - no subject,issuer `CN=GnuTLS Test CA', serial 0x59897b84004ff2ed, RSA-PSS key 2048 bits, signed using RSA-SHA256, activated `2017-08-08 08:51:16 UTC', expires `9999-12-31 23:59:59 UTC', pin-sha256="NN1idWI1043ahir5N4qSOKf/6IXzP/X1Kj4Ki5Z97xo=" 382s Public Key ID: 382s sha1:6a7ea695c72a532d59eb8c2f46fdf1c60e21db29 382s sha256:34dd62756235d38dda862af9378a9238a7ffe885f33ff5f52a3e0a8b967def1a 382s Public Key PIN: 382s pin-sha256:NN1idWI1043ahir5N4qSOKf/6IXzP/X1Kj4Ki5Z97xo= 382s 382s - Status: The certificate is trusted. 382s - Description: (TLS1.3-X.509)-(ECDHE-SECP256R1)-(RSA-PSS-SHA256)-(AES-256-GCM) 382s - Session ID: 0B:B4:DC:78:19:20:08:F2:FF:C5:2D:79:00:39:B4:14:90:8B:1A:1A:2D:91:03:21:49:48:1B:F6:78:75:8B:C4 382s - Options: 382s - Handshake was completed 382s 382s - Simple Client Mode: 382s 382s - Peer has closed the GnuTLS connection 382s Processed 1 CA certificate(s). 382s Resolving 'localhost:26971'... 382s Connecting to '::1:26971'... 382s - Successfully sent 0 certificate(s) to server. 382s - Server has requested a certificate. 382s - Certificate type: X.509 382s - Got a certificate list of 1 certificates. 382s - Certificate[0] info: 382s - no subject,issuer `CN=GnuTLS Test CA', serial 0x59897b84004ff2ed, RSA-PSS key 2048 bits, signed using RSA-SHA256, activated `2017-08-08 08:51:16 UTC', expires `9999-12-31 23:59:59 UTC', pin-sha256="NN1idWI1043ahir5N4qSOKf/6IXzP/X1Kj4Ki5Z97xo=" 382s Public Key ID: 382s sha1:6a7ea695c72a532d59eb8c2f46fdf1c60e21db29 382s sha256:34dd62756235d38dda862af9378a9238a7ffe885f33ff5f52a3e0a8b967def1a 382s Public Key PIN: 382s pin-sha256:NN1idWI1043ahir5N4qSOKf/6IXzP/X1Kj4Ki5Z97xo= 382s 382s - Status: The certificate is trusted. 382s - Description: (TLS1.3-X.509)-(ECDHE-SECP256R1)-(RSA-PSS-SHA256)-(AES-256-GCM) 382s - Session ID: BA:73:C4:AB:CB:05:4D:CC:ED:07:10:B4:26:C8:B7:DF:03:55:E5:56:D2:6C:6E:43:45:C6:47:F5:07:16:E2:37 382s - Options: 382s - Handshake was completed 382s 382s - Simple Client Mode: 382s 382s - Peer has closed the GnuTLS connection 382s unreserved port 26971 382s SUCCESS [109]../../tests/server-multi-keys.sh 382s running [110]../../tests/server-weak-keys.sh ... 382s Checking whether a client will refuse weak but trusted keys 382s reserved port 63218 382s Exiting via signal 15 382s Echo Server listening on IPv4 0.0.0.0 port 63218...done 382s Echo Server listening on IPv6 :: port 63218...done 383s |<3>| ASSERT: ../../../lib/x509/verify-high.c[gnutls_x509_trust_list_add_cas]:340 383s |<1>| There was a non-CA certificate in the trusted list: CN=localhost. 383s |<2>| added 3 protocols, 29 ciphersuites, 16 sig algos and 10 groups into priority list 383s |<4>| HSK[0x6037a0ceb310]: Adv. version: 3.3 383s |<2>| Keeping ciphersuite c0.2c (GNUTLS_ECDHE_ECDSA_AES_256_GCM_SHA384) 383s |<2>| Keeping ciphersuite cc.a9 (GNUTLS_ECDHE_ECDSA_CHACHA20_POLY1305) 383s |<2>| Keeping ciphersuite c0.ad (GNUTLS_ECDHE_ECDSA_AES_256_CCM) 383s |<2>| Keeping ciphersuite c0.0a (GNUTLS_ECDHE_ECDSA_AES_256_CBC_SHA1) 383s |<2>| Keeping ciphersuite c0.2b (GNUTLS_ECDHE_ECDSA_AES_128_GCM_SHA256) 383s |<2>| Keeping ciphersuite c0.ac (GNUTLS_ECDHE_ECDSA_AES_128_CCM) 384s |<2>| Keeping ciphersuite c0.09 (GNUTLS_ECDHE_ECDSA_AES_128_CBC_SHA1) 384s |<2>| Keeping ciphersuite c0.30 (GNUTLS_ECDHE_RSA_AES_256_GCM_SHA384) 384s |<2>| Keeping ciphersuite cc.a8 (GNUTLS_ECDHE_RSA_CHACHA20_POLY1305) 384s |<2>| Keeping ciphersuite c0.14 (GNUTLS_ECDHE_RSA_AES_256_CBC_SHA1) 384s |<2>| Keeping ciphersuite c0.2f (GNUTLS_ECDHE_RSA_AES_128_GCM_SHA256) 384s |<2>| Keeping ciphersuite c0.13 (GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1) 384s |<2>| Keeping ciphersuite 00.9d (GNUTLS_RSA_AES_256_GCM_SHA384) 384s |<2>| Keeping ciphersuite c0.9d (GNUTLS_RSA_AES_256_CCM) 384s |<2>| Keeping ciphersuite 00.35 (GNUTLS_RSA_AES_256_CBC_SHA1) 384s |<2>| Keeping ciphersuite 00.9c (GNUTLS_RSA_AES_128_GCM_SHA256) 384s |<2>| Keeping ciphersuite c0.9c (GNUTLS_RSA_AES_128_CCM) 384s |<2>| Keeping ciphersuite 00.2f (GNUTLS_RSA_AES_128_CBC_SHA1) 384s |<2>| Keeping ciphersuite 00.9f (GNUTLS_DHE_RSA_AES_256_GCM_SHA384) 384s |<2>| Keeping ciphersuite cc.aa (GNUTLS_DHE_RSA_CHACHA20_POLY1305) 384s |<2>| Keeping ciphersuite c0.9f (GNUTLS_DHE_RSA_AES_256_CCM) 384s |<2>| Keeping ciphersuite 00.39 (GNUTLS_DHE_RSA_AES_256_CBC_SHA1) 384s |<2>| Keeping ciphersuite 00.9e (GNUTLS_DHE_RSA_AES_128_GCM_SHA256) 384s |<2>| Keeping ciphersuite c0.9e (GNUTLS_DHE_RSA_AES_128_CCM) 384s |<2>| Keeping ciphersuite 00.33 (GNUTLS_DHE_RSA_AES_128_CBC_SHA1) 384s |<4>| EXT[0x6037a0ceb310]: Preparing extension (Compress Certificate/27) for 'client hello' 384s |<4>| EXT[0x6037a0ceb310]: Preparing extension (Record Size Limit/28) for 'client hello' 384s |<4>| EXT[0x6037a0ceb310]: Sending extension Record Size Limit/28 (2 bytes) 384s |<4>| EXT[0x6037a0ceb310]: Preparing extension (Supported Groups/10) for 'client hello' 384s |<4>| EXT[0x6037a0ceb310]: Sent group SECP256R1 (0x17) 384s |<4>| EXT[0x6037a0ceb310]: Sent group SECP384R1 (0x18) 384s |<4>| EXT[0x6037a0ceb310]: Sent group SECP521R1 (0x19) 384s |<4>| EXT[0x6037a0ceb310]: Sent group X25519 (0x1d) 384s |<4>| EXT[0x6037a0ceb310]: Sent group X448 (0x1e) 384s |<4>| EXT[0x6037a0ceb310]: Sent group FFDHE2048 (0x100) 384s |<4>| EXT[0x6037a0ceb310]: Sent group FFDHE3072 (0x101) 384s |<4>| EXT[0x6037a0ceb310]: Sent group FFDHE4096 (0x102) 384s |<4>| EXT[0x6037a0ceb310]: Sent group FFDHE6144 (0x103) 384s |<4>| EXT[0x6037a0ceb310]: Sent group FFDHE8192 (0x104) 384s |<4>| EXT[0x6037a0ceb310]: Sending extension Supported Groups/10 (22 bytes) 384s |<4>| EXT[0x6037a0ceb310]: Preparing extension (Supported Versions/43) for 'client hello' 384s |<4>| EXT[0x6037a0ceb310]: Preparing extension (Maximum Record Size/1) for 'client hello' 384s |<4>| EXT[0x6037a0ceb310]: Preparing extension (Cookie/44) for 'client hello' 384s |<4>| EXT[0x6037a0ceb310]: Preparing extension (Session Ticket/35) for 'client hello' 384s |<4>| EXT[0x6037a0ceb310]: Sending extension Session Ticket/35 (0 bytes) 384s |<4>| EXT[0x6037a0ceb310]: Preparing extension (Supported EC Point Formats/11) for 'client hello' 384s |<4>| EXT[0x6037a0ceb310]: Sending extension Supported EC Point Formats/11 (2 bytes) 384s |<4>| EXT[0x6037a0ceb310]: Preparing extension (Key Share/51) for 'client hello' 384s |<4>| EXT[0x6037a0ceb310]: Preparing extension (Server Name Indication/0) for 'client hello' 384s |<2>| HSK[0x6037a0ceb310]: sent server name: 'localhost' 384s |<4>| EXT[0x6037a0ceb310]: Sending extension Server Name Indication/0 (14 bytes) 384s |<4>| EXT[0x6037a0ceb310]: Preparing extension (SRTP/14) for 'client hello' 384s |<4>| EXT[0x6037a0ceb310]: Preparing extension (Safe Renegotiation/65281) for 'client hello' 384s |<4>| EXT[0x6037a0ceb310]: Sending extension Safe Renegotiation/65281 (1 bytes) 384s |<4>| EXT[0x6037a0ceb310]: Preparing extension (ALPN/16) for 'client hello' 384s |<4>| EXT[0x6037a0ceb310]: Preparing extension (Client Certificate Type/19) for 'client hello' 384s |<4>| EXT[0x6037a0ceb310]: Client certificate type was set to default cert type (X.509). We therefore do not send this extension. 384s |<4>| EXT[0x6037a0ceb310]: Preparing extension (Encrypt-then-MAC/22) for 'client hello' 384s |<4>| EXT[0x6037a0ceb310]: Sending extension Encrypt-then-MAC/22 (0 bytes) 384s |<4>| EXT[0x6037a0ceb310]: Preparing extension (Extended Master Secret/23) for 'client hello' 384s |<4>| EXT[0x6037a0ceb310]: Sending extension Extended Master Secret/23 (0 bytes) 384s |<4>| EXT[0x6037a0ceb310]: Preparing extension (PSK Key Exchange Modes/45) for 'client hello' 384s |<4>| EXT[0x6037a0ceb310]: Preparing extension (Early Data/42) for 'client hello' 384s |<4>| EXT[0x6037a0ceb310]: Preparing extension (Post Handshake Auth/49) for 'client hello' 384s |<4>| EXT[0x6037a0ceb310]: Preparing extension (Signature Algorithms/13) for 'client hello' 384s |<4>| EXT[0x6037a0ceb310]: sent signature algo (4.1) RSA-SHA256 384s |<4>| EXT[0x6037a0ceb310]: sent signature algo (8.9) RSA-PSS-SHA256 384s |<4>| EXT[0x6037a0ceb310]: sent signature algo (8.4) RSA-PSS-RSAE-SHA256 384s |<4>| EXT[0x6037a0ceb310]: sent signature algo (4.3) ECDSA-SHA256 384s |<4>| EXT[0x6037a0ceb310]: sent signature algo (8.7) EdDSA-Ed25519 384s |<4>| EXT[0x6037a0ceb310]: sent signature algo (5.1) RSA-SHA384 384s |<4>| EXT[0x6037a0ceb310]: sent signature algo (8.10) RSA-PSS-SHA384 384s |<4>| EXT[0x6037a0ceb310]: sent signature algo (8.5) RSA-PSS-RSAE-SHA384 384s |<4>| EXT[0x6037a0ceb310]: sent signature algo (5.3) ECDSA-SHA384 384s |<4>| EXT[0x6037a0ceb310]: sent signature algo (8.8) EdDSA-Ed448 384s |<4>| EXT[0x6037a0ceb310]: sent signature algo (6.1) RSA-SHA512 384s |<4>| EXT[0x6037a0ceb310]: sent signature algo (8.11) RSA-PSS-SHA512 384s |<4>| EXT[0x6037a0ceb310]: sent signature algo (8.6) RSA-PSS-RSAE-SHA512 384s |<4>| EXT[0x6037a0ceb310]: sent signature algo (6.3) ECDSA-SHA512 384s |<4>| EXT[0x6037a0ceb310]: sent signature algo (2.1) RSA-SHA1 384s |<4>| EXT[0x6037a0ceb310]: sent signature algo (2.3) ECDSA-SHA1 384s |<4>| EXT[0x6037a0ceb310]: Sending extension Signature Algorithms/13 (34 bytes) 384s |<4>| EXT[0x6037a0ceb310]: Preparing extension (OCSP Status Request/5) for 'client hello' 384s |<4>| EXT[0x6037a0ceb310]: Sending extension OCSP Status Request/5 (5 bytes) 384s |<4>| EXT[0x6037a0ceb310]: Preparing extension (Server Certificate Type/20) for 'client hello' 384s |<4>| EXT[0x6037a0ceb310]: Server certificate type was set to default cert type (X.509). We therefore do not send this extension. 384s |<4>| EXT[0x6037a0ceb310]: Preparing extension (ClientHello Padding/21) for 'client hello' 384s |<4>| EXT[0x6037a0ceb310]: Preparing extension (Pre Shared Key/41) for 'client hello' 384s |<4>| HSK[0x6037a0ceb310]: CLIENT HELLO was queued [215 bytes] 384s |<3>| ASSERT: ../../lib/buffers.c[get_last_packet]:1138 384s Processed 1 CA certificate(s). 384s Resolving 'localhost:63218'... 384s Connecting to '::1:63218'... 384s - Certificate type: X.509 384s - Got a certificate list of 1 certificates. 384s - Certificate[0] info: 384s - subject `CN=localhost', issuer `CN=localhost', serial 0x1c73ae48f234b15918dc4b5733c383112c873ca8, RSA key 512 bits, signed using RSA-SHA256, activated `2019-12-15 02:55:58 UTC', expires `2029-12-12 02:55:58 UTC', pin-sha256="oDIMOYWTA7+CxtxnzqZd3z1JFANQkweXoIsGC1gjEAk=" 384s Public Key ID: 384s sha1:aea8c3db4050e7c168f3879265f8b9982f7f39be 384s sha256:a0320c39859303bf82c6dc67cea65ddf3d49140350930797a08b060b58231009 384s Public Key PIN: 384s pin-sha256:oDIMOYWTA7+CxtxnzqZd3z1JFANQkweXoIsGC1gjEAk= 384s 384s - Status: The certificate is NOT trusted. The certificate chain uses insecure algorithm. 384s *** PKI verification of server certificate failed... 384s |<4>| HSK[0x6037a0ceb310]: SERVER HELLO (2) was received. Length 97[97], frag offset 0, frag length: 97, sequence: 0 384s |<3>| ASSERT: ../../lib/buffers.c[get_last_packet]:1130 384s |<3>| ASSERT: ../../lib/buffers.c[_gnutls_handshake_io_recv_int]:1374 384s |<4>| HSK[0x6037a0ceb310]: Server's version: 3.3 384s |<4>| HSK[0x6037a0ceb310]: SessionID length: 32 384s |<4>| HSK[0x6037a0ceb310]: SessionID: 5dabaa71b180dd36ebe0a8c0c7e3037ebdae099fce44806c422126c074434cbe 384s |<4>| HSK[0x6037a0ceb310]: Selected cipher suite: GNUTLS_ECDHE_RSA_AES_256_GCM_SHA384 384s |<4>| EXT[0x6037a0ceb310]: Parsing extension 'Safe Renegotiation/65281' (1 bytes) 384s |<4>| EXT[0x6037a0ceb310]: Parsing extension 'Session Ticket/35' (0 bytes) 384s |<4>| EXT[0x6037a0ceb310]: Parsing extension 'Extended Master Secret/23' (0 bytes) 384s |<4>| EXT[0x6037a0ceb310]: Parsing extension 'Record Size Limit/28' (2 bytes) 384s |<4>| EXT[0x6037a0ceb310]: record_size_limit 16384 negotiated 384s |<4>| EXT[0x6037a0ceb310]: Parsing extension 'Supported EC Point Formats/11' (2 bytes) 384s |<4>| HSK[0x6037a0ceb310]: Safe renegotiation succeeded 384s |<3>| ASSERT: ../../lib/buffers.c[get_last_packet]:1138 384s |<4>| HSK[0x6037a0ceb310]: CERTIFICATE (11) was received. Length 344[344], frag offset 0, frag length: 344, sequence: 0 384s |<3>| ASSERT: ../../../lib/nettle/mpi.c[wrap_nettle_mpi_print]:59 384s |<3>| ASSERT: ../../../lib/nettle/mpi.c[wrap_nettle_mpi_print]:59 384s |<3>| ASSERT: ../../../lib/nettle/mpi.c[wrap_nettle_mpi_print]:59 384s |<3>| ASSERT: ../../../lib/nettle/mpi.c[wrap_nettle_mpi_print]:59 384s |<3>| ASSERT: ../../../lib/nettle/mpi.c[wrap_nettle_mpi_print]:59 384s |<3>| ASSERT: ../../../lib/nettle/mpi.c[wrap_nettle_mpi_print]:59 384s |<3>| ASSERT: ../../../lib/nettle/mpi.c[wrap_nettle_mpi_print]:59 384s |<3>| ASSERT: ../../../lib/nettle/mpi.c[wrap_nettle_mpi_print]:59 384s |<3>| ASSERT: ../../lib/ocsp-api.c[gnutls_ocsp_status_request_get2]:96 384s |<3>| ASSERT: ../../../lib/x509/x509.c[gnutls_x509_crt_get_authority_key_id]:1691 384s |<3>| ASSERT: ../../../lib/nettle/mpi.c[wrap_nettle_mpi_print]:59 384s |<3>| ASSERT: ../../../lib/nettle/mpi.c[wrap_nettle_mpi_print]:59 384s |<3>| self-signed cert found: subject `CN=localhost', issuer `CN=localhost', serial 0x1c73ae48f234b15918dc4b5733c383112c873ca8, RSA key 512 bits, signed using RSA-SHA256, activated `2019-12-15 02:55:58 UTC', expires `2029-12-12 02:55:58 UTC', pin-sha256="oDIMOYWTA7+CxtxnzqZd3z1JFANQkweXoIsGC1gjEAk=" 384s |<3>| ASSERT: ../../../lib/x509/x509.c[gnutls_x509_crt_get_authority_key_id]:1691 384s |<3>| ASSERT: ../../../lib/nettle/mpi.c[wrap_nettle_mpi_print]:59 384s |<3>| ASSERT: ../../../lib/nettle/mpi.c[wrap_nettle_mpi_print]:59 384s |<3>| cert: subject `CN=localhost', issuer `CN=localhost', serial 0x1c73ae48f234b15918dc4b5733c383112c873ca8, RSA key 512 bits, signed using RSA-SHA256, activated `2019-12-15 02:55:58 UTC', expires `2029-12-12 02:55:58 UTC', pin-sha256="oDIMOYWTA7+CxtxnzqZd3z1JFANQkweXoIsGC1gjEAk=" 384s |<2>| GNUTLS_SEC_PARAM_LOW: certificate's security level is unacceptable 384s |<3>| ASSERT: ../../../lib/x509/verify.c[is_level_acceptable]:504 384s |<3>| ASSERT: ../../../lib/x509/verify.c[_gnutls_verify_crt_status]:1014 384s |<3>| ASSERT: ../../lib/handshake.c[_gnutls_run_verify_callback]:3020 384s |<3>| ASSERT: ../../lib/handshake.c[handshake_client]:3133 384s *** Fatal error: Error in the certificate. 384s Error in handshake: A TLS fatal alert has been received. 384s |<3>| ASSERT: ../../../lib/x509/verify-high.c[gnutls_x509_trust_list_add_cas]:340 384s |<1>| There was a non-CA certificate in the trusted list: CN=localhost. 384s |<2>| added 6 protocols, 29 ciphersuites, 19 sig algos and 10 groups into priority list 384s |<4>| HSK[0x65533ea54310]: Adv. version: 3.3 384s |<2>| Keeping ciphersuite 13.02 (GNUTLS_AES_256_GCM_SHA384) 384s |<2>| Keeping ciphersuite 13.03 (GNUTLS_CHACHA20_POLY1305_SHA256) 384s |<2>| Keeping ciphersuite 13.01 (GNUTLS_AES_128_GCM_SHA256) 384s |<2>| Keeping ciphersuite 13.04 (GNUTLS_AES_128_CCM_SHA256) 384s |<2>| Keeping ciphersuite c0.2c (GNUTLS_ECDHE_ECDSA_AES_256_GCM_SHA384) 384s |<2>| Keeping ciphersuite cc.a9 (GNUTLS_ECDHE_ECDSA_CHACHA20_POLY1305) 384s |<2>| Keeping ciphersuite c0.ad (GNUTLS_ECDHE_ECDSA_AES_256_CCM) 384s |<2>| Keeping ciphersuite c0.0a (GNUTLS_ECDHE_ECDSA_AES_256_CBC_SHA1) 384s |<2>| Keeping ciphersuite c0.2b (GNUTLS_ECDHE_ECDSA_AES_128_GCM_SHA256) 384s |<2>| Keeping ciphersuite c0.ac (GNUTLS_ECDHE_ECDSA_AES_128_CCM) 384s |<2>| Keeping ciphersuite c0.09 (GNUTLS_ECDHE_ECDSA_AES_128_CBC_SHA1) 384s |<2>| Keeping ciphersuite c0.30 (GNUTLS_ECDHE_RSA_AES_256_GCM_SHA384) 384s |<2>| Keeping ciphersuite cc.a8 (GNUTLS_ECDHE_RSA_CHACHA20_POLY1305) 384s |<2>| Keeping ciphersuite c0.14 (GNUTLS_ECDHE_RSA_AES_256_CBC_SHA1) 384s |<2>| Keeping ciphersuite c0.2f (GNUTLS_ECDHE_RSA_AES_128_GCM_SHA256) 384s |<2>| Keeping ciphersuite c0.13 (GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1) 384s |<2>| Keeping ciphersuite 00.9d (GNUTLS_RSA_AES_256_GCM_SHA384) 384s |<2>| Keeping ciphersuite c0.9d (GNUTLS_RSA_AES_256_CCM) 384s |<2>| Keeping ciphersuite 00.35 (GNUTLS_RSA_AES_256_CBC_SHA1) 384s |<2>| Keeping ciphersuite 00.9c (GNUTLS_RSA_AES_128_GCM_SHA256) 384s |<2>| Keeping ciphersuite c0.9c (GNUTLS_RSA_AES_128_CCM) 384s |<2>| Keeping ciphersuite 00.2f (GNUTLS_RSA_AES_128_CBC_SHA1) 384s |<2>| Keeping ciphersuite 00.9f (GNUTLS_DHE_RSA_AES_256_GCM_SHA384) 384s |<2>| Keeping ciphersuite cc.aa (GNUTLS_DHE_RSA_CHACHA20_POLY1305) 384s |<2>| Keeping ciphersuite c0.9f (GNUTLS_DHE_RSA_AES_256_CCM) 384s |<2>| Keeping ciphersuite 00.39 (GNUTLS_DHE_RSA_AES_256_CBC_SHA1) 384s |<2>| Keeping ciphersuite 00.9e (GNUTLS_DHE_RSA_AES_128_GCM_SHA256) 384s |<2>| Keeping ciphersuite c0.9e (GNUTLS_DHE_RSA_AES_128_CCM) 384s |<2>| Keeping ciphersuite 00.33 (GNUTLS_DHE_RSA_AES_128_CBC_SHA1) 384s |<4>| EXT[0x65533ea54310]: Preparing extension (Maximum Record Size/1) for 'client hello' 384s |<4>| EXT[0x65533ea54310]: Preparing extension (ALPN/16) for 'client hello' 384s |<4>| EXT[0x65533ea54310]: Preparing extension (Cookie/44) for 'client hello' 384s |<4>| EXT[0x65533ea54310]: Preparing extension (Early Data/42) for 'client hello' 384s |<4>| EXT[0x65533ea54310]: Preparing extension (Encrypt-then-MAC/22) for 'client hello' 384s |<4>| EXT[0x65533ea54310]: Sending extension Encrypt-then-MAC/22 (0 bytes) 384s |<4>| EXT[0x65533ea54310]: Preparing extension (Signature Algorithms/13) for 'client hello' 384s |<4>| EXT[0x65533ea54310]: sent signature algo (4.1) RSA-SHA256 384s |<4>| EXT[0x65533ea54310]: sent signature algo (8.9) RSA-PSS-SHA256 384s |<4>| EXT[0x65533ea54310]: sent signature algo (8.4) RSA-PSS-RSAE-SHA256 384s |<4>| EXT[0x65533ea54310]: sent signature algo (4.3) ECDSA-SHA256 384s |<4>| EXT[0x65533ea54310]: sent signature algo (8.7) EdDSA-Ed25519 384s |<4>| EXT[0x65533ea54310]: sent signature algo (5.1) RSA-SHA384 384s |<4>| EXT[0x65533ea54310]: sent signature algo (8.10) RSA-PSS-SHA384 384s |<4>| EXT[0x65533ea54310]: sent signature algo (8.5) RSA-PSS-RSAE-SHA384 384s |<4>| EXT[0x65533ea54310]: sent signature algo (5.3) ECDSA-SHA384 384s |<4>| EXT[0x65533ea54310]: sent signature algo (8.8) EdDSA-Ed448 384s |<4>| EXT[0x65533ea54310]: sent signature algo (6.1) RSA-SHA512 384s |<4>| EXT[0x65533ea54310]: sent signature algo (8.11) RSA-PSS-SHA512 384s |<4>| EXT[0x65533ea54310]: sent signature algo (8.6) RSA-PSS-RSAE-SHA512 384s |<4>| EXT[0x65533ea54310]: sent signature algo (6.3) ECDSA-SHA512 384s |<4>| EXT[0x65533ea54310]: sent signature algo (2.1) RSA-SHA1 384s |<4>| EXT[0x65533ea54310]: sent signature algo (2.3) ECDSA-SHA1 384s |<4>| EXT[0x65533ea54310]: Sending extension Signature Algorithms/13 (34 bytes) 384s |<4>| EXT[0x65533ea54310]: Preparing extension (Supported Groups/10) for 'client hello' 384s |<4>| EXT[0x65533ea54310]: Sent group SECP256R1 (0x17) 384s |<4>| EXT[0x65533ea54310]: Sent group SECP384R1 (0x18) 384s |<4>| EXT[0x65533ea54310]: Sent group SECP521R1 (0x19) 384s |<4>| EXT[0x65533ea54310]: Sent group X25519 (0x1d) 384s |<4>| EXT[0x65533ea54310]: Sent group X448 (0x1e) 384s |<4>| EXT[0x65533ea54310]: Sent group FFDHE2048 (0x100) 384s |<4>| EXT[0x65533ea54310]: Sent group FFDHE3072 (0x101) 384s |<4>| EXT[0x65533ea54310]: Sent group FFDHE4096 (0x102) 384s |<4>| EXT[0x65533ea54310]: Sent group FFDHE6144 (0x103) 384s |<4>| EXT[0x65533ea54310]: Sent group FFDHE8192 (0x104) 384s |<4>| EXT[0x65533ea54310]: Sending extension Supported Groups/10 (22 bytes) 384s |<4>| EXT[0x65533ea54310]: Preparing extension (Supported EC Point Formats/11) for 'client hello' 384s |<4>| EXT[0x65533ea54310]: Sending extension Supported EC Point Formats/11 (2 bytes) 384s |<4>| EXT[0x65533ea54310]: Preparing extension (Supported Versions/43) for 'client hello' 384s |<2>| Advertizing version 3.4 384s |<2>| Advertizing version 3.3 384s |<2>| Advertizing version 3.2 384s |<2>| Advertizing version 3.1 384s |<4>| EXT[0x65533ea54310]: Sending extension Supported Versions/43 (9 bytes) 384s |<4>| EXT[0x65533ea54310]: Preparing extension (OCSP Status Request/5) for 'client hello' 384s |<4>| EXT[0x65533ea54310]: Sending extension OCSP Status Request/5 (5 bytes) 384s |<4>| EXT[0x65533ea54310]: Preparing extension (Post Handshake Auth/49) for 'client hello' 384s |<4>| EXT[0x65533ea54310]: Preparing extension (Session Ticket/35) for 'client hello' 384s |<4>| EXT[0x65533ea54310]: Sending extension Session Ticket/35 (0 bytes) 384s |<4>| EXT[0x65533ea54310]: Preparing extension (PSK Key Exchange Modes/45) for 'client hello' 384s |<4>| EXT[0x65533ea54310]: Sending extension PSK Key Exchange Modes/45 (3 bytes) 384s |<4>| EXT[0x65533ea54310]: Preparing extension (Client Certificate Type/19) for 'client hello' 384s |<4>| EXT[0x65533ea54310]: Client certificate type was set to default cert type (X.509). We therefore do not send this extension. 384s |<4>| EXT[0x65533ea54310]: Preparing extension (Server Name Indication/0) for 'client hello' 384s |<2>| HSK[0x65533ea54310]: sent server name: 'localhost' 384s |<4>| EXT[0x65533ea54310]: Sending extension Server Name Indication/0 (14 bytes) 384s |<4>| EXT[0x65533ea54310]: Preparing extension (Extended Master Secret/23) for 'client hello' 384s |<4>| EXT[0x65533ea54310]: Sending extension Extended Master Secret/23 (0 bytes) 384s |<4>| EXT[0x65533ea54310]: Preparing extension (Safe Renegotiation/65281) for 'client hello' 384s |<4>| EXT[0x65533ea54310]: Sending extension Safe Renegotiation/65281 (1 bytes) 384s |<4>| EXT[0x65533ea54310]: Preparing extension (Key Share/51) for 'client hello' 384s |<4>| EXT[0x65533ea54310]: sending key share for SECP256R1 384s |<4>| EXT[0x65533ea54310]: sending key share for X25519 384s |<4>| EXT[0x65533ea54310]: Sending extension Key Share/51 (107 bytes) 384s |<4>| EXT[0x65533ea54310]: Preparing extension (SRTP/14) for 'client hello' 384s |<4>| EXT[0x65533ea54310]: Preparing extension (Record Size Limit/28) for 'client hello' 384s |<4>| EXT[0x65533ea54310]: Sending extension Record Size Limit/28 (2 bytes) 384s |<4>| EXT[0x65533ea54310]: Preparing extension (Compress Certificate/27) for 'client hello' 384s |<4>| EXT[0x65533ea54310]: Preparing extension (Server Certificate Type/20) for 'client hello' 384s |<4>| EXT[0x65533ea54310]: Server certificate type was set to default cert type (X.509). We therefore do not send this extension. 384s |<4>| EXT[0x65533ea54310]: Preparing extension (ClientHello Padding/21) for 'client hello' 384s |<4>| EXT[0x65533ea54310]: Preparing extension (Pre Shared Key/41) for 'client hello' 384s |<4>| HSK[0x65533ea54310]: CLIENT HELLO was queued [386 bytes] 384s |<3>| ASSERT: ../../lib/buffers.c[get_last_packet]:1138 384s |<4>| HSK[0x65533ea54310]: SERVER HELLO (2) was received. Length 151[151], frag offset 0, frag length: 151, sequence: 0 384s |<3>| ASSERT: ../../lib/buffers.c[get_last_packet]:1130 384s |<3>| ASSERT: ../../lib/buffers.c[_gnutls_handshake_io_recv_int]:1374 384s |<4>| HSK[0x65533ea54310]: Server's version: 3.3 384s |<4>| EXT[0x65533ea54310]: Parsing extension 'Supported Versions/43' (2 bytes) 384s |<4>| EXT[0x65533ea54310]: Negotiated version: 3.4 384s |<4>| HSK[0x65533ea54310]: Selected cipher suite: GNUTLS_AES_256_GCM_SHA384 384s |<4>| EXT[0x65533ea54310]: Parsing extension 'Key Share/51' (69 bytes) 384s |<4>| HSK[0x65533ea54310]: Selected group SECP256R1 (2) 384s Error in handshake: Some constraint limits were reached. 384s |<2>| EXT[0x65533ea54310]: client generated SECP256R1 shared key 384s |<4>| REC[0x65533ea54310]: Sent ChangeCipherSpec 384s |<4>| HSK[0x65533ea54310]: TLS 1.3 re-key with cipher suite: GNUTLS_AES_256_GCM_SHA384 384s |<3>| ASSERT: ../../lib/buffers.c[get_last_packet]:1138 384s |<3>| ASSERT: ../../lib/record.c[record_add_to_buffers]:887 384s |<3>| ASSERT: ../../lib/record.c[record_add_to_buffers]:893 384s |<3>| ASSERT: ../../lib/record.c[_gnutls_recv_in_buffers]:1565 384s |<3>| ASSERT: ../../lib/buffers.c[_gnutls_handshake_io_recv_int]:1412 384s |<3>| ASSERT: ../../lib/handshake.c[_gnutls_recv_handshake]:1594 384s |<3>| ASSERT: ../../lib/tls13/encrypted_extensions.c[_gnutls13_recv_encrypted_extensions]:38 384s |<3>| ASSERT: ../../lib/handshake-tls13.c[_gnutls13_handshake_client]:118 384s *** Fatal error: A TLS fatal alert has been received. 384s |<3>| ASSERT: ../../lib/alert.c[gnutls_alert_send_appropriate]:382 384s Processed 1 CA certificate(s). 384s Resolving 'localhost:63218'... 384s Connecting to '::1:63218'... 384s *** Received alert [80]: Internal error 384s unreserved port 63218 384s SUCCESS [110]../../tests/server-weak-keys.sh 384s running [111]../../tests/sni-hostname.sh ... 384s Checking SNI hostname in gnutls-cli 384s reserved port 14469 384s Exiting via signal 15 384s Echo Server listening on IPv4 0.0.0.0 port 14469...done 384s Echo Server listening on IPv6 :: port 14469...done 385s Error in handshake: The SNI host name not recognised. 385s *** Fatal error: A TLS fatal alert has been received. 385s Error in handshake: The SNI host name not recognised. 385s *** Fatal error: A TLS fatal alert has been received. 385s *** Fatal error: Error in the certificate. 385s Error in handshake: A TLS fatal alert has been received. 385s unreserved port 14469 385s Exiting via signal 15 385s SUCCESS [111]../../tests/sni-hostname.sh 385s running [112]../../tests/sni-resume.sh ... 385s Checking if the SNI extension is parsed in gnutls-serv during cache-based session resumption 385s reserved port 43138 386s Warning: no private key and certificate pairs were set. 386s Echo Server listening on IPv4 0.0.0.0 port 43138...done 386s Echo Server listening on IPv6 :: port 43138...done 386s Exiting via signal 15 386s unreserved port 43138 386s SUCCESS [112]../../tests/sni-resume.sh 386s running [113]../../tests/starttls-ftp.sh ... 386s SKIPPED [113]../../tests/starttls-ftp.sh 386s running [114]../../tests/starttls-lmtp.sh ... 386s SKIPPED [114]../../tests/starttls-lmtp.sh 386s running [115]../../tests/starttls-nntp.sh ... 386s SKIPPED [115]../../tests/starttls-nntp.sh 386s running [116]../../tests/starttls-pop3.sh ... 386s SKIPPED [116]../../tests/starttls-pop3.sh 386s running [117]../../tests/starttls-sieve.sh ... 386s SKIPPED [117]../../tests/starttls-sieve.sh 386s running [118]../../tests/starttls-smtp.sh ... 386s SKIPPED [118]../../tests/starttls-smtp.sh 386s running [119]../../tests/starttls-xmpp.sh ... 386s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 386s gnutls[2]: getrandom random generator was selected 386s gnutls[2]: Intel SSSE3 was detected 386s gnutls[2]: Intel AES accelerator was detected 386s gnutls[2]: Intel GCM accelerator (AVX) was detected 386s gnutls[2]: cfg: disabling curve secp256r1 386s gnutls[2]: cfg: disabling curve secp521r1 386s gnutls[2]: cfg: loaded system config config.4696.tmp mtime 1740086895 386s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 386s gnutls[2]: getrandom random generator was selected 386s gnutls[2]: Intel SSSE3 was detected 386s gnutls[2]: Intel AES accelerator was detected 386s gnutls[2]: Intel GCM accelerator (AVX) was detected 386s gnutls[2]: cfg: disabling version tls1.0 386s gnutls[2]: cfg: disabling version tls1.1 386s gnutls[2]: cfg: disabling version dtls0.9 386s gnutls[2]: cfg: disabling version dtls1.0 386s gnutls[2]: cfg: loaded system config /etc/gnutls/config mtime 1715681262 386s SKIPPED [119]../../tests/starttls-xmpp.sh 386s running [120]../../tests/starttls.sh ... 386s SKIPPED [120]../../tests/starttls.sh 386s running [121]../../tests/system-override-curves.sh ... 386s Groups: GROUP-SECP192R1, GROUP-SECP224R1, GROUP-SECP384R1, GROUP-X25519, GROUP-GC256B, GROUP-GC512A, GROUP-X448, GROUP-FFDHE2048, GROUP-FFDHE3072, GROUP-FFDHE4096, GROUP-FFDHE6144, GROUP-FFDHE8192 386s Groups: GROUP-SECP192R1, GROUP-SECP224R1, GROUP-SECP384R1, GROUP-X25519, GROUP-GC256B, GROUP-GC512A, GROUP-X448, GROUP-FFDHE2048, GROUP-FFDHE3072, GROUP-FFDHE4096, GROUP-FFDHE6144, GROUP-FFDHE8192 386s reserved port 5264 386s Echo Server listening on IPv4 0.0.0.0 port 5264...done 386s Echo Server listening on IPv6 :: port 5264...done 387s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 387s gnutls[2]: getrandom random generator was selected 387s gnutls[2]: Intel SSSE3 was detected 387s gnutls[2]: Intel AES accelerator was detected 387s gnutls[2]: Intel GCM accelerator (AVX) was detected 387s gnutls[2]: cfg: disabling version tls1.0 387s gnutls[2]: cfg: disabling version tls1.1 387s gnutls[2]: cfg: disabling version dtls0.9 387s gnutls[2]: cfg: disabling version dtls1.0 387s gnutls[2]: cfg: loaded system config /etc/gnutls/config mtime 1715681262 387s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 387s gnutls[2]: getrandom random generator was selected 387s gnutls[2]: Intel SSSE3 was detected 387s reserved port 48079 387s gnutls[2]: Intel AES accelerator was detected 387s gnutls[2]: Intel GCM accelerator (AVX) was detected 387s gnutls[2]: cfg: disabling curve secp256r1 387s gnutls[2]: cfg: disabling curve secp521r1 387s gnutls[2]: cfg: loaded system config config.4696.tmp mtime 1740086895 387s Syntax error at: +CURVE-SECP256R1:+CURVE-SECP521R1 387s Error in handshake: The TLS connection was non-properly terminated. 387s Exiting via signal 15 387s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 387s gnutls[2]: getrandom random generator was selected 387s gnutls[2]: Intel SSSE3 was detected 387s gnutls[2]: Intel AES accelerator was detected 387s gnutls[2]: Intel GCM accelerator (AVX) was detected 387s gnutls[2]: cfg: disabling curve secp256r1 387s gnutls[2]: cfg: disabling curve secp521r1 387s gnutls[2]: cfg: loaded system config config.4696.tmp mtime 1740086895 387s Echo Server listening on IPv4 0.0.0.0 port 48079...done 387s Echo Server listening on IPv6 :: port 48079...done 388s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 388s gnutls[2]: getrandom random generator was selected 388s gnutls[2]: Intel SSSE3 was detected 388s gnutls[2]: Intel AES accelerator was detected 388s gnutls[2]: Intel GCM accelerator (AVX) was detected 388s gnutls[2]: cfg: disabling version tls1.0 388s gnutls[2]: cfg: disabling version tls1.1 388s gnutls[2]: cfg: disabling version dtls0.9 388s gnutls[2]: cfg: disabling version dtls1.0 388s gnutls[2]: cfg: loaded system config /etc/gnutls/config mtime 1715681262 388s Error in handshake: No common key share with peer. 388s *** Fatal error: A TLS fatal alert has been received. 388s unreserved port 48079 388s Exiting via signal 15 388s SUCCESS [121]../../tests/system-override-curves.sh 388s running [122]../../tests/system-override-default-priority-string.sh ... 388s reserved port 55530 388s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 388s gnutls[2]: getrandom random generator was selected 388s gnutls[2]: Intel SSSE3 was detected 388s gnutls[2]: Intel AES accelerator was detected 388s gnutls[2]: Intel GCM accelerator (AVX) was detected 388s gnutls[2]: cfg: setting default-priority-string to NONE 388s gnutls[2]: cfg: loaded system config ../../tests//system-override-default-priority-string.none.config mtime 1706514143 388s Echo Server listening on IPv4 0.0.0.0 port 55530...done 388s Echo Server listening on IPv6 :: port 55530...done 389s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 389s gnutls[2]: getrandom random generator was selected 389s gnutls[2]: Intel SSSE3 was detected 389s gnutls[2]: Intel AES accelerator was detected 389s gnutls[2]: Intel GCM accelerator (AVX) was detected 389s gnutls[2]: cfg: unable to access: : 2 389s Could not set default policy: No or insufficient priorities were set. 389s *** Fatal error: Error in the pull function. 389s ../../tests/system-override-default-priority-string.sh: 57: kill: No such process 389s 389s reserved port 47320 389s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 389s gnutls[2]: getrandom random generator was selected 389s gnutls[2]: Intel SSSE3 was detected 389s gnutls[2]: Intel AES accelerator was detected 389s gnutls[2]: Intel GCM accelerator (AVX) was detected 389s gnutls[2]: cfg: setting default-priority-string to NORMAL:-VERS-ALL:+VERS-TLS1.3 389s gnutls[2]: cfg: loaded system config ../../tests//system-override-default-priority-string.only-tls13.config mtime 1706514143 389s Echo Server listening on IPv4 0.0.0.0 port 47320...done 389s Echo Server listening on IPv6 :: port 47320...done 390s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 390s gnutls[2]: getrandom random generator was selected 390s gnutls[2]: Intel SSSE3 was detected 390s gnutls[2]: Intel AES accelerator was detected 390s gnutls[2]: Intel GCM accelerator (AVX) was detected 390s gnutls[2]: cfg: unable to access: : 2 390s Error in handshake: No supported cipher suites have been found. 390s *** Fatal error: A TLS fatal alert has been received. 390s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 390s gnutls[2]: getrandom random generator was selected 390s gnutls[2]: Intel SSSE3 was detected 390s gnutls[2]: Intel AES accelerator was detected 390s gnutls[2]: Intel GCM accelerator (AVX) was detected 390s reserved port 18374 390s gnutls[2]: cfg: unable to access: : 2 390s Exiting via signal 15 390s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 390s gnutls[2]: getrandom random generator was selected 390s gnutls[2]: Intel SSSE3 was detected 390s gnutls[2]: Intel AES accelerator was detected 390s gnutls[2]: Intel GCM accelerator (AVX) was detected 390s gnutls[2]: cfg: adding priority: SYSTEM -> NORMAL 390s gnutls[2]: cfg: setting default-priority-string to 390s gnutls[2]: cfg: empty default-priority-string, using default 390s gnutls[2]: cfg: loaded system config ../../tests//system-override-default-priority-string.bad.config mtime 1706514143 390s Echo Server listening on IPv4 0.0.0.0 port 18374...done 390s Echo Server listening on IPv6 :: port 18374...done 391s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 391s gnutls[2]: getrandom random generator was selected 391s gnutls[2]: Intel SSSE3 was detected 391s gnutls[2]: Intel AES accelerator was detected 391s gnutls[2]: Intel GCM accelerator (AVX) was detected 391s gnutls[2]: cfg: adding priority: SYSTEM -> NORMAL 391s gnutls[2]: cfg: setting default-priority-string to 391s gnutls[2]: cfg: empty default-priority-string, using default 391s gnutls[2]: cfg: loaded system config ../../tests//system-override-default-priority-string.bad.config mtime 1706514143 391s Exiting via signal 15 391s unreserved port 18374 391s SUCCESS [122]../../tests/system-override-default-priority-string.sh 391s running [123]../../tests/system-override-hash-filters-prf.sh ... 391s SUCCESS [123]../../tests/system-override-hash-filters-prf.sh 391s running [124]../../tests/system-override-invalid.sh ... 391s SUCCESS [124]../../tests/system-override-invalid.sh 391s running [125]../../tests/system-override-kx.sh ... 391s reserved port 62256 391s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 391s gnutls[2]: getrandom random generator was selected 391s gnutls[2]: Intel SSSE3 was detected 391s gnutls[2]: Intel AES accelerator was detected 391s gnutls[2]: Intel GCM accelerator (AVX) was detected 391s gnutls[2]: cfg: disabling version tls1.0 391s gnutls[2]: cfg: disabling version tls1.1 391s gnutls[2]: cfg: disabling version dtls0.9 391s gnutls[2]: cfg: disabling version dtls1.0 391s gnutls[2]: cfg: loaded system config /etc/gnutls/config mtime 1715681262 391s Echo Server listening on IPv4 0.0.0.0 port 62256...done 391s Echo Server listening on IPv6 :: port 62256...done 392s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 392s gnutls[2]: getrandom random generator was selected 392s gnutls[2]: Intel SSSE3 was detected 392s gnutls[2]: Intel AES accelerator was detected 392s gnutls[2]: Intel GCM accelerator (AVX) was detected 392s gnutls[2]: cfg: disabling version tls1.0 392s gnutls[2]: cfg: disabling version tls1.1 392s gnutls[2]: cfg: disabling version dtls0.9 392s gnutls[2]: cfg: disabling version dtls1.0 392s gnutls[2]: cfg: loaded system config /etc/gnutls/config mtime 1715681262 392s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 392s gnutls[2]: getrandom random generator was selected 392s gnutls[2]: Intel SSSE3 was detected 392s gnutls[2]: Intel AES accelerator was detected 392s gnutls[2]: Intel GCM accelerator (AVX) was detected 392s gnutls[2]: cfg: disabling key exchange dhe-dss for TLS 392s gnutls[2]: cfg: disabling key exchange dhe-rsa for TLS 392s gnutls[2]: cfg: disabling key exchange unknown for TLS 392s gnutls[2]: cfg: unknown key exchange unknown listed at tls-disabled-kx 392s gnutls[2]: cfg: unable to parse: config.4807.tmp: 5 392s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 392s gnutls[2]: getrandom random generator was selected 392s gnutls[2]: Intel SSSE3 was detected 392s gnutls[2]: Intel AES accelerator was detected 392s gnutls[2]: Intel GCM accelerator (AVX) was detected 392s gnutls[2]: cfg: disabling key exchange dhe-dss for TLS 392s gnutls[2]: cfg: disabling key exchange dhe-rsa for TLS 392s gnutls[2]: cfg: disabling key exchange unknown for TLS 392s gnutls[2]: cfg: unknown key exchange unknown listed at tls-disabled-kx 392s gnutls[2]: cfg: unable to parse: config.4807.tmp: 5 392s Exiting via signal 15 392s reserved port 28374 392s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 392s gnutls[2]: getrandom random generator was selected 392s gnutls[2]: Intel SSSE3 was detected 392s gnutls[2]: Intel AES accelerator was detected 392s gnutls[2]: Intel GCM accelerator (AVX) was detected 392s gnutls[2]: cfg: disabling key exchange dhe-dss for TLS 392s gnutls[2]: cfg: disabling key exchange dhe-rsa for TLS 392s gnutls[2]: cfg: disabling key exchange unknown for TLS 392s gnutls[2]: cfg: unknown key exchange unknown listed at tls-disabled-kx 392s gnutls[2]: cfg: loaded system config config.4807.tmp mtime 1740086900 392s Echo Server listening on IPv4 0.0.0.0 port 28374...done 392s Echo Server listening on IPv6 :: port 28374...done 393s unreserved port 28374 393s SUCCESS [125]../../tests/system-override-kx.sh 393s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 393s gnutls[2]: getrandom random generator was selected 393s gnutls[2]: Intel SSSE3 was detected 393s gnutls[2]: Intel AES accelerator was detected 393s gnutls[2]: Intel GCM accelerator (AVX) was detected 393s gnutls[2]: cfg: disabling version tls1.0 393s gnutls[2]: cfg: disabling version tls1.1 393s gnutls[2]: cfg: disabling version dtls0.9 393s gnutls[2]: cfg: disabling version dtls1.0 393s gnutls[2]: cfg: loaded system config /etc/gnutls/config mtime 1715681262 393s Error in handshake: No supported cipher suites have been found. 393s *** Fatal error: A TLS fatal alert has been received. 393s Exiting via signal 15 393s running [126]../../tests/system-override-profiles.sh ... 393s reserved port 47864 393s Echo Server listening on IPv4 0.0.0.0 port 47864...done 393s Echo Server listening on IPv6 :: port 47864...done 394s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 394s gnutls[2]: getrandom random generator was selected 394s gnutls[2]: Intel SSSE3 was detected 394s gnutls[2]: Intel AES accelerator was detected 394s gnutls[2]: Intel GCM accelerator (AVX) was detected 394s gnutls[2]: cfg: disabling version tls1.0 394s gnutls[2]: cfg: disabling version tls1.1 394s gnutls[2]: cfg: disabling version dtls0.9 394s gnutls[2]: cfg: disabling version dtls1.0 394s gnutls[2]: cfg: loaded system config /etc/gnutls/config mtime 1715681262 394s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 394s gnutls[2]: getrandom random generator was selected 394s gnutls[2]: Intel SSSE3 was detected 394s gnutls[2]: Intel AES accelerator was detected 394s gnutls[2]: Intel GCM accelerator (AVX) was detected 394s gnutls[2]: cfg: loaded system config config.4844.tmp mtime 1740086903 394s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 394s gnutls[2]: getrandom random generator was selected 394s gnutls[2]: Intel SSSE3 was detected 394s gnutls[2]: Intel AES accelerator was detected 394s gnutls[2]: Intel GCM accelerator (AVX) was detected 394s gnutls[2]: cfg: loaded system config config.4844.tmp mtime 1740086903 394s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 394s gnutls[2]: getrandom random generator was selected 394s gnutls[2]: Intel SSSE3 was detected 394s gnutls[2]: Intel AES accelerator was detected 394s gnutls[2]: Intel GCM accelerator (AVX) was detected 394s gnutls[2]: cfg: disabling version tls1.0 394s gnutls[2]: cfg: disabling version tls1.1 394s gnutls[2]: cfg: disabling version dtls0.9 394s gnutls[2]: cfg: disabling version dtls1.0 394s gnutls[2]: cfg: loaded system config /etc/gnutls/config mtime 1715681262 394s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 394s gnutls[2]: getrandom random generator was selected 394s gnutls[2]: Intel SSSE3 was detected 394s gnutls[2]: Intel AES accelerator was detected 394s gnutls[2]: Intel GCM accelerator (AVX) was detected 394s gnutls[2]: cfg: loaded system config config.4844.tmp mtime 1740086903 394s *** Fatal error: Error in the certificate. 394s Error in handshake: A TLS fatal alert has been received. 394s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 394s gnutls[2]: getrandom random generator was selected 394s gnutls[2]: Intel SSSE3 was detected 394s gnutls[2]: Intel AES accelerator was detected 394s gnutls[2]: Intel GCM accelerator (AVX) was detected 394s gnutls[2]: cfg: loaded system config config.4844.tmp mtime 1740086903 394s unreserved port 47864 394s *** Fatal error: Error in the certificate. 394s Error in handshake: A TLS fatal alert has been received. 394s Exiting via signal 15 394s SUCCESS [126]../../tests/system-override-profiles.sh 394s running [127]../../tests/system-override-session-hash.sh ... 394s library is NOT in FIPS140-2 mode 394s reserved port 25252 394s Echo Server listening on IPv4 0.0.0.0 port 25252...done 394s Echo Server listening on IPv6 :: port 25252...done 395s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 395s gnutls[2]: getrandom random generator was selected 395s gnutls[2]: Intel SSSE3 was detected 395s gnutls[2]: Intel AES accelerator was detected 395s gnutls[2]: Intel GCM accelerator (AVX) was detected 395s gnutls[2]: cfg: loaded system config /tmp/system-override-session-hash.8llZJA/request.cfg mtime 1740086903 395s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 395s gnutls[2]: getrandom random generator was selected 395s gnutls[2]: Intel SSSE3 was detected 395s gnutls[2]: Intel AES accelerator was detected 395s gnutls[2]: Intel GCM accelerator (AVX) was detected 395s gnutls[2]: cfg: loaded system config /tmp/system-override-session-hash.8llZJA/request.cfg mtime 1740086903 395s kill 4886 395s unreserved port 25252 395s Exiting via signal 15 397s reserved port 25252 397s unreserved port 25252 399s reserved port 25252 399s unreserved port 25252 401s reserved port 25252 401s unreserved port 25252 403s reserved port 25252 403s unreserved port 25252 405s reserved port 25252 405s unreserved port 25252 407s Echo Server listening on IPv4 0.0.0.0 port 25252...done 407s Echo Server listening on IPv6 :: port 25252...done 408s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 408s gnutls[2]: getrandom random generator was selected 408s gnutls[2]: Intel SSSE3 was detected 408s gnutls[2]: Intel AES accelerator was detected 408s gnutls[2]: Intel GCM accelerator (AVX) was detected 408s gnutls[2]: cfg: loaded system config /tmp/system-override-session-hash.8llZJA/request.cfg mtime 1740086903 408s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 408s gnutls[2]: getrandom random generator was selected 408s gnutls[2]: Intel SSSE3 was detected 408s gnutls[2]: Intel AES accelerator was detected 408s gnutls[2]: Intel GCM accelerator (AVX) was detected 408s gnutls[2]: cfg: loaded system config /tmp/system-override-session-hash.8llZJA/request.cfg mtime 1740086903 408s Exiting via signal 15 408s reserved port 25252 408s unreserved port 25252 410s reserved port 25252 410s unreserved port 25252 412s reserved port 25252 413s unreserved port 25252 415s reserved port 25252 415s unreserved port 25252 417s reserved port 25252 417s unreserved port 25252 419s reserved port 25252 419s unreserved port 25252 421s Echo Server listening on IPv4 0.0.0.0 port 25252...done 421s Echo Server listening on IPv6 :: port 25252...done 422s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 422s gnutls[2]: getrandom random generator was selected 422s gnutls[2]: Intel SSSE3 was detected 422s gnutls[2]: Intel AES accelerator was detected 422s gnutls[2]: Intel GCM accelerator (AVX) was detected 422s gnutls[2]: cfg: loaded system config /tmp/system-override-session-hash.8llZJA/require.cfg mtime 1740086903 422s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 422s gnutls[2]: getrandom random generator was selected 422s gnutls[2]: Intel SSSE3 was detected 422s gnutls[2]: Intel AES accelerator was detected 422s gnutls[2]: Intel GCM accelerator (AVX) was detected 422s gnutls[2]: cfg: loaded system config /tmp/system-override-session-hash.8llZJA/require.cfg mtime 1740086903 422s Exiting via signal 15 422s reserved port 25252 422s unreserved port 25252 424s reserved port 25252 424s unreserved port 25252 426s reserved port 25252 426s unreserved port 25252 428s reserved port 25252 428s unreserved port 25252 430s reserved port 25252 430s unreserved port 25252 432s reserved port 25252 432s unreserved port 25252 434s Echo Server listening on IPv4 0.0.0.0 port 25252...done 434s Echo Server listening on IPv6 :: port 25252...done 435s Exiting via signal 15 435s unreserved port 25252 435s SUCCESS [127]../../tests/system-override-session-hash.sh 435s running [128]../../tests/system-override-special-allowlist.sh ... 435s SUCCESS [128]../../tests/system-override-special-allowlist.sh 435s running [129]../../tests/system-override-tls.sh ... 435s reserved port 34353 435s Echo Server listening on IPv4 0.0.0.0 port 34353...done 435s Echo Server listening on IPv6 :: port 34353...done 436s Sanity testing 436s Testing TLS1.3 436s * sanity 436s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 436s gnutls[2]: getrandom random generator was selected 436s gnutls[2]: Intel SSSE3 was detected 436s gnutls[2]: Intel AES accelerator was detected 436s gnutls[2]: Intel GCM accelerator (AVX) was detected 436s gnutls[2]: cfg: disabling cipher aes-128-gcm for TLS 436s gnutls[2]: cfg: disabling cipher aes-128-cbc for TLS 436s gnutls[2]: cfg: disabling MAC sha1 for TLS 436s gnutls[2]: cfg: disabling group ffdhe2048 for TLS 436s gnutls[2]: cfg: loaded system config config.5143.tmp mtime 1740086945 436s * fallback to good options 436s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 436s gnutls[2]: getrandom random generator was selected 436s gnutls[2]: Intel SSSE3 was detected 436s gnutls[2]: Intel AES accelerator was detected 436s gnutls[2]: Intel GCM accelerator (AVX) was detected 436s gnutls[2]: cfg: disabling cipher aes-128-gcm for TLS 436s gnutls[2]: cfg: disabling cipher aes-128-cbc for TLS 436s gnutls[2]: cfg: disabling MAC sha1 for TLS 436s gnutls[2]: cfg: disabling group ffdhe2048 for TLS 436s gnutls[2]: cfg: loaded system config config.5143.tmp mtime 1740086945 436s * disabled cipher 436s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 436s gnutls[2]: getrandom random generator was selected 436s gnutls[2]: Intel SSSE3 was detected 436s gnutls[2]: Intel AES accelerator was detected 436s gnutls[2]: Intel GCM accelerator (AVX) was detected 436s gnutls[2]: cfg: disabling cipher aes-128-gcm for TLS 436s gnutls[2]: cfg: disabling cipher aes-128-cbc for TLS 436s gnutls[2]: cfg: disabling MAC sha1 for TLS 436s gnutls[2]: cfg: disabling group ffdhe2048 for TLS 436s gnutls[2]: cfg: loaded system config config.5143.tmp mtime 1740086945 436s Processed 1 CA certificate(s). 436s Resolving '127.0.0.1:34353'... 436s Connecting to '127.0.0.1:34353'... 436s Error in priorities: No or insufficient priorities were set. 436s * disabled group 436s Error in handshake: The TLS connection was non-properly terminated. 436s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 436s gnutls[2]: getrandom random generator was selected 436s gnutls[2]: Intel SSSE3 was detected 436s gnutls[2]: Intel AES accelerator was detected 436s gnutls[2]: Intel GCM accelerator (AVX) was detected 436s gnutls[2]: cfg: disabling cipher aes-128-gcm for TLS 436s gnutls[2]: cfg: disabling cipher aes-128-cbc for TLS 436s gnutls[2]: cfg: disabling MAC sha1 for TLS 436s gnutls[2]: cfg: disabling group ffdhe2048 for TLS 436s gnutls[2]: cfg: loaded system config config.5143.tmp mtime 1740086945 436s *** Fatal error: The curve is unsupported 436s Error in handshake: A TLS fatal alert has been received. 436s Testing TLS1.2 436s * sanity 436s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 436s gnutls[2]: getrandom random generator was selected 436s gnutls[2]: Intel SSSE3 was detected 436s gnutls[2]: Intel AES accelerator was detected 436s gnutls[2]: Intel GCM accelerator (AVX) was detected 436s * fallback to good options 436s * disabled cipher 436s * disabled MAC 436s gnutls[2]: cfg: disabling cipher aes-128-gcm for TLS 436s gnutls[2]: cfg: disabling cipher aes-128-cbc for TLS 436s gnutls[2]: cfg: disabling MAC sha1 for TLS 436s gnutls[2]: cfg: disabling group ffdhe2048 for TLS 436s gnutls[2]: cfg: loaded system config config.5143.tmp mtime 1740086945 436s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 436s gnutls[2]: getrandom random generator was selected 436s gnutls[2]: Intel SSSE3 was detected 436s gnutls[2]: Intel AES accelerator was detected 436s gnutls[2]: Intel GCM accelerator (AVX) was detected 436s gnutls[2]: cfg: disabling cipher aes-128-gcm for TLS 436s gnutls[2]: cfg: disabling cipher aes-128-cbc for TLS 436s gnutls[2]: cfg: disabling MAC sha1 for TLS 436s gnutls[2]: cfg: disabling group ffdhe2048 for TLS 436s gnutls[2]: cfg: loaded system config config.5143.tmp mtime 1740086945 436s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 436s gnutls[2]: getrandom random generator was selected 436s gnutls[2]: Intel SSSE3 was detected 436s gnutls[2]: Intel AES accelerator was detected 436s gnutls[2]: Intel GCM accelerator (AVX) was detected 436s gnutls[2]: cfg: disabling cipher aes-128-gcm for TLS 436s gnutls[2]: cfg: disabling cipher aes-128-cbc for TLS 436s gnutls[2]: cfg: disabling MAC sha1 for TLS 436s gnutls[2]: cfg: disabling group ffdhe2048 for TLS 436s gnutls[2]: cfg: loaded system config config.5143.tmp mtime 1740086945 436s Error in priorities: No or insufficient priorities were set. 436s Error in handshake: The TLS connection was non-properly terminated. 436s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 436s gnutls[2]: getrandom random generator was selected 436s gnutls[2]: Intel SSSE3 was detected 436s gnutls[2]: Intel AES accelerator was detected 436s gnutls[2]: Intel GCM accelerator (AVX) was detected 436s gnutls[2]: cfg: disabling cipher aes-128-gcm for TLS 436s gnutls[2]: cfg: disabling cipher aes-128-cbc for TLS 436s gnutls[2]: cfg: disabling MAC sha1 for TLS 436s gnutls[2]: cfg: disabling group ffdhe2048 for TLS 436s gnutls[2]: cfg: loaded system config config.5143.tmp mtime 1740086945 436s Error in priorities: No or insufficient priorities were set. 436s Exiting via signal 15 436s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 436s gnutls[2]: getrandom random generator was selected 436s gnutls[2]: Intel SSSE3 was detected 436s gnutls[2]: Intel AES accelerator was detected 436s gnutls[2]: Intel GCM accelerator (AVX) was detected 436s gnutls[2]: cfg: enabling version tls1.1 436s gnutls[2]: cfg: loaded system config config.5173.tmp mtime 1740086945 436s gnutls[2]: cfg: deferred setting system-wide priority string 436s gnutls[2]: cfg: system priority config.5173.tmp has not changed 436s gnutls[2]: cfg: finalized system-wide priority string 436s gnutls[2]: resolved 'SYSTEM' to 'NONE:+VERS-TLS1.1', next '' 436s gnutls[2]: selected priority string: NONE:+VERS-TLS1.1 436s gnutls[2]: added 1 protocols, 0 ciphersuites, 0 sig algos and 0 groups into priority list 436s gnutls[3]: ASSERT: ../../lib/priority.c[set_ciphersuite_list]:2945 436s Error in priorities: No or insufficient priorities were set. 436s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 436s gnutls[2]: getrandom random generator was selected 436s gnutls[2]: Intel SSSE3 was detected 436s gnutls[2]: Intel AES accelerator was detected 436s gnutls[2]: Intel GCM accelerator (AVX) was detected 436s gnutls[2]: cfg: enabling version tls1.1 436s gnutls[2]: cfg: loaded system config config.5173.tmp mtime 1740086945 436s gnutls[2]: cfg: deferred setting system-wide priority string 436s gnutls[2]: cfg: system priority config.5173.tmp has not changed 436s gnutls[2]: cfg: finalized system-wide priority string 436s gnutls[2]: resolved 'SYSTEM' to 'NONE:+VERS-TLS1.1', next '' 436s gnutls[2]: selected priority string: NONE:+VERS-TLS1.1:+CIPHER-ALL:+MAC-ALL:+GROUP-ALL 436s gnutls[2]: added 1 protocols, 0 ciphersuites, 0 sig algos and 0 groups into priority list 436s gnutls[3]: ASSERT: ../../lib/priority.c[set_ciphersuite_list]:2945 436s Error in priorities: No or insufficient priorities were set. 436s unreserved port 34353 436s SUCCESS [129]../../tests/system-override-tls.sh 436s running [130]../../tests/system-override-versions-allowlist.sh ... 436s reserved port 20954 436s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 436s gnutls[2]: getrandom random generator was selected 436s gnutls[2]: Intel SSSE3 was detected 436s gnutls[2]: Intel AES accelerator was detected 436s gnutls[2]: Intel GCM accelerator (AVX) was detected 436s gnutls[2]: cfg: disabling version tls1.0 436s gnutls[2]: cfg: disabling version tls1.1 436s gnutls[2]: cfg: disabling version dtls0.9 436s gnutls[2]: cfg: disabling version dtls1.0 436s gnutls[2]: cfg: loaded system config /etc/gnutls/config mtime 1715681262 436s Echo Server listening on IPv4 0.0.0.0 port 20954...done 436s Echo Server listening on IPv6 :: port 20954...done 437s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 437s gnutls[2]: getrandom random generator was selected 437s gnutls[2]: Intel SSSE3 was detected 437s gnutls[2]: Intel AES accelerator was detected 437s gnutls[2]: Intel GCM accelerator (AVX) was detected 437s gnutls[2]: cfg: enabling version tls1.1 437s gnutls[2]: cfg: loaded system config config.5173.tmp mtime 1740086945 437s gnutls[2]: cfg: deferred setting system-wide priority string 437s Error in priorities: No or insufficient priorities were set. 437s Exiting via signal 15 437s reserved port 5169 437s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 437s gnutls[2]: getrandom random generator was selected 437s gnutls[2]: Intel SSSE3 was detected 437s gnutls[2]: Intel AES accelerator was detected 437s gnutls[2]: Intel GCM accelerator (AVX) was detected 437s gnutls[2]: cfg: enabling version tls1.1 437s gnutls[2]: cfg: loaded system config config.5173.tmp mtime 1740086945 437s gnutls[2]: cfg: deferred setting system-wide priority string 437s Echo Server listening on IPv4 0.0.0.0 port 5169...done 437s Echo Server listening on IPv6 :: port 5169...done 438s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 438s gnutls[2]: getrandom random generator was selected 438s gnutls[2]: Intel SSSE3 was detected 438s gnutls[2]: Intel AES accelerator was detected 438s gnutls[2]: Intel GCM accelerator (AVX) was detected 438s gnutls[2]: cfg: disabling version tls1.0 438s gnutls[2]: cfg: disabling version tls1.1 438s gnutls[2]: cfg: disabling version dtls0.9 438s gnutls[2]: cfg: disabling version dtls1.0 438s gnutls[2]: cfg: loaded system config /etc/gnutls/config mtime 1715681262 438s Syntax error at: @SYSTEM:+CIPHER-ALL:+MAC-ALL:+GROUP-ALL 438s *** Fatal error: Error in the pull function. 438s unreserved port 5169 438s SUCCESS [130]../../tests/system-override-versions-allowlist.sh 438s running [131]../../tests/system-override-versions.sh ... 438s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 438s gnutls[2]: getrandom random generator was selected 438s gnutls[2]: Intel SSSE3 was detected 438s gnutls[2]: Intel AES accelerator was detected 438s gnutls[2]: Intel GCM accelerator (AVX) was detected 438s Protocols: VERS-TLS1.0, VERS-TLS1.1, VERS-DTLS0.9, VERS-DTLS1.0, VERS-DTLS1.2 438s Protocols: VERS-TLS1.1, VERS-TLS1.0, VERS-DTLS1.2, VERS-DTLS1.0 438s reserved port 13638 438s gnutls[2]: cfg: disabling version tls1.2 438s gnutls[2]: cfg: disabling version tls1.3 438s gnutls[2]: cfg: loaded system config config.5216.tmp mtime 1740086947 438s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 438s gnutls[2]: getrandom random generator was selected 438s gnutls[2]: Intel SSSE3 was detected 438s gnutls[2]: Intel AES accelerator was detected 438s gnutls[2]: Intel GCM accelerator (AVX) was detected 438s gnutls[2]: cfg: disabling version tls1.2 438s gnutls[2]: cfg: disabling version tls1.3 438s gnutls[2]: cfg: loaded system config config.5216.tmp mtime 1740086947 438s gnutls[2]: added 4 protocols, 29 ciphersuites, 16 sig algos and 10 groups into priority list 438s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 438s gnutls[2]: getrandom random generator was selected 438s gnutls[2]: Intel SSSE3 was detected 438s gnutls[2]: Intel AES accelerator was detected 438s gnutls[2]: Intel GCM accelerator (AVX) was detected 438s gnutls[2]: cfg: disabling version tls1.0 438s gnutls[2]: cfg: disabling version tls1.1 438s gnutls[2]: cfg: disabling version dtls0.9 438s gnutls[2]: cfg: disabling version dtls1.0 438s gnutls[2]: cfg: loaded system config /etc/gnutls/config mtime 1715681262 438s Echo Server listening on IPv4 0.0.0.0 port 13638...done 438s Echo Server listening on IPv6 :: port 13638...done 439s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 439s gnutls[2]: getrandom random generator was selected 439s gnutls[2]: Intel SSSE3 was detected 439s gnutls[2]: Intel AES accelerator was detected 439s gnutls[2]: Intel GCM accelerator (AVX) was detected 439s gnutls[2]: cfg: disabling version tls1.2 439s gnutls[2]: cfg: disabling version tls1.3 439s gnutls[2]: cfg: loaded system config config.5216.tmp mtime 1740086947 439s Error in handshake: A packet with illegal or unsupported version was received. 439s *** Fatal error: A TLS fatal alert has been received. 439s Exiting via signal 15 439s reserved port 34223 439s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 439s gnutls[2]: getrandom random generator was selected 439s gnutls[2]: Intel SSSE3 was detected 439s gnutls[2]: Intel AES accelerator was detected 439s gnutls[2]: Intel GCM accelerator (AVX) was detected 439s gnutls[2]: cfg: disabling version tls1.2 439s gnutls[2]: cfg: disabling version tls1.3 439s gnutls[2]: cfg: loaded system config config.5216.tmp mtime 1740086947 439s Echo Server listening on IPv4 0.0.0.0 port 34223...done 439s Echo Server listening on IPv6 :: port 34223...done 440s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 440s gnutls[2]: getrandom random generator was selected 440s gnutls[2]: Intel SSSE3 was detected 440s gnutls[2]: Intel AES accelerator was detected 440s gnutls[2]: Intel GCM accelerator (AVX) was detected 440s gnutls[2]: cfg: disabling version tls1.0 440s gnutls[2]: cfg: disabling version tls1.1 440s gnutls[2]: cfg: disabling version dtls0.9 440s gnutls[2]: cfg: disabling version dtls1.0 440s gnutls[2]: cfg: loaded system config /etc/gnutls/config mtime 1715681262 440s *** Fatal error: A packet with illegal or unsupported version was received. 440s Error in handshake: A TLS fatal alert has been received. 440s unreserved port 34223 440s Exiting via signal 15 440s SUCCESS [131]../../tests/system-override-versions.sh 441s running [132]../../tests/systemkey.sh ... 441s SKIPPED [132]../../tests/systemkey.sh 441s running [133]../../tests/testpkcs11.sh ... 441s Testing PKCS11 support 441s usage: ../../tests/testpkcs11.sh: [pkcs15|softhsm|sc-hsm] 441s assuming 'softhsm' 441s 441s * Initializing smart card... ok 441s * Token: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=8a8b2e6eae0066f2;token=GnuTLS-Test 441s * Setting SO PIN... ok 441s * Re-setting SO PIN... ok 441s * Setting too large SO PIN... ok 441s * Setting large SO PIN... ok 441s * Re-setting SO PIN... ok 441s * Setting user PIN... ok 441s * Re-setting user PIN... ok 441s * Setting too large user PIN... ok 441s * Setting large user PIN... ok 441s * Re-setting user PIN... ok 441s * Writing a client private key... ok 441s * Checking whether object was marked private... ok 441s * Checking whether object was marked sensitive... ok 441s * Checking whether object was not marked always authenticate... ok 441s * Writing a client private key... ok 441s * Checking whether object was marked always authenticate... ok 441s * Generating ECC private key (256)... ok 441s * Deleting private key... ok 441s * Generating ECC private key without --login (256)... ok 441s * Deleting private key... ok 441s * Generating ECC private key (384)... ok 441s * Deleting private key... ok 441s * Generating RSA private key (2048)... ok 441s * Deleting private key... ok 443s * Generating DSA private key (3072)... ok 443s * Deleting private key... ok 443s * Importing RSA private key (1024)... ok 443s * Deleting private key... ok 443s * Importing ECC private key (256)... ok 443s * Deleting private key... ok 443s * Importing DSA private key (2048)... ok 443s * Deleting private key... ok 443s * Generating RSA private key (1024)... ok 444s * Checking whether generated private key was marked private... ok 444s * Checking whether private key was marked sensitive... ok 444s * Change the CKA_ID of generated private key... ok 444s * Exporting public key of generated private key... ok 444s * Change the CKA_LABEL of generated private key... ok 444s * Exporting public key as SO... ok 444s * List private key without GNUTLS_PIN... ok 444s * Generating client certificate... ok 444s * Writing client certificate... ok 444s * Checking whether ID was correctly set... ok 444s * Checking whether object was public... ok 444s * Writing certificate of client's CA... ok 444s * Testing certificate flags... ok 444s * Checking output of certificateok 444s * Trying to obtain back the cert... ok 444s * Trying to obtain the full chain... ok 444s * Writing the server private key... ok 444s * Writing the server certificate... ok 444s * Writing the server public key... ok 444s * Testing signatures using the private key... ok 444s * Testing RSA-PSS signatures using the private key... ok 444s * Testing signatures using the private key (with ID)... ok 444s * Using PKCS #11 with gnutls-cli (full URLs)... reserved port 58856 445s ok 445s * Using PKCS #11 with gnutls-cli (abbrv URLs)... reserved port 25005 446s ok 446s * Generating RSA private key on HSM... ok 446s * Checking whether right ID is set on copy... ok 446s * Generating RSA private key... ok 446s * Checking whether right ID is set on copy... ok 446s * Generating ECDSA private key... ok 446s * Checking whether right ID is set on copy... ok 446s * Deleting the server certificate... ok 446s * Testing signatures using the private key and --set-pin... ok 446s * All smart cards tests succeeded 446s unreserved port 25005 446s SUCCESS [133]../../tests/testpkcs11.sh 446s running [134]../../tests/tpm2.sh ... 446s Need swtpm package to run this test. 446s SKIPPED [134]../../tests/tpm2.sh 446s running [135]../../tests/tpmtool_test.sh ... 446s Need to be root to run this test. 446s SKIPPED [135]../../tests/tpmtool_test.sh 447s autopkgtest [21:29:16]: test run-upstream-testsuite: -----------------------] 448s autopkgtest [21:29:17]: test run-upstream-testsuite: - - - - - - - - - - results - - - - - - - - - - 448s run-upstream-testsuite PASS 448s autopkgtest [21:29:17]: @@@@@@@@@@@@@@@@@@@@ summary 448s run-upstream-testsuite PASS 504s nova [W] Skipping flock for amd64 504s Creating nova instance adt-plucky-amd64-gnutls28-20250220-201056-juju-7f2275-prod-proposed-migration-environment-2-f74a7210-be5b-4a53-b16b-124bd0355e3b from image adt/ubuntu-plucky-amd64-server-20250220.img (UUID 8ce549f8-ef4a-4335-bf9d-c468a6d98595)... 504s nova [W] Timed out waiting for ba69a22e-1af3-4701-868c-4d6628e95971 to get deleted.