0s autopkgtest [18:46:02]: starting date and time: 2025-01-18 18:46:02+0000 0s autopkgtest [18:46:02]: git checkout: 325255d2 Merge branch 'pin-any-arch' into 'ubuntu/production' 0s autopkgtest [18:46:02]: host juju-7f2275-prod-proposed-migration-environment-20; command line: /home/ubuntu/autopkgtest/runner/autopkgtest --output-dir /tmp/autopkgtest-work.wc3r42qj/out --timeout-copy=6000 --setup-commands /home/ubuntu/autopkgtest-cloud/worker-config-production/setup-canonical.sh --apt-pocket=proposed=src:sssd --apt-upgrade sssd --timeout-short=300 --timeout-copy=20000 --timeout-build=20000 --env=ADT_TEST_TRIGGERS=sssd/2.10.1-2ubuntu1 -- ssh -s /home/ubuntu/autopkgtest/ssh-setup/nova -- --flavor builder-cpu2-ram4-disk20 --security-groups autopkgtest-juju-7f2275-prod-proposed-migration-environment-20@bos03-21.secgroup --name adt-plucky-amd64-sssd-20250118-182220-juju-7f2275-prod-proposed-migration-environment-20-2e214c8e-e5a9-4fad-9e09-65d60683a46e --image adt/ubuntu-plucky-amd64-server --keyname testbed-juju-7f2275-prod-proposed-migration-environment-20 --net-id=net_prod-proposed-migration-amd64 -e TERM=linux -e ''"'"'http_proxy=http://squid.internal:3128'"'"'' -e ''"'"'https_proxy=http://squid.internal:3128'"'"'' -e ''"'"'no_proxy=127.0.0.1,127.0.1.1,login.ubuntu.com,localhost,localdomain,novalocal,internal,archive.ubuntu.com,ports.ubuntu.com,security.ubuntu.com,ddebs.ubuntu.com,changelogs.ubuntu.com,keyserver.ubuntu.com,launchpadlibrarian.net,launchpadcontent.net,launchpad.net,10.24.0.0/24,keystone.ps5.canonical.com,objectstorage.prodstack5.canonical.com,radosgw.ps5.canonical.com'"'"'' --mirror=http://ftpmaster.internal/ubuntu/ 136s autopkgtest [18:48:18]: testbed dpkg architecture: amd64 136s autopkgtest [18:48:18]: testbed apt version: 2.9.18 137s autopkgtest [18:48:19]: @@@@@@@@@@@@@@@@@@@@ test bed setup 137s autopkgtest [18:48:19]: testbed release detected to be: None 138s autopkgtest [18:48:20]: updating testbed package index (apt update) 138s Get:1 http://ftpmaster.internal/ubuntu plucky-proposed InRelease [73.9 kB] 138s Get:2 http://ftpmaster.internal/ubuntu plucky InRelease [213 kB] 138s Hit:3 http://ftpmaster.internal/ubuntu plucky-updates InRelease 138s Hit:4 http://ftpmaster.internal/ubuntu plucky-security InRelease 139s Get:5 http://ftpmaster.internal/ubuntu plucky-proposed/restricted Sources [9708 B] 139s Get:6 http://ftpmaster.internal/ubuntu plucky-proposed/main Sources [152 kB] 139s Get:7 http://ftpmaster.internal/ubuntu plucky-proposed/universe Sources [822 kB] 139s Get:8 http://ftpmaster.internal/ubuntu plucky-proposed/multiverse Sources [14.6 kB] 139s Get:9 http://ftpmaster.internal/ubuntu plucky-proposed/main i386 Packages [201 kB] 139s Get:10 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 Packages [288 kB] 139s Get:11 http://ftpmaster.internal/ubuntu plucky-proposed/restricted amd64 Packages [40.1 kB] 139s Get:12 http://ftpmaster.internal/ubuntu plucky-proposed/restricted i386 Packages [2408 B] 139s Get:13 http://ftpmaster.internal/ubuntu plucky-proposed/universe i386 Packages [413 kB] 139s Get:14 http://ftpmaster.internal/ubuntu plucky-proposed/universe amd64 Packages [949 kB] 139s Get:15 http://ftpmaster.internal/ubuntu plucky-proposed/multiverse i386 Packages [4116 B] 139s Get:16 http://ftpmaster.internal/ubuntu plucky-proposed/multiverse amd64 Packages [24.6 kB] 139s Get:17 http://ftpmaster.internal/ubuntu plucky/universe Sources [20.9 MB] 140s Get:18 http://ftpmaster.internal/ubuntu plucky/universe amd64 Packages [15.5 MB] 142s Fetched 39.6 MB in 4s (10.1 MB/s) 143s Reading package lists... 143s Reading package lists... 143s Building dependency tree... 143s Reading state information... 143s Calculating upgrade... 144s The following packages will be upgraded: 144s apport apport-core-dump-handler bash-completion ed libicu74 pci.ids 144s python3-apport python3-problem-report 144s 8 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 144s Need to get 11.8 MB of archives. 144s After this operation, 394 kB of additional disk space will be used. 144s Get:1 http://ftpmaster.internal/ubuntu plucky/main amd64 python3-problem-report all 2.31.0-0ubuntu3 [25.3 kB] 144s Get:2 http://ftpmaster.internal/ubuntu plucky/main amd64 python3-apport all 2.31.0-0ubuntu3 [93.1 kB] 144s Get:3 http://ftpmaster.internal/ubuntu plucky/main amd64 apport-core-dump-handler all 2.31.0-0ubuntu3 [18.3 kB] 144s Get:4 http://ftpmaster.internal/ubuntu plucky/main amd64 apport all 2.31.0-0ubuntu3 [83.0 kB] 144s Get:5 http://ftpmaster.internal/ubuntu plucky/main amd64 libicu74 amd64 74.2-1ubuntu6 [11.0 MB] 145s Get:6 http://ftpmaster.internal/ubuntu plucky/main amd64 bash-completion all 1:2.16.0-6 [214 kB] 145s Get:7 http://ftpmaster.internal/ubuntu plucky/main amd64 ed amd64 1.21-1 [62.3 kB] 145s Get:8 http://ftpmaster.internal/ubuntu plucky/main amd64 pci.ids all 0.0~2025.01.13-1 [282 kB] 145s Fetched 11.8 MB in 1s (11.5 MB/s) 145s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 89449 files and directories currently installed.) 145s Preparing to unpack .../0-python3-problem-report_2.31.0-0ubuntu3_all.deb ... 145s Unpacking python3-problem-report (2.31.0-0ubuntu3) over (2.31.0-0ubuntu2) ... 145s Preparing to unpack .../1-python3-apport_2.31.0-0ubuntu3_all.deb ... 145s Unpacking python3-apport (2.31.0-0ubuntu3) over (2.31.0-0ubuntu2) ... 145s Preparing to unpack .../2-apport-core-dump-handler_2.31.0-0ubuntu3_all.deb ... 145s Unpacking apport-core-dump-handler (2.31.0-0ubuntu3) over (2.31.0-0ubuntu2) ... 145s Preparing to unpack .../3-apport_2.31.0-0ubuntu3_all.deb ... 145s Unpacking apport (2.31.0-0ubuntu3) over (2.31.0-0ubuntu2) ... 145s Preparing to unpack .../4-libicu74_74.2-1ubuntu6_amd64.deb ... 145s Unpacking libicu74:amd64 (74.2-1ubuntu6) over (74.2-1ubuntu4) ... 146s Preparing to unpack .../5-bash-completion_1%3a2.16.0-6_all.deb ... 146s Unpacking bash-completion (1:2.16.0-6) over (1:2.16.0-3) ... 146s Preparing to unpack .../6-ed_1.21-1_amd64.deb ... 146s Unpacking ed (1.21-1) over (1.20.2-2) ... 146s Preparing to unpack .../7-pci.ids_0.0~2025.01.13-1_all.deb ... 146s Unpacking pci.ids (0.0~2025.01.13-1) over (0.0~2024.11.25-1) ... 146s Setting up pci.ids (0.0~2025.01.13-1) ... 146s Setting up python3-problem-report (2.31.0-0ubuntu3) ... 146s Setting up python3-apport (2.31.0-0ubuntu3) ... 146s Setting up ed (1.21-1) ... 146s Setting up bash-completion (1:2.16.0-6) ... 146s Setting up libicu74:amd64 (74.2-1ubuntu6) ... 146s Setting up apport-core-dump-handler (2.31.0-0ubuntu3) ... 146s invoke-rc.d: policy-rc.d denied execution of restart. 147s /usr/sbin/policy-rc.d returned 101, not running 'restart apport.service' 147s Setting up apport (2.31.0-0ubuntu3) ... 147s /usr/sbin/policy-rc.d returned 101, not running 'restart apport-autoreport.path apport-autoreport.service apport-autoreport.timer apport-forward.socket' 147s Processing triggers for install-info (7.1.1-1) ... 147s Processing triggers for libc-bin (2.40-4ubuntu1) ... 147s Processing triggers for man-db (2.13.0-1) ... 148s 148s Running kernel seems to be up-to-date. 148s 148s No services need to be restarted. 148s 148s No containers need to be restarted. 148s 148s No user sessions are running outdated binaries. 148s 148s No VM guests are running outdated hypervisor (qemu) binaries on this host. 149s Reading package lists... 149s Building dependency tree... 149s Reading state information... 149s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 149s autopkgtest [18:48:31]: upgrading testbed (apt dist-upgrade and autopurge) 150s Reading package lists... 150s Building dependency tree... 150s Reading state information... 150s Calculating upgrade...Starting pkgProblemResolver with broken count: 0 150s Starting 2 pkgProblemResolver with broken count: 0 150s Done 150s Entering ResolveByKeep 150s 150s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 151s Reading package lists... 151s Building dependency tree... 151s Reading state information... 151s Starting pkgProblemResolver with broken count: 0 151s Starting 2 pkgProblemResolver with broken count: 0 151s Done 151s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 151s autopkgtest [18:48:33]: rebooting testbed after setup commands that affected boot 165s autopkgtest-virt-ssh: WARNING: ssh connection failed. Retrying in 3 seconds... 171s autopkgtest [18:48:53]: testbed running kernel: Linux 6.11.0-8-generic #8-Ubuntu SMP PREEMPT_DYNAMIC Mon Sep 16 13:41:20 UTC 2024 174s autopkgtest [18:48:56]: @@@@@@@@@@@@@@@@@@@@ apt-source sssd 188s Get:1 http://ftpmaster.internal/ubuntu plucky-proposed/main sssd 2.10.1-2ubuntu1 (dsc) [5330 B] 188s Get:2 http://ftpmaster.internal/ubuntu plucky-proposed/main sssd 2.10.1-2ubuntu1 (tar) [9197 kB] 188s Get:3 http://ftpmaster.internal/ubuntu plucky-proposed/main sssd 2.10.1-2ubuntu1 (asc) [833 B] 188s Get:4 http://ftpmaster.internal/ubuntu plucky-proposed/main sssd 2.10.1-2ubuntu1 (diff) [49.9 kB] 188s gpgv: Signature made Tue Jan 14 21:45:37 2025 UTC 188s gpgv: using RSA key E92FD0B36B14F1F4D8E0EB2F106DA1C8C3CBBF14 188s gpgv: Can't check signature: No public key 188s dpkg-source: warning: cannot verify inline signature for ./sssd_2.10.1-2ubuntu1.dsc: no acceptable signature found 189s autopkgtest [18:49:11]: testing package sssd version 2.10.1-2ubuntu1 194s autopkgtest [18:49:16]: build not needed 201s autopkgtest [18:49:23]: test ldap-user-group-ldap-auth: preparing testbed 201s Reading package lists... 201s Building dependency tree... 201s Reading state information... 201s Starting pkgProblemResolver with broken count: 8 201s Starting 2 pkgProblemResolver with broken count: 8 201s Investigating (0) satisfy:command-line:amd64 < none -> 1 @un puN Ib > 201s Broken satisfy:command-line:amd64 Depends on sssd:amd64 < none @un H > 201s Considering sssd:amd64 3 as a solution to satisfy:command-line:amd64 9998 201s Considering sssd:amd64 3 as a solution to satisfy:command-line:amd64 9998 201s Considering sssd:i386 0 as a solution to satisfy:command-line:amd64 9998 201s Considering sssd:i386 0 as a solution to satisfy:command-line:amd64 9998 201s Broken satisfy:command-line:amd64 Depends on python3-sss:amd64 < none @un H > 201s Considering python3-sss:amd64 3 as a solution to satisfy:command-line:amd64 9998 201s Considering python3-sss:amd64 3 as a solution to satisfy:command-line:amd64 9998 201s Investigating (0) sssd-common:amd64 < none -> 2.10.1-2ubuntu1 @un puN Ib > 201s Broken sssd-common:amd64 Depends on python3-sss:amd64 < none @un H > 201s Considering python3-sss:amd64 3 as a solution to sssd-common:amd64 15 201s Considering python3-sss:amd64 3 as a solution to sssd-common:amd64 15 201s Investigating (0) sssd-ad-common:amd64 < none -> 2.10.1-2ubuntu1 @un puN Ib > 201s Broken sssd-ad-common:amd64 Depends on libndr4:amd64 < none @un H > (>= 2:4.20.0~rc1) 201s Considering samba-libs:amd64 0 as a solution to sssd-ad-common:amd64 1 201s Re-Instated libavahi-common-data:amd64 201s Re-Instated libavahi-common3:amd64 201s Re-Instated libavahi-client3:amd64 201s Re-Instated libwbclient0:amd64 201s Re-Instated samba-libs:amd64 201s Broken sssd-ad-common:amd64 Depends on samba-libs:amd64 < none -> 2:4.20.4+dfsg-1ubuntu3 @un uN > (> 2:4.20.4+dfsg-1ubuntu5~) 201s Considering samba-libs:amd64 0 as a solution to sssd-ad-common:amd64 1 201s Investigating (0) python3-libipa-hbac:amd64 < none -> 2.10.1-2ubuntu1 @un puN Ib > 201s Broken python3-libipa-hbac:amd64 Depends on python3:amd64 < 3.12.8-1 @ii pK > (>= 3.13~) 201s Considering python3:amd64 301 as a solution to python3-libipa-hbac:amd64 -1 201s Investigating (0) sssd-ipa:amd64 < none -> 2.10.1-2ubuntu1 @un puN Ib > 201s Broken sssd-ipa:amd64 Depends on samba-libs:amd64 < none -> 2:4.20.4+dfsg-1ubuntu3 @un uN > (> 2:4.20.4+dfsg-1ubuntu5~) 201s Considering samba-libs:amd64 0 as a solution to sssd-ipa:amd64 -1 201s Investigating (0) python3-libsss-nss-idmap:amd64 < none -> 2.10.1-2ubuntu1 @un puN Ib > 201s Broken python3-libsss-nss-idmap:amd64 Depends on python3:amd64 < 3.12.8-1 @ii pK > (>= 3.13~) 201s Considering python3:amd64 301 as a solution to python3-libsss-nss-idmap:amd64 -1 201s Investigating (0) sssd-ad:amd64 < none -> 2.10.1-2ubuntu1 @un puN Ib > 201s Broken sssd-ad:amd64 Depends on libsmbclient0:amd64 < none | 2:4.20.4+dfsg-1ubuntu3 @un uH > (>= 2:4.0.3+dfsg1) 201s Considering libsmbclient0:amd64 0 as a solution to sssd-ad:amd64 -1 201s Re-Instated libsmbclient0:amd64 201s Broken sssd-ad:amd64 Depends on samba-libs:amd64 < none -> 2:4.20.4+dfsg-1ubuntu3 @un uN > (> 2:4.20.4+dfsg-1ubuntu5~) 201s Considering samba-libs:amd64 0 as a solution to sssd-ad:amd64 -1 201s Investigating (0) sssd-tools:amd64 < none -> 2.10.1-2ubuntu1 @un puN Ib > 201s Broken sssd-tools:amd64 Depends on python3-sss:amd64 < none @un H > 201s Considering python3-sss:amd64 3 as a solution to sssd-tools:amd64 -1 201s Considering python3-sss:amd64 3 as a solution to sssd-tools:amd64 -1 201s Done 201s Some packages could not be installed. This may mean that you have 201s requested an impossible situation or if you are using the unstable 201s distribution that some required packages have not yet been created 201s or been moved out of Incoming. 201s The following information may help to resolve the situation: 201s 201s The following packages have unmet dependencies: 202s python3-libipa-hbac : Depends: python3 (>= 3.13~) but 3.12.8-1 is to be installed 202s python3-libsss-nss-idmap : Depends: python3 (>= 3.13~) but 3.12.8-1 is to be installed 202s satisfy:command-line : Depends: sssd 202s Depends: python3-sss but it is not installable 202s sssd-ad : Depends: samba-libs (> 2:4.20.4+dfsg-1ubuntu5~) but 2:4.20.4+dfsg-1ubuntu3 is to be installed 202s sssd-ad-common : Depends: samba-libs (> 2:4.20.4+dfsg-1ubuntu5~) but 2:4.20.4+dfsg-1ubuntu3 is to be installed 202s sssd-common : Depends: python3-sss but it is not installable 202s sssd-ipa : Depends: samba-libs (> 2:4.20.4+dfsg-1ubuntu5~) but 2:4.20.4+dfsg-1ubuntu3 is to be installed 202s sssd-tools : Depends: python3-sss but it is not installable 202s E: Unable to correct problems, you have held broken packages. 202s autopkgtest: WARNING: Test dependencies are unsatisfiable with using apt pinning. Retrying with using all packages from plucky-proposed 202s Reading package lists... 202s Building dependency tree... 202s Reading state information... 202s Starting pkgProblemResolver with broken count: 0 202s Starting 2 pkgProblemResolver with broken count: 0 202s Done 203s The following packages were automatically installed and are no longer required: 203s python3.12 python3.12-minimal 203s Use 'sudo apt autoremove' to remove them. 203s The following NEW packages will be installed: 203s expect ldap-utils libargon2-1 libavahi-client3 libavahi-common-data 203s libavahi-common3 libbasicobjects0t64 libcares2 libcollection4t64 libcrack2 203s libdhash1t64 libevent-2.1-7t64 libini-config5t64 libipa-hbac-dev 203s libipa-hbac0t64 libjose0 libkrad0 libldb2 libltdl7 libnfsidmap1 libnss-sss 203s libnss-sudo libodbc2 libpam-pwquality libpam-sss libpath-utils1t64 203s libpwquality-common libpwquality1 libpython3.13-minimal libpython3.13-stdlib 203s libref-array1t64 libsmbclient0 libsss-certmap-dev libsss-certmap0 203s libsss-idmap-dev libsss-idmap0 libsss-nss-idmap-dev libsss-nss-idmap0 203s libsss-sudo libtalloc2 libtdb1 libtevent0t64 libverto-libevent1t64 203s libverto1t64 libwbclient0 python3-libipa-hbac python3-libsss-nss-idmap 203s python3-sss python3.13 python3.13-minimal samba-libs slapd sssd sssd-ad 203s sssd-ad-common sssd-common sssd-dbus sssd-idp sssd-ipa sssd-kcm sssd-krb5 203s sssd-krb5-common sssd-ldap sssd-passkey sssd-proxy sssd-tools tcl-expect 203s The following packages will be upgraded: 203s krb5-locales libgssapi-krb5-2 libk5crypto3 libkrb5-3 libkrb5support0 203s libldap-common libldap2 libpython3-stdlib python3 python3-minimal 203s python3.13-gdbm 203s 11 upgraded, 67 newly installed, 0 to remove and 123 not upgraded. 203s Need to get 19.4 MB of archives. 203s After this operation, 69.9 MB of additional disk space will be used. 203s Get:1 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 libpython3.13-minimal amd64 3.13.1-3 [881 kB] 203s Get:2 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 python3.13-minimal amd64 3.13.1-3 [2358 kB] 204s Get:3 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 python3-minimal amd64 3.13.1-1~exp2 [27.6 kB] 204s Get:4 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 python3 amd64 3.13.1-1~exp2 [23.9 kB] 204s Get:5 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 libpython3.13-stdlib amd64 3.13.1-3 [2087 kB] 204s Get:6 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 python3.13 amd64 3.13.1-3 [729 kB] 204s Get:7 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 libpython3-stdlib amd64 3.13.1-1~exp2 [10.2 kB] 204s Get:8 http://ftpmaster.internal/ubuntu plucky/main amd64 libargon2-1 amd64 0~20190702+dfsg-4build1 [20.8 kB] 204s Get:9 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 libldap-common all 2.6.9+dfsg-1~exp2ubuntu1 [33.2 kB] 204s Get:10 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 libldap2 amd64 2.6.9+dfsg-1~exp2ubuntu1 [209 kB] 204s Get:11 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 libltdl7 amd64 2.5.4-2 [46.0 kB] 204s Get:12 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 libodbc2 amd64 2.3.12-2ubuntu1 [186 kB] 204s Get:13 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 slapd amd64 2.6.9+dfsg-1~exp2ubuntu1 [1648 kB] 204s Get:14 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 krb5-locales all 1.21.3-4 [14.5 kB] 204s Get:15 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 libgssapi-krb5-2 amd64 1.21.3-4 [159 kB] 204s Get:16 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 libkrb5-3 amd64 1.21.3-4 [386 kB] 204s Get:17 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 libkrb5support0 amd64 1.21.3-4 [35.2 kB] 204s Get:18 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 libk5crypto3 amd64 1.21.3-4 [90.6 kB] 204s Get:19 http://ftpmaster.internal/ubuntu plucky/universe amd64 tcl-expect amd64 5.45.4-3 [110 kB] 204s Get:20 http://ftpmaster.internal/ubuntu plucky/universe amd64 expect amd64 5.45.4-3 [137 kB] 204s Get:21 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 ldap-utils amd64 2.6.9+dfsg-1~exp2ubuntu1 [154 kB] 204s Get:22 http://ftpmaster.internal/ubuntu plucky/main amd64 libavahi-common-data amd64 0.8-14ubuntu1 [30.5 kB] 204s Get:23 http://ftpmaster.internal/ubuntu plucky/main amd64 libavahi-common3 amd64 0.8-14ubuntu1 [23.3 kB] 204s Get:24 http://ftpmaster.internal/ubuntu plucky/main amd64 libavahi-client3 amd64 0.8-14ubuntu1 [27.5 kB] 204s Get:25 http://ftpmaster.internal/ubuntu plucky/main amd64 libbasicobjects0t64 amd64 0.6.2-3 [5878 B] 204s Get:26 http://ftpmaster.internal/ubuntu plucky/main amd64 libcares2 amd64 1.34.4-2.1 [109 kB] 204s Get:27 http://ftpmaster.internal/ubuntu plucky/main amd64 libcollection4t64 amd64 0.6.2-3 [31.1 kB] 204s Get:28 http://ftpmaster.internal/ubuntu plucky/main amd64 libcrack2 amd64 2.9.6-5.2 [29.3 kB] 204s Get:29 http://ftpmaster.internal/ubuntu plucky/main amd64 libdhash1t64 amd64 0.6.2-3 [8792 B] 204s Get:30 http://ftpmaster.internal/ubuntu plucky/main amd64 libevent-2.1-7t64 amd64 2.1.12-stable-10 [144 kB] 204s Get:31 http://ftpmaster.internal/ubuntu plucky/main amd64 libpath-utils1t64 amd64 0.6.2-3 [8810 B] 204s Get:32 http://ftpmaster.internal/ubuntu plucky/main amd64 libref-array1t64 amd64 0.6.2-3 [7396 B] 204s Get:33 http://ftpmaster.internal/ubuntu plucky/main amd64 libini-config5t64 amd64 0.6.2-3 [43.9 kB] 204s Get:34 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 libipa-hbac0t64 amd64 2.10.1-2ubuntu1 [18.8 kB] 204s Get:35 http://ftpmaster.internal/ubuntu plucky/universe amd64 libjose0 amd64 14-1 [45.2 kB] 204s Get:36 http://ftpmaster.internal/ubuntu plucky/main amd64 libverto-libevent1t64 amd64 0.3.1-1.2ubuntu3 [6424 B] 204s Get:37 http://ftpmaster.internal/ubuntu plucky/main amd64 libverto1t64 amd64 0.3.1-1.2ubuntu3 [10.5 kB] 204s Get:38 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 libkrad0 amd64 1.21.3-4 [22.6 kB] 204s Get:39 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 libtalloc2 amd64 2.4.2-2build1 [35.2 kB] 204s Get:40 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 libtdb1 amd64 1.4.12-1build1 [54.2 kB] 204s Get:41 http://ftpmaster.internal/ubuntu plucky/main amd64 libtevent0t64 amd64 0.16.1-3 [42.7 kB] 204s Get:42 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 libldb2 amd64 2:2.9.1+samba4.20.4+dfsg-1ubuntu5 [197 kB] 205s Get:43 http://ftpmaster.internal/ubuntu plucky/main amd64 libnfsidmap1 amd64 1:2.6.4-4ubuntu1 [48.3 kB] 205s Get:44 http://ftpmaster.internal/ubuntu plucky/universe amd64 libnss-sudo all 1.9.15p5-3ubuntu5 [15.2 kB] 205s Get:45 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 libpwquality-common all 1.4.5-3build2 [7820 B] 205s Get:46 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 libpwquality1 amd64 1.4.5-3build2 [14.3 kB] 205s Get:47 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 libpam-pwquality amd64 1.4.5-3build2 [12.0 kB] 205s Get:48 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 libwbclient0 amd64 2:4.20.4+dfsg-1ubuntu5 [75.9 kB] 205s Get:49 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 samba-libs amd64 2:4.20.4+dfsg-1ubuntu5 [6396 kB] 205s Get:50 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 libsmbclient0 amd64 2:4.20.4+dfsg-1ubuntu5 [63.7 kB] 205s Get:51 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 python3.13-gdbm amd64 3.13.1-3 [31.7 kB] 205s Get:52 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 libnss-sss amd64 2.10.1-2ubuntu1 [33.3 kB] 205s Get:53 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 libpam-sss amd64 2.10.1-2ubuntu1 [53.3 kB] 205s Get:54 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 python3-sss amd64 2.10.1-2ubuntu1 [46.8 kB] 205s Get:55 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 libsss-certmap0 amd64 2.10.1-2ubuntu1 [49.4 kB] 205s Get:56 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 libsss-idmap0 amd64 2.10.1-2ubuntu1 [23.5 kB] 205s Get:57 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 libsss-nss-idmap0 amd64 2.10.1-2ubuntu1 [34.1 kB] 205s Get:58 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 sssd-common amd64 2.10.1-2ubuntu1 [1163 kB] 205s Get:59 http://ftpmaster.internal/ubuntu plucky-proposed/universe amd64 sssd-idp amd64 2.10.1-2ubuntu1 [28.7 kB] 205s Get:60 http://ftpmaster.internal/ubuntu plucky-proposed/universe amd64 sssd-passkey amd64 2.10.1-2ubuntu1 [32.7 kB] 205s Get:61 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 libipa-hbac-dev amd64 2.10.1-2ubuntu1 [6668 B] 205s Get:62 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 libsss-certmap-dev amd64 2.10.1-2ubuntu1 [5730 B] 205s Get:63 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 libsss-idmap-dev amd64 2.10.1-2ubuntu1 [8384 B] 205s Get:64 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 libsss-nss-idmap-dev amd64 2.10.1-2ubuntu1 [6718 B] 205s Get:65 http://ftpmaster.internal/ubuntu plucky-proposed/universe amd64 libsss-sudo amd64 2.10.1-2ubuntu1 [22.2 kB] 205s Get:66 http://ftpmaster.internal/ubuntu plucky-proposed/universe amd64 python3-libipa-hbac amd64 2.10.1-2ubuntu1 [18.0 kB] 205s Get:67 http://ftpmaster.internal/ubuntu plucky-proposed/universe amd64 python3-libsss-nss-idmap amd64 2.10.1-2ubuntu1 [9300 B] 205s Get:68 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 sssd-ad-common amd64 2.10.1-2ubuntu1 [78.7 kB] 205s Get:69 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 sssd-krb5-common amd64 2.10.1-2ubuntu1 [94.5 kB] 205s Get:70 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 sssd-ad amd64 2.10.1-2ubuntu1 [140 kB] 205s Get:71 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 sssd-ipa amd64 2.10.1-2ubuntu1 [226 kB] 205s Get:72 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 sssd-krb5 amd64 2.10.1-2ubuntu1 [14.6 kB] 205s Get:73 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 sssd-ldap amd64 2.10.1-2ubuntu1 [31.7 kB] 205s Get:74 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 sssd-proxy amd64 2.10.1-2ubuntu1 [44.7 kB] 205s Get:75 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 sssd amd64 2.10.1-2ubuntu1 [4118 B] 205s Get:76 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 sssd-dbus amd64 2.10.1-2ubuntu1 [110 kB] 205s Get:77 http://ftpmaster.internal/ubuntu plucky-proposed/universe amd64 sssd-kcm amd64 2.10.1-2ubuntu1 [144 kB] 205s Get:78 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 sssd-tools amd64 2.10.1-2ubuntu1 [100 kB] 206s Preconfiguring packages ... 206s Fetched 19.4 MB in 3s (7531 kB/s) 206s Selecting previously unselected package libpython3.13-minimal:amd64. 206s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 89449 files and directories currently installed.) 206s Preparing to unpack .../libpython3.13-minimal_3.13.1-3_amd64.deb ... 206s Unpacking libpython3.13-minimal:amd64 (3.13.1-3) ... 206s Selecting previously unselected package python3.13-minimal. 206s Preparing to unpack .../python3.13-minimal_3.13.1-3_amd64.deb ... 206s Unpacking python3.13-minimal (3.13.1-3) ... 206s Setting up libpython3.13-minimal:amd64 (3.13.1-3) ... 206s Setting up python3.13-minimal (3.13.1-3) ... 207s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 89770 files and directories currently installed.) 207s Preparing to unpack .../python3-minimal_3.13.1-1~exp2_amd64.deb ... 207s Unpacking python3-minimal (3.13.1-1~exp2) over (3.12.8-1) ... 207s Setting up python3-minimal (3.13.1-1~exp2) ... 207s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 89770 files and directories currently installed.) 207s Preparing to unpack .../00-python3_3.13.1-1~exp2_amd64.deb ... 207s Unpacking python3 (3.13.1-1~exp2) over (3.12.8-1) ... 207s Selecting previously unselected package libpython3.13-stdlib:amd64. 207s Preparing to unpack .../01-libpython3.13-stdlib_3.13.1-3_amd64.deb ... 207s Unpacking libpython3.13-stdlib:amd64 (3.13.1-3) ... 207s Selecting previously unselected package python3.13. 207s Preparing to unpack .../02-python3.13_3.13.1-3_amd64.deb ... 207s Unpacking python3.13 (3.13.1-3) ... 207s Preparing to unpack .../03-libpython3-stdlib_3.13.1-1~exp2_amd64.deb ... 207s Unpacking libpython3-stdlib:amd64 (3.13.1-1~exp2) over (3.12.8-1) ... 207s Selecting previously unselected package libargon2-1:amd64. 207s Preparing to unpack .../04-libargon2-1_0~20190702+dfsg-4build1_amd64.deb ... 207s Unpacking libargon2-1:amd64 (0~20190702+dfsg-4build1) ... 207s Preparing to unpack .../05-libldap-common_2.6.9+dfsg-1~exp2ubuntu1_all.deb ... 207s Unpacking libldap-common (2.6.9+dfsg-1~exp2ubuntu1) over (2.6.8+dfsg-1~exp4ubuntu3) ... 207s Preparing to unpack .../06-libldap2_2.6.9+dfsg-1~exp2ubuntu1_amd64.deb ... 207s Unpacking libldap2:amd64 (2.6.9+dfsg-1~exp2ubuntu1) over (2.6.8+dfsg-1~exp4ubuntu3) ... 207s Selecting previously unselected package libltdl7:amd64. 207s Preparing to unpack .../07-libltdl7_2.5.4-2_amd64.deb ... 207s Unpacking libltdl7:amd64 (2.5.4-2) ... 207s Selecting previously unselected package libodbc2:amd64. 207s Preparing to unpack .../08-libodbc2_2.3.12-2ubuntu1_amd64.deb ... 207s Unpacking libodbc2:amd64 (2.3.12-2ubuntu1) ... 207s Selecting previously unselected package slapd. 207s Preparing to unpack .../09-slapd_2.6.9+dfsg-1~exp2ubuntu1_amd64.deb ... 207s Unpacking slapd (2.6.9+dfsg-1~exp2ubuntu1) ... 208s Preparing to unpack .../10-krb5-locales_1.21.3-4_all.deb ... 208s Unpacking krb5-locales (1.21.3-4) over (1.21.3-3) ... 208s Preparing to unpack .../11-libgssapi-krb5-2_1.21.3-4_amd64.deb ... 208s Unpacking libgssapi-krb5-2:amd64 (1.21.3-4) over (1.21.3-3) ... 208s Preparing to unpack .../12-libkrb5-3_1.21.3-4_amd64.deb ... 208s Unpacking libkrb5-3:amd64 (1.21.3-4) over (1.21.3-3) ... 208s Preparing to unpack .../13-libkrb5support0_1.21.3-4_amd64.deb ... 208s Unpacking libkrb5support0:amd64 (1.21.3-4) over (1.21.3-3) ... 208s Preparing to unpack .../14-libk5crypto3_1.21.3-4_amd64.deb ... 208s Unpacking libk5crypto3:amd64 (1.21.3-4) over (1.21.3-3) ... 208s Selecting previously unselected package tcl-expect:amd64. 208s Preparing to unpack .../15-tcl-expect_5.45.4-3_amd64.deb ... 208s Unpacking tcl-expect:amd64 (5.45.4-3) ... 208s Selecting previously unselected package expect. 208s Preparing to unpack .../16-expect_5.45.4-3_amd64.deb ... 208s Unpacking expect (5.45.4-3) ... 208s Selecting previously unselected package ldap-utils. 208s Preparing to unpack .../17-ldap-utils_2.6.9+dfsg-1~exp2ubuntu1_amd64.deb ... 208s Unpacking ldap-utils (2.6.9+dfsg-1~exp2ubuntu1) ... 208s Selecting previously unselected package libavahi-common-data:amd64. 208s Preparing to unpack .../18-libavahi-common-data_0.8-14ubuntu1_amd64.deb ... 208s Unpacking libavahi-common-data:amd64 (0.8-14ubuntu1) ... 208s Selecting previously unselected package libavahi-common3:amd64. 208s Preparing to unpack .../19-libavahi-common3_0.8-14ubuntu1_amd64.deb ... 208s Unpacking libavahi-common3:amd64 (0.8-14ubuntu1) ... 208s Selecting previously unselected package libavahi-client3:amd64. 208s Preparing to unpack .../20-libavahi-client3_0.8-14ubuntu1_amd64.deb ... 208s Unpacking libavahi-client3:amd64 (0.8-14ubuntu1) ... 208s Selecting previously unselected package libbasicobjects0t64:amd64. 208s Preparing to unpack .../21-libbasicobjects0t64_0.6.2-3_amd64.deb ... 208s Unpacking libbasicobjects0t64:amd64 (0.6.2-3) ... 208s Selecting previously unselected package libcares2:amd64. 208s Preparing to unpack .../22-libcares2_1.34.4-2.1_amd64.deb ... 208s Unpacking libcares2:amd64 (1.34.4-2.1) ... 208s Selecting previously unselected package libcollection4t64:amd64. 208s Preparing to unpack .../23-libcollection4t64_0.6.2-3_amd64.deb ... 208s Unpacking libcollection4t64:amd64 (0.6.2-3) ... 208s Selecting previously unselected package libcrack2:amd64. 208s Preparing to unpack .../24-libcrack2_2.9.6-5.2_amd64.deb ... 208s Unpacking libcrack2:amd64 (2.9.6-5.2) ... 208s Selecting previously unselected package libdhash1t64:amd64. 208s Preparing to unpack .../25-libdhash1t64_0.6.2-3_amd64.deb ... 208s Unpacking libdhash1t64:amd64 (0.6.2-3) ... 208s Selecting previously unselected package libevent-2.1-7t64:amd64. 208s Preparing to unpack .../26-libevent-2.1-7t64_2.1.12-stable-10_amd64.deb ... 208s Unpacking libevent-2.1-7t64:amd64 (2.1.12-stable-10) ... 208s Selecting previously unselected package libpath-utils1t64:amd64. 208s Preparing to unpack .../27-libpath-utils1t64_0.6.2-3_amd64.deb ... 208s Unpacking libpath-utils1t64:amd64 (0.6.2-3) ... 208s Selecting previously unselected package libref-array1t64:amd64. 208s Preparing to unpack .../28-libref-array1t64_0.6.2-3_amd64.deb ... 208s Unpacking libref-array1t64:amd64 (0.6.2-3) ... 208s Selecting previously unselected package libini-config5t64:amd64. 208s Preparing to unpack .../29-libini-config5t64_0.6.2-3_amd64.deb ... 208s Unpacking libini-config5t64:amd64 (0.6.2-3) ... 208s Selecting previously unselected package libipa-hbac0t64. 208s Preparing to unpack .../30-libipa-hbac0t64_2.10.1-2ubuntu1_amd64.deb ... 208s Unpacking libipa-hbac0t64 (2.10.1-2ubuntu1) ... 208s Selecting previously unselected package libjose0:amd64. 208s Preparing to unpack .../31-libjose0_14-1_amd64.deb ... 208s Unpacking libjose0:amd64 (14-1) ... 208s Selecting previously unselected package libverto-libevent1t64:amd64. 208s Preparing to unpack .../32-libverto-libevent1t64_0.3.1-1.2ubuntu3_amd64.deb ... 208s Unpacking libverto-libevent1t64:amd64 (0.3.1-1.2ubuntu3) ... 208s Selecting previously unselected package libverto1t64:amd64. 208s Preparing to unpack .../33-libverto1t64_0.3.1-1.2ubuntu3_amd64.deb ... 208s Unpacking libverto1t64:amd64 (0.3.1-1.2ubuntu3) ... 208s Selecting previously unselected package libkrad0:amd64. 208s Preparing to unpack .../34-libkrad0_1.21.3-4_amd64.deb ... 208s Unpacking libkrad0:amd64 (1.21.3-4) ... 208s Selecting previously unselected package libtalloc2:amd64. 208s Preparing to unpack .../35-libtalloc2_2.4.2-2build1_amd64.deb ... 208s Unpacking libtalloc2:amd64 (2.4.2-2build1) ... 208s Selecting previously unselected package libtdb1:amd64. 208s Preparing to unpack .../36-libtdb1_1.4.12-1build1_amd64.deb ... 208s Unpacking libtdb1:amd64 (1.4.12-1build1) ... 208s Selecting previously unselected package libtevent0t64:amd64. 208s Preparing to unpack .../37-libtevent0t64_0.16.1-3_amd64.deb ... 208s Unpacking libtevent0t64:amd64 (0.16.1-3) ... 208s Selecting previously unselected package libldb2:amd64. 208s Preparing to unpack .../38-libldb2_2%3a2.9.1+samba4.20.4+dfsg-1ubuntu5_amd64.deb ... 208s Unpacking libldb2:amd64 (2:2.9.1+samba4.20.4+dfsg-1ubuntu5) ... 208s Selecting previously unselected package libnfsidmap1:amd64. 208s Preparing to unpack .../39-libnfsidmap1_1%3a2.6.4-4ubuntu1_amd64.deb ... 208s Unpacking libnfsidmap1:amd64 (1:2.6.4-4ubuntu1) ... 208s Selecting previously unselected package libnss-sudo. 208s Preparing to unpack .../40-libnss-sudo_1.9.15p5-3ubuntu5_all.deb ... 208s Unpacking libnss-sudo (1.9.15p5-3ubuntu5) ... 208s Selecting previously unselected package libpwquality-common. 208s Preparing to unpack .../41-libpwquality-common_1.4.5-3build2_all.deb ... 208s Unpacking libpwquality-common (1.4.5-3build2) ... 208s Selecting previously unselected package libpwquality1:amd64. 208s Preparing to unpack .../42-libpwquality1_1.4.5-3build2_amd64.deb ... 208s Unpacking libpwquality1:amd64 (1.4.5-3build2) ... 208s Selecting previously unselected package libpam-pwquality:amd64. 208s Preparing to unpack .../43-libpam-pwquality_1.4.5-3build2_amd64.deb ... 208s Unpacking libpam-pwquality:amd64 (1.4.5-3build2) ... 208s Selecting previously unselected package libwbclient0:amd64. 208s Preparing to unpack .../44-libwbclient0_2%3a4.20.4+dfsg-1ubuntu5_amd64.deb ... 208s Unpacking libwbclient0:amd64 (2:4.20.4+dfsg-1ubuntu5) ... 208s Selecting previously unselected package samba-libs:amd64. 208s Preparing to unpack .../45-samba-libs_2%3a4.20.4+dfsg-1ubuntu5_amd64.deb ... 208s Unpacking samba-libs:amd64 (2:4.20.4+dfsg-1ubuntu5) ... 209s Selecting previously unselected package libsmbclient0:amd64. 209s Preparing to unpack .../46-libsmbclient0_2%3a4.20.4+dfsg-1ubuntu5_amd64.deb ... 209s Unpacking libsmbclient0:amd64 (2:4.20.4+dfsg-1ubuntu5) ... 209s Preparing to unpack .../47-python3.13-gdbm_3.13.1-3_amd64.deb ... 209s Unpacking python3.13-gdbm (3.13.1-3) over (3.13.1-2) ... 209s Selecting previously unselected package libnss-sss:amd64. 209s Preparing to unpack .../48-libnss-sss_2.10.1-2ubuntu1_amd64.deb ... 209s Unpacking libnss-sss:amd64 (2.10.1-2ubuntu1) ... 209s Selecting previously unselected package libpam-sss:amd64. 209s Preparing to unpack .../49-libpam-sss_2.10.1-2ubuntu1_amd64.deb ... 209s Unpacking libpam-sss:amd64 (2.10.1-2ubuntu1) ... 209s Selecting previously unselected package python3-sss. 209s Preparing to unpack .../50-python3-sss_2.10.1-2ubuntu1_amd64.deb ... 209s Unpacking python3-sss (2.10.1-2ubuntu1) ... 209s Selecting previously unselected package libsss-certmap0. 209s Preparing to unpack .../51-libsss-certmap0_2.10.1-2ubuntu1_amd64.deb ... 209s Unpacking libsss-certmap0 (2.10.1-2ubuntu1) ... 209s Selecting previously unselected package libsss-idmap0. 209s Preparing to unpack .../52-libsss-idmap0_2.10.1-2ubuntu1_amd64.deb ... 209s Unpacking libsss-idmap0 (2.10.1-2ubuntu1) ... 209s Selecting previously unselected package libsss-nss-idmap0. 209s Preparing to unpack .../53-libsss-nss-idmap0_2.10.1-2ubuntu1_amd64.deb ... 209s Unpacking libsss-nss-idmap0 (2.10.1-2ubuntu1) ... 209s Selecting previously unselected package sssd-common. 209s Preparing to unpack .../54-sssd-common_2.10.1-2ubuntu1_amd64.deb ... 209s Unpacking sssd-common (2.10.1-2ubuntu1) ... 209s Selecting previously unselected package sssd-idp. 209s Preparing to unpack .../55-sssd-idp_2.10.1-2ubuntu1_amd64.deb ... 209s Unpacking sssd-idp (2.10.1-2ubuntu1) ... 209s Selecting previously unselected package sssd-passkey. 209s Preparing to unpack .../56-sssd-passkey_2.10.1-2ubuntu1_amd64.deb ... 209s Unpacking sssd-passkey (2.10.1-2ubuntu1) ... 209s Selecting previously unselected package libipa-hbac-dev. 209s Preparing to unpack .../57-libipa-hbac-dev_2.10.1-2ubuntu1_amd64.deb ... 209s Unpacking libipa-hbac-dev (2.10.1-2ubuntu1) ... 209s Selecting previously unselected package libsss-certmap-dev. 209s Preparing to unpack .../58-libsss-certmap-dev_2.10.1-2ubuntu1_amd64.deb ... 209s Unpacking libsss-certmap-dev (2.10.1-2ubuntu1) ... 209s Selecting previously unselected package libsss-idmap-dev. 209s Preparing to unpack .../59-libsss-idmap-dev_2.10.1-2ubuntu1_amd64.deb ... 209s Unpacking libsss-idmap-dev (2.10.1-2ubuntu1) ... 209s Selecting previously unselected package libsss-nss-idmap-dev. 209s Preparing to unpack .../60-libsss-nss-idmap-dev_2.10.1-2ubuntu1_amd64.deb ... 209s Unpacking libsss-nss-idmap-dev (2.10.1-2ubuntu1) ... 209s Selecting previously unselected package libsss-sudo. 209s Preparing to unpack .../61-libsss-sudo_2.10.1-2ubuntu1_amd64.deb ... 209s Unpacking libsss-sudo (2.10.1-2ubuntu1) ... 209s Selecting previously unselected package python3-libipa-hbac. 209s Preparing to unpack .../62-python3-libipa-hbac_2.10.1-2ubuntu1_amd64.deb ... 209s Unpacking python3-libipa-hbac (2.10.1-2ubuntu1) ... 209s Selecting previously unselected package python3-libsss-nss-idmap. 209s Preparing to unpack .../63-python3-libsss-nss-idmap_2.10.1-2ubuntu1_amd64.deb ... 209s Unpacking python3-libsss-nss-idmap (2.10.1-2ubuntu1) ... 209s Selecting previously unselected package sssd-ad-common. 209s Preparing to unpack .../64-sssd-ad-common_2.10.1-2ubuntu1_amd64.deb ... 209s Unpacking sssd-ad-common (2.10.1-2ubuntu1) ... 209s Selecting previously unselected package sssd-krb5-common. 209s Preparing to unpack .../65-sssd-krb5-common_2.10.1-2ubuntu1_amd64.deb ... 209s Unpacking sssd-krb5-common (2.10.1-2ubuntu1) ... 209s Selecting previously unselected package sssd-ad. 209s Preparing to unpack .../66-sssd-ad_2.10.1-2ubuntu1_amd64.deb ... 209s Unpacking sssd-ad (2.10.1-2ubuntu1) ... 209s Selecting previously unselected package sssd-ipa. 209s Preparing to unpack .../67-sssd-ipa_2.10.1-2ubuntu1_amd64.deb ... 209s Unpacking sssd-ipa (2.10.1-2ubuntu1) ... 209s Selecting previously unselected package sssd-krb5. 209s Preparing to unpack .../68-sssd-krb5_2.10.1-2ubuntu1_amd64.deb ... 209s Unpacking sssd-krb5 (2.10.1-2ubuntu1) ... 209s Selecting previously unselected package sssd-ldap. 209s Preparing to unpack .../69-sssd-ldap_2.10.1-2ubuntu1_amd64.deb ... 209s Unpacking sssd-ldap (2.10.1-2ubuntu1) ... 209s Selecting previously unselected package sssd-proxy. 209s Preparing to unpack .../70-sssd-proxy_2.10.1-2ubuntu1_amd64.deb ... 209s Unpacking sssd-proxy (2.10.1-2ubuntu1) ... 209s Selecting previously unselected package sssd. 209s Preparing to unpack .../71-sssd_2.10.1-2ubuntu1_amd64.deb ... 209s Unpacking sssd (2.10.1-2ubuntu1) ... 209s Selecting previously unselected package sssd-dbus. 209s Preparing to unpack .../72-sssd-dbus_2.10.1-2ubuntu1_amd64.deb ... 209s Unpacking sssd-dbus (2.10.1-2ubuntu1) ... 209s Selecting previously unselected package sssd-kcm. 209s Preparing to unpack .../73-sssd-kcm_2.10.1-2ubuntu1_amd64.deb ... 209s Unpacking sssd-kcm (2.10.1-2ubuntu1) ... 209s Selecting previously unselected package sssd-tools. 209s Preparing to unpack .../74-sssd-tools_2.10.1-2ubuntu1_amd64.deb ... 209s Unpacking sssd-tools (2.10.1-2ubuntu1) ... 209s Setting up libpwquality-common (1.4.5-3build2) ... 209s Setting up libsss-idmap0 (2.10.1-2ubuntu1) ... 209s Setting up libbasicobjects0t64:amd64 (0.6.2-3) ... 209s Setting up libipa-hbac0t64 (2.10.1-2ubuntu1) ... 209s Setting up libsss-idmap-dev (2.10.1-2ubuntu1) ... 209s Setting up libref-array1t64:amd64 (0.6.2-3) ... 209s Setting up libipa-hbac-dev (2.10.1-2ubuntu1) ... 209s Setting up libtdb1:amd64 (1.4.12-1build1) ... 209s Setting up libargon2-1:amd64 (0~20190702+dfsg-4build1) ... 209s Setting up libcollection4t64:amd64 (0.6.2-3) ... 209s Setting up tcl-expect:amd64 (5.45.4-3) ... 209s Setting up libevent-2.1-7t64:amd64 (2.1.12-stable-10) ... 209s Setting up krb5-locales (1.21.3-4) ... 209s Setting up libldap-common (2.6.9+dfsg-1~exp2ubuntu1) ... 209s Installing new version of config file /etc/ldap/ldap.conf ... 209s Setting up libjose0:amd64 (14-1) ... 209s Setting up libwbclient0:amd64 (2:4.20.4+dfsg-1ubuntu5) ... 209s Setting up libkrb5support0:amd64 (1.21.3-4) ... 209s Setting up libtalloc2:amd64 (2.4.2-2build1) ... 209s Setting up libpath-utils1t64:amd64 (0.6.2-3) ... 209s Setting up libavahi-common-data:amd64 (0.8-14ubuntu1) ... 209s Setting up libcares2:amd64 (1.34.4-2.1) ... 209s Setting up libdhash1t64:amd64 (0.6.2-3) ... 209s Setting up libk5crypto3:amd64 (1.21.3-4) ... 209s Setting up libltdl7:amd64 (2.5.4-2) ... 209s Setting up libcrack2:amd64 (2.9.6-5.2) ... 209s Setting up libodbc2:amd64 (2.3.12-2ubuntu1) ... 209s Setting up libkrb5-3:amd64 (1.21.3-4) ... 209s Setting up libnss-sudo (1.9.15p5-3ubuntu5) ... 209s Setting up libsss-nss-idmap0 (2.10.1-2ubuntu1) ... 209s Setting up libini-config5t64:amd64 (0.6.2-3) ... 209s Setting up libpython3.13-stdlib:amd64 (3.13.1-3) ... 209s Setting up libldap2:amd64 (2.6.9+dfsg-1~exp2ubuntu1) ... 209s Setting up libtevent0t64:amd64 (0.16.1-3) ... 209s Setting up python3.13-gdbm (3.13.1-3) ... 209s Setting up libpython3-stdlib:amd64 (3.13.1-1~exp2) ... 209s Setting up libnss-sss:amd64 (2.10.1-2ubuntu1) ... 209s Setting up slapd (2.6.9+dfsg-1~exp2ubuntu1) ... 210s [sss_cache] [sss_tool_confdb_init] (0x0010): Can't access '/var/lib/sss/db/config.ldb', probably SSSD isn't configured 210s Can't find configuration db, was SSSD configured and run? 210s [sss_cache] [sss_tool_confdb_init] (0x0010): Can't access '/var/lib/sss/db/config.ldb', probably SSSD isn't configured 210s Can't find configuration db, was SSSD configured and run? 210s Creating new user openldap... [sss_cache] [sss_tool_confdb_init] (0x0010): Can't access '/var/lib/sss/db/config.ldb', probably SSSD isn't configured 210s Can't find configuration db, was SSSD configured and run? 210s [sss_cache] [sss_tool_confdb_init] (0x0010): Can't access '/var/lib/sss/db/config.ldb', probably SSSD isn't configured 210s Can't find configuration db, was SSSD configured and run? 210s [sss_cache] [sss_tool_confdb_init] (0x0010): Can't access '/var/lib/sss/db/config.ldb', probably SSSD isn't configured 210s Can't find configuration db, was SSSD configured and run? 210s [sss_cache] [sss_tool_confdb_init] (0x0010): Can't access '/var/lib/sss/db/config.ldb', probably SSSD isn't configured 210s Can't find configuration db, was SSSD configured and run? 210s done. 210s Creating initial configuration... done. 210s Creating LDAP directory... done. 210s invoke-rc.d: policy-rc.d denied execution of start. 210s Created symlink '/etc/systemd/system/multi-user.target.wants/slapd.service' → '/usr/lib/systemd/system/slapd.service'. 210s /usr/sbin/policy-rc.d returned 101, not running 'start slapd.service' 210s Setting up libnfsidmap1:amd64 (1:2.6.4-4ubuntu1) ... 210s Setting up libsss-sudo (2.10.1-2ubuntu1) ... 210s Setting up python3.13 (3.13.1-3) ... 211s Setting up libsss-nss-idmap-dev (2.10.1-2ubuntu1) ... 211s Setting up expect (5.45.4-3) ... 211s Setting up libavahi-common3:amd64 (0.8-14ubuntu1) ... 211s Setting up python3 (3.13.1-1~exp2) ... 211s /usr/bin/py3clean:101: DeprecationWarning: glob.glob1 is deprecated and will be removed in Python 3.15. Use glob.glob and pass a directory to its root_dir argument instead. 211s for fn in glob1(directory, "%s.*" % fname): 211s Setting up ldap-utils (2.6.9+dfsg-1~exp2ubuntu1) ... 211s Setting up libsss-certmap0 (2.10.1-2ubuntu1) ... 211s Setting up libpwquality1:amd64 (1.4.5-3build2) ... 211s Setting up libgssapi-krb5-2:amd64 (1.21.3-4) ... 211s Setting up python3-libsss-nss-idmap (2.10.1-2ubuntu1) ... 211s Setting up python3-libipa-hbac (2.10.1-2ubuntu1) ... 211s Setting up libldb2:amd64 (2:2.9.1+samba4.20.4+dfsg-1ubuntu5) ... 211s Setting up libavahi-client3:amd64 (0.8-14ubuntu1) ... 211s Setting up libpam-pwquality:amd64 (1.4.5-3build2) ... 211s Setting up samba-libs:amd64 (2:4.20.4+dfsg-1ubuntu5) ... 211s Setting up libsss-certmap-dev (2.10.1-2ubuntu1) ... 211s Setting up python3-sss (2.10.1-2ubuntu1) ... 212s Setting up libsmbclient0:amd64 (2:4.20.4+dfsg-1ubuntu5) ... 212s Setting up libpam-sss:amd64 (2.10.1-2ubuntu1) ... 212s Setting up sssd-common (2.10.1-2ubuntu1) ... 212s Creating SSSD system user & group... 212s [sss_cache] [sss_tool_confdb_init] (0x0010): Can't access '/var/lib/sss/db/config.ldb', probably SSSD isn't configured 212s Can't find configuration db, was SSSD configured and run? 212s [sss_cache] [sss_tool_confdb_init] (0x0010): Can't access '/var/lib/sss/db/config.ldb', probably SSSD isn't configured 212s Can't find configuration db, was SSSD configured and run? 212s [sss_cache] [sss_tool_confdb_init] (0x0010): Can't access '/var/lib/sss/db/config.ldb', probably SSSD isn't configured 212s Can't find configuration db, was SSSD configured and run? 212s [sss_cache] [sss_tool_confdb_init] (0x0010): Can't access '/var/lib/sss/db/config.ldb', probably SSSD isn't configured 212s Can't find configuration db, was SSSD configured and run? 212s [sss_cache] [sss_tool_confdb_init] (0x0010): Can't access '/var/lib/sss/db/config.ldb', probably SSSD isn't configured 212s Can't find configuration db, was SSSD configured and run? 212s [sss_cache] [sss_tool_confdb_init] (0x0010): Can't access '/var/lib/sss/db/config.ldb', probably SSSD isn't configured 212s Can't find configuration db, was SSSD configured and run? 212s warn: The home directory `/var/lib/sss' already exists. Not touching this directory. 212s warn: Warning: The home directory `/var/lib/sss' does not belong to the user you are currently creating. 212s Warning: found usr.sbin.sssd in /etc/apparmor.d/force-complain, forcing complain mode 212s Warning from /etc/apparmor.d/usr.sbin.sssd (/etc/apparmor.d/usr.sbin.sssd line 63): Caching disabled for: 'usr.sbin.sssd' due to force complain 212s invoke-rc.d: policy-rc.d denied execution of start. 212s Created symlink '/etc/systemd/system/sssd.service.wants/sssd-autofs.socket' → '/usr/lib/systemd/system/sssd-autofs.socket'. 212s Created symlink '/etc/systemd/system/sssd.service.wants/sssd-nss.socket' → '/usr/lib/systemd/system/sssd-nss.socket'. 213s Created symlink '/etc/systemd/system/sssd.service.wants/sssd-pam.socket' → '/usr/lib/systemd/system/sssd-pam.socket'. 213s Created symlink '/etc/systemd/system/sssd.service.wants/sssd-ssh.socket' → '/usr/lib/systemd/system/sssd-ssh.socket'. 213s Created symlink '/etc/systemd/system/sssd.service.wants/sssd-sudo.socket' → '/usr/lib/systemd/system/sssd-sudo.socket'. 213s Created symlink '/etc/systemd/system/multi-user.target.wants/sssd.service' → '/usr/lib/systemd/system/sssd.service'. 213s /usr/sbin/policy-rc.d returned 101, not running 'start sssd-autofs.service sssd-autofs.socket sssd-nss.service sssd-nss.socket sssd-pam.service sssd-pam.socket sssd-ssh.service sssd-ssh.socket sssd-sudo.service sssd-sudo.socket sssd.service' 213s Setting up sssd-proxy (2.10.1-2ubuntu1) ... 213s Setting up sssd-kcm (2.10.1-2ubuntu1) ... 214s Created symlink '/etc/systemd/system/sockets.target.wants/sssd-kcm.socket' → '/usr/lib/systemd/system/sssd-kcm.socket'. 214s /usr/sbin/policy-rc.d returned 101, not running 'start sssd-kcm.service sssd-kcm.socket' 214s Setting up sssd-dbus (2.10.1-2ubuntu1) ... 214s /usr/sbin/policy-rc.d returned 101, not running 'start sssd-ifp.service' 214s Setting up sssd-ad-common (2.10.1-2ubuntu1) ... 214s Created symlink '/etc/systemd/system/sssd.service.wants/sssd-pac.socket' → '/usr/lib/systemd/system/sssd-pac.socket'. 215s /usr/sbin/policy-rc.d returned 101, not running 'start sssd-pac.service sssd-pac.socket' 215s Setting up sssd-krb5-common (2.10.1-2ubuntu1) ... 215s Setting up sssd-krb5 (2.10.1-2ubuntu1) ... 215s Setting up sssd-ldap (2.10.1-2ubuntu1) ... 215s Setting up sssd-ad (2.10.1-2ubuntu1) ... 215s Setting up sssd-tools (2.10.1-2ubuntu1) ... 215s Setting up sssd-ipa (2.10.1-2ubuntu1) ... 215s Setting up sssd (2.10.1-2ubuntu1) ... 215s Setting up libverto1t64:amd64 (0.3.1-1.2ubuntu3) ... 215s Setting up libkrad0:amd64 (1.21.3-4) ... 215s Setting up libverto-libevent1t64:amd64 (0.3.1-1.2ubuntu3) ... 215s Setting up sssd-passkey (2.10.1-2ubuntu1) ... 215s Setting up sssd-idp (2.10.1-2ubuntu1) ... 215s Processing triggers for libc-bin (2.40-4ubuntu1) ... 215s Processing triggers for ufw (0.36.2-8) ... 215s Processing triggers for systemd (257-2ubuntu1) ... 215s Processing triggers for man-db (2.13.0-1) ... 216s Processing triggers for dbus (1.14.10-4ubuntu5) ... 217s 217s Running kernel seems to be up-to-date. 217s 217s Restarting services... 217s systemctl restart ssh.service 217s 217s No containers need to be restarted. 217s 217s User sessions running outdated binaries: 217s ubuntu @ session #3: sshd-session[946] 217s 217s No VM guests are running outdated hypervisor (qemu) binaries on this host. 224s autopkgtest [18:49:46]: test ldap-user-group-ldap-auth: [----------------------- 224s + . debian/tests/util 224s + . debian/tests/common-tests 224s + trap cleanup EXIT 224s + mydomain=example.com 224s + myhostname=ldap.example.com 224s + mysuffix=dc=example,dc=com 224s + admin_dn=cn=admin,dc=example,dc=com 224s + admin_pw=secret 224s + ldap_user=testuser1 224s + ldap_user_pw=testuser1secret 224s + ldap_group=ldapusers 224s + adjust_hostname ldap.example.com 224s + local myhostname=ldap.example.com 224s + echo ldap.example.com 224s + hostname ldap.example.com 224s + grep -qE ldap.example.com /etc/hosts 224s + echo 127.0.1.10 ldap.example.com 224s + reconfigure_slapd 224s + debconf-set-selections 224s + rm -rf /var/backups/*slapd* /var/backups/unknown*ldapdb 224s + dpkg-reconfigure -fnoninteractive -pcritical slapd 224s invoke-rc.d: policy-rc.d denied execution of stop. 224s Backing up /etc/ldap/slapd.d in /var/backups/slapd-2.6.9+dfsg-1~exp2ubuntu1... done. 224s Moving old database directory to /var/backups: 224s - directory unknown... done. 224s Creating initial configuration... done. 224s Creating LDAP directory... done. 224s invoke-rc.d: policy-rc.d denied execution of start. 225s /usr/sbin/policy-rc.d returned 101, not running 'restart slapd.service' 225s + generate_certs ldap.example.com 225s + local cn=ldap.example.com 225s + local cert=/etc/ldap/server.pem 225s + local key=/etc/ldap/server.key 225s + local cnf=/etc/ldap/openssl.cnf 225s + cat 225s + openssl req -new -x509 -nodes -out /etc/ldap/server.pem -keyout /etc/ldap/server.key -config /etc/ldap/openssl.cnf 225s .....+..+..........+...+++++++++++++++++++++++++++++++++++++++*...+...+..+++++++++++++++++++++++++++++++++++++++*..+....+......+...+.....+....+...+...+...........+.+........+......+...............+....+..+.........++++++ 225s .+++++++++++++++++++++++++++++++++++++++*...+.+...+...............+..+...............+...+............+...+++++++++++++++++++++++++++++++++++++++*...+...+.......+..+.........+.+...+........+...............+......................+........+....+.....+.+.........+.....+...+......+............+....+...+...+.....+## Something failed, gathering logs 225s 225s ## sssd 225s 225s ## journalctl 225s ...+................+...+......+..++++++ 225s ----- 225s + chmod 0640 /etc/ldap/server.key 225s + chgrp openldap /etc/ldap/server.key 225s + [ ! -f /etc/ldap/server.pem ] 225s + [ ! -f /etc/ldap/server.key ] 225s + enable_ldap_ssl 225s + cat 225s + cat 225s + ldapmodify -H ldapi:/// -Y EXTERNAL -Q 225s ldap_sasl_interactive_bind: Can't contact LDAP server (-1) 225s + cleanup 225s + result=255 225s + set +e 225s + [ 255 -ne 0 ] 225s + echo ## Something failed, gathering logs 225s + echo 225s + gather_logs 225s + echo ## sssd 225s + tail -n 200 /var/log/sssd/*.log 225s tail: cannot open '/var/log/sssd/*.log' for reading: No such file or directory 225s + echo 225s + echo ## journalctl 225s + journalctl -b --lines 200 225s Jan 18 18:49:23 autopkgtest sudo[2002]: ubuntu : PWD=/home/ubuntu ; USER=root ; COMMAND=/var/tmp/autopkgtest-run-wrapper env DEBIAN_FRONTEND=noninteractive APT_LISTBUGS_FRONTEND=none APT_LISTCHANGES_FRONTEND=none /bin/sh -ec '"$@" 3>&2 2>&1' run_apt_command /usr/bin/eatmydata apt-get --quiet --assume-yes -o=APT::Status-Fd=3 -o=APT::Install-Recommends=false -o=Dpkg::Options::=--force-confnew -o=Debug::pkgProblemResolver=true satisfy 'sssd, sssd-common, sssd-ad, sssd-ad-common, sssd-dbus, sssd-idp, sssd-ipa, sssd-kcm, sssd-krb5, sssd-krb5-common, sssd-ldap, sssd-passkey, sssd-proxy, sssd-tools, libnss-sss, libpam-sss, libipa-hbac0t64, libipa-hbac-dev, libsss-certmap0, libsss-certmap-dev, libsss-idmap0, libsss-idmap-dev, libsss-nss-idmap0, libsss-nss-idmap-dev, libsss-sudo, python3-libipa-hbac, python3-libsss-nss-idmap, python3-sss, slapd, ldap-utils, openssl, expect, lsb-release, openssh-server' 225s Jan 18 18:49:23 autopkgtest sudo[2002]: pam_unix(sudo:session): session opened for user root(uid=0) by ubuntu(uid=1000) 225s Jan 18 18:49:23 autopkgtest sudo[2002]: pam_unix(sudo:session): session closed for user root 225s Jan 18 18:49:24 autopkgtest sudo[2019]: ubuntu : PWD=/home/ubuntu ; USER=root ; COMMAND=/var/tmp/autopkgtest-run-wrapper rm /etc/apt/preferences.d/autopkgtest-plucky-proposed.pref 225s Jan 18 18:49:24 autopkgtest sudo[2019]: pam_unix(sudo:session): session opened for user root(uid=0) by ubuntu(uid=1000) 225s Jan 18 18:49:24 autopkgtest sudo[2019]: pam_unix(sudo:session): session closed for user root 225s Jan 18 18:49:24 autopkgtest sudo[2029]: ubuntu : PWD=/home/ubuntu ; USER=root ; COMMAND=/var/tmp/autopkgtest-run-wrapper env DEBIAN_FRONTEND=noninteractive APT_LISTBUGS_FRONTEND=none APT_LISTCHANGES_FRONTEND=none /bin/sh -ec '"$@" 3>&2 2>&1' run_apt_command /usr/bin/eatmydata apt-get --quiet --assume-yes -o=APT::Status-Fd=3 -o=APT::Install-Recommends=false -o=Dpkg::Options::=--force-confnew -o=Debug::pkgProblemResolver=true satisfy 'sssd, sssd-common, sssd-ad, sssd-ad-common, sssd-dbus, sssd-idp, sssd-ipa, sssd-kcm, sssd-krb5, sssd-krb5-common, sssd-ldap, sssd-passkey, sssd-proxy, sssd-tools, libnss-sss, libpam-sss, libipa-hbac0t64, libipa-hbac-dev, libsss-certmap0, libsss-certmap-dev, libsss-idmap0, libsss-idmap-dev, libsss-nss-idmap0, libsss-nss-idmap-dev, libsss-sudo, python3-libipa-hbac, python3-libsss-nss-idmap, python3-sss, slapd, ldap-utils, openssl, expect, lsb-release, openssh-server' 225s Jan 18 18:49:24 autopkgtest sudo[2029]: pam_unix(sudo:session): session opened for user root(uid=0) by ubuntu(uid=1000) 225s Jan 18 18:49:31 autopkgtest dbus-daemon[691]: Unknown group "power" in message bus configuration file 225s Jan 18 18:49:31 autopkgtest dbus-daemon[691]: [system] Reloaded configuration 225s Jan 18 18:49:31 autopkgtest dbus-daemon[691]: Unknown group "power" in message bus configuration file 225s Jan 18 18:49:31 autopkgtest dbus-daemon[691]: [system] Reloaded configuration 225s Jan 18 18:49:31 autopkgtest dbus-daemon[691]: Unknown group "power" in message bus configuration file 225s Jan 18 18:49:31 autopkgtest dbus-daemon[691]: [system] Reloaded configuration 225s Jan 18 18:49:31 autopkgtest addgroup[2920]: Selecting GID from range 100 to 999 ... 225s Jan 18 18:49:31 autopkgtest addgroup[2920]: Adding group `openldap' (GID 112) ... 225s Jan 18 18:49:31 autopkgtest groupadd[2923]: group added to /etc/group: name=openldap, GID=112 225s Jan 18 18:49:31 autopkgtest groupadd[2923]: group added to /etc/gshadow: name=openldap 225s Jan 18 18:49:31 autopkgtest groupadd[2923]: new group: name=openldap, GID=112 225s Jan 18 18:49:32 autopkgtest adduser[2930]: Selecting UID from range 100 to 999 ... 225s Jan 18 18:49:32 autopkgtest adduser[2930]: Adding system user `openldap' (UID 110) ... 225s Jan 18 18:49:32 autopkgtest adduser[2930]: Adding new user `openldap' (UID 110) with group `openldap' ... 225s Jan 18 18:49:32 autopkgtest useradd[2934]: new user: name=openldap, UID=110, GID=112, home=/var/lib/ldap, shell=/bin/false, from=none 225s Jan 18 18:49:32 autopkgtest chfn[2941]: changed user 'openldap' information 225s Jan 18 18:49:32 autopkgtest adduser[2930]: Creating home directory `/var/lib/ldap' ... 225s Jan 18 18:49:32 autopkgtest systemd[1]: Reload requested from client PID 2990 ('systemctl') (unit session-3.scope)... 225s Jan 18 18:49:32 autopkgtest systemd[1]: Reloading... 225s Jan 18 18:49:32 autopkgtest systemd[1]: Reloading finished in 164 ms. 225s Jan 18 18:49:32 autopkgtest systemd[1]: Reload requested from client PID 3045 ('systemctl') (unit session-3.scope)... 225s Jan 18 18:49:32 autopkgtest systemd[1]: Reloading... 225s Jan 18 18:49:32 autopkgtest systemd[1]: Reloading finished in 163 ms. 225s Jan 18 18:49:34 autopkgtest adduser[3147]: The home dir /var/lib/sss you specified already exists. 225s Jan 18 18:49:34 autopkgtest adduser[3147]: Selecting UID from range 100 to 999 ... 225s Jan 18 18:49:34 autopkgtest adduser[3147]: Selecting GID from range 100 to 999 ... 225s Jan 18 18:49:34 autopkgtest adduser[3147]: Adding system user `sssd' (UID 111) ... 225s Jan 18 18:49:34 autopkgtest adduser[3147]: Adding new group `sssd' (GID 113) ... 225s Jan 18 18:49:34 autopkgtest groupadd[3153]: group added to /etc/group: name=sssd, GID=113 225s Jan 18 18:49:34 autopkgtest groupadd[3153]: group added to /etc/gshadow: name=sssd 225s Jan 18 18:49:34 autopkgtest groupadd[3153]: new group: name=sssd, GID=113 225s Jan 18 18:49:34 autopkgtest adduser[3147]: Adding new user `sssd' (UID 111) with group `sssd' ... 225s Jan 18 18:49:34 autopkgtest useradd[3160]: new user: name=sssd, UID=111, GID=113, home=/var/lib/sss, shell=/usr/sbin/nologin, from=none 225s Jan 18 18:49:34 autopkgtest chfn[3167]: changed user 'sssd' information 225s Jan 18 18:49:34 autopkgtest adduser[3147]: The home directory `/var/lib/sss' already exists. Not touching this directory. 225s Jan 18 18:49:34 autopkgtest adduser[3147]: Warning: The home directory `/var/lib/sss' does not belong to the user you are currently creating. 225s Jan 18 18:49:34 autopkgtest kernel: audit: type=1400 audit(1737226174.303:122): apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/sbin/sssd" pid=3194 comm="apparmor_parser" 225s Jan 18 18:49:34 autopkgtest systemd[1]: Reload requested from client PID 3196 ('systemctl') (unit session-3.scope)... 225s Jan 18 18:49:34 autopkgtest systemd[1]: Reloading... 225s Jan 18 18:49:34 autopkgtest systemd[1]: Reloading finished in 178 ms. 225s Jan 18 18:49:35 autopkgtest systemd[1]: Reload requested from client PID 3291 ('systemctl') (unit session-3.scope)... 225s Jan 18 18:49:35 autopkgtest systemd[1]: Reloading... 225s Jan 18 18:49:35 autopkgtest systemd[1]: Reloading finished in 164 ms. 225s Jan 18 18:49:36 autopkgtest systemd[1]: Reload requested from client PID 3346 ('systemctl') (unit session-3.scope)... 225s Jan 18 18:49:36 autopkgtest systemd[1]: Reloading... 225s Jan 18 18:49:36 autopkgtest systemd[1]: Reloading finished in 171 ms. 225s Jan 18 18:49:36 autopkgtest systemd[1]: Reload requested from client PID 3394 ('systemctl') (unit session-3.scope)... 225s Jan 18 18:49:36 autopkgtest systemd[1]: Reloading... 225s Jan 18 18:49:36 autopkgtest systemd[1]: Reloading finished in 172 ms. 225s Jan 18 18:49:36 autopkgtest systemd[1]: Reload requested from client PID 3447 ('systemctl') (unit session-3.scope)... 225s Jan 18 18:49:36 autopkgtest systemd[1]: Reloading... 225s Jan 18 18:49:36 autopkgtest systemd[1]: Reloading finished in 177 ms. 225s Jan 18 18:49:37 autopkgtest systemd[1]: Starting fwupd-refresh.service - Refresh fwupd metadata and update motd... 225s Jan 18 18:49:37 autopkgtest dbus-daemon[691]: [system] Activating via systemd: service name='org.freedesktop.fwupd' unit='fwupd.service' requested by ':1.16' (uid=990 pid=3489 comm="/usr/bin/fwupdmgr refresh" label="unconfined") 225s Jan 18 18:49:37 autopkgtest systemd[1]: Starting fwupd.service - Firmware update daemon... 225s Jan 18 18:49:37 autopkgtest systemd[1]: Stopping systemd-binfmt.service - Set Up Additional Binary Formats... 225s Jan 18 18:49:37 autopkgtest systemd[1]: systemd-binfmt.service: Deactivated successfully. 225s Jan 18 18:49:37 autopkgtest systemd[1]: Stopped systemd-binfmt.service - Set Up Additional Binary Formats. 225s Jan 18 18:49:37 autopkgtest systemd[1]: Starting systemd-binfmt.service - Set Up Additional Binary Formats... 225s Jan 18 18:49:37 autopkgtest systemd[1]: Finished systemd-binfmt.service - Set Up Additional Binary Formats. 225s Jan 18 18:49:37 autopkgtest dbus-daemon[691]: [system] Activating via systemd: service name='org.freedesktop.UPower' unit='upower.service' requested by ':1.17' (uid=0 pid=3510 comm="/usr/libexec/fwupd/fwupd" label="unconfined") 225s Jan 18 18:49:37 autopkgtest systemd[1]: Starting upower.service - Daemon for power management... 225s Jan 18 18:49:37 autopkgtest dbus-daemon[691]: [system] Successfully activated service 'org.freedesktop.UPower' 225s Jan 18 18:49:37 autopkgtest systemd[1]: Started upower.service - Daemon for power management. 225s Jan 18 18:49:37 autopkgtest fwupd[3510]: 18:49:37.730 FuMain Daemon ready for requests (locale C.UTF-8) 225s Jan 18 18:49:37 autopkgtest dbus-daemon[691]: [system] Successfully activated service 'org.freedesktop.fwupd' 225s Jan 18 18:49:37 autopkgtest systemd[1]: Started fwupd.service - Firmware update daemon. 225s Jan 18 18:49:37 autopkgtest fwupdmgr[3489]: Updating lvfs 225s Jan 18 18:49:37 autopkgtest systemd[1]: fwupd-refresh.service: Main process exited, code=exited, status=1/FAILURE 225s Jan 18 18:49:37 autopkgtest systemd[1]: fwupd-refresh.service: Failed with result 'exit-code'. 225s Jan 18 18:49:37 autopkgtest systemd[1]: Failed to start fwupd-refresh.service - Refresh fwupd metadata and update motd. 225s Jan 18 18:49:38 autopkgtest dbus-daemon[691]: Unknown group "power" in message bus configuration file 225s Jan 18 18:49:38 autopkgtest dbus-daemon[691]: [system] Reloaded configuration 225s Jan 18 18:49:39 autopkgtest dbus-daemon[691]: [system] Activating via systemd: service name='org.freedesktop.PackageKit' unit='packagekit.service' requested by ':1.20' (uid=0 pid=3548 comm="/usr/bin/gdbus call --system --dest org.freedeskto" label="unconfined") 225s Jan 18 18:49:39 autopkgtest systemd[1]: Starting packagekit.service - PackageKit Daemon... 225s Jan 18 18:49:39 autopkgtest PackageKit[3552]: daemon start 225s Jan 18 18:49:39 autopkgtest dbus-daemon[691]: [system] Successfully activated service 'org.freedesktop.PackageKit' 225s Jan 18 18:49:39 autopkgtest systemd[1]: Started packagekit.service - PackageKit Daemon. 225s Jan 18 18:49:39 autopkgtest systemd[1]: Stopping ssh.service - OpenBSD Secure Shell server... 225s Jan 18 18:49:39 autopkgtest sshd[791]: Received signal 15; terminating. 225s Jan 18 18:49:39 autopkgtest systemd[1]: ssh.service: Deactivated successfully. 225s Jan 18 18:49:39 autopkgtest systemd[1]: Stopped ssh.service - OpenBSD Secure Shell server. 225s Jan 18 18:49:39 autopkgtest systemd[1]: Starting ssh.service - OpenBSD Secure Shell server... 225s Jan 18 18:49:39 autopkgtest sshd[3577]: Server listening on 0.0.0.0 port 22. 225s Jan 18 18:49:39 autopkgtest sshd[3577]: Server listening on :: port 22. 225s Jan 18 18:49:39 autopkgtest systemd[1]: Started ssh.service - OpenBSD Secure Shell server. 225s Jan 18 18:49:40 autopkgtest sudo[2029]: pam_unix(sudo:session): session closed for user root 225s Jan 18 18:49:40 autopkgtest sudo[3616]: ubuntu : PWD=/home/ubuntu ; USER=root ; COMMAND=/var/tmp/autopkgtest-run-wrapper dpkg-query --show -f ${Status} sssd 225s Jan 18 18:49:40 autopkgtest sudo[3616]: pam_unix(sudo:session): session opened for user root(uid=0) by ubuntu(uid=1000) 225s Jan 18 18:49:40 autopkgtest sudo[3616]: pam_unix(sudo:session): session closed for user root 225s Jan 18 18:49:40 autopkgtest sudo[3626]: ubuntu : PWD=/home/ubuntu ; USER=root ; COMMAND=/var/tmp/autopkgtest-run-wrapper dpkg-query --show -f ${Status} sssd-common 225s Jan 18 18:49:40 autopkgtest sudo[3626]: pam_unix(sudo:session): session opened for user root(uid=0) by ubuntu(uid=1000) 225s Jan 18 18:49:40 autopkgtest sudo[3626]: pam_unix(sudo:session): session closed for user root 225s Jan 18 18:49:41 autopkgtest sudo[3636]: ubuntu : PWD=/home/ubuntu ; USER=root ; COMMAND=/var/tmp/autopkgtest-run-wrapper dpkg-query --show -f ${Status} sssd-ad 225s Jan 18 18:49:41 autopkgtest sudo[3636]: pam_unix(sudo:session): session opened for user root(uid=0) by ubuntu(uid=1000) 225s Jan 18 18:49:41 autopkgtest sudo[3636]: pam_unix(sudo:session): session closed for user root 225s Jan 18 18:49:41 autopkgtest sudo[3646]: ubuntu : PWD=/home/ubuntu ; USER=root ; COMMAND=/var/tmp/autopkgtest-run-wrapper dpkg-query --show -f ${Status} sssd-ad-common 225s Jan 18 18:49:41 autopkgtest sudo[3646]: pam_unix(sudo:session): session opened for user root(uid=0) by ubuntu(uid=1000) 225s Jan 18 18:49:41 autopkgtest sudo[3646]: pam_unix(sudo:session): session closed for user root 225s Jan 18 18:49:41 autopkgtest sudo[3656]: ubuntu : PWD=/home/ubuntu ; USER=root ; COMMAND=/var/tmp/autopkgtest-run-wrapper dpkg-query --show -f ${Status} sssd-dbus 225s Jan 18 18:49:41 autopkgtest sudo[3656]: pam_unix(sudo:session): session opened for user root(uid=0) by ubuntu(uid=1000) 225s Jan 18 18:49:41 autopkgtest sudo[3656]: pam_unix(sudo:session): session closed for user root 225s Jan 18 18:49:41 autopkgtest sudo[3666]: ubuntu : PWD=/home/ubuntu ; USER=root ; COMMAND=/var/tmp/autopkgtest-run-wrapper dpkg-query --show -f ${Status} sssd-idp 225s Jan 18 18:49:41 autopkgtest sudo[3666]: pam_unix(sudo:session): session opened for user root(uid=0) by ubuntu(uid=1000) 225s Jan 18 18:49:41 autopkgtest sudo[3666]: pam_unix(sudo:session): session closed for user root 225s Jan 18 18:49:41 autopkgtest sudo[3676]: ubuntu : PWD=/home/ubuntu ; USER=root ; COMMAND=/var/tmp/autopkgtest-run-wrapper dpkg-query --show -f ${Status} sssd-ipa 225s Jan 18 18:49:41 autopkgtest sudo[3676]: pam_unix(sudo:session): session opened for user root(uid=0) by ubuntu(uid=1000) 225s Jan 18 18:49:41 autopkgtest sudo[3676]: pam_unix(sudo:session): session closed for user root 225s Jan 18 18:49:41 autopkgtest sudo[3686]: ubuntu : PWD=/home/ubuntu ; USER=root ; COMMAND=/var/tmp/autopkgtest-run-wrapper dpkg-query --show -f ${Status} sssd-kcm 225s Jan 18 18:49:41 autopkgtest sudo[3686]: pam_unix(sudo:session): session opened for user root(uid=0) by ubuntu(uid=1000) 225s Jan 18 18:49:41 autopkgtest sudo[3686]: pam_unix(sudo:session): session closed for user root 225s Jan 18 18:49:42 autopkgtest sudo[3696]: ubuntu : PWD=/home/ubuntu ; USER=root ; COMMAND=/var/tmp/autopkgtest-run-wrapper dpkg-query --show -f ${Status} sssd-krb5 225s Jan 18 18:49:42 autopkgtest sudo[3696]: pam_unix(sudo:session): session opened for user root(uid=0) by ubuntu(uid=1000) 225s Jan 18 18:49:42 autopkgtest sudo[3696]: pam_unix(sudo:session): session closed for user root 225s Jan 18 18:49:42 autopkgtest sudo[3706]: ubuntu : PWD=/home/ubuntu ; USER=root ; COMMAND=/var/tmp/autopkgtest-run-wrapper dpkg-query --show -f ${Status} sssd-krb5-common 225s Jan 18 18:49:42 autopkgtest sudo[3706]: pam_unix(sudo:session): session opened for user root(uid=0) by ubuntu(uid=1000) 225s Jan 18 18:49:42 autopkgtest sudo[3706]: pam_unix(sudo:session): session closed for user root 225s Jan 18 18:49:42 autopkgtest sudo[3716]: ubuntu : PWD=/home/ubuntu ; USER=root ; COMMAND=/var/tmp/autopkgtest-run-wrapper dpkg-query --show -f ${Status} sssd-ldap 225s Jan 18 18:49:42 autopkgtest sudo[3716]: pam_unix(sudo:session): session opened for user root(uid=0) by ubuntu(uid=1000) 225s Jan 18 18:49:42 autopkgtest sudo[3716]: pam_unix(sudo:session): session closed for user root 225s Jan 18 18:49:42 autopkgtest sudo[3727]: ubuntu : PWD=/home/ubuntu ; USER=root ; COMMAND=/var/tmp/autopkgtest-run-wrapper dpkg-query --show -f ${Status} sssd-passkey 225s Jan 18 18:49:42 autopkgtest sudo[3727]: pam_unix(sudo:session): session opened for user root(uid=0) by ubuntu(uid=1000) 225s Jan 18 18:49:42 autopkgtest sudo[3727]: pam_unix(sudo:session): session closed for user root 225s Jan 18 18:49:42 autopkgtest sudo[3737]: ubuntu : PWD=/home/ubuntu ; USER=root ; COMMAND=/var/tmp/autopkgtest-run-wrapper dpkg-query --show -f ${Status} sssd-proxy 225s Jan 18 18:49:42 autopkgtest sudo[3737]: pam_unix(sudo:session): session opened for user root(uid=0) by ubuntu(uid=1000) 225s Jan 18 18:49:42 autopkgtest sudo[3737]: pam_unix(sudo:session): session closed for user root 225s Jan 18 18:49:43 autopkgtest sudo[3747]: ubuntu : PWD=/home/ubuntu ; USER=root ; COMMAND=/var/tmp/autopkgtest-run-wrapper dpkg-query --show -f ${Status} sssd-tools 225s Jan 18 18:49:43 autopkgtest sudo[3747]: pam_unix(sudo:session): session opened for user root(uid=0) by ubuntu(uid=1000) 225s Jan 18 18:49:43 autopkgtest sudo[3747]: pam_unix(sudo:session): session closed for user root 225s Jan 18 18:49:43 autopkgtest sudo[3757]: ubuntu : PWD=/home/ubuntu ; USER=root ; COMMAND=/var/tmp/autopkgtest-run-wrapper dpkg-query --show -f ${Status} libnss-sss 225s Jan 18 18:49:43 autopkgtest sudo[3757]: pam_unix(sudo:session): session opened for user root(uid=0) by ubuntu(uid=1000) 225s Jan 18 18:49:43 autopkgtest sudo[3757]: pam_unix(sudo:session): session closed for user root 225s Jan 18 18:49:43 autopkgtest sudo[3767]: ubuntu : PWD=/home/ubuntu ; USER=root ; COMMAND=/var/tmp/autopkgtest-run-wrapper dpkg-query --show -f ${Status} libpam-sss 225s Jan 18 18:49:43 autopkgtest sudo[3767]: pam_unix(sudo:session): session opened for user root(uid=0) by ubuntu(uid=1000) 225s Jan 18 18:49:43 autopkgtest sudo[3767]: pam_unix(sudo:session): session closed for user root 225s Jan 18 18:49:43 autopkgtest sudo[3777]: ubuntu : PWD=/home/ubuntu ; USER=root ; COMMAND=/var/tmp/autopkgtest-run-wrapper dpkg-query --show -f ${Status} libipa-hbac0t64 225s Jan 18 18:49:43 autopkgtest sudo[3777]: pam_unix(sudo:session): session opened for user root(uid=0) by ubuntu(uid=1000) 225s Jan 18 18:49:43 autopkgtest sudo[3777]: pam_unix(sudo:session): session closed for user root 225s Jan 18 18:49:43 autopkgtest sudo[3787]: ubuntu : PWD=/home/ubuntu ; USER=root ; COMMAND=/var/tmp/autopkgtest-run-wrapper dpkg-query --show -f ${Status} libipa-hbac-dev 225s Jan 18 18:49:43 autopkgtest sudo[3787]: pam_unix(sudo:session): session opened for user root(uid=0) by ubuntu(uid=1000) 225s Jan 18 18:49:43 autopkgtest sudo[3787]: pam_unix(sudo:session): session closed for user root 225s Jan 18 18:49:43 autopkgtest sudo[3797]: ubuntu : PWD=/home/ubuntu ; USER=root ; COMMAND=/var/tmp/autopkgtest-run-wrapper dpkg-query --show -f ${Status} libsss-certmap0 225s Jan 18 18:49:43 autopkgtest sudo[3797]: pam_unix(sudo:session): session opened for user root(uid=0) by ubuntu(uid=1000) 225s Jan 18 18:49:43 autopkgtest sudo[3797]: pam_unix(sudo:session): session closed for user root 225s Jan 18 18:49:44 autopkgtest sudo[3807]: ubuntu : PWD=/home/ubuntu ; USER=root ; COMMAND=/var/tmp/autopkgtest-run-wrapper dpkg-query --show -f ${Status} libsss-certmap-dev 225s Jan 18 18:49:44 autopkgtest sudo[3807]: pam_unix(sudo:session): session opened for user root(uid=0) by ubuntu(uid=1000) 225s Jan 18 18:49:44 autopkgtest sudo[3807]: pam_unix(sudo:session): session closed for user root 225s Jan 18 18:49:44 autopkgtest sudo[3817]: ubuntu : PWD=/home/ubuntu ; USER=root ; COMMAND=/var/tmp/autopkgtest-run-wrapper dpkg-query --show -f ${Status} libsss-idmap0 225s Jan 18 18:49:44 autopkgtest sudo[3817]: pam_unix(sudo:session): session opened for user root(uid=0) by ubuntu(uid=1000) 225s Jan 18 18:49:44 autopkgtest sudo[3817]: pam_unix(sudo:session): session closed for user root 225s Jan 18 18:49:44 autopkgtest sudo[3827]: ubuntu : PWD=/home/ubuntu ; USER=root ; COMMAND=/var/tmp/autopkgtest-run-wrapper dpkg-query --show -f ${Status} libsss-idmap-dev 225s Jan 18 18:49:44 autopkgtest sudo[3827]: pam_unix(sudo:session): session opened for user root(uid=0) by ubuntu(uid=1000) 225s Jan 18 18:49:44 autopkgtest sudo[3827]: pam_unix(sudo:session): session closed for user root 225s Jan 18 18:49:44 autopkgtest sudo[3837]: ubuntu : PWD=/home/ubuntu ; USER=root ; COMMAND=/var/tmp/autopkgtest-run-wrapper dpkg-query --show -f ${Status} libsss-nss-idmap0 225s Jan 18 18:49:44 autopkgtest sudo[3837]: pam_unix(sudo:session): session opened for user root(uid=0) by ubuntu(uid=1000) 225s Jan 18 18:49:44 autopkgtest sudo[3837]: pam_unix(sudo:session): session closed for user root 225s Jan 18 18:49:44 autopkgtest sudo[3847]: ubuntu : PWD=/home/ubuntu ; USER=root ; COMMAND=/var/tmp/autopkgtest-run-wrapper dpkg-query --show -f ${Status} libsss-nss-idmap-dev 225s Jan 18 18:49:44 autopkgtest sudo[3847]: pam_unix(sudo:session): session opened for user root(uid=0) by ubuntu(uid=1000) 225s Jan 18 18:49:44 autopkgtest sudo[3847]: pam_unix(sudo:session): session closed for user root 225s Jan 18 18:49:44 autopkgtest sudo[3857]: ubuntu : PWD=/home/ubuntu ; USER=root ; COMMAND=/var/tmp/autopkgtest-run-wrapper dpkg-query --show -f ${Status} libsss-sudo 225s Jan 18 18:49:44 autopkgtest sudo[3857]: pam_unix(sudo:session): session opened for user root(uid=0) by ubuntu(uid=1000) 225s Jan 18 18:49:44 autopkgtest sudo[3857]: pam_unix(sudo:session): session closed for user root 225s Jan 18 18:49:45 autopkgtest sudo[3867]: ubuntu : PWD=/home/ubuntu ; USER=root ; COMMAND=/var/tmp/autopkgtest-run-wrapper dpkg-query --show -f ${Status} python3-libipa-hbac 225s Jan 18 18:49:45 autopkgtest sudo[3867]: pam_unix(sudo:session): session opened for user root(uid=0) by ubuntu(uid=1000) 225s Jan 18 18:49:45 autopkgtest sudo[3867]: pam_unix(sudo:session): session closed for user root 225s Jan 18 18:49:45 autopkgtest sudo[3877]: ubuntu : PWD=/home/ubuntu ; USER=root ; COMMAND=/var/tmp/autopkgtest-run-wrapper dpkg-query --show -f ${Status} python3-libsss-nss-idmap 225s Jan 18 18:49:45 autopkgtest sudo[3877]: pam_unix(sudo:session): session opened for user root(uid=0) by ubuntu(uid=1000) 225s Jan 18 18:49:45 autopkgtest sudo[3877]: pam_unix(sudo:session): session closed for user root 225s Jan 18 18:49:45 autopkgtest sudo[3887]: ubuntu : PWD=/home/ubuntu ; USER=root ; COMMAND=/var/tmp/autopkgtest-run-wrapper dpkg-query --show -f ${Status} python3-sss 225s Jan 18 18:49:45 autopkgtest sudo[3887]: pam_unix(sudo:session): session opened for user root(uid=0) by ubuntu(uid=1000) 225s Jan 18 18:49:45 autopkgtest sudo[3887]: pam_unix(sudo:session): session closed for user root 225s Jan 18 18:49:45 autopkgtest sudo[3897]: ubuntu : PWD=/home/ubuntu ; USER=root ; COMMAND=/var/tmp/autopkgtest-run-wrapper sh -ec 'dpkg-query --show -f \'${Package}\\t${Version}\\n\' > /tmp/autopkgtest.gKA2Xv/ldap-user-group-ldap-auth-packages.all' 225s Jan 18 18:49:45 autopkgtest sudo[3897]: pam_unix(sudo:session): session opened for user root(uid=0) by ubuntu(uid=1000) 225s Jan 18 18:49:45 autopkgtest sudo[3897]: pam_unix(sudo:session): session closed for user root 225s Jan 18 18:49:45 autopkgtest sudo[3908]: ubuntu : PWD=/home/ubuntu ; USER=root ; COMMAND=/var/tmp/autopkgtest-run-wrapper sh -ec 'cat (1094242659, -1449402) 225s [Sat Jan 18 18:48:42 2025] registered taskstats version 1 225s [Sat Jan 18 18:48:42 2025] Loading compiled-in X.509 certificates 225s [Sat Jan 18 18:48:42 2025] Loaded X.509 cert 'Build time autogenerated kernel key: 44bb7aee388ba8514143508bda37e4c74d0436e3' 225s [Sat Jan 18 18:48:42 2025] Loaded X.509 cert 'Canonical Ltd. Live Patch Signing: 14df34d1a87cf37625abec039ef2bf521249b969' 225s [Sat Jan 18 18:48:42 2025] Loaded X.509 cert 'Canonical Ltd. Kernel Module Signing: 88f752e560a1e0737e31163a466ad7b70a850c19' 225s [Sat Jan 18 18:48:42 2025] blacklist: Loading compiled-in revocation X.509 certificates 225s [Sat Jan 18 18:48:42 2025] Loaded X.509 cert 'Canonical Ltd. Secure Boot Signing: 61482aa2830d0ab2ad5af10b7250da9033ddcef0' 225s [Sat Jan 18 18:48:42 2025] Loaded X.509 cert 'Canonical Ltd. Secure Boot Signing (2017): 242ade75ac4a15e50d50c84b0d45ff3eae707a03' 225s [Sat Jan 18 18:48:42 2025] Loaded X.509 cert 'Canonical Ltd. Secure Boot Signing (ESM 2018): 365188c1d374d6b07c3c8f240f8ef722433d6a8b' 225s [Sat Jan 18 18:48:42 2025] Loaded X.509 cert 'Canonical Ltd. Secure Boot Signing (2019): c0746fd6c5da3ae827864651ad66ae47fe24b3e8' 225s [Sat Jan 18 18:48:42 2025] Loaded X.509 cert 'Canonical Ltd. Secure Boot Signing (2021 v1): a8d54bbb3825cfb94fa13c9f8a594a195c107b8d' 225s [Sat Jan 18 18:48:42 2025] Loaded X.509 cert 'Canonical Ltd. Secure Boot Signing (2021 v2): 4cf046892d6fd3c9a5b03f98d845f90851dc6a8c' 225s [Sat Jan 18 18:48:42 2025] Loaded X.509 cert 'Canonical Ltd. Secure Boot Signing (2021 v3): 100437bb6de6e469b581e61cd66bce3ef4ed53af' 225s [Sat Jan 18 18:48:42 2025] Loaded X.509 cert 'Canonical Ltd. Secure Boot Signing (Ubuntu Core 2019): c1d57b8f6b743f23ee41f4f7ee292f06eecadfb9' 225s [Sat Jan 18 18:48:42 2025] Demotion targets for Node 0: null 225s [Sat Jan 18 18:48:42 2025] Key type .fscrypt registered 225s [Sat Jan 18 18:48:42 2025] Key type fscrypt-provisioning registered 225s [Sat Jan 18 18:48:42 2025] cryptd: max_cpu_qlen set to 1000 225s [Sat Jan 18 18:48:42 2025] AES CTR mode by8 optimization enabled 225s [Sat Jan 18 18:48:42 2025] Key type encrypted registered 225s [Sat Jan 18 18:48:42 2025] AppArmor: AppArmor sha256 policy hashing enabled 225s [Sat Jan 18 18:48:42 2025] ima: No TPM chip found, activating TPM-bypass! 225s [Sat Jan 18 18:48:42 2025] Loading compiled-in module X.509 certificates 225s [Sat Jan 18 18:48:42 2025] Loaded X.509 cert 'Build time autogenerated kernel key: 44bb7aee388ba8514143508bda37e4c74d0436e3' 225s [Sat Jan 18 18:48:42 2025] ima: Allocated hash algorithm: sha256 225s [Sat Jan 18 18:48:42 2025] ima: No architecture policies found 225s [Sat Jan 18 18:48:42 2025] evm: Initialising EVM extended attributes: 225s [Sat Jan 18 18:48:42 2025] evm: security.selinux 225s [Sat Jan 18 18:48:42 2025] evm: security.SMACK64 225s [Sat Jan 18 18:48:42 2025] evm: security.SMACK64EXEC 225s [Sat Jan 18 18:48:42 2025] evm: security.SMACK64TRANSMUTE 225s [Sat Jan 18 18:48:42 2025] evm: security.SMACK64MMAP 225s [Sat Jan 18 18:48:42 2025] evm: security.apparmor 225s [Sat Jan 18 18:48:42 2025] evm: security.ima 225s [Sat Jan 18 18:48:42 2025] evm: security.capability 225s [Sat Jan 18 18:48:42 2025] evm: HMAC attrs: 0x1 225s [Sat Jan 18 18:48:42 2025] PM: Magic number: 9:20:848 225s [Sat Jan 18 18:48:42 2025] RAS: Correctable Errors collector initialized. 225s [Sat Jan 18 18:48:42 2025] clk: Disabling unused clocks 225s [Sat Jan 18 18:48:42 2025] PM: genpd: Disabling unused power domains 225s [Sat Jan 18 18:48:42 2025] Freeing unused decrypted memory: 2028K 225s [Sat Jan 18 18:48:42 2025] Freeing unused kernel image (initmem) memory: 4956K 225s [Sat Jan 18 18:48:42 2025] Write protecting the kernel read-only data: 38912k 225s [Sat Jan 18 18:48:42 2025] Freeing unused kernel image (rodata/data gap) memory: 1448K 225s [Sat Jan 18 18:48:42 2025] x86/mm: Checked W+X mappings: passed, no W+X pages found. 225s [Sat Jan 18 18:48:42 2025] Run /init as init process 225s [Sat Jan 18 18:48:42 2025] with arguments: 225s [Sat Jan 18 18:48:42 2025] /init 225s [Sat Jan 18 18:48:42 2025] with environment: 225s [Sat Jan 18 18:48:42 2025] HOME=/ 225s [Sat Jan 18 18:48:42 2025] TERM=linux 225s [Sat Jan 18 18:48:42 2025] BOOT_IMAGE=/vmlinuz-6.11.0-8-generic 225s [Sat Jan 18 18:48:42 2025] virtio_net virtio0 ens3: renamed from eth0 225s [Sat Jan 18 18:48:42 2025] input: VirtualPS/2 VMware VMMouse as /devices/platform/i8042/serio1/input/input4 225s [Sat Jan 18 18:48:42 2025] input: VirtualPS/2 VMware VMMouse as /devices/platform/i8042/serio1/input/input3 225s [Sat Jan 18 18:48:42 2025] FDC 0 is a S82078B 225s [Sat Jan 18 18:48:43 2025] raid6: avx2x4 gen() 32698 MB/s 225s [Sat Jan 18 18:48:43 2025] raid6: avx2x2 gen() 34448 MB/s 225s [Sat Jan 18 18:48:43 2025] raid6: avx2x1 gen() 28442 MB/s 225s [Sat Jan 18 18:48:43 2025] raid6: using algorithm avx2x2 gen() 34448 MB/s 225s [Sat Jan 18 18:48:43 2025] raid6: .... xor() 29983 MB/s, rmw enabled 225s [Sat Jan 18 18:48:43 2025] raid6: using avx2x2 recovery algorithm 225s [Sat Jan 18 18:48:43 2025] xor: automatically using best checksumming function avx 225s [Sat Jan 18 18:48:43 2025] async_tx: api initialized (async) 225s [Sat Jan 18 18:48:43 2025] Btrfs loaded, zoned=yes, fsverity=yes 225s [Sat Jan 18 18:48:43 2025] EXT4-fs (vda1): orphan cleanup on readonly fs 225s [Sat Jan 18 18:48:43 2025] EXT4-fs (vda1): mounted filesystem c1d91cd9-c36e-400f-a528-e35795b2f626 ro with ordered data mode. Quota mode: none. 225s [Sat Jan 18 18:48:44 2025] systemd[1]: Inserted module 'autofs4' 225s [Sat Jan 18 18:48:44 2025] systemd[1]: systemd 257-2ubuntu1 running in system mode (+PAM +AUDIT +SELINUX +APPARMOR +IMA +IPE +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS +FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBCRYPTSETUP_PLUGINS +LIBFDISK +PCRE2 +PWQUALITY +P11KIT +QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD +BPF_FRAMEWORK -BTF -XKBCOMMON -UTMP +SYSVINIT +LIBARCHIVE) 225s [Sat Jan 18 18:48:44 2025] systemd[1]: Detected virtualization kvm. 225s [Sat Jan 18 18:48:44 2025] systemd[1]: Detected architecture x86-64. 225s [Sat Jan 18 18:48:44 2025] systemd[1]: Hostname set to . 225s [Sat Jan 18 18:48:44 2025] systemd[1]: bpf-restrict-fs: BPF LSM hook not enabled in the kernel, BPF LSM not supported. 225s [Sat Jan 18 18:48:44 2025] Guest personality initialized and is inactive 225s [Sat Jan 18 18:48:44 2025] VMCI host device registered (name=vmci, major=10, minor=122) 225s [Sat Jan 18 18:48:44 2025] Initialized host personality 225s [Sat Jan 18 18:48:44 2025] NET: Registered PF_VSOCK protocol family 225s [Sat Jan 18 18:48:44 2025] systemd[1]: Queued start job for default target graphical.target. 225s [Sat Jan 18 18:48:44 2025] systemd[1]: Created slice system-autopkgtest.slice - Slice /system/autopkgtest. 225s [Sat Jan 18 18:48:44 2025] systemd[1]: Created slice system-modprobe.slice - Slice /system/modprobe. 225s [Sat Jan 18 18:48:44 2025] systemd[1]: Created slice system-serial\x2dgetty.slice - Slice /system/serial-getty. 225s [Sat Jan 18 18:48:44 2025] systemd[1]: Created slice system-systemd\x2dfsck.slice - Slice /system/systemd-fsck. 225s [Sat Jan 18 18:48:44 2025] systemd[1]: Created slice user.slice - User and Session Slice. 225s [Sat Jan 18 18:48:44 2025] systemd[1]: Started systemd-ask-password-wall.path - Forward Password Requests to Wall Directory Watch. 225s [Sat Jan 18 18:48:44 2025] systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount - Arbitrary Executable File Formats File System Automount Point. 225s [Sat Jan 18 18:48:44 2025] systemd[1]: Expecting device dev-disk-by\x2dlabel-BOOT.device - /dev/disk/by-label/BOOT... 225s [Sat Jan 18 18:48:44 2025] systemd[1]: Expecting device dev-disk-by\x2dlabel-UEFI.device - /dev/disk/by-label/UEFI... 225s [Sat Jan 18 18:48:44 2025] systemd[1]: Expecting device dev-ttyS0.device - /dev/ttyS0... 225s [Sat Jan 18 18:48:44 2025] systemd[1]: Reached target integritysetup.target - Local Integrity Protected Volumes. 225s [Sat Jan 18 18:48:44 2025] systemd[1]: Reached target slices.target - Slice Units. 225s [Sat Jan 18 18:48:44 2025] systemd[1]: Reached target swap.target - Swaps. 225s [Sat Jan 18 18:48:44 2025] systemd[1]: Reached target veritysetup.target - Local Verity Protected Volumes. 225s [Sat Jan 18 18:48:44 2025] systemd[1]: Listening on dm-event.socket - Device-mapper event daemon FIFOs. 225s [Sat Jan 18 18:48:44 2025] systemd[1]: Listening on lvm2-lvmpolld.socket - LVM2 poll daemon socket. 225s [Sat Jan 18 18:48:44 2025] systemd[1]: Listening on syslog.socket - Syslog Socket. 225s [Sat Jan 18 18:48:44 2025] systemd[1]: Listening on systemd-creds.socket - Credential Encryption/Decryption. 225s [Sat Jan 18 18:48:44 2025] systemd[1]: Listening on systemd-fsckd.socket - fsck to fsckd communication Socket. 225s [Sat Jan 18 18:48:44 2025] systemd[1]: Listening on systemd-initctl.socket - initctl Compatibility Named Pipe. 225s [Sat Jan 18 18:48:44 2025] systemd[1]: Listening on systemd-journald-dev-log.socket - Journal Socket (/dev/log). 225s [Sat Jan 18 18:48:44 2025] systemd[1]: Listening on systemd-journald.socket - Journal Sockets. 225s [Sat Jan 18 18:48:44 2025] systemd[1]: Listening on systemd-networkd.socket - Network Service Netlink Socket. 225s [Sat Jan 18 18:48:44 2025] systemd[1]: systemd-pcrextend.socket - TPM PCR Measurements was skipped because of an unmet condition check (ConditionSecurity=measured-uki). 225s [Sat Jan 18 18:48:44 2025] systemd[1]: systemd-pcrlock.socket - Make TPM PCR Policy was skipped because of an unmet condition check (ConditionSecurity=measured-uki). 225s [Sat Jan 18 18:48:44 2025] systemd[1]: Listening on systemd-udevd-control.socket - udev Control Socket. 225s [Sat Jan 18 18:48:44 2025] systemd[1]: Listening on systemd-udevd-kernel.socket - udev Kernel Socket. 225s [Sat Jan 18 18:48:44 2025] systemd[1]: Mounting dev-hugepages.mount - Huge Pages File System... 225s [Sat Jan 18 18:48:44 2025] systemd[1]: Mounting dev-mqueue.mount - POSIX Message Queue File System... 225s [Sat Jan 18 18:48:44 2025] systemd[1]: Mounting run-lock.mount - Legacy Locks Directory /run/lock... 225s [Sat Jan 18 18:48:44 2025] systemd[1]: Mounting sys-kernel-debug.mount - Kernel Debug File System... 225s [Sat Jan 18 18:48:44 2025] systemd[1]: Mounting sys-kernel-tracing.mount - Kernel Trace File System... 225s [Sat Jan 18 18:48:44 2025] systemd[1]: Mounting tmp.mount - Temporary Directory /tmp... 225s [Sat Jan 18 18:48:44 2025] systemd[1]: Starting systemd-journald.service - Journal Service... 225s [Sat Jan 18 18:48:44 2025] systemd[1]: Starting keyboard-setup.service - Set the console keyboard layout... 225s [Sat Jan 18 18:48:44 2025] systemd[1]: Starting kmod-static-nodes.service - Create List of Static Device Nodes... 225s [Sat Jan 18 18:48:44 2025] systemd[1]: Starting lvm2-monitor.service - Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling... 225s [Sat Jan 18 18:48:44 2025] systemd[1]: Starting modprobe@configfs.service - Load Kernel Module configfs... 225s [Sat Jan 18 18:48:44 2025] systemd[1]: Starting modprobe@dm_multipath.service - Load Kernel Module dm_multipath... 225s [Sat Jan 18 18:48:44 2025] systemd[1]: Starting modprobe@drm.service - Load Kernel Module drm... 225s [Sat Jan 18 18:48:44 2025] systemd-journald[320]: Collecting audit messages is disabled. 225s [Sat Jan 18 18:48:44 2025] systemd[1]: Starting modprobe@efi_pstore.service - Load Kernel Module efi_pstore... 225s [Sat Jan 18 18:48:44 2025] systemd[1]: Starting modprobe@fuse.service - Load Kernel Module fuse... 225s [Sat Jan 18 18:48:44 2025] systemd[1]: netplan-ovs-cleanup.service - OpenVSwitch configuration for cleanup was skipped because of an unmet condition check (ConditionFileIsExecutable=/usr/bin/ovs-vsctl). 225s [Sat Jan 18 18:48:44 2025] systemd[1]: systemd-fsck-root.service - File System Check on Root Device was skipped because of an unmet condition check (ConditionPathExists=!/run/initramfs/fsck-root). 225s [Sat Jan 18 18:48:44 2025] systemd[1]: systemd-hibernate-clear.service - Clear Stale Hibernate Storage Info was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/HibernateLocation-8cf2644b-4b0b-428f-9387-6d876050dc67). 225s [Sat Jan 18 18:48:44 2025] systemd[1]: Starting systemd-modules-load.service - Load Kernel Modules... 225s [Sat Jan 18 18:48:44 2025] systemd[1]: systemd-pcrmachine.service - TPM PCR Machine ID Measurement was skipped because of an unmet condition check (ConditionSecurity=measured-uki). 225s [Sat Jan 18 18:48:44 2025] systemd[1]: Starting systemd-remount-fs.service - Remount Root and Kernel File Systems... 225s [Sat Jan 18 18:48:44 2025] systemd[1]: systemd-tpm2-setup-early.service - Early TPM SRK Setup was skipped because of an unmet condition check (ConditionSecurity=measured-uki). 225s [Sat Jan 18 18:48:44 2025] systemd[1]: Starting systemd-udev-load-credentials.service - Load udev Rules from Credentials... 225s [Sat Jan 18 18:48:44 2025] systemd[1]: Starting systemd-udev-trigger.service - Coldplug All udev Devices... 225s [Sat Jan 18 18:48:44 2025] systemd[1]: Started systemd-journald.service - Journal Service. 225s [Sat Jan 18 18:48:44 2025] EXT4-fs (vda1): re-mounted c1d91cd9-c36e-400f-a528-e35795b2f626 r/w. Quota mode: none. 225s [Sat Jan 18 18:48:45 2025] systemd-journald[320]: Received client request to flush runtime journal. 225s [Sat Jan 18 18:48:45 2025] piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 225s [Sat Jan 18 18:48:45 2025] i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD 225s [Sat Jan 18 18:48:45 2025] kvm_amd: Nested Virtualization enabled 225s [Sat Jan 18 18:48:45 2025] kvm_amd: Nested Paging enabled 225s [Sat Jan 18 18:48:45 2025] qxl 0000:00:02.0: vgaarb: deactivate vga console 225s [Sat Jan 18 18:48:45 2025] Console: switching to colour dummy device 80x25 225s [Sat Jan 18 18:48:45 2025] [drm] Device Version 0.0 225s [Sat Jan 18 18:48:45 2025] [drm] Compression level 0 log level 0 225s [Sat Jan 18 18:48:45 2025] [drm] 12286 io pages at offset 0x1000000 225s [Sat Jan 18 18:48:45 2025] [drm] 16777216 byte draw area at offset 0x0 225s [Sat Jan 18 18:48:45 2025] [drm] RAM header offset: 0x3ffe000 225s [Sat Jan 18 18:48:45 2025] [drm] qxl: 16M of VRAM memory size 225s [Sat Jan 18 18:48:45 2025] [drm] qxl: 63M of IO pages memory ready (VRAM domain) 225s [Sat Jan 18 18:48:45 2025] [drm] qxl: 64M of Surface memory size 225s [Sat Jan 18 18:48:45 2025] [drm] slot 0 (main): base 0xf4000000, size 0x03ffe000 225s [Sat Jan 18 18:48:45 2025] [drm] slot 1 (surfaces): base 0xf8000000, size 0x04000000 225s [Sat Jan 18 18:48:45 2025] [drm] Initialized qxl 0.1.0 for 0000:00:02.0 on minor 0 225s [Sat Jan 18 18:48:45 2025] fbcon: qxldrmfb (fb0) is primary device 225s [Sat Jan 18 18:48:45 2025] Console: switching to colour frame buffer device 128x48 225s [Sat Jan 18 18:48:45 2025] qxl 0000:00:02.0: [drm] fb0: qxldrmfb frame buffer device 225s [Sat Jan 18 18:48:45 2025] EXT4-fs (vda13): mounted filesystem a114845e-6f1f-49a7-8044-b769724fdfd4 r/w with ordered data mode. Quota mode: none. 225s [Sat Jan 18 18:48:46 2025] audit: type=1400 audit(1737226125.411:2): apparmor="STATUS" operation="profile_load" profile="unconfined" name="Discord" pid=511 comm="apparmor_parser" 225s [Sat Jan 18 18:48:46 2025] audit: type=1400 audit(1737226125.412:3): apparmor="STATUS" operation="profile_load" profile="unconfined" name="1password" pid=510 comm="apparmor_parser" 225s [Sat Jan 18 18:48:46 2025] audit: type=1400 audit(1737226125.414:4): apparmor="STATUS" operation="profile_load" profile="unconfined" name="QtWebEngineProcess" pid=517 comm="apparmor_parser" 225s [Sat Jan 18 18:48:46 2025] audit: type=1400 audit(1737226125.414:5): apparmor="STATUS" operation="profile_load" profile="unconfined" name=4D6F6E676F444220436F6D70617373 pid=516 comm="apparmor_parser" 225s [Sat Jan 18 18:48:46 2025] audit: type=1400 audit(1737226125.417:6): apparmor="STATUS" operation="profile_load" profile="unconfined" name="balena-etcher" pid=521 comm="apparmor_parser" 225s [Sat Jan 18 18:48:46 2025] audit: type=1400 audit(1737226125.419:7): apparmor="STATUS" operation="profile_load" profile="unconfined" name="brave" pid=522 comm="apparmor_parser" 225s [Sat Jan 18 18:48:46 2025] audit: type=1400 audit(1737226125.420:8): apparmor="STATUS" operation="profile_load" profile="unconfined" name="buildah" pid=523 comm="apparmor_parser" 225s [Sat Jan 18 18:48:46 2025] audit: type=1400 audit(1737226125.422:9): apparmor="STATUS" operation="profile_load" profile="unconfined" name="busybox" pid=524 comm="apparmor_parser" 225s [Sat Jan 18 18:48:46 2025] audit: type=1400 audit(1737226125.424:10): apparmor="STATUS" operation="profile_load" profile="unconfined" name="Xorg" pid=520 comm="apparmor_parser" 225s [Sat Jan 18 18:48:46 2025] cfg80211: Loading compiled-in X.509 certificates for regulatory database 225s [Sat Jan 18 18:48:46 2025] Loaded X.509 cert 'sforshee: 00b28ddf47aef9cea7' 225s [Sat Jan 18 18:48:46 2025] Loaded X.509 cert 'wens: 61c038651aabdcf94bd0ac7ff06c7248db18c600' 225s [Sat Jan 18 18:48:46 2025] kauditd_printk_skb: 110 callbacks suppressed 225s [Sat Jan 18 18:48:46 2025] audit: type=1400 audit(1737226126.072:121): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="rsyslogd" pid=721 comm="apparmor_parser" 225s [Sat Jan 18 18:48:46 2025] NET: Registered PF_QIPCRTR protocol family 225s [Sat Jan 18 18:49:34 2025] audit: type=1400 audit(1737226174.303:122): apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/sbin/sssd" pid=3194 comm="apparmor_parser" 225s autopkgtest [18:49:47]: test ldap-user-group-ldap-auth: -----------------------] 226s autopkgtest [18:49:48]: test ldap-user-group-ldap-auth: - - - - - - - - - - results - - - - - - - - - - 226s ldap-user-group-ldap-auth FAIL non-zero exit status 253 226s autopkgtest [18:49:48]: test ldap-user-group-krb5-auth: preparing testbed 226s Reading package lists... 226s Building dependency tree... 226s Reading state information... 227s Starting pkgProblemResolver with broken count: 0 227s Starting 2 pkgProblemResolver with broken count: 0 227s Done 227s The following packages were automatically installed and are no longer required: 227s python3.12 python3.12-minimal 227s Use 'sudo apt autoremove' to remove them. 227s The following NEW packages will be installed: 227s krb5-admin-server krb5-config krb5-kdc krb5-user libgssrpc4t64 227s libkadm5clnt-mit12 libkadm5srv-mit12 libkdb5-10t64 227s 0 upgraded, 8 newly installed, 0 to remove and 123 not upgraded. 227s Need to get 627 kB of archives. 227s After this operation, 2205 kB of additional disk space will be used. 227s Get:1 http://ftpmaster.internal/ubuntu plucky/main amd64 krb5-config all 2.7 [22.0 kB] 227s Get:2 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 libgssrpc4t64 amd64 1.21.3-4 [58.1 kB] 227s Get:3 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 libkadm5clnt-mit12 amd64 1.21.3-4 [41.3 kB] 227s Get:4 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 libkdb5-10t64 amd64 1.21.3-4 [41.8 kB] 227s Get:5 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 libkadm5srv-mit12 amd64 1.21.3-4 [55.5 kB] 227s Get:6 http://ftpmaster.internal/ubuntu plucky-proposed/universe amd64 krb5-user amd64 1.21.3-4 [111 kB] 227s Get:7 http://ftpmaster.internal/ubuntu plucky-proposed/universe amd64 krb5-kdc amd64 1.21.3-4 [197 kB] 227s Get:8 http://ftpmaster.internal/ubuntu plucky-proposed/universe amd64 krb5-admin-server amd64 1.21.3-4 [100 kB] 228s Preconfiguring packages ... 229s Fetched 627 kB in 1s (1130 kB/s) 229s Selecting previously unselected package krb5-config. 229s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 91227 files and directories currently installed.) 229s Preparing to unpack .../0-krb5-config_2.7_all.deb ... 229s Unpacking krb5-config (2.7) ... 229s Selecting previously unselected package libgssrpc4t64:amd64. 229s Preparing to unpack .../1-libgssrpc4t64_1.21.3-4_amd64.deb ... 229s Unpacking libgssrpc4t64:amd64 (1.21.3-4) ... 229s Selecting previously unselected package libkadm5clnt-mit12:amd64. 229s Preparing to unpack .../2-libkadm5clnt-mit12_1.21.3-4_amd64.deb ... 229s Unpacking libkadm5clnt-mit12:amd64 (1.21.3-4) ... 229s Selecting previously unselected package libkdb5-10t64:amd64. 229s Preparing to unpack .../3-libkdb5-10t64_1.21.3-4_amd64.deb ... 229s Unpacking libkdb5-10t64:amd64 (1.21.3-4) ... 229s Selecting previously unselected package libkadm5srv-mit12:amd64. 229s Preparing to unpack .../4-libkadm5srv-mit12_1.21.3-4_amd64.deb ... 229s Unpacking libkadm5srv-mit12:amd64 (1.21.3-4) ... 229s Selecting previously unselected package krb5-user. 229s Preparing to unpack .../5-krb5-user_1.21.3-4_amd64.deb ... 229s Unpacking krb5-user (1.21.3-4) ... 229s Selecting previously unselected package krb5-kdc. 229s Preparing to unpack .../6-krb5-kdc_1.21.3-4_amd64.deb ... 229s Unpacking krb5-kdc (1.21.3-4) ... 229s Selecting previously unselected package krb5-admin-server. 229s Preparing to unpack .../7-krb5-admin-server_1.21.3-4_amd64.deb ... 229s Unpacking krb5-admin-server (1.21.3-4) ... 229s Setting up libgssrpc4t64:amd64 (1.21.3-4) ... 229s Setting up krb5-config (2.7) ... 229s Setting up libkadm5clnt-mit12:amd64 (1.21.3-4) ... 229s Setting up libkdb5-10t64:amd64 (1.21.3-4) ... 229s Setting up libkadm5srv-mit12:amd64 (1.21.3-4) ... 229s Setting up krb5-user (1.21.3-4) ... 229s update-alternatives: using /usr/bin/kinit.mit to provide /usr/bin/kinit (kinit) in auto mode 229s update-alternatives: using /usr/bin/klist.mit to provide /usr/bin/klist (klist) in auto mode 229s update-alternatives: using /usr/bin/kswitch.mit to provide /usr/bin/kswitch (kswitch) in auto mode 229s update-alternatives: using /usr/bin/ksu.mit to provide /usr/bin/ksu (ksu) in auto mode 229s update-alternatives: using /usr/bin/kpasswd.mit to provide /usr/bin/kpasswd (kpasswd) in auto mode 229s update-alternatives: using /usr/bin/kdestroy.mit to provide /usr/bin/kdestroy (kdestroy) in auto mode 229s update-alternatives: using /usr/bin/kadmin.mit to provide /usr/bin/kadmin (kadmin) in auto mode 229s update-alternatives: using /usr/bin/ktutil.mit to provide /usr/bin/ktutil (ktutil) in auto mode 229s Setting up krb5-kdc (1.21.3-4) ... 230s invoke-rc.d: policy-rc.d denied execution of start. 230s Created symlink '/etc/systemd/system/multi-user.target.wants/krb5-kdc.service' → '/usr/lib/systemd/system/krb5-kdc.service'. 230s /usr/sbin/policy-rc.d returned 101, not running 'start krb5-kdc.service' 230s Setting up krb5-admin-server (1.21.3-4) ... 230s invoke-rc.d: policy-rc.d denied execution of start. 230s Created symlink '/etc/systemd/system/multi-user.target.wants/krb5-admin-server.service' → '/usr/lib/systemd/system/krb5-admin-server.service'. 231s /usr/sbin/policy-rc.d returned 101, not running 'start krb5-admin-server.service' 231s Processing triggers for man-db (2.13.0-1) ... 231s Processing triggers for libc-bin (2.40-4ubuntu1) ... 232s 232s Running kernel seems to be up-to-date. 232s 232s No services need to be restarted. 232s 232s No containers need to be restarted. 232s 232s User sessions running outdated binaries: 232s ubuntu @ session #3: sshd-session[946] 232s 232s No VM guests are running outdated hypervisor (qemu) binaries on this host. 238s autopkgtest [18:50:00]: test ldap-user-group-krb5-auth: [----------------------- 238s + . debian/tests/util 238s + . debian/tests/common-tests 238s + trap cleanup EXIT 238s + mydomain=example.com 238s + myhostname=ldap.example.com 238s + mysuffix=dc=example,dc=com 238s + myrealm=EXAMPLE.COM 238s + admin_dn=cn=admin,dc=example,dc=com 238s + admin_pw=secret 238s + ldap_user=testuser1 238s + ldap_user_pw=testuser1secret 238s + kerberos_principal_pw=testuser1kerberos 238s + ldap_group=ldapusers 238s + adjust_hostname ldap.example.com 238s + local myhostname=ldap.example.com 238s + echo ldap.example.com 238s + hostname ldap.example.com 238s + grep -qE ldap.example.com /etc/hosts 238s + reconfigure_slapd 238s + debconf-set-selections 238s + rm -rf /var/backups/slapd-2.6.9+dfsg-1~exp2ubuntu1 /var/backups/unknown-2.6.9+dfsg-1~exp2ubuntu1-20250118-184946.ldapdb 238s + dpkg-reconfigure -fnoninteractive -pcritical slapd 239s invoke-rc.d: policy-rc.d denied execution of stop. 239s Backing up /etc/ldap/slapd.d in /var/backups/slapd-2.6.9+dfsg-1~exp2ubuntu1... done. 239s Moving old database directory to /var/backups: 239s - directory unknown... done. 239s Creating initial configuration... done. 239s Creating LDAP directory... done. 239s invoke-rc.d: policy-rc.d denied execution of start. 239s /usr/sbin/policy-rc.d returned 101, not running 'restart slapd.service' 239s + generate_certs ldap.example.com 239s + local cn=ldap.example.com 239s + local cert=/etc/ldap/server.pem 239s + local key=/etc/ldap/server.key 239s + local cnf=/etc/ldap/openssl.cnf 239s + cat 239s + openssl req -new -x509 -nodes -out /etc/ldap/server.pem -keyout /etc/ldap/server.key -config /etc/ldap/openssl.cnf 239s .....+............+...+++++++++++++++++++++++++++++++++++++++*......+.+.....+++++++++++++++++++++++++++++++++++++++*..+...+..+.+..+...+.+...+............+......+..+..........+..+.+........+....+...........+......+...+.+.........+.....+.+..+....+..............+.+......+.........+.....+..................+.......+.....+....+..+.......+...............+......+..............+......+...............+......+.+.........+...........+...+.+..................+..+.+..+.+......+...+..+......+....+...+.....+...+.........+.....................+...+.+...+.....+...+......................+..+..........+.....+....+..........................+...+.+......+......+...+..+....+.....+...+...+....+.........+.................+.......+........+...+.....................+....+............+..+.+...........+.+..+...+.........+.+...+.....+....+............+.....+.............+...+........+....+...+..+......+.+........+...+...+.+.....+...............+....+..+...................+...+..+....+..+....+..................+.................+....+.........+.....+......+.......+...............+..++++++ 239s .+++++++++++++++++++++++++++++++++++++++*.....+...+......+.+...+...+...+..+...+.........+.............+...+++++++++++++++++++++++++++++++++++++++*.+.....+....+..+...+.......+..+...+........................+...+.+......+...+...+..+......+...................+........+.......+.....+......+.+....................................+...+.....+.+...+...+..............+....+...........+...................+..+....+..............+......+.+...............+...+.....+.+...+..+.+..+...+.......+..+.............+.....+................+......+......+..+...+....+......+..+.+......+.....+...+...+...+.+...........+.......+..+................+.....+....+...+.....+......+....+.....+.+..+.............+............+.....+............+.......+......+...+.....+......++++++ 239s ----- 239s + chmod 0640 /etc/ldap/server.key 239s + chgrp openldap /etc/ldap/server.key 239s + [ ! -f /etc/ldap/server.pem ] 239s + [ ! -f /etc/ldap/server.key ] 239s + enable_ldap_ssl 239s + cat 239s + cat 239s + ldapmodify -H ldapi:/// -Y EXTERNAL -Q 239s ldap_sasl_interactive_bind: Can't contact LDAP server (-1) 239s + cleanup 239s + result=255 239s + set +e 239s + [ 255 -ne 0 ] 239s + echo ## Something failed, gathering logs 239s + echo 239s + gather_logs 239s + echo ## sssd 239s + tail -n 200 /var/log/sssd/*.log 239s tail: cannot open '/var/log/sssd/*.log' for reading: No such file or directory 239s + echo 239s + echo ## journalctl 239s + journalctl -b --lines 200 239s ## Something failed, gathering logs 239s 239s ## sssd 239s 239s ## journalctl 239s Jan 18 18:49:43 autopkgtest sudo[3777]: pam_unix(sudo:session): session opened for user root(uid=0) by ubuntu(uid=1000) 239s Jan 18 18:49:43 autopkgtest sudo[3777]: pam_unix(sudo:session): session closed for user root 239s Jan 18 18:49:43 autopkgtest sudo[3787]: ubuntu : PWD=/home/ubuntu ; USER=root ; COMMAND=/var/tmp/autopkgtest-run-wrapper dpkg-query --show -f ${Status} libipa-hbac-dev 239s Jan 18 18:49:43 autopkgtest sudo[3787]: pam_unix(sudo:session): session opened for user root(uid=0) by ubuntu(uid=1000) 239s Jan 18 18:49:43 autopkgtest sudo[3787]: pam_unix(sudo:session): session closed for user root 239s Jan 18 18:49:43 autopkgtest sudo[3797]: ubuntu : PWD=/home/ubuntu ; USER=root ; COMMAND=/var/tmp/autopkgtest-run-wrapper dpkg-query --show -f ${Status} libsss-certmap0 239s Jan 18 18:49:43 autopkgtest sudo[3797]: pam_unix(sudo:session): session opened for user root(uid=0) by ubuntu(uid=1000) 239s Jan 18 18:49:43 autopkgtest sudo[3797]: pam_unix(sudo:session): session closed for user root 239s Jan 18 18:49:44 autopkgtest sudo[3807]: ubuntu : PWD=/home/ubuntu ; USER=root ; COMMAND=/var/tmp/autopkgtest-run-wrapper dpkg-query --show -f ${Status} libsss-certmap-dev 239s Jan 18 18:49:44 autopkgtest sudo[3807]: pam_unix(sudo:session): session opened for user root(uid=0) by ubuntu(uid=1000) 239s Jan 18 18:49:44 autopkgtest sudo[3807]: pam_unix(sudo:session): session closed for user root 239s Jan 18 18:49:44 autopkgtest sudo[3817]: ubuntu : PWD=/home/ubuntu ; USER=root ; COMMAND=/var/tmp/autopkgtest-run-wrapper dpkg-query --show -f ${Status} libsss-idmap0 239s Jan 18 18:49:44 autopkgtest sudo[3817]: pam_unix(sudo:session): session opened for user root(uid=0) by ubuntu(uid=1000) 239s Jan 18 18:49:44 autopkgtest sudo[3817]: pam_unix(sudo:session): session closed for user root 239s Jan 18 18:49:44 autopkgtest sudo[3827]: ubuntu : PWD=/home/ubuntu ; USER=root ; COMMAND=/var/tmp/autopkgtest-run-wrapper dpkg-query --show -f ${Status} libsss-idmap-dev 239s Jan 18 18:49:44 autopkgtest sudo[3827]: pam_unix(sudo:session): session opened for user root(uid=0) by ubuntu(uid=1000) 239s Jan 18 18:49:44 autopkgtest sudo[3827]: pam_unix(sudo:session): session closed for user root 239s Jan 18 18:49:44 autopkgtest sudo[3837]: ubuntu : PWD=/home/ubuntu ; USER=root ; COMMAND=/var/tmp/autopkgtest-run-wrapper dpkg-query --show -f ${Status} libsss-nss-idmap0 239s Jan 18 18:49:44 autopkgtest sudo[3837]: pam_unix(sudo:session): session opened for user root(uid=0) by ubuntu(uid=1000) 239s Jan 18 18:49:44 autopkgtest sudo[3837]: pam_unix(sudo:session): session closed for user root 239s Jan 18 18:49:44 autopkgtest sudo[3847]: ubuntu : PWD=/home/ubuntu ; USER=root ; COMMAND=/var/tmp/autopkgtest-run-wrapper dpkg-query --show -f ${Status} libsss-nss-idmap-dev 239s Jan 18 18:49:44 autopkgtest sudo[3847]: pam_unix(sudo:session): session opened for user root(uid=0) by ubuntu(uid=1000) 239s Jan 18 18:49:44 autopkgtest sudo[3847]: pam_unix(sudo:session): session closed for user root 239s Jan 18 18:49:44 autopkgtest sudo[3857]: ubuntu : PWD=/home/ubuntu ; USER=root ; COMMAND=/var/tmp/autopkgtest-run-wrapper dpkg-query --show -f ${Status} libsss-sudo 239s Jan 18 18:49:44 autopkgtest sudo[3857]: pam_unix(sudo:session): session opened for user root(uid=0) by ubuntu(uid=1000) 239s Jan 18 18:49:44 autopkgtest sudo[3857]: pam_unix(sudo:session): session closed for user root 239s Jan 18 18:49:45 autopkgtest sudo[3867]: ubuntu : PWD=/home/ubuntu ; USER=root ; COMMAND=/var/tmp/autopkgtest-run-wrapper dpkg-query --show -f ${Status} python3-libipa-hbac 239s Jan 18 18:49:45 autopkgtest sudo[3867]: pam_unix(sudo:session): session opened for user root(uid=0) by ubuntu(uid=1000) 239s Jan 18 18:49:45 autopkgtest sudo[3867]: pam_unix(sudo:session): session closed for user root 239s Jan 18 18:49:45 autopkgtest sudo[3877]: ubuntu : PWD=/home/ubuntu ; USER=root ; COMMAND=/var/tmp/autopkgtest-run-wrapper dpkg-query --show -f ${Status} python3-libsss-nss-idmap 239s Jan 18 18:49:45 autopkgtest sudo[3877]: pam_unix(sudo:session): session opened for user root(uid=0) by ubuntu(uid=1000) 239s Jan 18 18:49:45 autopkgtest sudo[3877]: pam_unix(sudo:session): session closed for user root 239s Jan 18 18:49:45 autopkgtest sudo[3887]: ubuntu : PWD=/home/ubuntu ; USER=root ; COMMAND=/var/tmp/autopkgtest-run-wrapper dpkg-query --show -f ${Status} python3-sss 239s Jan 18 18:49:45 autopkgtest sudo[3887]: pam_unix(sudo:session): session opened for user root(uid=0) by ubuntu(uid=1000) 239s Jan 18 18:49:45 autopkgtest sudo[3887]: pam_unix(sudo:session): session closed for user root 239s Jan 18 18:49:45 autopkgtest sudo[3897]: ubuntu : PWD=/home/ubuntu ; USER=root ; COMMAND=/var/tmp/autopkgtest-run-wrapper sh -ec 'dpkg-query --show -f \'${Package}\\t${Version}\\n\' > /tmp/autopkgtest.gKA2Xv/ldap-user-group-ldap-auth-packages.all' 239s Jan 18 18:49:45 autopkgtest sudo[3897]: pam_unix(sudo:session): session opened for user root(uid=0) by ubuntu(uid=1000) 239s Jan 18 18:49:45 autopkgtest sudo[3897]: pam_unix(sudo:session): session closed for user root 239s Jan 18 18:49:45 autopkgtest sudo[3908]: ubuntu : PWD=/home/ubuntu ; USER=root ; COMMAND=/var/tmp/autopkgtest-run-wrapper sh -ec 'cat &2 2>&1' run_apt_command /usr/bin/eatmydata apt-get --quiet --assume-yes -o=APT::Status-Fd=3 -o=APT::Install-Recommends=false -o=Dpkg::Options::=--force-confnew -o=Debug::pkgProblemResolver=true satisfy 'sssd, sssd-common, sssd-ad, sssd-ad-common, sssd-dbus, sssd-idp, sssd-ipa, sssd-kcm, sssd-krb5, sssd-krb5-common, sssd-ldap, sssd-passkey, sssd-proxy, sssd-tools, libnss-sss, libpam-sss, libipa-hbac0t64, libipa-hbac-dev, libsss-certmap0, libsss-certmap-dev, libsss-idmap0, libsss-idmap-dev, libsss-nss-idmap0, libsss-nss-idmap-dev, libsss-sudo, python3-libipa-hbac, python3-libsss-nss-idmap, python3-sss, slapd, ldap-utils, openssl, expect, lsb-release, krb5-user, krb5-admin-server, krb5-kdc, openssh-server' 239s Jan 18 18:49:48 ldap.example.com sudo[4234]: pam_unix(sudo:session): session opened for user root(uid=0) by ubuntu(uid=1000) 239s Jan 18 18:49:51 ldap.example.com systemd[1]: Reload requested from client PID 4409 ('systemctl') (unit session-3.scope)... 239s Jan 18 18:49:51 ldap.example.com systemd[1]: Reloading... 239s Jan 18 18:49:52 ldap.example.com systemd[1]: Reloading finished in 166 ms. 239s Jan 18 18:49:52 ldap.example.com systemd[1]: Reload requested from client PID 4467 ('systemctl') (unit session-3.scope)... 239s Jan 18 18:49:52 ldap.example.com systemd[1]: Reloading... 239s Jan 18 18:49:52 ldap.example.com systemd[1]: Reloading finished in 165 ms. 239s Jan 18 18:49:52 ldap.example.com systemd[1]: Reload requested from client PID 4519 ('systemctl') (unit session-3.scope)... 239s Jan 18 18:49:52 ldap.example.com systemd[1]: Reloading... 239s Jan 18 18:49:52 ldap.example.com systemd[1]: Reloading finished in 178 ms. 239s Jan 18 18:49:52 ldap.example.com systemd[1]: Reload requested from client PID 4577 ('systemctl') (unit session-3.scope)... 239s Jan 18 18:49:52 ldap.example.com systemd[1]: Reloading... 239s Jan 18 18:49:52 ldap.example.com systemd[1]: Reloading finished in 172 ms. 239s Jan 18 18:49:55 ldap.example.com sudo[4234]: pam_unix(sudo:session): session closed for user root 239s Jan 18 18:49:55 ldap.example.com sudo[4689]: ubuntu : PWD=/home/ubuntu ; USER=root ; COMMAND=/var/tmp/autopkgtest-run-wrapper dpkg-query --show -f ${Status} sssd 239s Jan 18 18:49:55 ldap.example.com sudo[4689]: pam_unix(sudo:session): session opened for user root(uid=0) by ubuntu(uid=1000) 239s Jan 18 18:49:55 ldap.example.com sudo[4689]: pam_unix(sudo:session): session closed for user root 239s Jan 18 18:49:55 ldap.example.com sudo[4699]: ubuntu : PWD=/home/ubuntu ; USER=root ; COMMAND=/var/tmp/autopkgtest-run-wrapper dpkg-query --show -f ${Status} sssd-common 239s Jan 18 18:49:55 ldap.example.com sudo[4699]: pam_unix(sudo:session): session opened for user root(uid=0) by ubuntu(uid=1000) 239s Jan 18 18:49:55 ldap.example.com sudo[4699]: pam_unix(sudo:session): session closed for user root 239s Jan 18 18:49:55 ldap.example.com sudo[4709]: ubuntu : PWD=/home/ubuntu ; USER=root ; COMMAND=/var/tmp/autopkgtest-run-wrapper dpkg-query --show -f ${Status} sssd-ad 239s Jan 18 18:49:55 ldap.example.com sudo[4709]: pam_unix(sudo:session): session opened for user root(uid=0) by ubuntu(uid=1000) 239s Jan 18 18:49:55 ldap.example.com sudo[4709]: pam_unix(sudo:session): session closed for user root 239s Jan 18 18:49:55 ldap.example.com sudo[4719]: ubuntu : PWD=/home/ubuntu ; USER=root ; COMMAND=/var/tmp/autopkgtest-run-wrapper dpkg-query --show -f ${Status} sssd-ad-common 239s Jan 18 18:49:55 ldap.example.com sudo[4719]: pam_unix(sudo:session): session opened for user root(uid=0) by ubuntu(uid=1000) 239s Jan 18 18:49:55 ldap.example.com sudo[4719]: pam_unix(sudo:session): session closed for user root 239s Jan 18 18:49:55 ldap.example.com sudo[4729]: ubuntu : PWD=/home/ubuntu ; USER=root ; COMMAND=/var/tmp/autopkgtest-run-wrapper dpkg-query --show -f ${Status} sssd-dbus 239s Jan 18 18:49:55 ldap.example.com sudo[4729]: pam_unix(sudo:session): session opened for user root(uid=0) by ubuntu(uid=1000) 239s Jan 18 18:49:55 ldap.example.com sudo[4729]: pam_unix(sudo:session): session closed for user root 239s Jan 18 18:49:56 ldap.example.com sudo[4739]: ubuntu : PWD=/home/ubuntu ; USER=root ; COMMAND=/var/tmp/autopkgtest-run-wrapper dpkg-query --show -f ${Status} sssd-idp 239s Jan 18 18:49:56 ldap.example.com sudo[4739]: pam_unix(sudo:session): session opened for user root(uid=0) by ubuntu(uid=1000) 239s Jan 18 18:49:56 ldap.example.com sudo[4739]: pam_unix(sudo:session): session closed for user root 239s Jan 18 18:49:56 ldap.example.com sudo[4749]: ubuntu : PWD=/home/ubuntu ; USER=root ; COMMAND=/var/tmp/autopkgtest-run-wrapper dpkg-query --show -f ${Status} sssd-ipa 239s Jan 18 18:49:56 ldap.example.com sudo[4749]: pam_unix(sudo:session): session opened for user root(uid=0) by ubuntu(uid=1000) 239s Jan 18 18:49:56 ldap.example.com sudo[4749]: pam_unix(sudo:session): session closed for user root 239s Jan 18 18:49:56 ldap.example.com sudo[4759]: ubuntu : PWD=/home/ubuntu ; USER=root ; COMMAND=/var/tmp/autopkgtest-run-wrapper dpkg-query --show -f ${Status} sssd-kcm 239s Jan 18 18:49:56 ldap.example.com sudo[4759]: pam_unix(sudo:session): session opened for user root(uid=0) by ubuntu(uid=1000) 239s Jan 18 18:49:56 ldap.example.com sudo[4759]: pam_unix(sudo:session): session closed for user root 239s Jan 18 18:49:56 ldap.example.com sudo[4769]: ubuntu : PWD=/home/ubuntu ; USER=root ; COMMAND=/var/tmp/autopkgtest-run-wrapper dpkg-query --show -f ${Status} sssd-krb5 239s Jan 18 18:49:56 ldap.example.com sudo[4769]: pam_unix(sudo:session): session opened for user root(uid=0) by ubuntu(uid=1000) 239s Jan 18 18:49:56 ldap.example.com sudo[4769]: pam_unix(sudo:session): session closed for user root 239s Jan 18 18:49:56 ldap.example.com sudo[4779]: ubuntu : PWD=/home/ubuntu ; USER=root ; COMMAND=/var/tmp/autopkgtest-run-wrapper dpkg-query --show -f ${Status} sssd-krb5-common 239s Jan 18 18:49:56 ldap.example.com sudo[4779]: pam_unix(sudo:session): session opened for user root(uid=0) by ubuntu(uid=1000) 239s Jan 18 18:49:56 ldap.example.com sudo[4779]: pam_unix(sudo:session): session closed for user root 239s Jan 18 18:49:57 ldap.example.com sudo[4789]: ubuntu : PWD=/home/ubuntu ; USER=root ; COMMAND=/var/tmp/autopkgtest-run-wrapper dpkg-query --show -f ${Status} sssd-ldap 239s Jan 18 18:49:57 ldap.example.com sudo[4789]: pam_unix(sudo:session): session opened for user root(uid=0) by ubuntu(uid=1000) 239s Jan 18 18:49:57 ldap.example.com sudo[4789]: pam_unix(sudo:session): session closed for user root 239s Jan 18 18:49:57 ldap.example.com sudo[4799]: ubuntu : PWD=/home/ubuntu ; USER=root ; COMMAND=/var/tmp/autopkgtest-run-wrapper dpkg-query --show -f ${Status} sssd-passkey 239s Jan 18 18:49:57 ldap.example.com sudo[4799]: pam_unix(sudo:session): session opened for user root(uid=0) by ubuntu(uid=1000) 239s Jan 18 18:49:57 ldap.example.com sudo[4799]: pam_unix(sudo:session): session closed for user root 239s Jan 18 18:49:57 ldap.example.com sudo[4809]: ubuntu : PWD=/home/ubuntu ; USER=root ; COMMAND=/var/tmp/autopkgtest-run-wrapper dpkg-query --show -f ${Status} sssd-proxy 239s Jan 18 18:49:57 ldap.example.com sudo[4809]: pam_unix(sudo:session): session opened for user root(uid=0) by ubuntu(uid=1000) 239s Jan 18 18:49:57 ldap.example.com sudo[4809]: pam_unix(sudo:session): session closed for user root 239s Jan 18 18:49:57 ldap.example.com sudo[4819]: ubuntu : PWD=/home/ubuntu ; USER=root ; COMMAND=/var/tmp/autopkgtest-run-wrapper dpkg-query --show -f ${Status} sssd-tools 239s Jan 18 18:49:57 ldap.example.com sudo[4819]: pam_unix(sudo:session): session opened for user root(uid=0) by ubuntu(uid=1000) 239s Jan 18 18:49:57 ldap.example.com sudo[4819]: pam_unix(sudo:session): session closed for user root 239s Jan 18 18:49:57 ldap.example.com sudo[4829]: ubuntu : PWD=/home/ubuntu ; USER=root ; COMMAND=/var/tmp/autopkgtest-run-wrapper dpkg-query --show -f ${Status} libnss-sss 239s Jan 18 18:49:57 ldap.example.com sudo[4829]: pam_unix(sudo:session): session opened for user root(uid=0) by ubuntu(uid=1000) 239s Jan 18 18:49:57 ldap.example.com sudo[4829]: pam_unix(sudo:session): session closed for user root 239s Jan 18 18:49:57 ldap.example.com sudo[4839]: ubuntu : PWD=/home/ubuntu ; USER=root ; COMMAND=/var/tmp/autopkgtest-run-wrapper dpkg-query --show -f ${Status} libpam-sss 239s Jan 18 18:49:57 ldap.example.com sudo[4839]: pam_unix(sudo:session): session opened for user root(uid=0) by ubuntu(uid=1000) 239s Jan 18 18:49:57 ldap.example.com sudo[4839]: pam_unix(sudo:session): session closed for user root 239s Jan 18 18:49:58 ldap.example.com sudo[4849]: ubuntu : PWD=/home/ubuntu ; USER=root ; COMMAND=/var/tmp/autopkgtest-run-wrapper dpkg-query --show -f ${Status} libipa-hbac0t64 239s Jan 18 18:49:58 ldap.example.com sudo[4849]: pam_unix(sudo:session): session opened for user root(uid=0) by ubuntu(uid=1000) 239s Jan 18 18:49:58 ldap.example.com sudo[4849]: pam_unix(sudo:session): session closed for user root 239s Jan 18 18:49:58 ldap.example.com sudo[4859]: ubuntu : PWD=/home/ubuntu ; USER=root ; COMMAND=/var/tmp/autopkgtest-run-wrapper dpkg-query --show -f ${Status} libipa-hbac-dev 239s Jan 18 18:49:58 ldap.example.com sudo[4859]: pam_unix(sudo:session): session opened for user root(uid=0) by ubuntu(uid=1000) 239s Jan 18 18:49:58 ldap.example.com sudo[4859]: pam_unix(sudo:session): session closed for user root 239s Jan 18 18:49:58 ldap.example.com sudo[4869]: ubuntu : PWD=/home/ubuntu ; USER=root ; COMMAND=/var/tmp/autopkgtest-run-wrapper dpkg-query --show -f ${Status} libsss-certmap0 239s Jan 18 18:49:58 ldap.example.com sudo[4869]: pam_unix(sudo:session): session opened for user root(uid=0) by ubuntu(uid=1000) 239s Jan 18 18:49:58 ldap.example.com sudo[4869]: pam_unix(sudo:session): session closed for user root 239s Jan 18 18:49:58 ldap.example.com sudo[4879]: ubuntu : PWD=/home/ubuntu ; USER=root ; COMMAND=/var/tmp/autopkgtest-run-wrapper dpkg-query --+ echo 239s + echo ## dmesg 239s + dmesg -T 239s + tail -n 200 239s show -f ${Status} libsss-certmap-dev 239s Jan 18 18:49:58 ldap.example.com sudo[4879]: pam_unix(sudo:session): session opened for user root(uid=0) by ubuntu(uid=1000) 239s Jan 18 18:49:58 ldap.example.com sudo[4879]: pam_unix(sudo:session): session closed for user root 239s Jan 18 18:49:58 ldap.example.com sudo[4889]: ubuntu : PWD=/home/ubuntu ; USER=root ; COMMAND=/var/tmp/autopkgtest-run-wrapper dpkg-query --show -f ${Status} libsss-idmap0 239s Jan 18 18:49:58 ldap.example.com sudo[4889]: pam_unix(sudo:session): session opened for user root(uid=0) by ubuntu(uid=1000) 239s Jan 18 18:49:58 ldap.example.com sudo[4889]: pam_unix(sudo:session): session closed for user root 239s Jan 18 18:49:58 ldap.example.com sudo[4899]: ubuntu : PWD=/home/ubuntu ; USER=root ; COMMAND=/var/tmp/autopkgtest-run-wrapper dpkg-query --show -f ${Status} libsss-idmap-dev 239s Jan 18 18:49:58 ldap.example.com sudo[4899]: pam_unix(sudo:session): session opened for user root(uid=0) by ubuntu(uid=1000) 239s Jan 18 18:49:58 ldap.example.com sudo[4899]: pam_unix(sudo:session): session closed for user root 239s Jan 18 18:49:59 ldap.example.com sudo[4909]: ubuntu : PWD=/home/ubuntu ; USER=root ; COMMAND=/var/tmp/autopkgtest-run-wrapper dpkg-query --show -f ${Status} libsss-nss-idmap0 239s Jan 18 18:49:59 ldap.example.com sudo[4909]: pam_unix(sudo:session): session opened for user root(uid=0) by ubuntu(uid=1000) 239s Jan 18 18:49:59 ldap.example.com sudo[4909]: pam_unix(sudo:session): session closed for user root 239s Jan 18 18:49:59 ldap.example.com sudo[4919]: ubuntu : PWD=/home/ubuntu ; USER=root ; COMMAND=/var/tmp/autopkgtest-run-wrapper dpkg-query --show -f ${Status} libsss-nss-idmap-dev 239s Jan 18 18:49:59 ldap.example.com sudo[4919]: pam_unix(sudo:session): session opened for user root(uid=0) by ubuntu(uid=1000) 239s Jan 18 18:49:59 ldap.example.com sudo[4919]: pam_unix(sudo:session): session closed for user root 239s Jan 18 18:49:59 ldap.example.com sudo[4929]: ubuntu : PWD=/home/ubuntu ; USER=root ; COMMAND=/var/tmp/autopkgtest-run-wrapper dpkg-query --show -f ${Status} libsss-sudo 239s Jan 18 18:49:59 ldap.example.com sudo[4929]: pam_unix(sudo:session): session opened for user root(uid=0) by ubuntu(uid=1000) 239s Jan 18 18:49:59 ldap.example.com sudo[4929]: pam_unix(sudo:session): session closed for user root 239s Jan 18 18:49:59 ldap.example.com sudo[4939]: ubuntu : PWD=/home/ubuntu ; USER=root ; COMMAND=/var/tmp/autopkgtest-run-wrapper dpkg-query --show -f ${Status} python3-libipa-hbac 239s Jan 18 18:49:59 ldap.example.com sudo[4939]: pam_unix(sudo:session): session opened for user root(uid=0) by ubuntu(uid=1000) 239s Jan 18 18:49:59 ldap.example.com sudo[4939]: pam_unix(sudo:session): session closed for user root 239s Jan 18 18:49:59 ldap.example.com sudo[4949]: ubuntu : PWD=/home/ubuntu ; USER=root ; COMMAND=/var/tmp/autopkgtest-run-wrapper dpkg-query --show -f ${Status} python3-libsss-nss-idmap 239s Jan 18 18:49:59 ldap.example.com sudo[4949]: pam_unix(sudo:session): session opened for user root(uid=0) by ubuntu(uid=1000) 239s Jan 18 18:49:59 ldap.example.com sudo[4949]: pam_unix(sudo:session): session closed for user root 239s Jan 18 18:50:00 ldap.example.com sudo[4959]: ubuntu : PWD=/home/ubuntu ; USER=root ; COMMAND=/var/tmp/autopkgtest-run-wrapper dpkg-query --show -f ${Status} python3-sss 239s Jan 18 18:50:00 ldap.example.com sudo[4959]: pam_unix(sudo:session): session opened for user root(uid=0) by ubuntu(uid=1000) 239s Jan 18 18:50:00 ldap.example.com sudo[4959]: pam_unix(sudo:session): session closed for user root 239s Jan 18 18:50:00 ldap.example.com sudo[4969]: ubuntu : PWD=/home/ubuntu ; USER=root ; COMMAND=/var/tmp/autopkgtest-run-wrapper sh -ec 'dpkg-query --show -f \'${Package}\\t${Version}\\n\' > /tmp/autopkgtest.gKA2Xv/ldap-user-group-krb5-auth-packages.all' 239s Jan 18 18:50:00 ldap.example.com sudo[4969]: pam_unix(sudo:session): session opened for user root(uid=0) by ubuntu(uid=1000) 239s Jan 18 18:50:00 ldap.example.com sudo[4969]: pam_unix(sudo:session): session closed for user root 239s Jan 18 18:50:00 ldap.example.com sudo[4980]: ubuntu : PWD=/home/ubuntu ; USER=root ; COMMAND=/var/tmp/autopkgtest-run-wrapper sh -ec 'cat (1094242659, -1449402) 239s [Sat Jan 18 18:48:42 2025] registered taskstats version 1 239s [Sat Jan 18 18:48:42 2025] Loading compiled-in X.509 certificates 239s [Sat Jan 18 18:48:42 2025] Loaded X.509 cert 'Build time autogenerated kernel key: 44bb7aee388ba8514143508bda37e4c74d0436e3' 239s [Sat Jan 18 18:48:42 2025] Loaded X.509 cert 'Canonical Ltd. Live Patch Signing: 14df34d1a87cf37625abec039ef2bf521249b969' 239s [Sat Jan 18 18:48:42 2025] Loaded X.509 cert 'Canonical Ltd. Kernel Module Signing: 88f752e560a1e0737e31163a466ad7b70a850c19' 239s [Sat Jan 18 18:48:42 2025] blacklist: Loading compiled-in revocation X.509 certificates 239s [Sat Jan 18 18:48:42 2025] Loaded X.509 cert 'Canonical Ltd. Secure Boot Signing: 61482aa2830d0ab2ad5af10b7250da9033ddcef0' 239s [Sat Jan 18 18:48:42 2025] Loaded X.509 cert 'Canonical Ltd. Secure Boot Signing (2017): 242ade75ac4a15e50d50c84b0d45ff3eae707a03' 239s [Sat Jan 18 18:48:42 2025] Loaded X.509 cert 'Canonical Ltd. Secure Boot Signing (ESM 2018): 365188c1d374d6b07c3c8f240f8ef722433d6a8b' 239s [Sat Jan 18 18:48:42 2025] Loaded X.509 cert 'Canonical Ltd. Secure Boot Signing (2019): c0746fd6c5da3ae827864651ad66ae47fe24b3e8' 239s [Sat Jan 18 18:48:42 2025] Loaded X.509 cert 'Canonical Ltd. Secure Boot Signing (2021 v1): a8d54bbb3825cfb94fa13c9f8a594a195c107b8d' 239s [Sat Jan 18 18:48:42 2025] Loaded X.509 cert 'Canonical Ltd. Secure Boot Signing (2021 v2): 4cf046892d6fd3c9a5b03f98d845f90851dc6a8c' 239s [Sat Jan 18 18:48:42 2025] Loaded X.509 cert 'Canonical Ltd. Secure Boot Signing (2021 v3): 100437bb6de6e469b581e61cd66bce3ef4ed53af' 239s [Sat Jan 18 18:48:42 2025] Loaded X.509 cert 'Canonical Ltd. Secure Boot Signing (Ubuntu Core 2019): c1d57b8f6b743f23ee41f4f7ee292f06eecadfb9' 239s [Sat+ cleanup_sshd_config 239s + rm -f /etc/ssh/sshd_config.d/00-dep8.conf 239s + systemctl restart ssh 239s Jan 18 18:48:42 2025] Demotion targets for Node 0: null 239s [Sat Jan 18 18:48:42 2025] Key type .fscrypt registered 239s [Sat Jan 18 18:48:42 2025] Key type fscrypt-provisioning registered 239s [Sat Jan 18 18:48:42 2025] cryptd: max_cpu_qlen set to 1000 239s [Sat Jan 18 18:48:42 2025] AES CTR mode by8 optimization enabled 239s [Sat Jan 18 18:48:42 2025] Key type encrypted registered 239s [Sat Jan 18 18:48:42 2025] AppArmor: AppArmor sha256 policy hashing enabled 239s [Sat Jan 18 18:48:42 2025] ima: No TPM chip found, activating TPM-bypass! 239s [Sat Jan 18 18:48:42 2025] Loading compiled-in module X.509 certificates 239s [Sat Jan 18 18:48:42 2025] Loaded X.509 cert 'Build time autogenerated kernel key: 44bb7aee388ba8514143508bda37e4c74d0436e3' 239s [Sat Jan 18 18:48:42 2025] ima: Allocated hash algorithm: sha256 239s [Sat Jan 18 18:48:42 2025] ima: No architecture policies found 239s [Sat Jan 18 18:48:42 2025] evm: Initialising EVM extended attributes: 239s [Sat Jan 18 18:48:42 2025] evm: security.selinux 239s [Sat Jan 18 18:48:42 2025] evm: security.SMACK64 239s [Sat Jan 18 18:48:42 2025] evm: security.SMACK64EXEC 239s [Sat Jan 18 18:48:42 2025] evm: security.SMACK64TRANSMUTE 239s [Sat Jan 18 18:48:42 2025] evm: security.SMACK64MMAP 239s [Sat Jan 18 18:48:42 2025] evm: security.apparmor 239s [Sat Jan 18 18:48:42 2025] evm: security.ima 239s [Sat Jan 18 18:48:42 2025] evm: security.capability 239s [Sat Jan 18 18:48:42 2025] evm: HMAC attrs: 0x1 239s [Sat Jan 18 18:48:42 2025] PM: Magic number: 9:20:848 239s [Sat Jan 18 18:48:42 2025] RAS: Correctable Errors collector initialized. 239s [Sat Jan 18 18:48:42 2025] clk: Disabling unused clocks 239s [Sat Jan 18 18:48:42 2025] PM: genpd: Disabling unused power domains 239s [Sat Jan 18 18:48:42 2025] Freeing unused decrypted memory: 2028K 239s [Sat Jan 18 18:48:42 2025] Freeing unused kernel image (initmem) memory: 4956K 239s [Sat Jan 18 18:48:42 2025] Write protecting the kernel read-only data: 38912k 239s [Sat Jan 18 18:48:42 2025] Freeing unused kernel image (rodata/data gap) memory: 1448K 239s [Sat Jan 18 18:48:42 2025] x86/mm: Checked W+X mappings: passed, no W+X pages found. 239s [Sat Jan 18 18:48:42 2025] Run /init as init process 239s [Sat Jan 18 18:48:42 2025] with arguments: 239s [Sat Jan 18 18:48:42 2025] /init 239s [Sat Jan 18 18:48:42 2025] with environment: 239s [Sat Jan 18 18:48:42 2025] HOME=/ 239s [Sat Jan 18 18:48:42 2025] TERM=linux 239s [Sat Jan 18 18:48:42 2025] BOOT_IMAGE=/vmlinuz-6.11.0-8-generic 239s [Sat Jan 18 18:48:42 2025] virtio_net virtio0 ens3: renamed from eth0 239s [Sat Jan 18 18:48:42 2025] input: VirtualPS/2 VMware VMMouse as /devices/platform/i8042/serio1/input/input4 239s [Sat Jan 18 18:48:42 2025] input: VirtualPS/2 VMware VMMouse as /devices/platform/i8042/serio1/input/input3 239s [Sat Jan 18 18:48:42 2025] FDC 0 is a S82078B 239s [Sat Jan 18 18:48:43 2025] raid6: avx2x4 gen() 32698 MB/s 239s [Sat Jan 18 18:48:43 2025] raid6: avx2x2 gen() 34448 MB/s 239s [Sat Jan 18 18:48:43 2025] raid6: avx2x1 gen() 28442 MB/s 239s [Sat Jan 18 18:48:43 2025] raid6: using algorithm avx2x2 gen() 34448 MB/s 239s [Sat Jan 18 18:48:43 2025] raid6: .... xor() 29983 MB/s, rmw enabled 239s [Sat Jan 18 18:48:43 2025] raid6: using avx2x2 recovery algorithm 239s [Sat Jan 18 18:48:43 2025] xor: automatically using best checksumming function avx 239s [Sat Jan 18 18:48:43 2025] async_tx: api initialized (async) 239s [Sat Jan 18 18:48:43 2025] Btrfs loaded, zoned=yes, fsverity=yes 239s [Sat Jan 18 18:48:43 2025] EXT4-fs (vda1): orphan cleanup on readonly fs 239s [Sat Jan 18 18:48:43 2025] EXT4-fs (vda1): mounted filesystem c1d91cd9-c36e-400f-a528-e35795b2f626 ro with ordered data mode. Quota mode: none. 239s [Sat Jan 18 18:48:44 2025] systemd[1]: Inserted module 'autofs4' 239s [Sat Jan 18 18:48:44 2025] systemd[1]: systemd 257-2ubuntu1 running in system mode (+PAM +AUDIT +SELINUX +APPARMOR +IMA +IPE +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS +FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBCRYPTSETUP_PLUGINS +LIBFDISK +PCRE2 +PWQUALITY +P11KIT +QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD +BPF_FRAMEWORK -BTF -XKBCOMMON -UTMP +SYSVINIT +LIBARCHIVE) 239s [Sat Jan 18 18:48:44 2025] systemd[1]: Detected virtualization kvm. 239s [Sat Jan 18 18:48:44 2025] systemd[1]: Detected architecture x86-64. 239s [Sat Jan 18 18:48:44 2025] systemd[1]: Hostname set to . 239s [Sat Jan 18 18:48:44 2025] systemd[1]: bpf-restrict-fs: BPF LSM hook not enabled in the kernel, BPF LSM not supported. 239s [Sat Jan 18 18:48:44 2025] Guest personality initialized and is inactive 239s [Sat Jan 18 18:48:44 2025] VMCI host device registered (name=vmci, major=10, minor=122) 239s [Sat Jan 18 18:48:44 2025] Initialized host personality 239s [Sat Jan 18 18:48:44 2025] NET: Registered PF_VSOCK protocol family 239s [Sat Jan 18 18:48:44 2025] systemd[1]: Queued start job for default target graphical.target. 239s [Sat Jan 18 18:48:44 2025] systemd[1]: Created slice system-autopkgtest.slice - Slice /system/autopkgtest. 239s [Sat Jan 18 18:48:44 2025] systemd[1]: Created slice system-modprobe.slice - Slice /system/modprobe. 239s [Sat Jan 18 18:48:44 2025] systemd[1]: Created slice system-serial\x2dgetty.slice - Slice /system/serial-getty. 239s [Sat Jan 18 18:48:44 2025] systemd[1]: Created slice system-systemd\x2dfsck.slice - Slice /system/systemd-fsck. 239s [Sat Jan 18 18:48:44 2025] systemd[1]: Created slice user.slice - User and Session Slice. 239s [Sat Jan 18 18:48:44 2025] systemd[1]: Started systemd-ask-password-wall.path - Forward Password Requests to Wall Directory Watch. 239s [Sat Jan 18 18:48:44 2025] systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount - Arbitrary Executable File Formats File System Automount Point. 239s [Sat Jan 18 18:48:44 2025] systemd[1]: Expecting device dev-disk-by\x2dlabel-BOOT.device - /dev/disk/by-label/BOOT... 239s [Sat Jan 18 18:48:44 2025] systemd[1]: Expecting device dev-disk-by\x2dlabel-UEFI.device - /dev/disk/by-label/UEFI... 239s [Sat Jan 18 18:48:44 2025] systemd[1]: Expecting device dev-ttyS0.device - /dev/ttyS0... 239s [Sat Jan 18 18:48:44 2025] systemd[1]: Reached target integritysetup.target - Local Integrity Protected Volumes. 239s [Sat Jan 18 18:48:44 2025] systemd[1]: Reached target slices.target - Slice Units. 239s [Sat Jan 18 18:48:44 2025] systemd[1]: Reached target swap.target - Swaps. 239s [Sat Jan 18 18:48:44 2025] systemd[1]: Reached target veritysetup.target - Local Verity Protected Volumes. 239s [Sat Jan 18 18:48:44 2025] systemd[1]: Listening on dm-event.socket - Device-mapper event daemon FIFOs. 239s [Sat Jan 18 18:48:44 2025] systemd[1]: Listening on lvm2-lvmpolld.socket - LVM2 poll daemon socket. 239s [Sat Jan 18 18:48:44 2025] systemd[1]: Listening on syslog.socket - Syslog Socket. 239s [Sat Jan 18 18:48:44 2025] systemd[1]: Listening on systemd-creds.socket - Credential Encryption/Decryption. 239s [Sat Jan 18 18:48:44 2025] systemd[1]: Listening on systemd-fsckd.socket - fsck to fsckd communication Socket. 239s [Sat Jan 18 18:48:44 2025] systemd[1]: Listening on systemd-initctl.socket - initctl Compatibility Named Pipe. 239s [Sat Jan 18 18:48:44 2025] systemd[1]: Listening on systemd-journald-dev-log.socket - Journal Socket (/dev/log). 239s [Sat Jan 18 18:48:44 2025] systemd[1]: Listening on systemd-journald.socket - Journal Sockets. 239s [Sat Jan 18 18:48:44 2025] systemd[1]: Listening on systemd-networkd.socket - Network Service Netlink Socket. 239s [Sat Jan 18 18:48:44 2025] systemd[1]: systemd-pcrextend.socket - TPM PCR Measurements was skipped because of an unmet condition check (ConditionSecurity=measured-uki). 239s [Sat Jan 18 18:48:44 2025] systemd[1]: systemd-pcrlock.socket - Make TPM PCR Policy was skipped because of an unmet condition check (ConditionSecurity=measured-uki). 239s [Sat Jan 18 18:48:44 2025] systemd[1]: Listening on systemd-udevd-control.socket - udev Control Socket. 239s [Sat Jan 18 18:48:44 2025] systemd[1]: Listening on systemd-udevd-kernel.socket - udev Kernel Socket. 239s [Sat Jan 18 18:48:44 2025] systemd[1]: Mounting dev-hugepages.mount - Huge Pages File System... 239s [Sat Jan 18 18:48:44 2025] systemd[1]: Mounting dev-mqueue.mount - POSIX Message Queue File System... 239s [Sat Jan 18 18:48:44 2025] systemd[1]: Mounting run-lock.mount - Legacy Locks Directory /run/lock... 239s [Sat Jan 18 18:48:44 2025] systemd[1]: Mounting sys-kernel-debug.mount - Kernel Debug File System... 239s [Sat Jan 18 18:48:44 2025] systemd[1]: Mounting sys-kernel-tracing.mount - Kernel Trace File System... 239s [Sat Jan 18 18:48:44 2025] systemd[1]: Mounting tmp.mount - Temporary Directory /tmp... 239s [Sat Jan 18 18:48:44 2025] systemd[1]: Starting systemd-journald.service - Journal Service... 239s [Sat Jan 18 18:48:44 2025] systemd[1]: Starting keyboard-setup.service - Set the console keyboard layout... 239s [Sat Jan 18 18:48:44 2025] systemd[1]: Starting kmod-static-nodes.service - Create List of Static Device Nodes... 239s [Sat Jan 18 18:48:44 2025] systemd[1]: Starting lvm2-monitor.service - Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling... 239s [Sat Jan 18 18:48:44 2025] systemd[1]: Starting modprobe@configfs.service - Load Kernel Module configfs... 239s [Sat Jan 18 18:48:44 2025] systemd[1]: Starting modprobe@dm_multipath.service - Load Kernel Module dm_multipath... 239s [Sat Jan 18 18:48:44 2025] systemd[1]: Starting modprobe@drm.service - Load Kernel Module drm... 239s [Sat Jan 18 18:48:44 2025] systemd-journald[320]: Collecting audit messages is disabled. 239s [Sat Jan 18 18:48:44 2025] systemd[1]: Starting modprobe@efi_pstore.service - Load Kernel Module efi_pstore... 239s [Sat Jan 18 18:48:44 2025] systemd[1]: Starting modprobe@fuse.service - Load Kernel Module fuse... 239s [Sat Jan 18 18:48:44 2025] systemd[1]: netplan-ovs-cleanup.service - OpenVSwitch configuration for cleanup was skipped because of an unmet condition check (ConditionFileIsExecutable=/usr/bin/ovs-vsctl). 239s [Sat Jan 18 18:48:44 2025] systemd[1]: systemd-fsck-root.service - File System Check on Root Device was skipped because of an unmet condition check (ConditionPathExists=!/run/initramfs/fsck-root). 239s [Sat Jan 18 18:48:44 2025] systemd[1]: systemd-hibernate-clear.service - Clear Stale Hibernate Storage Info was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/HibernateLocation-8cf2644b-4b0b-428f-9387-6d876050dc67). 239s [Sat Jan 18 18:48:44 2025] systemd[1]: Starting systemd-modules-load.service - Load Kernel Modules... 239s [Sat Jan 18 18:48:44 2025] systemd[1]: systemd-pcrmachine.service - TPM PCR Machine ID Measurement was skipped because of an unmet condition check (ConditionSecurity=measured-uki). 239s [Sat Jan 18 18:48:44 2025] systemd[1]: Starting systemd-remount-fs.service - Remount Root and Kernel File Systems... 239s [Sat Jan 18 18:48:44 2025] systemd[1]: systemd-tpm2-setup-early.service - Early TPM SRK Setup was skipped because of an unmet condition check (ConditionSecurity=measured-uki). 239s [Sat Jan 18 18:48:44 2025] systemd[1]: Starting systemd-udev-load-credentials.service - Load udev Rules from Credentials... 239s [Sat Jan 18 18:48:44 2025] systemd[1]: Starting systemd-udev-trigger.service - Coldplug All udev Devices... 239s [Sat Jan 18 18:48:44 2025] systemd[1]: Started systemd-journald.service - Journal Service. 239s [Sat Jan 18 18:48:44 2025] EXT4-fs (vda1): re-mounted c1d91cd9-c36e-400f-a528-e35795b2f626 r/w. Quota mode: none. 239s [Sat Jan 18 18:48:45 2025] systemd-journald[320]: Received client request to flush runtime journal. 239s [Sat Jan 18 18:48:45 2025] piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 239s [Sat Jan 18 18:48:45 2025] i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD 239s [Sat Jan 18 18:48:45 2025] kvm_amd: Nested Virtualization enabled 239s [Sat Jan 18 18:48:45 2025] kvm_amd: Nested Paging enabled 239s [Sat Jan 18 18:48:45 2025] qxl 0000:00:02.0: vgaarb: deactivate vga console 239s [Sat Jan 18 18:48:45 2025] Console: switching to colour dummy device 80x25 239s [Sat Jan 18 18:48:45 2025] [drm] Device Version 0.0 239s [Sat Jan 18 18:48:45 2025] [drm] Compression level 0 log level 0 239s [Sat Jan 18 18:48:45 2025] [drm] 12286 io pages at offset 0x1000000 239s [Sat Jan 18 18:48:45 2025] [drm] 16777216 byte draw area at offset 0x0 239s [Sat Jan 18 18:48:45 2025] [drm] RAM header offset: 0x3ffe000 239s [Sat Jan 18 18:48:45 2025] [drm] qxl: 16M of VRAM memory size 239s [Sat Jan 18 18:48:45 2025] [drm] qxl: 63M of IO pages memory ready (VRAM domain) 239s [Sat Jan 18 18:48:45 2025] [drm] qxl: 64M of Surface memory size 239s [Sat Jan 18 18:48:45 2025] [drm] slot 0 (main): base 0xf4000000, size 0x03ffe000 239s [Sat Jan 18 18:48:45 2025] [drm] slot 1 (surfaces): base 0xf8000000, size 0x04000000 239s [Sat Jan 18 18:48:45 2025] [drm] Initialized qxl 0.1.0 for 0000:00:02.0 on minor 0 239s [Sat Jan 18 18:48:45 2025] fbcon: qxldrmfb (fb0) is primary device 239s [Sat Jan 18 18:48:45 2025] Console: switching to colour frame buffer device 128x48 239s [Sat Jan 18 18:48:45 2025] qxl 0000:00:02.0: [drm] fb0: qxldrmfb frame buffer device 239s [Sat Jan 18 18:48:45 2025] EXT4-fs (vda13): mounted filesystem a114845e-6f1f-49a7-8044-b769724fdfd4 r/w with ordered data mode. Quota mode: none. 239s [Sat Jan 18 18:48:46 2025] audit: type=1400 audit(1737226125.411:2): apparmor="STATUS" operation="profile_load" profile="unconfined" name="Discord" pid=511 comm="apparmor_parser" 239s [Sat Jan 18 18:48:46 2025] audit: type=1400 audit(1737226125.412:3): apparmor="STATUS" operation="profile_load" profile="unconfined" name="1password" pid=510 comm="apparmor_parser" 239s [Sat Jan 18 18:48:46 2025] audit: type=1400 audit(1737226125.414:4): apparmor="STATUS" operation="profile_load" profile="unconfined" name="QtWebEngineProcess" pid=517 comm="apparmor_parser" 239s [Sat Jan 18 18:48:46 2025] audit: type=1400 audit(1737226125.414:5): apparmor="STATUS" operation="profile_load" profile="unconfined" name=4D6F6E676F444220436F6D70617373 pid=516 comm="apparmor_parser" 239s [Sat Jan 18 18:48:46 2025] audit: type=1400 audit(1737226125.417:6): apparmor="STATUS" operation="profile_load" profile="unconfined" name="balena-etcher" pid=521 comm="apparmor_parser" 239s [Sat Jan 18 18:48:46 2025] audit: type=1400 audit(1737226125.419:7): apparmor="STATUS" operation="profile_load" profile="unconfined" name="brave" pid=522 comm="apparmor_parser" 239s [Sat Jan 18 18:48:46 2025] audit: type=1400 audit(1737226125.420:8): apparmor="STATUS" operation="profile_load" profile="unconfined" name="buildah" pid=523 comm="apparmor_parser" 239s [Sat Jan 18 18:48:46 2025] audit: type=1400 audit(1737226125.422:9): apparmor="STATUS" operation="profile_load" profile="unconfined" name="busybox" pid=524 comm="apparmor_parser" 239s [Sat Jan 18 18:48:46 2025] audit: type=1400 audit(1737226125.424:10): apparmor="STATUS" operation="profile_load" profile="unconfined" name="Xorg" pid=520 comm="apparmor_parser" 239s [Sat Jan 18 18:48:46 2025] cfg80211: Loading compiled-in X.509 certificates for regulatory database 239s [Sat Jan 18 18:48:46 2025] Loaded X.509 cert 'sforshee: 00b28ddf47aef9cea7' 239s [Sat Jan 18 18:48:46 2025] Loaded X.509 cert 'wens: 61c038651aabdcf94bd0ac7ff06c7248db18c600' 239s [Sat Jan 18 18:48:46 2025] kauditd_printk_skb: 110 callbacks suppressed 239s [Sat Jan 18 18:48:46 2025] audit: type=1400 audit(1737226126.072:121): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="rsyslogd" pid=721 comm="apparmor_parser" 239s [Sat Jan 18 18:48:46 2025] NET: Registered PF_QIPCRTR protocol family 239s [Sat Jan 18 18:49:34 2025] audit: type=1400 audit(1737226174.303:122): apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/sbin/sssd" pid=3194 comm="apparmor_parser" 240s autopkgtest [18:50:02]: test ldap-user-group-krb5-auth: -----------------------] 240s ldap-user-group-krb5-auth FAIL non-zero exit status 253 240s autopkgtest [18:50:02]: test ldap-user-group-krb5-auth: - - - - - - - - - - results - - - - - - - - - - 240s autopkgtest [18:50:02]: test sssd-softhism2-certificates-tests.sh: preparing testbed 667s autopkgtest [18:57:09]: testbed dpkg architecture: amd64 667s autopkgtest [18:57:09]: testbed apt version: 2.9.18 668s autopkgtest [18:57:10]: @@@@@@@@@@@@@@@@@@@@ test bed setup 668s autopkgtest [18:57:10]: testbed release detected to be: plucky 669s autopkgtest [18:57:11]: updating testbed package index (apt update) 669s Get:1 http://ftpmaster.internal/ubuntu plucky-proposed InRelease [73.9 kB] 669s Hit:2 http://ftpmaster.internal/ubuntu plucky InRelease 669s Hit:3 http://ftpmaster.internal/ubuntu plucky-updates InRelease 669s Hit:4 http://ftpmaster.internal/ubuntu plucky-security InRelease 669s Get:5 http://ftpmaster.internal/ubuntu plucky-proposed/multiverse Sources [14.6 kB] 669s Get:6 http://ftpmaster.internal/ubuntu plucky-proposed/universe Sources [822 kB] 670s Get:7 http://ftpmaster.internal/ubuntu plucky-proposed/main Sources [152 kB] 670s Get:8 http://ftpmaster.internal/ubuntu plucky-proposed/restricted Sources [9708 B] 670s Get:9 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 Packages [288 kB] 670s Get:10 http://ftpmaster.internal/ubuntu plucky-proposed/main i386 Packages [201 kB] 670s Get:11 http://ftpmaster.internal/ubuntu plucky-proposed/restricted i386 Packages [2408 B] 670s Get:12 http://ftpmaster.internal/ubuntu plucky-proposed/restricted amd64 Packages [40.1 kB] 670s Get:13 http://ftpmaster.internal/ubuntu plucky-proposed/universe i386 Packages [413 kB] 670s Get:14 http://ftpmaster.internal/ubuntu plucky-proposed/universe amd64 Packages [949 kB] 670s Get:15 http://ftpmaster.internal/ubuntu plucky-proposed/multiverse amd64 Packages [24.6 kB] 670s Get:16 http://ftpmaster.internal/ubuntu plucky-proposed/multiverse i386 Packages [4116 B] 670s Fetched 2996 kB in 1s (3142 kB/s) 671s Reading package lists... 671s Reading package lists... 672s Building dependency tree... 672s Reading state information... 672s Calculating upgrade... 672s The following packages will be upgraded: 672s apport apport-core-dump-handler bash-completion ed libicu74 pci.ids 672s python3-apport python3-problem-report 672s 8 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 672s Need to get 11.8 MB of archives. 672s After this operation, 394 kB of additional disk space will be used. 672s Get:1 http://ftpmaster.internal/ubuntu plucky/main amd64 python3-problem-report all 2.31.0-0ubuntu3 [25.3 kB] 672s Get:2 http://ftpmaster.internal/ubuntu plucky/main amd64 python3-apport all 2.31.0-0ubuntu3 [93.1 kB] 672s Get:3 http://ftpmaster.internal/ubuntu plucky/main amd64 apport-core-dump-handler all 2.31.0-0ubuntu3 [18.3 kB] 672s Get:4 http://ftpmaster.internal/ubuntu plucky/main amd64 apport all 2.31.0-0ubuntu3 [83.0 kB] 672s Get:5 http://ftpmaster.internal/ubuntu plucky/main amd64 libicu74 amd64 74.2-1ubuntu6 [11.0 MB] 673s Get:6 http://ftpmaster.internal/ubuntu plucky/main amd64 bash-completion all 1:2.16.0-6 [214 kB] 673s Get:7 http://ftpmaster.internal/ubuntu plucky/main amd64 ed amd64 1.21-1 [62.3 kB] 673s Get:8 http://ftpmaster.internal/ubuntu plucky/main amd64 pci.ids all 0.0~2025.01.13-1 [282 kB] 673s Fetched 11.8 MB in 1s (12.0 MB/s) 673s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 89449 files and directories currently installed.) 673s Preparing to unpack .../0-python3-problem-report_2.31.0-0ubuntu3_all.deb ... 673s Unpacking python3-problem-report (2.31.0-0ubuntu3) over (2.31.0-0ubuntu2) ... 673s Preparing to unpack .../1-python3-apport_2.31.0-0ubuntu3_all.deb ... 674s Unpacking python3-apport (2.31.0-0ubuntu3) over (2.31.0-0ubuntu2) ... 674s Preparing to unpack .../2-apport-core-dump-handler_2.31.0-0ubuntu3_all.deb ... 674s Unpacking apport-core-dump-handler (2.31.0-0ubuntu3) over (2.31.0-0ubuntu2) ... 674s Preparing to unpack .../3-apport_2.31.0-0ubuntu3_all.deb ... 674s Unpacking apport (2.31.0-0ubuntu3) over (2.31.0-0ubuntu2) ... 674s Preparing to unpack .../4-libicu74_74.2-1ubuntu6_amd64.deb ... 674s Unpacking libicu74:amd64 (74.2-1ubuntu6) over (74.2-1ubuntu4) ... 674s Preparing to unpack .../5-bash-completion_1%3a2.16.0-6_all.deb ... 674s Unpacking bash-completion (1:2.16.0-6) over (1:2.16.0-3) ... 674s Preparing to unpack .../6-ed_1.21-1_amd64.deb ... 674s Unpacking ed (1.21-1) over (1.20.2-2) ... 674s Preparing to unpack .../7-pci.ids_0.0~2025.01.13-1_all.deb ... 674s Unpacking pci.ids (0.0~2025.01.13-1) over (0.0~2024.11.25-1) ... 675s Setting up pci.ids (0.0~2025.01.13-1) ... 675s Setting up python3-problem-report (2.31.0-0ubuntu3) ... 675s Setting up python3-apport (2.31.0-0ubuntu3) ... 675s Setting up ed (1.21-1) ... 675s Setting up bash-completion (1:2.16.0-6) ... 675s Setting up libicu74:amd64 (74.2-1ubuntu6) ... 675s Setting up apport-core-dump-handler (2.31.0-0ubuntu3) ... 675s invoke-rc.d: policy-rc.d denied execution of restart. 675s /usr/sbin/policy-rc.d returned 101, not running 'restart apport.service' 675s Setting up apport (2.31.0-0ubuntu3) ... 675s /usr/sbin/policy-rc.d returned 101, not running 'restart apport-autoreport.path apport-autoreport.service apport-autoreport.timer apport-forward.socket' 675s Processing triggers for install-info (7.1.1-1) ... 676s Processing triggers for libc-bin (2.40-4ubuntu1) ... 676s Processing triggers for man-db (2.13.0-1) ... 677s 677s Running kernel seems to be up-to-date. 677s 677s No services need to be restarted. 677s 677s No containers need to be restarted. 677s 677s No user sessions are running outdated binaries. 677s 677s No VM guests are running outdated hypervisor (qemu) binaries on this host. 678s Reading package lists... 678s Building dependency tree... 678s Reading state information... 678s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 678s autopkgtest [18:57:20]: upgrading testbed (apt dist-upgrade and autopurge) 678s Reading package lists... 678s Building dependency tree... 678s Reading state information... 679s Calculating upgrade...Starting pkgProblemResolver with broken count: 0 679s Starting 2 pkgProblemResolver with broken count: 0 679s Done 679s Entering ResolveByKeep 680s 680s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 680s Reading package lists... 680s Building dependency tree... 680s Reading state information... 680s Starting pkgProblemResolver with broken count: 0 680s Starting 2 pkgProblemResolver with broken count: 0 680s Done 681s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 681s autopkgtest [18:57:23]: rebooting testbed after setup commands that affected boot 706s Reading package lists... 706s Building dependency tree... 706s Reading state information... 707s Starting pkgProblemResolver with broken count: 1 707s Starting 2 pkgProblemResolver with broken count: 1 707s Investigating (0) satisfy:command-line:amd64 < none -> 1 @un puN Ib > 707s Broken satisfy:command-line:amd64 Depends on sssd:amd64 < none @un H > 707s Considering sssd:amd64 1 as a solution to satisfy:command-line:amd64 9998 707s Considering sssd:amd64 1 as a solution to satisfy:command-line:amd64 9998 707s Considering sssd:i386 0 as a solution to satisfy:command-line:amd64 9998 707s Considering sssd:i386 0 as a solution to satisfy:command-line:amd64 9998 707s Done 707s Some packages could not be installed. This may mean that you have 707s requested an impossible situation or if you are using the unstable 707s distribution that some required packages have not yet been created 707s or been moved out of Incoming. 707s The following information may help to resolve the situation: 707s 707s The following packages have unmet dependencies: 707s satisfy:command-line : Depends: sssd 707s E: Unable to correct problems, you have held broken packages. 707s autopkgtest: WARNING: Test dependencies are unsatisfiable with using apt pinning. Retrying with using all packages from plucky-proposed 707s Reading package lists... 707s Building dependency tree... 707s Reading state information... 708s Starting pkgProblemResolver with broken count: 0 708s Starting 2 pkgProblemResolver with broken count: 0 708s Done 708s The following packages were automatically installed and are no longer required: 708s python3.12 python3.12-minimal 708s Use 'sudo apt autoremove' to remove them. 708s The following NEW packages will be installed: 708s gnutls-bin libavahi-client3 libavahi-common-data libavahi-common3 708s libbasicobjects0t64 libcares2 libcollection4t64 libcrack2 libdhash1t64 708s libevent-2.1-7t64 libgnutls-dane0t64 libini-config5t64 libipa-hbac0t64 708s libldb2 libnfsidmap1 libnss-sss libpam-pwquality libpam-sss 708s libpath-utils1t64 libpwquality-common libpwquality1 libpython3.13-minimal 708s libpython3.13-stdlib libref-array1t64 libsmbclient0 libsofthsm2 708s libsss-certmap0 libsss-idmap0 libsss-nss-idmap0 libtalloc2 libtdb1 708s libtevent0t64 libunbound8 libwbclient0 python3-sss python3.13 708s python3.13-minimal samba-libs softhsm2 softhsm2-common sssd sssd-ad 708s sssd-ad-common sssd-common sssd-ipa sssd-krb5 sssd-krb5-common sssd-ldap 708s sssd-proxy 708s The following packages will be upgraded: 708s libpython3-stdlib python3 python3-minimal python3.13-gdbm 709s 4 upgraded, 49 newly installed, 0 to remove and 130 not upgraded. 709s Need to get 16.9 MB of archives. 709s After this operation, 64.0 MB of additional disk space will be used. 709s Get:1 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 libpython3.13-minimal amd64 3.13.1-3 [881 kB] 709s Get:2 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 python3.13-minimal amd64 3.13.1-3 [2358 kB] 710s Get:3 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 python3-minimal amd64 3.13.1-1~exp2 [27.6 kB] 710s Get:4 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 python3 amd64 3.13.1-1~exp2 [23.9 kB] 710s Get:5 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 libpython3.13-stdlib amd64 3.13.1-3 [2087 kB] 710s Get:6 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 python3.13 amd64 3.13.1-3 [729 kB] 710s Get:7 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 libpython3-stdlib amd64 3.13.1-1~exp2 [10.2 kB] 710s Get:8 http://ftpmaster.internal/ubuntu plucky/main amd64 libevent-2.1-7t64 amd64 2.1.12-stable-10 [144 kB] 710s Get:9 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 libunbound8 amd64 1.20.0-1ubuntu2.2 [512 kB] 710s Get:10 http://ftpmaster.internal/ubuntu plucky/main amd64 libgnutls-dane0t64 amd64 3.8.8-2ubuntu1 [24.3 kB] 710s Get:11 http://ftpmaster.internal/ubuntu plucky/universe amd64 gnutls-bin amd64 3.8.8-2ubuntu1 [282 kB] 710s Get:12 http://ftpmaster.internal/ubuntu plucky/main amd64 libavahi-common-data amd64 0.8-14ubuntu1 [30.5 kB] 710s Get:13 http://ftpmaster.internal/ubuntu plucky/main amd64 libavahi-common3 amd64 0.8-14ubuntu1 [23.3 kB] 710s Get:14 http://ftpmaster.internal/ubuntu plucky/main amd64 libavahi-client3 amd64 0.8-14ubuntu1 [27.5 kB] 710s Get:15 http://ftpmaster.internal/ubuntu plucky/main amd64 libbasicobjects0t64 amd64 0.6.2-3 [5878 B] 710s Get:16 http://ftpmaster.internal/ubuntu plucky/main amd64 libcares2 amd64 1.34.4-2.1 [109 kB] 710s Get:17 http://ftpmaster.internal/ubuntu plucky/main amd64 libcollection4t64 amd64 0.6.2-3 [31.1 kB] 710s Get:18 http://ftpmaster.internal/ubuntu plucky/main amd64 libcrack2 amd64 2.9.6-5.2 [29.3 kB] 710s Get:19 http://ftpmaster.internal/ubuntu plucky/main amd64 libdhash1t64 amd64 0.6.2-3 [8792 B] 710s Get:20 http://ftpmaster.internal/ubuntu plucky/main amd64 libpath-utils1t64 amd64 0.6.2-3 [8810 B] 710s Get:21 http://ftpmaster.internal/ubuntu plucky/main amd64 libref-array1t64 amd64 0.6.2-3 [7396 B] 710s Get:22 http://ftpmaster.internal/ubuntu plucky/main amd64 libini-config5t64 amd64 0.6.2-3 [43.9 kB] 710s Get:23 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 libipa-hbac0t64 amd64 2.10.1-2ubuntu1 [18.8 kB] 710s Get:24 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 libtalloc2 amd64 2.4.2-2build1 [35.2 kB] 710s Get:25 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 libtdb1 amd64 1.4.12-1build1 [54.2 kB] 710s Get:26 http://ftpmaster.internal/ubuntu plucky/main amd64 libtevent0t64 amd64 0.16.1-3 [42.7 kB] 710s Get:27 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 libldb2 amd64 2:2.9.1+samba4.20.4+dfsg-1ubuntu5 [197 kB] 710s Get:28 http://ftpmaster.internal/ubuntu plucky/main amd64 libnfsidmap1 amd64 1:2.6.4-4ubuntu1 [48.3 kB] 710s Get:29 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 libpwquality-common all 1.4.5-3build2 [7820 B] 710s Get:30 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 libpwquality1 amd64 1.4.5-3build2 [14.3 kB] 710s Get:31 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 libpam-pwquality amd64 1.4.5-3build2 [12.0 kB] 710s Get:32 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 libwbclient0 amd64 2:4.20.4+dfsg-1ubuntu5 [75.9 kB] 710s Get:33 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 samba-libs amd64 2:4.20.4+dfsg-1ubuntu5 [6396 kB] 710s Get:34 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 libsmbclient0 amd64 2:4.20.4+dfsg-1ubuntu5 [63.7 kB] 710s Get:35 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 python3.13-gdbm amd64 3.13.1-3 [31.7 kB] 710s Get:36 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 libnss-sss amd64 2.10.1-2ubuntu1 [33.3 kB] 710s Get:37 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 libpam-sss amd64 2.10.1-2ubuntu1 [53.3 kB] 710s Get:38 http://ftpmaster.internal/ubuntu plucky/universe amd64 softhsm2-common amd64 2.6.1-2.2ubuntu3 [6198 B] 710s Get:39 http://ftpmaster.internal/ubuntu plucky/universe amd64 libsofthsm2 amd64 2.6.1-2.2ubuntu3 [266 kB] 710s Get:40 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 libsss-certmap0 amd64 2.10.1-2ubuntu1 [49.4 kB] 710s Get:41 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 libsss-idmap0 amd64 2.10.1-2ubuntu1 [23.5 kB] 710s Get:42 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 libsss-nss-idmap0 amd64 2.10.1-2ubuntu1 [34.1 kB] 710s Get:43 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 python3-sss amd64 2.10.1-2ubuntu1 [46.8 kB] 710s Get:44 http://ftpmaster.internal/ubuntu plucky/universe amd64 softhsm2 amd64 2.6.1-2.2ubuntu3 [175 kB] 710s Get:45 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 sssd-common amd64 2.10.1-2ubuntu1 [1163 kB] 710s Get:46 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 sssd-ad-common amd64 2.10.1-2ubuntu1 [78.7 kB] 710s Get:47 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 sssd-krb5-common amd64 2.10.1-2ubuntu1 [94.5 kB] 710s Get:48 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 sssd-ad amd64 2.10.1-2ubuntu1 [140 kB] 710s Get:49 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 sssd-ipa amd64 2.10.1-2ubuntu1 [226 kB] 710s Get:50 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 sssd-krb5 amd64 2.10.1-2ubuntu1 [14.6 kB] 710s Get:51 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 sssd-ldap amd64 2.10.1-2ubuntu1 [31.7 kB] 710s Get:52 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 sssd-proxy amd64 2.10.1-2ubuntu1 [44.7 kB] 710s Get:53 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 sssd amd64 2.10.1-2ubuntu1 [4118 B] 711s Fetched 16.9 MB in 2s (7677 kB/s) 711s Selecting previously unselected package libpython3.13-minimal:amd64. 711s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 89449 files and directories currently installed.) 711s Preparing to unpack .../libpython3.13-minimal_3.13.1-3_amd64.deb ... 711s Unpacking libpython3.13-minimal:amd64 (3.13.1-3) ... 711s Selecting previously unselected package python3.13-minimal. 711s Preparing to unpack .../python3.13-minimal_3.13.1-3_amd64.deb ... 711s Unpacking python3.13-minimal (3.13.1-3) ... 711s Setting up libpython3.13-minimal:amd64 (3.13.1-3) ... 711s Setting up python3.13-minimal (3.13.1-3) ... 712s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 89770 files and directories currently installed.) 712s Preparing to unpack .../python3-minimal_3.13.1-1~exp2_amd64.deb ... 712s Unpacking python3-minimal (3.13.1-1~exp2) over (3.12.8-1) ... 712s Setting up python3-minimal (3.13.1-1~exp2) ... 712s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 89770 files and directories currently installed.) 712s Preparing to unpack .../00-python3_3.13.1-1~exp2_amd64.deb ... 712s Unpacking python3 (3.13.1-1~exp2) over (3.12.8-1) ... 712s Selecting previously unselected package libpython3.13-stdlib:amd64. 712s Preparing to unpack .../01-libpython3.13-stdlib_3.13.1-3_amd64.deb ... 712s Unpacking libpython3.13-stdlib:amd64 (3.13.1-3) ... 712s Selecting previously unselected package python3.13. 712s Preparing to unpack .../02-python3.13_3.13.1-3_amd64.deb ... 712s Unpacking python3.13 (3.13.1-3) ... 712s Preparing to unpack .../03-libpython3-stdlib_3.13.1-1~exp2_amd64.deb ... 712s Unpacking libpython3-stdlib:amd64 (3.13.1-1~exp2) over (3.12.8-1) ... 712s Selecting previously unselected package libevent-2.1-7t64:amd64. 712s Preparing to unpack .../04-libevent-2.1-7t64_2.1.12-stable-10_amd64.deb ... 712s Unpacking libevent-2.1-7t64:amd64 (2.1.12-stable-10) ... 712s Selecting previously unselected package libunbound8:amd64. 712s Preparing to unpack .../05-libunbound8_1.20.0-1ubuntu2.2_amd64.deb ... 712s Unpacking libunbound8:amd64 (1.20.0-1ubuntu2.2) ... 712s Selecting previously unselected package libgnutls-dane0t64:amd64. 712s Preparing to unpack .../06-libgnutls-dane0t64_3.8.8-2ubuntu1_amd64.deb ... 712s Unpacking libgnutls-dane0t64:amd64 (3.8.8-2ubuntu1) ... 712s Selecting previously unselected package gnutls-bin. 712s Preparing to unpack .../07-gnutls-bin_3.8.8-2ubuntu1_amd64.deb ... 712s Unpacking gnutls-bin (3.8.8-2ubuntu1) ... 712s Selecting previously unselected package libavahi-common-data:amd64. 712s Preparing to unpack .../08-libavahi-common-data_0.8-14ubuntu1_amd64.deb ... 712s Unpacking libavahi-common-data:amd64 (0.8-14ubuntu1) ... 712s Selecting previously unselected package libavahi-common3:amd64. 712s Preparing to unpack .../09-libavahi-common3_0.8-14ubuntu1_amd64.deb ... 712s Unpacking libavahi-common3:amd64 (0.8-14ubuntu1) ... 712s Selecting previously unselected package libavahi-client3:amd64. 712s Preparing to unpack .../10-libavahi-client3_0.8-14ubuntu1_amd64.deb ... 712s Unpacking libavahi-client3:amd64 (0.8-14ubuntu1) ... 712s Selecting previously unselected package libbasicobjects0t64:amd64. 712s Preparing to unpack .../11-libbasicobjects0t64_0.6.2-3_amd64.deb ... 712s Unpacking libbasicobjects0t64:amd64 (0.6.2-3) ... 712s Selecting previously unselected package libcares2:amd64. 712s Preparing to unpack .../12-libcares2_1.34.4-2.1_amd64.deb ... 712s Unpacking libcares2:amd64 (1.34.4-2.1) ... 712s Selecting previously unselected package libcollection4t64:amd64. 712s Preparing to unpack .../13-libcollection4t64_0.6.2-3_amd64.deb ... 712s Unpacking libcollection4t64:amd64 (0.6.2-3) ... 712s Selecting previously unselected package libcrack2:amd64. 712s Preparing to unpack .../14-libcrack2_2.9.6-5.2_amd64.deb ... 712s Unpacking libcrack2:amd64 (2.9.6-5.2) ... 712s Selecting previously unselected package libdhash1t64:amd64. 712s Preparing to unpack .../15-libdhash1t64_0.6.2-3_amd64.deb ... 712s Unpacking libdhash1t64:amd64 (0.6.2-3) ... 712s Selecting previously unselected package libpath-utils1t64:amd64. 712s Preparing to unpack .../16-libpath-utils1t64_0.6.2-3_amd64.deb ... 712s Unpacking libpath-utils1t64:amd64 (0.6.2-3) ... 712s Selecting previously unselected package libref-array1t64:amd64. 712s Preparing to unpack .../17-libref-array1t64_0.6.2-3_amd64.deb ... 712s Unpacking libref-array1t64:amd64 (0.6.2-3) ... 712s Selecting previously unselected package libini-config5t64:amd64. 712s Preparing to unpack .../18-libini-config5t64_0.6.2-3_amd64.deb ... 712s Unpacking libini-config5t64:amd64 (0.6.2-3) ... 713s Selecting previously unselected package libipa-hbac0t64. 713s Preparing to unpack .../19-libipa-hbac0t64_2.10.1-2ubuntu1_amd64.deb ... 713s Unpacking libipa-hbac0t64 (2.10.1-2ubuntu1) ... 713s Selecting previously unselected package libtalloc2:amd64. 713s Preparing to unpack .../20-libtalloc2_2.4.2-2build1_amd64.deb ... 713s Unpacking libtalloc2:amd64 (2.4.2-2build1) ... 713s Selecting previously unselected package libtdb1:amd64. 713s Preparing to unpack .../21-libtdb1_1.4.12-1build1_amd64.deb ... 713s Unpacking libtdb1:amd64 (1.4.12-1build1) ... 713s Selecting previously unselected package libtevent0t64:amd64. 713s Preparing to unpack .../22-libtevent0t64_0.16.1-3_amd64.deb ... 713s Unpacking libtevent0t64:amd64 (0.16.1-3) ... 713s Selecting previously unselected package libldb2:amd64. 713s Preparing to unpack .../23-libldb2_2%3a2.9.1+samba4.20.4+dfsg-1ubuntu5_amd64.deb ... 713s Unpacking libldb2:amd64 (2:2.9.1+samba4.20.4+dfsg-1ubuntu5) ... 713s Selecting previously unselected package libnfsidmap1:amd64. 713s Preparing to unpack .../24-libnfsidmap1_1%3a2.6.4-4ubuntu1_amd64.deb ... 713s Unpacking libnfsidmap1:amd64 (1:2.6.4-4ubuntu1) ... 713s Selecting previously unselected package libpwquality-common. 713s Preparing to unpack .../25-libpwquality-common_1.4.5-3build2_all.deb ... 713s Unpacking libpwquality-common (1.4.5-3build2) ... 713s Selecting previously unselected package libpwquality1:amd64. 713s Preparing to unpack .../26-libpwquality1_1.4.5-3build2_amd64.deb ... 713s Unpacking libpwquality1:amd64 (1.4.5-3build2) ... 713s Selecting previously unselected package libpam-pwquality:amd64. 713s Preparing to unpack .../27-libpam-pwquality_1.4.5-3build2_amd64.deb ... 713s Unpacking libpam-pwquality:amd64 (1.4.5-3build2) ... 713s Selecting previously unselected package libwbclient0:amd64. 713s Preparing to unpack .../28-libwbclient0_2%3a4.20.4+dfsg-1ubuntu5_amd64.deb ... 713s Unpacking libwbclient0:amd64 (2:4.20.4+dfsg-1ubuntu5) ... 713s Selecting previously unselected package samba-libs:amd64. 713s Preparing to unpack .../29-samba-libs_2%3a4.20.4+dfsg-1ubuntu5_amd64.deb ... 713s Unpacking samba-libs:amd64 (2:4.20.4+dfsg-1ubuntu5) ... 713s Selecting previously unselected package libsmbclient0:amd64. 713s Preparing to unpack .../30-libsmbclient0_2%3a4.20.4+dfsg-1ubuntu5_amd64.deb ... 713s Unpacking libsmbclient0:amd64 (2:4.20.4+dfsg-1ubuntu5) ... 713s Preparing to unpack .../31-python3.13-gdbm_3.13.1-3_amd64.deb ... 713s Unpacking python3.13-gdbm (3.13.1-3) over (3.13.1-2) ... 713s Selecting previously unselected package libnss-sss:amd64. 713s Preparing to unpack .../32-libnss-sss_2.10.1-2ubuntu1_amd64.deb ... 713s Unpacking libnss-sss:amd64 (2.10.1-2ubuntu1) ... 713s Selecting previously unselected package libpam-sss:amd64. 713s Preparing to unpack .../33-libpam-sss_2.10.1-2ubuntu1_amd64.deb ... 713s Unpacking libpam-sss:amd64 (2.10.1-2ubuntu1) ... 713s Selecting previously unselected package softhsm2-common. 713s Preparing to unpack .../34-softhsm2-common_2.6.1-2.2ubuntu3_amd64.deb ... 713s Unpacking softhsm2-common (2.6.1-2.2ubuntu3) ... 713s Selecting previously unselected package libsofthsm2. 713s Preparing to unpack .../35-libsofthsm2_2.6.1-2.2ubuntu3_amd64.deb ... 713s Unpacking libsofthsm2 (2.6.1-2.2ubuntu3) ... 713s Selecting previously unselected package libsss-certmap0. 713s Preparing to unpack .../36-libsss-certmap0_2.10.1-2ubuntu1_amd64.deb ... 713s Unpacking libsss-certmap0 (2.10.1-2ubuntu1) ... 713s Selecting previously unselected package libsss-idmap0. 713s Preparing to unpack .../37-libsss-idmap0_2.10.1-2ubuntu1_amd64.deb ... 713s Unpacking libsss-idmap0 (2.10.1-2ubuntu1) ... 713s Selecting previously unselected package libsss-nss-idmap0. 713s Preparing to unpack .../38-libsss-nss-idmap0_2.10.1-2ubuntu1_amd64.deb ... 713s Unpacking libsss-nss-idmap0 (2.10.1-2ubuntu1) ... 713s Selecting previously unselected package python3-sss. 713s Preparing to unpack .../39-python3-sss_2.10.1-2ubuntu1_amd64.deb ... 713s Unpacking python3-sss (2.10.1-2ubuntu1) ... 713s Selecting previously unselected package softhsm2. 713s Preparing to unpack .../40-softhsm2_2.6.1-2.2ubuntu3_amd64.deb ... 713s Unpacking softhsm2 (2.6.1-2.2ubuntu3) ... 713s Selecting previously unselected package sssd-common. 713s Preparing to unpack .../41-sssd-common_2.10.1-2ubuntu1_amd64.deb ... 713s Unpacking sssd-common (2.10.1-2ubuntu1) ... 713s Selecting previously unselected package sssd-ad-common. 713s Preparing to unpack .../42-sssd-ad-common_2.10.1-2ubuntu1_amd64.deb ... 713s Unpacking sssd-ad-common (2.10.1-2ubuntu1) ... 713s Selecting previously unselected package sssd-krb5-common. 713s Preparing to unpack .../43-sssd-krb5-common_2.10.1-2ubuntu1_amd64.deb ... 713s Unpacking sssd-krb5-common (2.10.1-2ubuntu1) ... 713s Selecting previously unselected package sssd-ad. 713s Preparing to unpack .../44-sssd-ad_2.10.1-2ubuntu1_amd64.deb ... 713s Unpacking sssd-ad (2.10.1-2ubuntu1) ... 713s Selecting previously unselected package sssd-ipa. 713s Preparing to unpack .../45-sssd-ipa_2.10.1-2ubuntu1_amd64.deb ... 713s Unpacking sssd-ipa (2.10.1-2ubuntu1) ... 713s Selecting previously unselected package sssd-krb5. 713s Preparing to unpack .../46-sssd-krb5_2.10.1-2ubuntu1_amd64.deb ... 713s Unpacking sssd-krb5 (2.10.1-2ubuntu1) ... 713s Selecting previously unselected package sssd-ldap. 713s Preparing to unpack .../47-sssd-ldap_2.10.1-2ubuntu1_amd64.deb ... 713s Unpacking sssd-ldap (2.10.1-2ubuntu1) ... 713s Selecting previously unselected package sssd-proxy. 713s Preparing to unpack .../48-sssd-proxy_2.10.1-2ubuntu1_amd64.deb ... 713s Unpacking sssd-proxy (2.10.1-2ubuntu1) ... 713s Selecting previously unselected package sssd. 713s Preparing to unpack .../49-sssd_2.10.1-2ubuntu1_amd64.deb ... 713s Unpacking sssd (2.10.1-2ubuntu1) ... 713s Setting up libpwquality-common (1.4.5-3build2) ... 713s Setting up softhsm2-common (2.6.1-2.2ubuntu3) ... 714s Creating config file /etc/softhsm/softhsm2.conf with new version 714s Setting up libnfsidmap1:amd64 (1:2.6.4-4ubuntu1) ... 714s Setting up libsss-idmap0 (2.10.1-2ubuntu1) ... 714s Setting up libbasicobjects0t64:amd64 (0.6.2-3) ... 714s Setting up libipa-hbac0t64 (2.10.1-2ubuntu1) ... 714s Setting up libref-array1t64:amd64 (0.6.2-3) ... 714s Setting up libtdb1:amd64 (1.4.12-1build1) ... 714s Setting up libcollection4t64:amd64 (0.6.2-3) ... 714s Setting up libevent-2.1-7t64:amd64 (2.1.12-stable-10) ... 714s Setting up libwbclient0:amd64 (2:4.20.4+dfsg-1ubuntu5) ... 714s Setting up libtalloc2:amd64 (2.4.2-2build1) ... 714s Setting up libpath-utils1t64:amd64 (0.6.2-3) ... 714s Setting up libunbound8:amd64 (1.20.0-1ubuntu2.2) ... 714s Setting up libgnutls-dane0t64:amd64 (3.8.8-2ubuntu1) ... 714s Setting up libavahi-common-data:amd64 (0.8-14ubuntu1) ... 714s Setting up libcares2:amd64 (1.34.4-2.1) ... 714s Setting up libdhash1t64:amd64 (0.6.2-3) ... 714s Setting up libcrack2:amd64 (2.9.6-5.2) ... 714s Setting up libsss-nss-idmap0 (2.10.1-2ubuntu1) ... 714s Setting up libini-config5t64:amd64 (0.6.2-3) ... 714s Setting up libpython3.13-stdlib:amd64 (3.13.1-3) ... 714s Setting up libtevent0t64:amd64 (0.16.1-3) ... 714s Setting up python3.13-gdbm (3.13.1-3) ... 714s Setting up libpython3-stdlib:amd64 (3.13.1-1~exp2) ... 714s Setting up libnss-sss:amd64 (2.10.1-2ubuntu1) ... 714s Setting up gnutls-bin (3.8.8-2ubuntu1) ... 714s Setting up libsofthsm2 (2.6.1-2.2ubuntu3) ... 714s Setting up softhsm2 (2.6.1-2.2ubuntu3) ... 714s Setting up python3.13 (3.13.1-3) ... 714s Setting up libavahi-common3:amd64 (0.8-14ubuntu1) ... 714s Setting up python3 (3.13.1-1~exp2) ... 714s /usr/bin/py3clean:101: DeprecationWarning: glob.glob1 is deprecated and will be removed in Python 3.15. Use glob.glob and pass a directory to its root_dir argument instead. 714s for fn in glob1(directory, "%s.*" % fname): 715s Setting up libsss-certmap0 (2.10.1-2ubuntu1) ... 715s Setting up libpwquality1:amd64 (1.4.5-3build2) ... 715s Setting up libldb2:amd64 (2:2.9.1+samba4.20.4+dfsg-1ubuntu5) ... 715s Setting up libavahi-client3:amd64 (0.8-14ubuntu1) ... 715s Setting up libpam-pwquality:amd64 (1.4.5-3build2) ... 715s Setting up samba-libs:amd64 (2:4.20.4+dfsg-1ubuntu5) ... 715s Setting up python3-sss (2.10.1-2ubuntu1) ... 715s Setting up libsmbclient0:amd64 (2:4.20.4+dfsg-1ubuntu5) ... 715s Setting up libpam-sss:amd64 (2.10.1-2ubuntu1) ... 715s Setting up sssd-common (2.10.1-2ubuntu1) ... 715s Creating SSSD system user & group... 715s warn: The home directory `/var/lib/sss' already exists. Not touching this directory. 715s warn: Warning: The home directory `/var/lib/sss' does not belong to the user you are currently creating. 715s Warning: found usr.sbin.sssd in /etc/apparmor.d/force-complain, forcing complain mode 715s Warning from /etc/apparmor.d/usr.sbin.sssd (/etc/apparmor.d/usr.sbin.sssd line 63): Caching disabled for: 'usr.sbin.sssd' due to force complain 715s invoke-rc.d: policy-rc.d denied execution of start. 716s Created symlink '/etc/systemd/system/sssd.service.wants/sssd-autofs.socket' → '/usr/lib/systemd/system/sssd-autofs.socket'. 716s Created symlink '/etc/systemd/system/sssd.service.wants/sssd-nss.socket' → '/usr/lib/systemd/system/sssd-nss.socket'. 716s Created symlink '/etc/systemd/system/sssd.service.wants/sssd-pam.socket' → '/usr/lib/systemd/system/sssd-pam.socket'. 716s Created symlink '/etc/systemd/system/sssd.service.wants/sssd-ssh.socket' → '/usr/lib/systemd/system/sssd-ssh.socket'. 716s Created symlink '/etc/systemd/system/sssd.service.wants/sssd-sudo.socket' → '/usr/lib/systemd/system/sssd-sudo.socket'. 717s Created symlink '/etc/systemd/system/multi-user.target.wants/sssd.service' → '/usr/lib/systemd/system/sssd.service'. 717s /usr/sbin/policy-rc.d returned 101, not running 'start sssd-autofs.service sssd-autofs.socket sssd-nss.service sssd-nss.socket sssd-pam.service sssd-pam.socket sssd-ssh.service sssd-ssh.socket sssd-sudo.service sssd-sudo.socket sssd.service' 717s Setting up sssd-proxy (2.10.1-2ubuntu1) ... 717s Setting up sssd-ad-common (2.10.1-2ubuntu1) ... 717s Created symlink '/etc/systemd/system/sssd.service.wants/sssd-pac.socket' → '/usr/lib/systemd/system/sssd-pac.socket'. 717s /usr/sbin/policy-rc.d returned 101, not running 'start sssd-pac.service sssd-pac.socket' 717s Setting up sssd-krb5-common (2.10.1-2ubuntu1) ... 717s Setting up sssd-krb5 (2.10.1-2ubuntu1) ... 717s Setting up sssd-ldap (2.10.1-2ubuntu1) ... 717s Setting up sssd-ad (2.10.1-2ubuntu1) ... 717s Setting up sssd-ipa (2.10.1-2ubuntu1) ... 717s Setting up sssd (2.10.1-2ubuntu1) ... 717s Processing triggers for systemd (257-2ubuntu1) ... 717s Processing triggers for man-db (2.13.0-1) ... 719s Processing triggers for libc-bin (2.40-4ubuntu1) ... 719s 719s Running kernel seems to be up-to-date. 719s 719s No services need to be restarted. 719s 719s No containers need to be restarted. 719s 719s No user sessions are running outdated binaries. 719s 719s No VM guests are running outdated hypervisor (qemu) binaries on this host. 725s autopkgtest [18:58:07]: test sssd-softhism2-certificates-tests.sh: [----------------------- 725s + '[' -z ubuntu ']' 725s + required_tools=(p11tool openssl softhsm2-util) 725s + for cmd in "${required_tools[@]}" 725s + command -v p11tool 725s + for cmd in "${required_tools[@]}" 725s + command -v openssl 725s + for cmd in "${required_tools[@]}" 725s + command -v softhsm2-util 725s + PIN=053350 725s +++ find /usr/lib/softhsm/libsofthsm2.so 725s +++ head -n 1 725s ++ realpath /usr/lib/softhsm/libsofthsm2.so 725s + SOFTHSM2_MODULE=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so 725s + SSSD_P11_CHILD=/usr/libexec/sssd/p11_child 725s + TOKEN_ID=00112233445566778899FFAABBCCDDEEFF012345 725s + '[' '!' -v NO_SSSD_TESTS ']' 725s + '[' '!' -x /usr/libexec/sssd/p11_child ']' 725s + ca_db_arg=ca_db 725s ++ /usr/libexec/sssd/p11_child --help 725s + p11_child_help='Usage: p11_child [OPTION...] 725s -d, --debug-level=INT Debug level 725s --debug-timestamps=INT Add debug timestamps 725s --debug-microseconds=INT Show timestamps with microseconds 725s --dumpable=INT Allow core dumps 725s --backtrace=INT Enable debug backtrace 725s --debug-fd=INT An open file descriptor for the debug 725s logs 725s --logger=stderr|files|journald Set logger 725s --auth Run in auth mode 725s --pre Run in pre-auth mode 725s --wait_for_card Wait until card is available 725s --verification Run in verification mode 725s --pin Expect PIN on stdin 725s --keypad Expect PIN on keypad 725s --verify=STRING Tune validation 725s --ca_db=STRING CA DB to use 725s --module_name=STRING Module name for authentication 725s --token_name=STRING Token name for authentication 725s --key_id=STRING Key ID for authentication 725s --label=STRING Label for authentication 725s --certificate=STRING certificate to verify, base64 encoded 725s --uri=STRING PKCS#11 URI to restrict selection 725s --chain-id=LONG Tevent chain ID used for logging 725s purposes 725s 725s Help options: 725s -?, --help Show this help message 725s --usage Display brief usage message' 725s + echo 'Usage: p11_child [OPTION...] 725s -d, --debug-level=INT Debug level 725s --debug-timestamps=INT Add debug timestamps 725s --debug-microseconds=INT Show timestamps with microseconds 725s --dumpable=INT Allow core dumps 725s --backtrace=INT Enable debug backtrace 725s --debug-fd=INT An open file descriptor for the debug 725s logs 725s --logger=stderr|files|journald Set logger 725s --auth Run in auth mode 725s --pre Run in pre-auth mode 725s --wait_for_card Wait until card is available 725s --verification Run in verification mode 725s --pin Expect PIN on stdin 725s --keypad Expect PIN on keypad 725s --verify=STRING Tune validation 725s --ca_db=STRING CA DB to use 725s --module_name=STRING Module name for authentication 725s --token_name=STRING Token name for authentication 725s --key_id=STRING Key ID for authentication 725s --label=STRING Label for authentication 725s --certificate=STRING certificate to verify, base64 encoded 725s --uri=STRING PKCS#11 URI to restrict selection 725s --chain-id=LONG Tevent chain ID used for logging 725s purposes 725s 725s Help options: 725s -?, --help Show this help message 725s --usage Display brief usage message' 725s + grep nssdb -qs 725s + echo 'Usage: p11_child [OPTION...] 725s -d, --debug-level=INT Debug level 725s --debug-timestamps=INT Add debug timestamps 725s --debug-microseconds=INT Show timestamps with microseconds 725s --dumpable=INT Allow core dumps 725s --backtrace=INT Enable debug backtrace 725s --debug-fd=INT An open file descriptor for the debug 725s logs 725s --logger=stderr|files|journald Set logger 725s --auth Run in auth mode 725s --pre Run in pre-auth mode 725s --wait_for_card Wait until card is available 725s --verification Run in verification mode 725s --pin Expect PIN on stdin 725s --keypad Expect PIN on keypad 725s --verify=STRING Tune validation 725s --ca_db=STRING CA DB to use 725s --module_name=STRING Module name for authentication 725s --token_name=STRING Token name for authentication 725s --key_id=STRING Key ID for authentication 725s --label=STRING Label for authentication 725s --certificate=STRING certificate to verify, base64 encoded 725s --uri=STRING PKCS#11 URI to restrict selection 725s --chain-id=LONG Tevent chain ID used for logging 725s purposes 725s 725s Help options: 725s -?, --help Show this help message 725s --usage Display brief usage message' 725s + grep -qs -- --ca_db 725s + '[' '!' -e /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so ']' 725s ++ mktemp -d -t sssd-softhsm2-XXXXXX 725s + tmpdir=/tmp/sssd-softhsm2-P7Xs16 725s + keys_size=1024 725s + [[ ! -v KEEP_TEMPORARY_FILES ]] 725s + trap 'rm -rf "$tmpdir"' EXIT 725s + trap 'set +x; echo -e "\nUnexpected failure!!!"' ERR 725s + echo -n 01 725s + touch /tmp/sssd-softhsm2-P7Xs16/index.txt 725s + mkdir -p /tmp/sssd-softhsm2-P7Xs16/new_certs 725s + cat 725s + root_ca_key_pass=pass:random-root-CA-password-17630 725s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-P7Xs16/test-root-CA-key.pem -passout pass:random-root-CA-password-17630 1024 725s + openssl req -passin pass:random-root-CA-password-17630 -batch -config /tmp/sssd-softhsm2-P7Xs16/test-root-CA.config -x509 -new -nodes -key /tmp/sssd-softhsm2-P7Xs16/test-root-CA-key.pem -sha256 -days 1024 -set_serial 0 -extensions v3_ca -out /tmp/sssd-softhsm2-P7Xs16/test-root-CA.pem 725s + openssl x509 -noout -in /tmp/sssd-softhsm2-P7Xs16/test-root-CA.pem 725s + cat 725s + intermediate_ca_key_pass=pass:random-intermediate-CA-password-12983 725s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA-key.pem -passout pass:random-intermediate-CA-password-12983 1024 725s + openssl req -batch -new -nodes -passin pass:random-intermediate-CA-password-12983 -config /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA.config -key /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA-key.pem -passout pass:random-root-CA-password-17630 -sha256 -out /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA-certificate-request.pem 725s + openssl req -text -noout -in /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA-certificate-request.pem 725s Certificate Request: 725s Data: 725s Version: 1 (0x0) 725s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate CA 725s Subject Public Key Info: 725s Public Key Algorithm: rsaEncryption 725s Public-Key: (1024 bit) 725s Modulus: 725s 00:ba:70:55:0e:49:e4:27:da:c8:d3:d7:1a:24:db: 725s 4e:ca:55:96:ad:4c:c6:64:37:0b:20:83:30:e1:38: 725s e2:5e:31:55:48:e7:80:e8:08:88:94:c4:3a:a1:a2: 725s 98:79:77:b9:93:1a:05:e4:50:9f:68:d7:6e:03:99: 725s a9:5f:8a:cf:6e:7f:f0:a4:30:ed:74:3a:dd:3d:e5: 725s 67:bf:51:af:94:8a:e7:34:e4:de:c3:00:df:8c:3c: 725s 54:40:28:67:21:d8:17:23:b9:27:35:1b:76:66:a7: 725s 76:1f:95:7b:85:e1:6f:36:27:3a:42:1a:ee:4e:d9: 725s 2d:64:fe:33:3b:3f:bf:c8:f1 725s Exponent: 65537 (0x10001) 725s Attributes: 725s (none) 725s Requested Extensions: 725s Signature Algorithm: sha256WithRSAEncryption 725s Signature Value: 725s 71:40:55:a6:6f:8a:0e:db:65:12:28:4f:60:a6:10:60:5f:1c: 725s 45:ab:a4:44:cb:61:0e:ef:1c:59:2b:2a:ae:1f:59:79:3d:14: 725s 24:e0:ec:a2:ea:69:36:24:d3:fa:4f:30:19:f0:c9:a0:3b:78: 725s 5e:6e:b7:0c:d5:0e:5c:5a:a9:8b:62:3f:e3:bc:f4:f6:2c:69: 725s bc:eb:64:4d:16:27:24:1c:87:6b:cf:e8:e9:27:77:31:94:cc: 725s dc:e5:9c:39:87:49:69:23:9f:cc:96:22:9a:78:9d:07:ff:bb: 725s de:f0:12:0a:8b:3e:96:49:8c:d8:dc:3c:18:64:22:a3:22:b6: 725s 22:7a 725s + openssl ca -batch -notext -config /tmp/sssd-softhsm2-P7Xs16/test-root-CA.config -passin pass:random-root-CA-password-17630 -keyfile /tmp/sssd-softhsm2-P7Xs16/test-root-CA-key.pem -in /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA-certificate-request.pem -days 365 -extensions v3_intermediate_ca -out /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA.pem 725s Using configuration from /tmp/sssd-softhsm2-P7Xs16/test-root-CA.config 725s Check that the request matches the signature 725s Signature ok 725s Certificate Details: 725s Serial Number: 1 (0x1) 725s Validity 725s Not Before: Jan 18 18:58:07 2025 GMT 725s Not After : Jan 18 18:58:07 2026 GMT 725s Subject: 725s organizationName /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA.pem: OK 725s = Test Organization 725s organizationalUnitName = Test Organization Unit 725s commonName = Test Organization Intermediate CA 725s X509v3 extensions: 725s X509v3 Subject Key Identifier: 725s AC:04:14:1D:7B:38:42:77:66:9C:2E:5E:A9:51:0B:CF:56:5A:9B:B3 725s X509v3 Authority Key Identifier: 725s keyid:DD:C4:4D:2D:40:3E:9C:92:A4:3A:7C:77:FC:10:CD:6C:6A:F0:F5:88 725s DirName:/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root CA 725s serial:00 725s X509v3 Basic Constraints: 725s CA:TRUE 725s X509v3 Key Usage: critical 725s Digital Signature, Certificate Sign, CRL Sign 725s Certificate is to be certified until Jan 18 18:58:07 2026 GMT (365 days) 725s 725s Write out database with 1 new entries 725s Database updated 725s + openssl x509 -noout -in /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA.pem 725s + openssl verify -CAfile /tmp/sssd-softhsm2-P7Xs16/test-root-CA.pem /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA.pem 725s + cat 725s + sub_intermediate_ca_key_pass=pass:random-sub-intermediate-CA-password-5115 725s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-key.pem -passout pass:random-sub-intermediate-CA-password-5115 1024 725s + openssl req -batch -new -nodes -passin pass:random-sub-intermediate-CA-password-5115 -config /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA.config -key /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-key.pem -passout pass:random-intermediate-CA-password-12983 -sha256 -out /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-certificate-request.pem 725s + openssl req -text -noout -in /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-certificate-request.pem 725s Certificate Request: 725s Data: 725s Version: 1 (0x0) 725s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate CA 725s Subject Public Key Info: 725s Public Key Algorithm: rsaEncryption 725s Public-Key: (1024 bit) 725s Modulus: 725s 00:b8:fe:59:3c:6f:86:4f:e7:c7:52:42:64:d6:49: 725s e7:b6:c5:9f:b0:35:27:da:7c:83:50:33:88:47:32: 725s 1d:ef:22:7a:be:41:d6:ac:7c:fd:76:7b:6c:3c:47: 725s a9:3e:b3:f4:d5:71:5e:22:83:d4:c8:61:34:50:28: 725s 0d:8f:8d:37:b2:0c:9b:f0:be:3a:72:5f:03:2d:e6: 725s 8b:0f:b6:f8:7d:e7:8f:3e:b0:f2:09:7c:a4:06:43: 725s 34:38:fa:7e:ef:31:5f:bb:9b:13:1d:75:aa:54:ce: 725s a2:d2:b8:43:db:99:7e:e5:77:8a:43:65:93:66:6b: 725s 78:3b:47:34:af:e4:e8:27:4f 725s Exponent: 65537 (0x10001) 725s Attributes: 725s (none) 725s Requested Extensions: 725s Signature Algorithm: sha256WithRSAEncryption 725s Signature Value: 725s 7e:96:08:0f:95:5b:08:d2:01:f8:ac:dd:8f:49:94:f1:ab:fe: 725s b8:5b:1c:ac:76:84:af:0c:18:53:96:cc:56:81:ed:3c:21:d5: 725s 6b:c1:39:1c:e4:de:57:6d:fd:bc:a4:fe:2e:74:6a:41:0f:b1: 725s d3:7e:98:2d:57:6f:9d:cb:c1:15:7d:40:4c:5d:1e:65:38:b1: 725s d7:2d:f1:31:06:ec:de:cc:9b:6a:17:06:e1:70:15:50:c1:ac: 725s 14:8a:bd:04:90:4e:39:18:aa:c9:4e:73:be:23:59:90:97:24: 725s 91:fd:3c:9e:c1:1c:b4:e7:48:d0:ec:f7:4a:9a:7d:75:b8:5e: 725s 16:6f 725s + openssl ca -batch -notext -config /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA.config -passin pass:random-intermediate-CA-password-12983 -keyfile /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA-key.pem -in /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-certificate-request.pem -days 365 -extensions v3_intermediate_ca -out /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA.pem 725s Using configuration from /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA.config 725s Check that the request matches the signature 725s Signature ok 725s Certificate Details: 725s Serial Number: 2 (0x2) 725s Validity 725s Not Before: Jan 18 18:58:07 2025 GMT 725s Not After : Jan 18 18:58:07 2026 GMT 725s Subject: 725s organizationName = Test Organization 725s organizationalUnitName = Test Organization Unit 725s commonName = Test Organization Sub Intermediate CA 725s X509v3 extensions: 725s X509v3 Subject Key Identifier: 725s CE:1C:22:BE:FA:6F:2C:4B:B2:05:25:AB:60:04:98:BE:D8:1D:5C:01 725s X509v3 Authority Key Identifier: 725s keyid:AC:04:14:1D:7B:38:42:77:66:9C:2E:5E:A9:51:0B:CF:56:5A:9B:B3 725s DirName:/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root CA 725s serial:01 725s X509v3 Basic Constraints: 725s CA:TRUE 725s X509v3 Key Usage: critical 725s Digital Signature, Certificate Sign, CRL Sign 725s Certificate is to be certified until Jan 18 18:58:07 2026 GMT (365 days) 725s 725s Write out database with 1 new entries 725s Database updated 725s + openssl x509 -noout -in /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA.pem 725s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA.pem /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA.pem 725s /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA.pem: OK 725s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-P7Xs16/test-root-CA.pem /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA.pem 725s + local cmd=openssl 725s + shift 725s + openssl verify -CAfile /tmp/sssd-softhsm2-P7Xs16/test-root-CA.pem /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA.pem 725s O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate CA 725s error 20 at 0 depth lookup: unable to get local issuer certificate 725s error /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA.pem: verification failed 725s + cat 725s + root_ca_trusted_cert_0001_key_pass=pass:random-root-ca-trusted-cert-0001-31705 725s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-P7Xs16/test-root-CA-trusted-certificate-0001-key.pem -passout pass:random-root-ca-trusted-cert-0001-31705 1024 725s + openssl req -new -nodes -reqexts req_exts -passin pass:random-root-ca-trusted-cert-0001-31705 -key /tmp/sssd-softhsm2-P7Xs16/test-root-CA-trusted-certificate-0001-key.pem -config /tmp/sssd-softhsm2-P7Xs16/test-root-CA-trusted-certificate-0001.config -out /tmp/sssd-softhsm2-P7Xs16/test-root-CA-trusted-certificate-0001-request.pem 725s + openssl req -text -noout -in /tmp/sssd-softhsm2-P7Xs16/test-root-CA-trusted-certificate-0001-request.pem 725s Certificate Request: 725s Data: 725s Version: 1 (0x0) 725s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root Trusted Certificate 0001 725s Subject Public Key Info: 725s Public Key Algorithm: rsaEncryption 725s Public-Key: (1024 bit) 725s Modulus: 725s 00:bf:73:84:9d:6a:ae:ae:fd:3b:4c:a5:0c:f4:4b: 725s 39:15:7c:d6:8d:1b:d3:39:e9:9d:61:c8:6f:76:55: 725s 64:56:01:5e:9b:fc:ef:30:42:f7:0c:f6:7b:0c:7a: 725s 13:bf:45:04:6e:53:8a:44:1a:38:95:4a:36:81:5e: 725s b5:68:2d:f2:e5:7b:b4:d3:cf:43:30:6b:b3:7c:a1: 725s b8:85:9a:59:9a:fc:46:a0:65:5f:76:0e:44:68:ca: 725s fa:b6:91:85:58:c5:d5:5f:de:45:7c:61:d6:f6:aa: 725s c2:38:ae:35:84:85:42:f0:35:f2:fd:f3:5b:c4:a0: 725s bd:98:3b:0d:e1:9e:62:5c:5f 725s Exponent: 65537 (0x10001) 725s Attributes: 725s Requested Extensions: 725s X509v3 Basic Constraints: 725s CA:FALSE 725s Netscape Cert Type: 725s SSL Client, S/MIME 725s Netscape Comment: 725s Test Organization Root CA trusted Certificate 725s X509v3 Subject Key Identifier: 725s DB:38:6F:EF:EA:42:DC:CD:83:9F:84:0F:B2:0B:C6:62:A1:C4:CB:99 725s X509v3 Key Usage: critical 725s Digital Signature, Non Repudiation, Key Encipherment 725s X509v3 Extended Key Usage: 725s TLS Web Client Authentication, E-mail Protection 725s X509v3 Subject Alternative Name: 725s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 725s Signature Algorithm: sha256WithRSAEncryption 725s Signature Value: 725s 55:64:f1:16:c9:47:6c:c2:06:39:19:09:1c:90:e1:9b:35:d6: 725s 7b:3b:9e:5f:73:03:09:ca:94:10:40:a9:84:a8:01:e1:14:c2: 725s ee:34:6c:9c:ab:be:e1:03:7f:a7:b8:b0:88:8f:91:a1:f3:5f: 725s c8:c4:93:a5:1e:ae:cb:2a:e6:63:0f:30:2f:f1:e9:61:f5:72: 725s 14:02:5e:62:7e:8c:be:59:11:cd:73:88:70:5c:f3:78:ef:df: 725s d2:af:38:85:86:1d:5f:ec:e4:4c:ed:66:5c:b2:4b:37:35:f1: 725s 4e:7f:bc:ca:87:58:8d:72:99:62:57:6e:4e:88:e5:aa:04:bf: 725s fd:b7 725s + openssl ca -batch -notext -config /tmp/sssd-softhsm2-P7Xs16/test-root-CA.config -passin pass:random-root-CA-password-17630 -keyfile /tmp/sssd-softhsm2-P7Xs16/test-root-CA-key.pem -in /tmp/sssd-softhsm2-P7Xs16/test-root-CA-trusted-certificate-0001-request.pem -days 365 -extensions usr_cert -out /tmp/sssd-softhsm2-P7Xs16/test-root-CA-trusted-certificate-0001.pem 725s Using configuration from /tmp/sssd-softhsm2-P7Xs16/test-root-CA.config 725s Check that the request matches the signature 725s Signature ok 725s Certificate Details: 725s Serial Number: 3 (0x3) 725s Validity 725s Not Before: Jan 18 18:58:07 2025 GMT 725s Not After : Jan 18 18:58:07 2026 GMT 725s Subject: 725s organizationName = Test Organization 725s organizationalUnitName = Test Organization Unit 725s commonName = Test Organization Root Trusted Certificate 0001 725s X509v3 extensions: 725s X509v3 Authority Key Identifier: 725s DD:C4:4D:2D:40:3E:9C:92:A4:3A:7C:77:FC:10:CD:6C:6A:F0:F5:88 725s X509v3 Basic Constraints: 725s CA:FALSE 725s Netscape Cert Type: 725s SSL Client, S/MIME 725s Netscape Comment: 725s Test Organization Root CA trusted Certificate 725s X509v3 Subject Key Identifier: 725s DB:38:6F:EF:EA:42:DC:CD:83:9F:84:0F:B2:0B:C6:62:A1:C4:CB:99 725s X509v3 Key Usage: critical 725s Digital Signature, Non Repudiation, Key Encipherment 725s X509v3 Extended Key Usage: 725s TLS Web Client Authentication, E-mail Protection 725s X509v3 Subject Alternative Name: 725s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 725s Certificate is to be certified until Jan 18 18:58:07 2026 GMT (365 days) 725s 725s Write out database with 1 new entries 725s Database updated 725s + openssl x509 -noout -in /tmp/sssd-softhsm2-P7Xs16/test-root-CA-trusted-certificate-0001.pem 725s + openssl verify -CAfile /tmp/sssd-softhsm2-P7Xs16/test-root-CA.pem /tmp/sssd-softhsm2-P7Xs16/test-root-CA-trusted-certificate-0001.pem 725s /tmp/sssd-softhsm2-P7Xs16/test-root-CA-trusted-certificate-0001.pem: OK 725s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA.pem /tmp/sssd-softhsm2-P7Xs16/test-root-CA-trusted-certificate-0001.pem 725s + local cmd=openssl 725s + shift 725s + openssl verify -CAfile /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA.pem /tmp/sssd-softhsm2-P7Xs16/test-root-CA-trusted-certificate-0001.pem 725s O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root Trusted Certificate 0001 725s error 20 at 0 depth lookup: unable to get local issuer certificate 725s error /tmp/sssd-softhsm2-P7Xs16/test-root-CA-trusted-certificate-0001.pem: verification failed 725s + cat 725s + intermediate_ca_trusted_cert_0001_key_pass=pass:random-intermediate-ca-trusted-cert-0001-28208 725s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA-trusted-certificate-0001-key.pem -passout pass:random-intermediate-ca-trusted-cert-0001-28208 1024 725s + openssl req -new -nodes -reqexts req_exts -passin pass:random-intermediate-ca-trusted-cert-0001-28208 -key /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA-trusted-certificate-0001-key.pem -config /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA-trusted-certificate-0001.config -out /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA-trusted-certificate-0001-request.pem 725s + openssl req -text -noout -in /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA-trusted-certificate-0001-request.pem 725s Certificate Request: 725s Data: 725s Version: 1 (0x0) 725s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate Trusted Certificate 0001 725s Subject Public Key Info: 725s Public Key Algorithm: rsaEncryption 725s Public-Key: (1024 bit) 725s Modulus: 725s 00:de:0f:4b:51:b6:e2:37:2c:33:47:10:1b:c8:67: 725s 03:bd:d8:a7:0b:4b:c2:60:a2:62:b4:21:33:fe:38: 725s 77:42:8f:c5:cb:6b:c9:fd:ea:ac:77:81:1a:6a:dd: 725s 6f:51:6a:6c:30:8e:b3:7c:8a:44:6f:91:12:8b:e5: 725s 23:73:65:87:e5:82:77:7d:d0:08:a8:51:bc:4e:0d: 725s f5:98:dd:8a:ef:8c:92:e9:49:c0:3f:cd:78:48:51: 725s 3d:ca:bf:76:0c:88:04:60:2e:20:d3:28:e9:72:c0: 725s 71:c2:f7:d6:1f:76:4d:e7:47:87:b8:f3:d9:de:d9: 725s 46:e2:93:63:59:4f:2c:9f:2f 725s Exponent: 65537 (0x10001) 725s Attributes: 725s Requested Extensions: 725s X509v3 Basic Constraints: 725s CA:FALSE 725s Netscape Cert Type: 725s SSL Client, S/MIME 725s Netscape Comment: 725s Test Organization Intermediate CA trusted Certificate 725s X509v3 Subject Key Identifier: 725s 70:F1:9E:0B:95:90:49:1F:AE:5E:06:8E:6C:DD:BC:3F:5B:C2:40:4A 725s X509v3 Key Usage: critical 725s Digital Signature, Non Repudiation, Key Encipherment 725s X509v3 Extended Key Usage: 725s TLS Web Client Authentication, E-mail Protection 725s X509v3 Subject Alternative Name: 725s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 725s Signature Algorithm: sha256WithRSAEncryption 725s Signature Value: 725s 91:a5:b1:2e:c7:23:15:6a:71:fb:29:bf:7e:36:1b:0e:29:ef: 725s fc:78:c0:e9:0d:7a:c6:ba:4a:31:62:5a:eb:cb:da:88:27:ff: 725s d3:4b:be:d8:2a:18:00:53:9d:e3:bf:f2:3d:c9:2b:c9:2e:a9: 725s f2:0a:07:d1:4f:90:45:c3:a3:79:cf:1e:e9:b2:bd:5b:5f:de: 725s 30:3b:03:87:4b:d3:57:3d:46:e4:52:5e:59:eb:17:30:2a:aa: 725s 03:a5:4a:ab:dc:39:7a:c6:2c:2d:de:7f:c8:eb:4d:df:02:db: 725s e3:e6:d0:df:a1:3f:07:26:e2:24:fa:86:76:da:82:92:2c:05: 725s 2e:c7 725s + openssl ca -passin pass:random-intermediate-CA-password-12983 -config /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA.config -batch -notext -keyfile /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA-key.pem -in /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA-trusted-certificate-0001-request.pem -days 365 -extensions usr_cert -out /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA-trusted-certificate-0001.pem 725s Using configuration from /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA.config 725s Check that the request matches the signature 725s Signature ok 725s Certificate Details: 725s Serial Number: 4 (0x4) 725s Validity 725s Not Before: Jan 18 18:58:07 2025 GMT 725s Not After : Jan 18 18:58:07 2026 GMT 725s Subject: 725s organizationName = Test Organization 725s organizationalUnitName = Test Organization Unit 725s commonName = Test Organization Intermediate Trusted Certificate 0001 725s X509v3 extensions: 725s X509v3 Authority Key Identifier: 725s AC:04:14:1D:7B:38:42:77:66:9C:2E:5E:A9:51:0B:CF:56:5A:9B:B3 725s X509v3 Basic Constraints: 725s CA:FALSE 725s Netscape Cert Type: 725s SSL Client, S/MIME 725s Netscape Comment: 725s Test Organization Intermediate CA trusted Certificate 725s X509v3 Subject Key Identifier: 725s 70:F1:9E:0B:95:90:49:1F:AE:5E:06:8E:6C:DD:BC:3F:5B:C2:40:4A 725s X509v3 Key Usage: critical 725s Digital Signature, Non Repudiation, Key Encipherment 725s X509v3 Extended Key Usage: 725s TLS Web Client Authentication, E-mail Protection 725s X509v3 Subject Alternative Name: 725s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 725s Certificate is to be certified until Jan 18 18:58:07 2026 GMT (365 days) 725s 725s Write out database with 1 new entries 725s Database updated 725s + openssl x509 -noout -in /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA-trusted-certificate-0001.pem 725s This certificate should not be trusted fully 725s + echo 'This certificate should not be trusted fully' 725s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA.pem /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA-trusted-certificate-0001.pem 725s + local cmd=openssl 725s + shift 725s + openssl verify -CAfile /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA.pem /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA-trusted-certificate-0001.pem 725s O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate CA 725s error 2 at 1 depth lookup: unable to get issuer certificate 725s error /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA-trusted-certificate-0001.pem: verification failed 725s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA.pem /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA-trusted-certificate-0001.pem 725s /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA-trusted-certificate-0001.pem: OK 725s + cat 725s + sub_intermediate_ca_trusted_cert_0001_key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-4585 725s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-trusted-certificate-0001-key.pem -passout pass:random-sub-intermediate-ca-trusted-cert-0001-4585 1024 725s + openssl req -new -nodes -reqexts req_exts -passin pass:random-sub-intermediate-ca-trusted-cert-0001-4585 -key /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-trusted-certificate-0001-key.pem -config /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-trusted-certificate-0001.config -out /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-trusted-certificate-0001-request.pem 725s + openssl req -text -noout -in /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-trusted-certificate-0001-request.pem 725s Certificate Request: 725s Data: 725s Version: 1 (0x0) 725s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate Trusted Certificate 0001 725s Subject Public Key Info: 725s Public Key Algorithm: rsaEncryption 725s Public-Key: (1024 bit) 725s Modulus: 725s 00:c9:66:3d:bb:d5:ad:bf:9f:2d:f7:e4:3e:f8:e2: 725s 98:71:c7:f9:d7:08:4d:b3:b2:0d:c8:04:04:c0:69: 725s 04:cc:93:01:b7:b2:c0:db:00:7c:e8:ac:13:6d:15: 725s 03:0d:75:f1:85:df:a8:06:21:ba:7a:14:18:c1:c9: 725s f6:8b:f8:24:b8:dc:d6:82:b6:b5:90:cc:87:59:00: 725s ab:8a:b8:72:f6:fe:3a:78:c0:8b:8e:12:2c:57:40: 725s d1:70:73:a5:ca:e0:03:2b:b4:0f:cd:11:e2:67:ad: 725s a0:86:c8:c8:ac:b2:7e:86:5d:21:19:67:58:46:e2: 725s b1:85:db:7d:0e:32:61:1c:73 725s Exponent: 65537 (0x10001) 725s Attributes: 725s Requested Extensions: 725s X509v3 Basic Constraints: 725s CA:FALSE 725s Netscape Cert Type: 725s SSL Client, S/MIME 725s Netscape Comment: 725s Test Organization Sub Intermediate CA trusted Certificate 725s X509v3 Subject Key Identifier: 725s F8:06:4B:70:B2:D5:BA:61:70:C3:AF:A2:F9:E8:23:D2:35:D8:46:CE 725s X509v3 Key Usage: critical 725s Digital Signature, Non Repudiation, Key Encipherment 725s X509v3 Extended Key Usage: 725s TLS Web Client Authentication, E-mail Protection 725s X509v3 Subject Alternative Name: 725s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 725s Signature Algorithm: sha256WithRSAEncryption 725s Signature Value: 725s 31:61:b7:38:ac:3b:cd:37:82:f5:6b:96:79:48:0b:27:8a:ad: 725s e8:43:5b:6d:2e:be:d3:4f:a5:a8:fa:0d:52:d3:29:db:8a:29: 725s 6d:bb:6b:4b:db:86:59:d8:fc:0d:5e:74:81:e2:33:ef:01:a6: 725s a4:26:1f:22:86:aa:09:d9:4f:50:fb:b9:8f:5c:43:0c:0e:bc: 725s 73:e7:f3:bc:2e:d7:65:80:a2:fb:45:1f:de:60:da:42:77:80: 725s e6:33:09:d8:f2:7e:5b:4a:dd:40:cb:e8:17:f3:a9:5d:2b:0f: 725s 2a:34:36:d7:fe:ac:32:01:ea:50:56:99:29:3c:e8:33:e5:9a: 725s 0f:7b 725s + openssl ca -passin pass:random-sub-intermediate-CA-password-5115 -config /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA.config -batch -notext -keyfile /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-key.pem -in /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-trusted-certificate-0001-request.pem -days 365 -extensions usr_cert -out /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-trusted-certificate-0001.pem 725s Using configuration from /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA.config 725s Check that the request matches the signature 725s Signature ok 725s Certificate Details: 725s Serial Number: 5 (0x5) 725s Validity 725s Not Before: Jan 18 18:58:07 2025 GMT 725s Not After : Jan 18 18:58:07 2026 GMT 725s Subject: 725s organizationName = Test Organization 725s organizationalUnitName = Test Organization Unit 725s commonName = Test Organization Sub Intermediate Trusted Certificate 0001 725s X509v3 extensions: 725s X509v3 Authority Key Identifier: 725s CE:1C:22:BE:FA:6F:2C:4B:B2:05:25:AB:60:04:98:BE:D8:1D:5C:01 725s X509v3 Basic Constraints: 725s CA:FALSE 725s Netscape Cert Type: 725s SSL Client, S/MIME 725s Netscape Comment: 725s Test Organization Sub Intermediate CA trusted Certificate 725s X509v3 Subject Key Identifier: 725s F8:06:4B:70:B2:D5:BA:61:70:C3:AF:A2:F9:E8:23:D2:35:D8:46:CE 725s X509v3 Key Usage: critical 725s Digital Signature, Non Repudiation, Key Encipherment 725s X509v3 Extended Key Usage: 725s TLS Web Client Authentication, E-mail Protection 725s X509v3 Subject Alternative Name: 725s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 725s Certificate is to be certified until Jan 18 18:58:07 2026 GMT (365 days) 725s 725s Write out database with 1 new entries 725s Database updated 725s + openssl x509 -noout -in /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-trusted-certificate-0001.pem 725s This certificate should not be trusted fully 725s + echo 'This certificate should not be trusted fully' 725s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA.pem /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-trusted-certificate-0001.pem 725s + local cmd=openssl 725s + shift 725s + openssl verify -CAfile /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA.pem /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-trusted-certificate-0001.pem 725s O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate CA 725s error 2 at 1 depth lookup: unable to get issuer certificate 725s error /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-trusted-certificate-0001.pem: verification failed 725s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA.pem /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-trusted-certificate-0001.pem 725s + local cmd=openssl 725s + shift 725s + openssl verify -CAfile /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA.pem /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-trusted-certificate-0001.pem 725s O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate Trusted Certificate 0001 725s error 20 at 0 depth lookup: unable to get local issuer certificate 725s error /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-trusted-certificate-0001.pem: verification failed 725s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA.pem /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-trusted-certificate-0001.pem 725s /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-trusted-certificate-0001.pem: OK 725s + expect_fail openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA.pem /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-trusted-certificate-0001.pem 725s + local cmd=openssl 725s + shift 725s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA.pem /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-trusted-certificate-0001.pem 725s O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate Trusted Certificate 0001 725s error 20 at 0 depth lookup: unable to get local issuer certificate 725s error /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-trusted-certificate-0001.pem: verification failed 725s + echo 'Building a the full-chain CA file...' 725s Building a the full-chain CA file... 725s + cat /tmp/sssd-softhsm2-P7Xs16/test-root-CA.pem /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA.pem /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA.pem 725s + cat /tmp/sssd-softhsm2-P7Xs16/test-root-CA.pem /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA.pem 725s + cat /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA.pem /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA.pem 725s + openssl crl2pkcs7 -nocrl -certfile /tmp/sssd-softhsm2-P7Xs16/test-full-chain-CA.pem 725s + openssl pkcs7 -print_certs -noout 725s subject=O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root CA 725s issuer=O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root CA 725s 725s subject=O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate CA 725s issuer=O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root CA 725s 725s subject=O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate CA 725s issuer=O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate CA 725s 725s + openssl verify -CAfile /tmp/sssd-softhsm2-P7Xs16/test-full-chain-CA.pem /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA.pem 725s /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA.pem: OK 725s + openssl verify -CAfile /tmp/sssd-softhsm2-P7Xs16/test-full-chain-CA.pem /tmp/sssd-softhsm2-P7Xs16/test-root-CA-trusted-certificate-0001.pem 725s /tmp/sssd-softhsm2-P7Xs16/test-root-CA-trusted-certificate-0001.pem: OK 725s + openssl verify -CAfile /tmp/sssd-softhsm2-P7Xs16/test-full-chain-CA.pem /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA-trusted-certificate-0001.pem 725s /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA-trusted-certificate-0001.pem: OK 725s + openssl verify -CAfile /tmp/sssd-softhsm2-P7Xs16/test-full-chain-CA.pem /tmp/sssd-softhsm2-P7Xs16/test-root-intermediate-chain-CA.pem 725s /tmp/sssd-softhsm2-P7Xs16/test-root-intermediate-chain-CA.pem: OK 725s + openssl verify -CAfile /tmp/sssd-softhsm2-P7Xs16/test-full-chain-CA.pem /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-trusted-certificate-0001.pem 726s /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-trusted-certificate-0001.pem: OK 726s + echo 'Certificates generation completed!' 726s Certificates generation completed! 726s + [[ -v NO_SSSD_TESTS ]] 726s + invalid_certificate /tmp/sssd-softhsm2-P7Xs16/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-31705 /dev/null 726s + check_certificate /tmp/sssd-softhsm2-P7Xs16/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-31705 /dev/null 726s + local certificate=/tmp/sssd-softhsm2-P7Xs16/test-root-CA-trusted-certificate-0001.pem 726s + local key_pass=pass:random-root-ca-trusted-cert-0001-31705 726s + local key_ring=/dev/null 726s + local verify_option= 726s + prepare_softhsm2_card /tmp/sssd-softhsm2-P7Xs16/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-31705 726s + local certificate=/tmp/sssd-softhsm2-P7Xs16/test-root-CA-trusted-certificate-0001.pem 726s + local key_pass=pass:random-root-ca-trusted-cert-0001-31705 726s + local key_cn 726s + local key_name 726s + local tokens_dir 726s + local output_cert_file 726s + token_name= 726s ++ basename /tmp/sssd-softhsm2-P7Xs16/test-root-CA-trusted-certificate-0001.pem .pem 726s + key_name=test-root-CA-trusted-certificate-0001 726s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-P7Xs16/test-root-CA-trusted-certificate-0001.pem 726s ++ sed -n 's/ *commonName *= //p' 726s + key_cn='Test Organization Root Trusted Certificate 0001' 726s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 726s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-P7Xs16/softhsm2-test-root-CA-trusted-certificate-0001.conf 726s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-P7Xs16/softhsm2-test-root-CA-trusted-certificate-0001.conf 726s ++ basename /tmp/sssd-softhsm2-P7Xs16/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 726s + tokens_dir=/tmp/sssd-softhsm2-P7Xs16/softhsm2-test-root-CA-trusted-certificate-0001 726s + token_name='Test Organization Root Tr Token' 726s + '[' '!' -e /tmp/sssd-softhsm2-P7Xs16/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 726s + local key_file 726s + local decrypted_key 726s + mkdir -p /tmp/sssd-softhsm2-P7Xs16/softhsm2-test-root-CA-trusted-certificate-0001 726s + key_file=/tmp/sssd-softhsm2-P7Xs16/test-root-CA-trusted-certificate-0001-key.pem 726s + decrypted_key=/tmp/sssd-softhsm2-P7Xs16/test-root-CA-trusted-certificate-0001-key-decrypted.pem 726s + cat 726s + softhsm2-util --init-token --label 'Test Organization Root Tr Token' --pin 053350 --so-pin 053350 --free 726s Slot 0 has a free/uninitialized token. 726s The token has been initialized and is reassigned to slot 1488024143 726s + softhsm2-util --show-slots 726s Available slots: 726s Slot 1488024143 726s Slot info: 726s Description: SoftHSM slot ID 0x58b1724f 726s Manufacturer ID: SoftHSM project 726s Hardware version: 2.6 726s Firmware version: 2.6 726s Token present: yes 726s Token info: 726s Manufacturer ID: SoftHSM project 726s Model: SoftHSM v2 726s Hardware version: 2.6 726s Firmware version: 2.6 726s Serial number: 6be8fe08d8b1724f 726s Initialized: yes 726s User PIN init.: yes 726s Label: Test Organization Root Tr Token 726s Slot 1 726s Slot info: 726s Description: SoftHSM slot ID 0x1 726s Manufacturer ID: SoftHSM project 726s Hardware version: 2.6 726s Firmware version: 2.6 726s Token present: yes 726s Token info: 726s Manufacturer ID: SoftHSM project 726s Model: SoftHSM v2 726s Hardware version: 2.6 726s Firmware version: 2.6 726s Serial number: 726s Initialized: no 726s User PIN init.: no 726s Label: 726s + p11tool --provider=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --write --no-mark-private --load-certificate=/tmp/sssd-softhsm2-P7Xs16/test-root-CA-trusted-certificate-0001.pem --login --set-pin=053350 --label 'Test Organization Root Trusted Certificate 0001' --id 00112233445566778899FFAABBCCDDEEFF012345 726s + openssl rsa -passin pass:random-root-ca-trusted-cert-0001-31705 -in /tmp/sssd-softhsm2-P7Xs16/test-root-CA-trusted-certificate-0001-key.pem -out /tmp/sssd-softhsm2-P7Xs16/test-root-CA-trusted-certificate-0001-key-decrypted.pem 726s writing RSA key 726s + p11tool --provider=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --write --load-privkey=/tmp/sssd-softhsm2-P7Xs16/test-root-CA-trusted-certificate-0001-key-decrypted.pem --login --set-pin=053350 --label 'Test Organization Root Trusted Certificate 0001 Key' --id 00112233445566778899FFAABBCCDDEEFF012345 726s + rm /tmp/sssd-softhsm2-P7Xs16/test-root-CA-trusted-certificate-0001-key-decrypted.pem 726s + p11tool --provider=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --list-all 726s Object 0: 726s URL: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=6be8fe08d8b1724f;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert 726s Type: X.509 Certificate (RSA-1024) 726s Expires: Sun Jan 18 18:58:07 2026 726s Label: Test Organization Root Trusted Certificate 0001 726s ID: 00:11:22:33:44:55:66:77:88:99:ff:aa:bb:cc:dd:ee:ff:01:23:45 726s 726s + echo 'Test Organization Root Tr Token' 726s Test Organization Root Tr Token 726s + '[' -n '' ']' 726s + local output_base_name=SSSD-child-1872 726s + local output_file=/tmp/sssd-softhsm2-P7Xs16/SSSD-child-1872.output 726s + output_cert_file=/tmp/sssd-softhsm2-P7Xs16/SSSD-child-1872.pem 726s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/dev/null 726s [p11_child[2494]] [main] (0x0400): p11_child started. 726s [p11_child[2494]] [main] (0x2000): Running in [pre-auth] mode. 726s [p11_child[2494]] [main] (0x2000): Running with effective IDs: [0][0]. 726s [p11_child[2494]] [main] (0x2000): Running with real IDs [0][0]. 726s [p11_child[2494]] [init_verification] (0x0040): X509_LOOKUP_load_file [/dev/null] failed [92274824][error:05800088:x509 certificate routines::no certificate or crl found]. 726s [p11_child[2494]] [do_work] (0x0040): init_verification failed. 726s [p11_child[2494]] [main] (0x0020): p11_child failed (5) 726s + return 2 726s + valid_certificate /tmp/sssd-softhsm2-P7Xs16/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-31705 /dev/null no_verification 726s + check_certificate /tmp/sssd-softhsm2-P7Xs16/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-31705 /dev/null no_verification 726s + local certificate=/tmp/sssd-softhsm2-P7Xs16/test-root-CA-trusted-certificate-0001.pem 726s + local key_pass=pass:random-root-ca-trusted-cert-0001-31705 726s + local key_ring=/dev/null 726s + local verify_option=no_verification 726s + prepare_softhsm2_card /tmp/sssd-softhsm2-P7Xs16/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-31705 726s + local certificate=/tmp/sssd-softhsm2-P7Xs16/test-root-CA-trusted-certificate-0001.pem 726s + local key_pass=pass:random-root-ca-trusted-cert-0001-31705 726s + local key_cn 726s + local key_name 726s + local tokens_dir 726s + local output_cert_file 726s + token_name= 726s ++ basename /tmp/sssd-softhsm2-P7Xs16/test-root-CA-trusted-certificate-0001.pem .pem 726s + key_name=test-root-CA-trusted-certificate-0001 726s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-P7Xs16/test-root-CA-trusted-certificate-0001.pem 726s ++ sed -n 's/ *commonName *= //p' 726s + key_cn='Test Organization Root Trusted Certificate 0001' 726s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 726s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-P7Xs16/softhsm2-test-root-CA-trusted-certificate-0001.conf 726s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-P7Xs16/softhsm2-test-root-CA-trusted-certificate-0001.conf 726s ++ basename /tmp/sssd-softhsm2-P7Xs16/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 726s + tokens_dir=/tmp/sssd-softhsm2-P7Xs16/softhsm2-test-root-CA-trusted-certificate-0001 726s Test Organization Root Tr Token 726s + token_name='Test Organization Root Tr Token' 726s + '[' '!' -e /tmp/sssd-softhsm2-P7Xs16/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 726s + '[' '!' -d /tmp/sssd-softhsm2-P7Xs16/softhsm2-test-root-CA-trusted-certificate-0001 ']' 726s + echo 'Test Organization Root Tr Token' 726s + '[' -n no_verification ']' 726s + local verify_arg=--verify=no_verification 726s + local output_base_name=SSSD-child-4217 726s + local output_file=/tmp/sssd-softhsm2-P7Xs16/SSSD-child-4217.output 726s + output_cert_file=/tmp/sssd-softhsm2-P7Xs16/SSSD-child-4217.pem 726s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --verify=no_verification --ca_db=/dev/null 726s [p11_child[2500]] [main] (0x0400): p11_child started. 726s [p11_child[2500]] [main] (0x2000): Running in [pre-auth] mode. 726s [p11_child[2500]] [main] (0x2000): Running with effective IDs: [0][0]. 726s [p11_child[2500]] [main] (0x2000): Running with real IDs [0][0]. 726s [p11_child[2500]] [parse_cert_verify_opts] (0x0020): Found 'no_verification' option, disabling verification completely. This should not be used in production. 726s [p11_child[2500]] [do_card] (0x4000): Module List: 726s [p11_child[2500]] [do_card] (0x4000): common name: [softhsm2]. 726s [p11_child[2500]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 726s [p11_child[2500]] [do_card] (0x4000): Description [SoftHSM slot ID 0x58b1724f] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 726s [p11_child[2500]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 726s [p11_child[2500]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x58b1724f][1488024143] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 726s [p11_child[2500]] [do_card] (0x4000): Login NOT required. 726s [p11_child[2500]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 726s [p11_child[2500]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Root Tr Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 726s [p11_child[2500]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x58b1724f;slot-manufacturer=SoftHSM%20project;slot-id=1488024143;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=6be8fe08d8b1724f;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 726s [p11_child[2500]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 726s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-P7Xs16/SSSD-child-4217.output 726s + echo '-----BEGIN CERTIFICATE-----' 726s + tail -n1 /tmp/sssd-softhsm2-P7Xs16/SSSD-child-4217.output 726s + echo '-----END CERTIFICATE-----' 726s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-P7Xs16/SSSD-child-4217.pem 726s Certificate: 726s Data: 726s Version: 3 (0x2) 726s Serial Number: 3 (0x3) 726s Signature Algorithm: sha256WithRSAEncryption 726s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root CA 726s Validity 726s Not Before: Jan 18 18:58:07 2025 GMT 726s Not After : Jan 18 18:58:07 2026 GMT 726s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root Trusted Certificate 0001 726s Subject Public Key Info: 726s Public Key Algorithm: rsaEncryption 726s Public-Key: (1024 bit) 726s Modulus: 726s 00:bf:73:84:9d:6a:ae:ae:fd:3b:4c:a5:0c:f4:4b: 726s 39:15:7c:d6:8d:1b:d3:39:e9:9d:61:c8:6f:76:55: 726s 64:56:01:5e:9b:fc:ef:30:42:f7:0c:f6:7b:0c:7a: 726s 13:bf:45:04:6e:53:8a:44:1a:38:95:4a:36:81:5e: 726s b5:68:2d:f2:e5:7b:b4:d3:cf:43:30:6b:b3:7c:a1: 726s b8:85:9a:59:9a:fc:46:a0:65:5f:76:0e:44:68:ca: 726s fa:b6:91:85:58:c5:d5:5f:de:45:7c:61:d6:f6:aa: 726s c2:38:ae:35:84:85:42:f0:35:f2:fd:f3:5b:c4:a0: 726s bd:98:3b:0d:e1:9e:62:5c:5f 726s Exponent: 65537 (0x10001) 726s X509v3 extensions: 726s X509v3 Authority Key Identifier: 726s DD:C4:4D:2D:40:3E:9C:92:A4:3A:7C:77:FC:10:CD:6C:6A:F0:F5:88 726s X509v3 Basic Constraints: 726s CA:FALSE 726s Netscape Cert Type: 726s SSL Client, S/MIME 726s Netscape Comment: 726s Test Organization Root CA trusted Certificate 726s X509v3 Subject Key Identifier: 726s DB:38:6F:EF:EA:42:DC:CD:83:9F:84:0F:B2:0B:C6:62:A1:C4:CB:99 726s X509v3 Key Usage: critical 726s Digital Signature, Non Repudiation, Key Encipherment 726s X509v3 Extended Key Usage: 726s TLS Web Client Authentication, E-mail Protection 726s X509v3 Subject Alternative Name: 726s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 726s Signature Algorithm: sha256WithRSAEncryption 726s Signature Value: 726s af:d1:08:be:51:59:f3:2a:e8:46:6a:00:49:6a:bf:2d:17:6b: 726s dd:c4:07:1f:fc:e8:86:76:2e:e1:de:7f:0d:71:e9:3c:92:78: 726s 08:af:fb:1a:ba:17:a7:b6:eb:e1:a2:d9:93:79:6b:d0:db:39: 726s db:5a:f5:83:98:08:61:fe:1c:20:e5:4d:55:2b:2d:59:74:7e: 726s f6:75:e6:57:da:65:9f:25:57:fe:a5:91:a6:4b:df:ba:1b:eb: 726s 9e:44:d9:27:e8:12:f8:e9:d7:1c:26:b4:a9:4a:3c:f9:ec:d3: 726s 8b:11:8f:e9:eb:22:56:0d:cd:cc:e2:28:00:f6:2e:a1:c0:c5: 726s 8a:55 726s + local found_md5 expected_md5 726s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-P7Xs16/test-root-CA-trusted-certificate-0001.pem 726s + expected_md5=Modulus=BF73849D6AAEAEFD3B4CA50CF44B39157CD68D1BD339E99D61C86F76556456015E9BFCEF3042F70CF67B0C7A13BF45046E538A441A38954A36815EB5682DF2E57BB4D3CF43306BB37CA1B8859A599AFC46A0655F760E4468CAFAB6918558C5D55FDE457C61D6F6AAC238AE35848542F035F2FDF35BC4A0BD983B0DE19E625C5F 726s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-P7Xs16/SSSD-child-4217.pem 726s + found_md5=Modulus=BF73849D6AAEAEFD3B4CA50CF44B39157CD68D1BD339E99D61C86F76556456015E9BFCEF3042F70CF67B0C7A13BF45046E538A441A38954A36815EB5682DF2E57BB4D3CF43306BB37CA1B8859A599AFC46A0655F760E4468CAFAB6918558C5D55FDE457C61D6F6AAC238AE35848542F035F2FDF35BC4A0BD983B0DE19E625C5F 726s + '[' Modulus=BF73849D6AAEAEFD3B4CA50CF44B39157CD68D1BD339E99D61C86F76556456015E9BFCEF3042F70CF67B0C7A13BF45046E538A441A38954A36815EB5682DF2E57BB4D3CF43306BB37CA1B8859A599AFC46A0655F760E4468CAFAB6918558C5D55FDE457C61D6F6AAC238AE35848542F035F2FDF35BC4A0BD983B0DE19E625C5F '!=' Modulus=BF73849D6AAEAEFD3B4CA50CF44B39157CD68D1BD339E99D61C86F76556456015E9BFCEF3042F70CF67B0C7A13BF45046E538A441A38954A36815EB5682DF2E57BB4D3CF43306BB37CA1B8859A599AFC46A0655F760E4468CAFAB6918558C5D55FDE457C61D6F6AAC238AE35848542F035F2FDF35BC4A0BD983B0DE19E625C5F ']' 726s + output_file=/tmp/sssd-softhsm2-P7Xs16/SSSD-child-4217-auth.output 726s ++ basename /tmp/sssd-softhsm2-P7Xs16/SSSD-child-4217-auth.output .output 726s + output_cert_file=/tmp/sssd-softhsm2-P7Xs16/SSSD-child-4217-auth.pem 726s + echo -n 053350 726s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/dev/null --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=no_verification --token_name 'Test Organization Root Tr Token' --module_name /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so 726s [p11_child[2508]] [main] (0x0400): p11_child started. 726s [p11_child[2508]] [main] (0x2000): Running in [auth] mode. 726s [p11_child[2508]] [main] (0x2000): Running with effective IDs: [0][0]. 726s [p11_child[2508]] [main] (0x2000): Running with real IDs [0][0]. 726s [p11_child[2508]] [parse_cert_verify_opts] (0x0020): Found 'no_verification' option, disabling verification completely. This should not be used in production. 726s [p11_child[2508]] [do_card] (0x4000): Module List: 726s [p11_child[2508]] [do_card] (0x4000): common name: [softhsm2]. 726s [p11_child[2508]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 726s [p11_child[2508]] [do_card] (0x4000): Description [SoftHSM slot ID 0x58b1724f] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 726s [p11_child[2508]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 726s [p11_child[2508]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x58b1724f][1488024143] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 726s [p11_child[2508]] [do_card] (0x4000): Login required. 726s [p11_child[2508]] [do_card] (0x4000): Token flags [1069]. 726s [p11_child[2508]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 726s [p11_child[2508]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so Test Organization Root Tr Token Test Organization Root Tr Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 726s [p11_child[2508]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x58b1724f;slot-manufacturer=SoftHSM%20project;slot-id=1488024143;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=6be8fe08d8b1724f;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 726s [p11_child[2508]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 726s [p11_child[2508]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 726s [p11_child[2508]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 726s [p11_child[2508]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 726s [p11_child[2508]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 726s [p11_child[2508]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 726s [p11_child[2508]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 726s [p11_child[2508]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 726s [p11_child[2508]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 726s [p11_child[2508]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 726s [p11_child[2508]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 726s [p11_child[2508]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 726s [p11_child[2508]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 726s [p11_child[2508]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 726s [p11_child[2508]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 726s [p11_child[2508]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 726s [p11_child[2508]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 726s [p11_child[2508]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 726s [p11_child[2508]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 726s [p11_child[2508]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 726s [p11_child[2508]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 726s [p11_child[2508]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 726s [p11_child[2508]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 726s [p11_child[2508]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 726s [p11_child[2508]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 726s [p11_child[2508]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 726s [p11_child[2508]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 726s [p11_child[2508]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 726s [p11_child[2508]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 726s [p11_child[2508]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 726s [p11_child[2508]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 726s [p11_child[2508]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 726s [p11_child[2508]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 726s [p11_child[2508]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 726s [p11_child[2508]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 726s [p11_child[2508]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 726s [p11_child[2508]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 726s [p11_child[2508]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 726s [p11_child[2508]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 726s [p11_child[2508]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 726s [p11_child[2508]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 726s [p11_child[2508]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 726s [p11_child[2508]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 726s [p11_child[2508]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 726s [p11_child[2508]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 726s [p11_child[2508]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 726s [p11_child[2508]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 726s [p11_child[2508]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 726s [p11_child[2508]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 726s [p11_child[2508]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 726s [p11_child[2508]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 726s [p11_child[2508]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 726s [p11_child[2508]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 726s [p11_child[2508]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 726s [p11_child[2508]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 726s [p11_child[2508]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 726s [p11_child[2508]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 726s [p11_child[2508]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 726s [p11_child[2508]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 726s [p11_child[2508]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 726s [p11_child[2508]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 726s [p11_child[2508]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 726s [p11_child[2508]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 726s [p11_child[2508]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 726s [p11_child[2508]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 726s [p11_child[2508]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 726s [p11_child[2508]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 726s [p11_child[2508]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 726s [p11_child[2508]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 726s [p11_child[2508]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 726s [p11_child[2508]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 726s [p11_child[2508]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 726s [p11_child[2508]] [do_card] (0x4000): Certificate verified and validated. 726s [p11_child[2508]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 726s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-P7Xs16/SSSD-child-4217-auth.output 726s + echo '-----BEGIN CERTIFICATE-----' 726s + tail -n1 /tmp/sssd-softhsm2-P7Xs16/SSSD-child-4217-auth.output 726s + echo '-----END CERTIFICATE-----' 726s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-P7Xs16/SSSD-child-4217-auth.pem 726s Certificate: 726s Data: 726s Version: 3 (0x2) 726s Serial Number: 3 (0x3) 726s Signature Algorithm: sha256WithRSAEncryption 726s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root CA 726s Validity 726s Not Before: Jan 18 18:58:07 2025 GMT 726s Not After : Jan 18 18:58:07 2026 GMT 726s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root Trusted Certificate 0001 726s Subject Public Key Info: 726s Public Key Algorithm: rsaEncryption 726s Public-Key: (1024 bit) 726s Modulus: 726s 00:bf:73:84:9d:6a:ae:ae:fd:3b:4c:a5:0c:f4:4b: 726s 39:15:7c:d6:8d:1b:d3:39:e9:9d:61:c8:6f:76:55: 726s 64:56:01:5e:9b:fc:ef:30:42:f7:0c:f6:7b:0c:7a: 726s 13:bf:45:04:6e:53:8a:44:1a:38:95:4a:36:81:5e: 726s b5:68:2d:f2:e5:7b:b4:d3:cf:43:30:6b:b3:7c:a1: 726s b8:85:9a:59:9a:fc:46:a0:65:5f:76:0e:44:68:ca: 726s fa:b6:91:85:58:c5:d5:5f:de:45:7c:61:d6:f6:aa: 726s c2:38:ae:35:84:85:42:f0:35:f2:fd:f3:5b:c4:a0: 726s bd:98:3b:0d:e1:9e:62:5c:5f 726s Exponent: 65537 (0x10001) 726s X509v3 extensions: 726s X509v3 Authority Key Identifier: 726s DD:C4:4D:2D:40:3E:9C:92:A4:3A:7C:77:FC:10:CD:6C:6A:F0:F5:88 726s X509v3 Basic Constraints: 726s CA:FALSE 726s Netscape Cert Type: 726s SSL Client, S/MIME 726s Netscape Comment: 726s Test Organization Root CA trusted Certificate 726s X509v3 Subject Key Identifier: 726s DB:38:6F:EF:EA:42:DC:CD:83:9F:84:0F:B2:0B:C6:62:A1:C4:CB:99 726s X509v3 Key Usage: critical 726s Digital Signature, Non Repudiation, Key Encipherment 726s X509v3 Extended Key Usage: 726s TLS Web Client Authentication, E-mail Protection 726s X509v3 Subject Alternative Name: 726s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 726s Signature Algorithm: sha256WithRSAEncryption 726s Signature Value: 726s af:d1:08:be:51:59:f3:2a:e8:46:6a:00:49:6a:bf:2d:17:6b: 726s dd:c4:07:1f:fc:e8:86:76:2e:e1:de:7f:0d:71:e9:3c:92:78: 726s 08:af:fb:1a:ba:17:a7:b6:eb:e1:a2:d9:93:79:6b:d0:db:39: 726s db:5a:f5:83:98:08:61:fe:1c:20:e5:4d:55:2b:2d:59:74:7e: 726s f6:75:e6:57:da:65:9f:25:57:fe:a5:91:a6:4b:df:ba:1b:eb: 726s 9e:44:d9:27:e8:12:f8:e9:d7:1c:26:b4:a9:4a:3c:f9:ec:d3: 726s 8b:11:8f:e9:eb:22:56:0d:cd:cc:e2:28:00:f6:2e:a1:c0:c5: 726s 8a:55 726s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-P7Xs16/SSSD-child-4217-auth.pem 726s + found_md5=Modulus=BF73849D6AAEAEFD3B4CA50CF44B39157CD68D1BD339E99D61C86F76556456015E9BFCEF3042F70CF67B0C7A13BF45046E538A441A38954A36815EB5682DF2E57BB4D3CF43306BB37CA1B8859A599AFC46A0655F760E4468CAFAB6918558C5D55FDE457C61D6F6AAC238AE35848542F035F2FDF35BC4A0BD983B0DE19E625C5F 726s + '[' Modulus=BF73849D6AAEAEFD3B4CA50CF44B39157CD68D1BD339E99D61C86F76556456015E9BFCEF3042F70CF67B0C7A13BF45046E538A441A38954A36815EB5682DF2E57BB4D3CF43306BB37CA1B8859A599AFC46A0655F760E4468CAFAB6918558C5D55FDE457C61D6F6AAC238AE35848542F035F2FDF35BC4A0BD983B0DE19E625C5F '!=' Modulus=BF73849D6AAEAEFD3B4CA50CF44B39157CD68D1BD339E99D61C86F76556456015E9BFCEF3042F70CF67B0C7A13BF45046E538A441A38954A36815EB5682DF2E57BB4D3CF43306BB37CA1B8859A599AFC46A0655F760E4468CAFAB6918558C5D55FDE457C61D6F6AAC238AE35848542F035F2FDF35BC4A0BD983B0DE19E625C5F ']' 726s + valid_certificate /tmp/sssd-softhsm2-P7Xs16/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-31705 /tmp/sssd-softhsm2-P7Xs16/test-root-CA.pem 726s + check_certificate /tmp/sssd-softhsm2-P7Xs16/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-31705 /tmp/sssd-softhsm2-P7Xs16/test-root-CA.pem 726s + local certificate=/tmp/sssd-softhsm2-P7Xs16/test-root-CA-trusted-certificate-0001.pem 726s + local key_pass=pass:random-root-ca-trusted-cert-0001-31705 726s + local key_ring=/tmp/sssd-softhsm2-P7Xs16/test-root-CA.pem 726s + local verify_option= 726s + prepare_softhsm2_card /tmp/sssd-softhsm2-P7Xs16/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-31705 726s + local certificate=/tmp/sssd-softhsm2-P7Xs16/test-root-CA-trusted-certificate-0001.pem 726s + local key_pass=pass:random-root-ca-trusted-cert-0001-31705 726s + local key_cn 726s + local key_name 726s + local tokens_dir 726s + local output_cert_file 726s + token_name= 726s ++ basename /tmp/sssd-softhsm2-P7Xs16/test-root-CA-trusted-certificate-0001.pem .pem 726s + key_name=test-root-CA-trusted-certificate-0001 726s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-P7Xs16/test-root-CA-trusted-certificate-0001.pem 726s ++ sed -n 's/ *commonName *= //p' 726s + key_cn='Test Organization Root Trusted Certificate 0001' 726s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 726s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-P7Xs16/softhsm2-test-root-CA-trusted-certificate-0001.conf 726s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-P7Xs16/softhsm2-test-root-CA-trusted-certificate-0001.conf 726s ++ basename /tmp/sssd-softhsm2-P7Xs16/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 726s + tokens_dir=/tmp/sssd-softhsm2-P7Xs16/softhsm2-test-root-CA-trusted-certificate-0001 726s + token_name='Test Organization Root Tr Token' 726s + '[' '!' -e /tmp/sssd-softhsm2-P7Xs16/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 726s + '[' '!' -d /tmp/sssd-softhsm2-P7Xs16/softhsm2-test-root-CA-trusted-certificate-0001 ']' 726s + echo 'Test Organization Root Tr Token' 726s + '[' -n '' ']' 726s + local output_base_name=SSSD-child-10799 726s + local output_file=/tmp/sssd-softhsm2-P7Xs16/SSSD-child-10799.output 726s + output_cert_file=/tmp/sssd-softhsm2-P7Xs16/SSSD-child-10799.pem 726s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-P7Xs16/test-root-CA.pem 726s Test Organization Root Tr Token 726s [p11_child[2518]] [main] (0x0400): p11_child started. 726s [p11_child[2518]] [main] (0x2000): Running in [pre-auth] mode. 726s [p11_child[2518]] [main] (0x2000): Running with effective IDs: [0][0]. 726s [p11_child[2518]] [main] (0x2000): Running with real IDs [0][0]. 726s [p11_child[2518]] [do_card] (0x4000): Module List: 726s [p11_child[2518]] [do_card] (0x4000): common name: [softhsm2]. 726s [p11_child[2518]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 726s [p11_child[2518]] [do_card] (0x4000): Description [SoftHSM slot ID 0x58b1724f] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 726s [p11_child[2518]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 726s [p11_child[2518]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x58b1724f][1488024143] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 726s [p11_child[2518]] [do_card] (0x4000): Login NOT required. 726s [p11_child[2518]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 726s [p11_child[2518]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 726s [p11_child[2518]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Root Tr Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 726s [p11_child[2518]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x58b1724f;slot-manufacturer=SoftHSM%20project;slot-id=1488024143;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=6be8fe08d8b1724f;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 726s [p11_child[2518]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 726s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-P7Xs16/SSSD-child-10799.output 726s + echo '-----BEGIN CERTIFICATE-----' 726s + tail -n1 /tmp/sssd-softhsm2-P7Xs16/SSSD-child-10799.output 726s + echo '-----END CERTIFICATE-----' 726s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-P7Xs16/SSSD-child-10799.pem 726s + local found_md5 expected_md5 726s Certificate: 726s Data: 726s Version: 3 (0x2) 726s Serial Number: 3 (0x3) 726s Signature Algorithm: sha256WithRSAEncryption 726s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root CA 726s Validity 726s Not Before: Jan 18 18:58:07 2025 GMT 726s Not After : Jan 18 18:58:07 2026 GMT 726s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root Trusted Certificate 0001 726s Subject Public Key Info: 726s Public Key Algorithm: rsaEncryption 726s Public-Key: (1024 bit) 726s Modulus: 726s 00:bf:73:84:9d:6a:ae:ae:fd:3b:4c:a5:0c:f4:4b: 726s 39:15:7c:d6:8d:1b:d3:39:e9:9d:61:c8:6f:76:55: 726s 64:56:01:5e:9b:fc:ef:30:42:f7:0c:f6:7b:0c:7a: 726s 13:bf:45:04:6e:53:8a:44:1a:38:95:4a:36:81:5e: 726s b5:68:2d:f2:e5:7b:b4:d3:cf:43:30:6b:b3:7c:a1: 726s b8:85:9a:59:9a:fc:46:a0:65:5f:76:0e:44:68:ca: 726s fa:b6:91:85:58:c5:d5:5f:de:45:7c:61:d6:f6:aa: 726s c2:38:ae:35:84:85:42:f0:35:f2:fd:f3:5b:c4:a0: 726s bd:98:3b:0d:e1:9e:62:5c:5f 726s Exponent: 65537 (0x10001) 726s X509v3 extensions: 726s X509v3 Authority Key Identifier: 726s DD:C4:4D:2D:40:3E:9C:92:A4:3A:7C:77:FC:10:CD:6C:6A:F0:F5:88 726s X509v3 Basic Constraints: 726s CA:FALSE 726s Netscape Cert Type: 726s SSL Client, S/MIME 726s Netscape Comment: 726s Test Organization Root CA trusted Certificate 726s X509v3 Subject Key Identifier: 726s DB:38:6F:EF:EA:42:DC:CD:83:9F:84:0F:B2:0B:C6:62:A1:C4:CB:99 726s X509v3 Key Usage: critical 726s Digital Signature, Non Repudiation, Key Encipherment 726s X509v3 Extended Key Usage: 726s TLS Web Client Authentication, E-mail Protection 726s X509v3 Subject Alternative Name: 726s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 726s Signature Algorithm: sha256WithRSAEncryption 726s Signature Value: 726s af:d1:08:be:51:59:f3:2a:e8:46:6a:00:49:6a:bf:2d:17:6b: 726s dd:c4:07:1f:fc:e8:86:76:2e:e1:de:7f:0d:71:e9:3c:92:78: 726s 08:af:fb:1a:ba:17:a7:b6:eb:e1:a2:d9:93:79:6b:d0:db:39: 726s db:5a:f5:83:98:08:61:fe:1c:20:e5:4d:55:2b:2d:59:74:7e: 726s f6:75:e6:57:da:65:9f:25:57:fe:a5:91:a6:4b:df:ba:1b:eb: 726s 9e:44:d9:27:e8:12:f8:e9:d7:1c:26:b4:a9:4a:3c:f9:ec:d3: 726s 8b:11:8f:e9:eb:22:56:0d:cd:cc:e2:28:00:f6:2e:a1:c0:c5: 726s 8a:55 726s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-P7Xs16/test-root-CA-trusted-certificate-0001.pem 726s + expected_md5=Modulus=BF73849D6AAEAEFD3B4CA50CF44B39157CD68D1BD339E99D61C86F76556456015E9BFCEF3042F70CF67B0C7A13BF45046E538A441A38954A36815EB5682DF2E57BB4D3CF43306BB37CA1B8859A599AFC46A0655F760E4468CAFAB6918558C5D55FDE457C61D6F6AAC238AE35848542F035F2FDF35BC4A0BD983B0DE19E625C5F 726s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-P7Xs16/SSSD-child-10799.pem 726s + found_md5=Modulus=BF73849D6AAEAEFD3B4CA50CF44B39157CD68D1BD339E99D61C86F76556456015E9BFCEF3042F70CF67B0C7A13BF45046E538A441A38954A36815EB5682DF2E57BB4D3CF43306BB37CA1B8859A599AFC46A0655F760E4468CAFAB6918558C5D55FDE457C61D6F6AAC238AE35848542F035F2FDF35BC4A0BD983B0DE19E625C5F 726s + '[' Modulus=BF73849D6AAEAEFD3B4CA50CF44B39157CD68D1BD339E99D61C86F76556456015E9BFCEF3042F70CF67B0C7A13BF45046E538A441A38954A36815EB5682DF2E57BB4D3CF43306BB37CA1B8859A599AFC46A0655F760E4468CAFAB6918558C5D55FDE457C61D6F6AAC238AE35848542F035F2FDF35BC4A0BD983B0DE19E625C5F '!=' Modulus=BF73849D6AAEAEFD3B4CA50CF44B39157CD68D1BD339E99D61C86F76556456015E9BFCEF3042F70CF67B0C7A13BF45046E538A441A38954A36815EB5682DF2E57BB4D3CF43306BB37CA1B8859A599AFC46A0655F760E4468CAFAB6918558C5D55FDE457C61D6F6AAC238AE35848542F035F2FDF35BC4A0BD983B0DE19E625C5F ']' 726s + output_file=/tmp/sssd-softhsm2-P7Xs16/SSSD-child-10799-auth.output 726s ++ basename /tmp/sssd-softhsm2-P7Xs16/SSSD-child-10799-auth.output .output 726s + output_cert_file=/tmp/sssd-softhsm2-P7Xs16/SSSD-child-10799-auth.pem 726s + echo -n 053350 726s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-P7Xs16/test-root-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 '' --token_name 'Test Organization Root Tr Token' --module_name /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so 726s [p11_child[2526]] [main] (0x0400): p11_child started. 726s [p11_child[2526]] [main] (0x2000): Running in [auth] mode. 726s [p11_child[2526]] [main] (0x2000): Running with effective IDs: [0][0]. 726s [p11_child[2526]] [main] (0x2000): Running with real IDs [0][0]. 726s [p11_child[2526]] [do_card] (0x4000): Module List: 726s [p11_child[2526]] [do_card] (0x4000): common name: [softhsm2]. 726s [p11_child[2526]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 726s [p11_child[2526]] [do_card] (0x4000): Description [SoftHSM slot ID 0x58b1724f] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 726s [p11_child[2526]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 726s [p11_child[2526]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x58b1724f][1488024143] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 726s [p11_child[2526]] [do_card] (0x4000): Login required. 726s [p11_child[2526]] [do_card] (0x4000): Token flags [1069]. 726s [p11_child[2526]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 726s [p11_child[2526]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 726s [p11_child[2526]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so Test Organization Root Tr Token Test Organization Root Tr Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 726s [p11_child[2526]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x58b1724f;slot-manufacturer=SoftHSM%20project;slot-id=1488024143;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=6be8fe08d8b1724f;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 726s [p11_child[2526]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 726s [p11_child[2526]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 726s [p11_child[2526]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 726s [p11_child[2526]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 726s [p11_child[2526]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 726s [p11_child[2526]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 726s [p11_child[2526]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 726s [p11_child[2526]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 726s [p11_child[2526]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 726s [p11_child[2526]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 726s [p11_child[2526]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 726s [p11_child[2526]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 726s [p11_child[2526]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 726s [p11_child[2526]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 726s [p11_child[2526]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 726s [p11_child[2526]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 726s [p11_child[2526]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 726s [p11_child[2526]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 726s [p11_child[2526]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 726s [p11_child[2526]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 726s [p11_child[2526]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 726s [p11_child[2526]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 726s [p11_child[2526]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 726s [p11_child[2526]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 726s [p11_child[2526]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 726s [p11_child[2526]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 726s [p11_child[2526]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 726s [p11_child[2526]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 726s [p11_child[2526]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 726s [p11_child[2526]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 726s [p11_child[2526]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 726s [p11_child[2526]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 726s [p11_child[2526]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 726s [p11_child[2526]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 726s [p11_child[2526]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 726s [p11_child[2526]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 726s [p11_child[2526]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 726s [p11_child[2526]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 726s [p11_child[2526]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 726s [p11_child[2526]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 726s [p11_child[2526]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 726s [p11_child[2526]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 726s [p11_child[2526]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 726s [p11_child[2526]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 726s [p11_child[2526]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 726s [p11_child[2526]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 726s [p11_child[2526]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 726s [p11_child[2526]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 726s [p11_child[2526]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 726s [p11_child[2526]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 726s [p11_child[2526]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 726s [p11_child[2526]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 726s [p11_child[2526]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 726s [p11_child[2526]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 726s [p11_child[2526]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 726s [p11_child[2526]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 726s [p11_child[2526]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 726s [p11_child[2526]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 726s [p11_child[2526]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 726s [p11_child[2526]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 726s [p11_child[2526]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 726s [p11_child[2526]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 726s [p11_child[2526]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 726s [p11_child[2526]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 726s [p11_child[2526]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 726s [p11_child[2526]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 726s [p11_child[2526]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 726s [p11_child[2526]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 726s [p11_child[2526]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 726s [p11_child[2526]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 726s [p11_child[2526]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 726s [p11_child[2526]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 726s [p11_child[2526]] [do_card] (0x4000): Certificate verified and validated. 726s [p11_child[2526]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 726s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-P7Xs16/SSSD-child-10799-auth.output 726s + echo '-----BEGIN CERTIFICATE-----' 726s + tail -n1 /tmp/sssd-softhsm2-P7Xs16/SSSD-child-10799-auth.output 726s + echo '-----END CERTIFICATE-----' 726s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-P7Xs16/SSSD-child-10799-auth.pem 726s Certificate: 726s Data: 726s Version: 3 (0x2) 726s Serial Number: 3 (0x3) 726s Signature Algorithm: sha256WithRSAEncryption 726s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root CA 726s Validity 726s Not Before: Jan 18 18:58:07 2025 GMT 726s Not After : Jan 18 18:58:07 2026 GMT 726s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root Trusted Certificate 0001 726s Subject Public Key Info: 726s Public Key Algorithm: rsaEncryption 726s Public-Key: (1024 bit) 726s Modulus: 726s 00:bf:73:84:9d:6a:ae:ae:fd:3b:4c:a5:0c:f4:4b: 726s 39:15:7c:d6:8d:1b:d3:39:e9:9d:61:c8:6f:76:55: 726s 64:56:01:5e:9b:fc:ef:30:42:f7:0c:f6:7b:0c:7a: 726s 13:bf:45:04:6e:53:8a:44:1a:38:95:4a:36:81:5e: 726s b5:68:2d:f2:e5:7b:b4:d3:cf:43:30:6b:b3:7c:a1: 726s b8:85:9a:59:9a:fc:46:a0:65:5f:76:0e:44:68:ca: 726s fa:b6:91:85:58:c5:d5:5f:de:45:7c:61:d6:f6:aa: 726s c2:38:ae:35:84:85:42:f0:35:f2:fd:f3:5b:c4:a0: 726s bd:98:3b:0d:e1:9e:62:5c:5f 726s Exponent: 65537 (0x10001) 726s X509v3 extensions: 726s X509v3 Authority Key Identifier: 726s DD:C4:4D:2D:40:3E:9C:92:A4:3A:7C:77:FC:10:CD:6C:6A:F0:F5:88 726s X509v3 Basic Constraints: 726s CA:FALSE 726s Netscape Cert Type: 726s SSL Client, S/MIME 726s Netscape Comment: 726s Test Organization Root CA trusted Certificate 726s X509v3 Subject Key Identifier: 726s DB:38:6F:EF:EA:42:DC:CD:83:9F:84:0F:B2:0B:C6:62:A1:C4:CB:99 726s X509v3 Key Usage: critical 726s Digital Signature, Non Repudiation, Key Encipherment 726s X509v3 Extended Key Usage: 726s TLS Web Client Authentication, E-mail Protection 726s X509v3 Subject Alternative Name: 726s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 726s Signature Algorithm: sha256WithRSAEncryption 726s Signature Value: 726s af:d1:08:be:51:59:f3:2a:e8:46:6a:00:49:6a:bf:2d:17:6b: 726s dd:c4:07:1f:fc:e8:86:76:2e:e1:de:7f:0d:71:e9:3c:92:78: 726s 08:af:fb:1a:ba:17:a7:b6:eb:e1:a2:d9:93:79:6b:d0:db:39: 726s db:5a:f5:83:98:08:61:fe:1c:20:e5:4d:55:2b:2d:59:74:7e: 726s f6:75:e6:57:da:65:9f:25:57:fe:a5:91:a6:4b:df:ba:1b:eb: 726s 9e:44:d9:27:e8:12:f8:e9:d7:1c:26:b4:a9:4a:3c:f9:ec:d3: 726s 8b:11:8f:e9:eb:22:56:0d:cd:cc:e2:28:00:f6:2e:a1:c0:c5: 726s 8a:55 726s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-P7Xs16/SSSD-child-10799-auth.pem 726s + found_md5=Modulus=BF73849D6AAEAEFD3B4CA50CF44B39157CD68D1BD339E99D61C86F76556456015E9BFCEF3042F70CF67B0C7A13BF45046E538A441A38954A36815EB5682DF2E57BB4D3CF43306BB37CA1B8859A599AFC46A0655F760E4468CAFAB6918558C5D55FDE457C61D6F6AAC238AE35848542F035F2FDF35BC4A0BD983B0DE19E625C5F 726s + '[' Modulus=BF73849D6AAEAEFD3B4CA50CF44B39157CD68D1BD339E99D61C86F76556456015E9BFCEF3042F70CF67B0C7A13BF45046E538A441A38954A36815EB5682DF2E57BB4D3CF43306BB37CA1B8859A599AFC46A0655F760E4468CAFAB6918558C5D55FDE457C61D6F6AAC238AE35848542F035F2FDF35BC4A0BD983B0DE19E625C5F '!=' Modulus=BF73849D6AAEAEFD3B4CA50CF44B39157CD68D1BD339E99D61C86F76556456015E9BFCEF3042F70CF67B0C7A13BF45046E538A441A38954A36815EB5682DF2E57BB4D3CF43306BB37CA1B8859A599AFC46A0655F760E4468CAFAB6918558C5D55FDE457C61D6F6AAC238AE35848542F035F2FDF35BC4A0BD983B0DE19E625C5F ']' 726s + valid_certificate /tmp/sssd-softhsm2-P7Xs16/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-31705 /tmp/sssd-softhsm2-P7Xs16/test-root-CA.pem partial_chain 726s + check_certificate /tmp/sssd-softhsm2-P7Xs16/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-31705 /tmp/sssd-softhsm2-P7Xs16/test-root-CA.pem partial_chain 726s + local certificate=/tmp/sssd-softhsm2-P7Xs16/test-root-CA-trusted-certificate-0001.pem 726s + local key_pass=pass:random-root-ca-trusted-cert-0001-31705 726s + local key_ring=/tmp/sssd-softhsm2-P7Xs16/test-root-CA.pem 726s + local verify_option=partial_chain 726s + prepare_softhsm2_card /tmp/sssd-softhsm2-P7Xs16/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-31705 726s + local certificate=/tmp/sssd-softhsm2-P7Xs16/test-root-CA-trusted-certificate-0001.pem 726s + local key_pass=pass:random-root-ca-trusted-cert-0001-31705 726s + local key_cn 726s + local key_name 726s + local tokens_dir 726s + local output_cert_file 726s + token_name= 726s ++ basename /tmp/sssd-softhsm2-P7Xs16/test-root-CA-trusted-certificate-0001.pem .pem 726s + key_name=test-root-CA-trusted-certificate-0001 726s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-P7Xs16/test-root-CA-trusted-certificate-0001.pem 726s ++ sed -n 's/ *commonName *= //p' 726s + key_cn='Test Organization Root Trusted Certificate 0001' 726s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 726s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-P7Xs16/softhsm2-test-root-CA-trusted-certificate-0001.conf 726s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-P7Xs16/softhsm2-test-root-CA-trusted-certificate-0001.conf 726s ++ basename /tmp/sssd-softhsm2-P7Xs16/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 726s + tokens_dir=/tmp/sssd-softhsm2-P7Xs16/softhsm2-test-root-CA-trusted-certificate-0001 726s + token_name='Test Organization Root Tr Token' 726s + '[' '!' -e /tmp/sssd-softhsm2-P7Xs16/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 726s + '[' '!' -d /tmp/sssd-softhsm2-P7Xs16/softhsm2-test-root-CA-trusted-certificate-0001 ']' 726s + echo 'Test Organization Root Tr Token' 726s + '[' -n partial_chain ']' 726s + local verify_arg=--verify=partial_chain 726s + local output_base_name=SSSD-child-12513 726s + local output_file=/tmp/sssd-softhsm2-P7Xs16/SSSD-child-12513.output 726s + output_cert_file=/tmp/sssd-softhsm2-P7Xs16/SSSD-child-12513.pem 726s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-P7Xs16/test-root-CA.pem 726s Test Organization Root Tr Token 726s [p11_child[2536]] [main] (0x0400): p11_child started. 726s [p11_child[2536]] [main] (0x2000): Running in [pre-auth] mode. 726s [p11_child[2536]] [main] (0x2000): Running with effective IDs: [0][0]. 726s [p11_child[2536]] [main] (0x2000): Running with real IDs [0][0]. 726s [p11_child[2536]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 726s [p11_child[2536]] [do_card] (0x4000): Module List: 726s [p11_child[2536]] [do_card] (0x4000): common name: [softhsm2]. 726s [p11_child[2536]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 726s [p11_child[2536]] [do_card] (0x4000): Description [SoftHSM slot ID 0x58b1724f] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 726s [p11_child[2536]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 726s [p11_child[2536]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x58b1724f][1488024143] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 726s [p11_child[2536]] [do_card] (0x4000): Login NOT required. 726s [p11_child[2536]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 726s [p11_child[2536]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 726s [p11_child[2536]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Root Tr Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 726s [p11_child[2536]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x58b1724f;slot-manufacturer=SoftHSM%20project;slot-id=1488024143;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=6be8fe08d8b1724f;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 726s [p11_child[2536]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 726s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-P7Xs16/SSSD-child-12513.output 726s + echo '-----BEGIN CERTIFICATE-----' 726s + tail -n1 /tmp/sssd-softhsm2-P7Xs16/SSSD-child-12513.output 726s + echo '-----END CERTIFICATE-----' 726s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-P7Xs16/SSSD-child-12513.pem 726s Certificate: 726s Data: 726s Version: 3 (0x2) 726s Serial Number: 3 (0x3) 726s Signature Algorithm: sha256WithRSAEncryption 726s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root CA 726s Validity 726s Not Before: Jan 18 18:58:07 2025 GMT 726s Not After : Jan 18 18:58:07 2026 GMT 726s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root Trusted Certificate 0001 726s Subject Public Key Info: 726s Public Key Algorithm: rsaEncryption 726s Public-Key: (1024 bit) 726s Modulus: 726s 00:bf:73:84:9d:6a:ae:ae:fd:3b:4c:a5:0c:f4:4b: 726s 39:15:7c:d6:8d:1b:d3:39:e9:9d:61:c8:6f:76:55: 726s 64:56:01:5e:9b:fc:ef:30:42:f7:0c:f6:7b:0c:7a: 726s 13:bf:45:04:6e:53:8a:44:1a:38:95:4a:36:81:5e: 726s b5:68:2d:f2:e5:7b:b4:d3:cf:43:30:6b:b3:7c:a1: 726s b8:85:9a:59:9a:fc:46:a0:65:5f:76:0e:44:68:ca: 726s fa:b6:91:85:58:c5:d5:5f:de:45:7c:61:d6:f6:aa: 726s c2:38:ae:35:84:85:42:f0:35:f2:fd:f3:5b:c4:a0: 726s bd:98:3b:0d:e1:9e:62:5c:5f 726s Exponent: 65537 (0x10001) 726s X509v3 extensions: 726s X509v3 Authority Key Identifier: 726s DD:C4:4D:2D:40:3E:9C:92:A4:3A:7C:77:FC:10:CD:6C:6A:F0:F5:88 726s X509v3 Basic Constraints: 726s CA:FALSE 726s Netscape Cert Type: 726s SSL Client, S/MIME 726s Netscape Comment: 726s Test Organization Root CA trusted Certificate 726s X509v3 Subject Key Identifier: 726s DB:38:6F:EF:EA:42:DC:CD:83:9F:84:0F:B2:0B:C6:62:A1:C4:CB:99 726s X509v3 Key Usage: critical 726s Digital Signature, Non Repudiation, Key Encipherment 726s X509v3 Extended Key Usage: 726s TLS Web Client Authentication, E-mail Protection 726s X509v3 Subject Alternative Name: 726s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 726s Signature Algorithm: sha256WithRSAEncryption 726s Signature Value: 726s af:d1:08:be:51:59:f3:2a:e8:46:6a:00:49:6a:bf:2d:17:6b: 726s dd:c4:07:1f:fc:e8:86:76:2e:e1:de:7f:0d:71:e9:3c:92:78: 726s 08:af:fb:1a:ba:17:a7:b6:eb:e1:a2:d9:93:79:6b:d0:db:39: 726s db:5a:f5:83:98:08:61:fe:1c:20:e5:4d:55:2b:2d:59:74:7e: 726s f6:75:e6:57:da:65:9f:25:57:fe:a5:91:a6:4b:df:ba:1b:eb: 726s 9e:44:d9:27:e8:12:f8:e9:d7:1c:26:b4:a9:4a:3c:f9:ec:d3: 726s 8b:11:8f:e9:eb:22:56:0d:cd:cc:e2:28:00:f6:2e:a1:c0:c5: 726s 8a:55 726s + local found_md5 expected_md5 726s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-P7Xs16/test-root-CA-trusted-certificate-0001.pem 726s + expected_md5=Modulus=BF73849D6AAEAEFD3B4CA50CF44B39157CD68D1BD339E99D61C86F76556456015E9BFCEF3042F70CF67B0C7A13BF45046E538A441A38954A36815EB5682DF2E57BB4D3CF43306BB37CA1B8859A599AFC46A0655F760E4468CAFAB6918558C5D55FDE457C61D6F6AAC238AE35848542F035F2FDF35BC4A0BD983B0DE19E625C5F 726s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-P7Xs16/SSSD-child-12513.pem 726s + found_md5=Modulus=BF73849D6AAEAEFD3B4CA50CF44B39157CD68D1BD339E99D61C86F76556456015E9BFCEF3042F70CF67B0C7A13BF45046E538A441A38954A36815EB5682DF2E57BB4D3CF43306BB37CA1B8859A599AFC46A0655F760E4468CAFAB6918558C5D55FDE457C61D6F6AAC238AE35848542F035F2FDF35BC4A0BD983B0DE19E625C5F 726s + '[' Modulus=BF73849D6AAEAEFD3B4CA50CF44B39157CD68D1BD339E99D61C86F76556456015E9BFCEF3042F70CF67B0C7A13BF45046E538A441A38954A36815EB5682DF2E57BB4D3CF43306BB37CA1B8859A599AFC46A0655F760E4468CAFAB6918558C5D55FDE457C61D6F6AAC238AE35848542F035F2FDF35BC4A0BD983B0DE19E625C5F '!=' Modulus=BF73849D6AAEAEFD3B4CA50CF44B39157CD68D1BD339E99D61C86F76556456015E9BFCEF3042F70CF67B0C7A13BF45046E538A441A38954A36815EB5682DF2E57BB4D3CF43306BB37CA1B8859A599AFC46A0655F760E4468CAFAB6918558C5D55FDE457C61D6F6AAC238AE35848542F035F2FDF35BC4A0BD983B0DE19E625C5F ']' 726s + output_file=/tmp/sssd-softhsm2-P7Xs16/SSSD-child-12513-auth.output 726s ++ basename /tmp/sssd-softhsm2-P7Xs16/SSSD-child-12513-auth.output .output 726s + output_cert_file=/tmp/sssd-softhsm2-P7Xs16/SSSD-child-12513-auth.pem 726s + echo -n 053350 726s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-P7Xs16/test-root-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Root Tr Token' --module_name /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so 726s [p11_child[2544]] [main] (0x0400): p11_child started. 726s [p11_child[2544]] [main] (0x2000): Running in [auth] mode. 726s [p11_child[2544]] [main] (0x2000): Running with effective IDs: [0][0]. 726s [p11_child[2544]] [main] (0x2000): Running with real IDs [0][0]. 726s [p11_child[2544]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 726s [p11_child[2544]] [do_card] (0x4000): Module List: 726s [p11_child[2544]] [do_card] (0x4000): common name: [softhsm2]. 726s [p11_child[2544]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 726s [p11_child[2544]] [do_card] (0x4000): Description [SoftHSM slot ID 0x58b1724f] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 726s [p11_child[2544]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 726s [p11_child[2544]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x58b1724f][1488024143] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 726s [p11_child[2544]] [do_card] (0x4000): Login required. 726s [p11_child[2544]] [do_card] (0x4000): Token flags [1069]. 726s [p11_child[2544]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 726s [p11_child[2544]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 726s [p11_child[2544]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so Test Organization Root Tr Token Test Organization Root Tr Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 726s [p11_child[2544]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x58b1724f;slot-manufacturer=SoftHSM%20project;slot-id=1488024143;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=6be8fe08d8b1724f;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 726s [p11_child[2544]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 726s [p11_child[2544]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 726s [p11_child[2544]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 726s [p11_child[2544]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 726s [p11_child[2544]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 726s [p11_child[2544]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 726s [p11_child[2544]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 726s [p11_child[2544]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 726s [p11_child[2544]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 726s [p11_child[2544]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 726s [p11_child[2544]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 726s [p11_child[2544]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 726s [p11_child[2544]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 726s [p11_child[2544]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 726s [p11_child[2544]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 726s [p11_child[2544]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 726s [p11_child[2544]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 726s [p11_child[2544]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 726s [p11_child[2544]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 726s [p11_child[2544]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 726s [p11_child[2544]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 726s [p11_child[2544]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 726s [p11_child[2544]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 726s [p11_child[2544]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 726s [p11_child[2544]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 726s [p11_child[2544]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 726s [p11_child[2544]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 726s [p11_child[2544]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 726s [p11_child[2544]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 726s [p11_child[2544]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 726s [p11_child[2544]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 726s [p11_child[2544]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 726s [p11_child[2544]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 726s [p11_child[2544]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 726s [p11_child[2544]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 726s [p11_child[2544]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 726s [p11_child[2544]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 726s [p11_child[2544]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 726s [p11_child[2544]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 726s [p11_child[2544]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 726s [p11_child[2544]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 726s [p11_child[2544]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 726s [p11_child[2544]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 726s [p11_child[2544]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 726s [p11_child[2544]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 726s [p11_child[2544]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 726s [p11_child[2544]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 726s [p11_child[2544]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 726s [p11_child[2544]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 726s [p11_child[2544]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 726s [p11_child[2544]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 726s [p11_child[2544]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 726s [p11_child[2544]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 726s [p11_child[2544]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 726s [p11_child[2544]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 726s [p11_child[2544]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 726s [p11_child[2544]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 726s [p11_child[2544]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 726s [p11_child[2544]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 726s [p11_child[2544]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 726s [p11_child[2544]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 726s [p11_child[2544]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 726s [p11_child[2544]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 726s [p11_child[2544]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 726s [p11_child[2544]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 726s [p11_child[2544]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 726s [p11_child[2544]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 726s [p11_child[2544]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 726s [p11_child[2544]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 726s [p11_child[2544]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 726s [p11_child[2544]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 726s [p11_child[2544]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 726s [p11_child[2544]] [do_card] (0x4000): Certificate verified and validated. 726s [p11_child[2544]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 726s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-P7Xs16/SSSD-child-12513-auth.output 726s + echo '-----BEGIN CERTIFICATE-----' 726s + tail -n1 /tmp/sssd-softhsm2-P7Xs16/SSSD-child-12513-auth.output 726s + echo '-----END CERTIFICATE-----' 726s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-P7Xs16/SSSD-child-12513-auth.pem 726s Certificate: 726s Data: 726s Version: 3 (0x2) 726s Serial Number: 3 (0x3) 726s Signature Algorithm: sha256WithRSAEncryption 726s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root CA 726s Validity 726s Not Before: Jan 18 18:58:07 2025 GMT 726s Not After : Jan 18 18:58:07 2026 GMT 726s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root Trusted Certificate 0001 726s Subject Public Key Info: 726s Public Key Algorithm: rsaEncryption 726s Public-Key: (1024 bit) 726s Modulus: 726s 00:bf:73:84:9d:6a:ae:ae:fd:3b:4c:a5:0c:f4:4b: 726s 39:15:7c:d6:8d:1b:d3:39:e9:9d:61:c8:6f:76:55: 726s 64:56:01:5e:9b:fc:ef:30:42:f7:0c:f6:7b:0c:7a: 726s 13:bf:45:04:6e:53:8a:44:1a:38:95:4a:36:81:5e: 726s b5:68:2d:f2:e5:7b:b4:d3:cf:43:30:6b:b3:7c:a1: 726s b8:85:9a:59:9a:fc:46:a0:65:5f:76:0e:44:68:ca: 726s fa:b6:91:85:58:c5:d5:5f:de:45:7c:61:d6:f6:aa: 726s c2:38:ae:35:84:85:42:f0:35:f2:fd:f3:5b:c4:a0: 726s bd:98:3b:0d:e1:9e:62:5c:5f 726s Exponent: 65537 (0x10001) 726s X509v3 extensions: 726s X509v3 Authority Key Identifier: 726s DD:C4:4D:2D:40:3E:9C:92:A4:3A:7C:77:FC:10:CD:6C:6A:F0:F5:88 726s X509v3 Basic Constraints: 726s CA:FALSE 726s Netscape Cert Type: 726s SSL Client, S/MIME 726s Netscape Comment: 726s Test Organization Root CA trusted Certificate 726s X509v3 Subject Key Identifier: 726s DB:38:6F:EF:EA:42:DC:CD:83:9F:84:0F:B2:0B:C6:62:A1:C4:CB:99 726s X509v3 Key Usage: critical 726s Digital Signature, Non Repudiation, Key Encipherment 726s X509v3 Extended Key Usage: 726s TLS Web Client Authentication, E-mail Protection 726s X509v3 Subject Alternative Name: 726s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 726s Signature Algorithm: sha256WithRSAEncryption 726s Signature Value: 726s af:d1:08:be:51:59:f3:2a:e8:46:6a:00:49:6a:bf:2d:17:6b: 726s dd:c4:07:1f:fc:e8:86:76:2e:e1:de:7f:0d:71:e9:3c:92:78: 726s 08:af:fb:1a:ba:17:a7:b6:eb:e1:a2:d9:93:79:6b:d0:db:39: 726s db:5a:f5:83:98:08:61:fe:1c:20:e5:4d:55:2b:2d:59:74:7e: 726s f6:75:e6:57:da:65:9f:25:57:fe:a5:91:a6:4b:df:ba:1b:eb: 726s 9e:44:d9:27:e8:12:f8:e9:d7:1c:26:b4:a9:4a:3c:f9:ec:d3: 726s 8b:11:8f:e9:eb:22:56:0d:cd:cc:e2:28:00:f6:2e:a1:c0:c5: 726s 8a:55 726s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-P7Xs16/SSSD-child-12513-auth.pem 726s + found_md5=Modulus=BF73849D6AAEAEFD3B4CA50CF44B39157CD68D1BD339E99D61C86F76556456015E9BFCEF3042F70CF67B0C7A13BF45046E538A441A38954A36815EB5682DF2E57BB4D3CF43306BB37CA1B8859A599AFC46A0655F760E4468CAFAB6918558C5D55FDE457C61D6F6AAC238AE35848542F035F2FDF35BC4A0BD983B0DE19E625C5F 726s + '[' Modulus=BF73849D6AAEAEFD3B4CA50CF44B39157CD68D1BD339E99D61C86F76556456015E9BFCEF3042F70CF67B0C7A13BF45046E538A441A38954A36815EB5682DF2E57BB4D3CF43306BB37CA1B8859A599AFC46A0655F760E4468CAFAB6918558C5D55FDE457C61D6F6AAC238AE35848542F035F2FDF35BC4A0BD983B0DE19E625C5F '!=' Modulus=BF73849D6AAEAEFD3B4CA50CF44B39157CD68D1BD339E99D61C86F76556456015E9BFCEF3042F70CF67B0C7A13BF45046E538A441A38954A36815EB5682DF2E57BB4D3CF43306BB37CA1B8859A599AFC46A0655F760E4468CAFAB6918558C5D55FDE457C61D6F6AAC238AE35848542F035F2FDF35BC4A0BD983B0DE19E625C5F ']' 726s + valid_certificate /tmp/sssd-softhsm2-P7Xs16/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-31705 /tmp/sssd-softhsm2-P7Xs16/test-full-chain-CA.pem 726s + check_certificate /tmp/sssd-softhsm2-P7Xs16/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-31705 /tmp/sssd-softhsm2-P7Xs16/test-full-chain-CA.pem 726s + local certificate=/tmp/sssd-softhsm2-P7Xs16/test-root-CA-trusted-certificate-0001.pem 726s + local key_pass=pass:random-root-ca-trusted-cert-0001-31705 726s + local key_ring=/tmp/sssd-softhsm2-P7Xs16/test-full-chain-CA.pem 726s + local verify_option= 726s + prepare_softhsm2_card /tmp/sssd-softhsm2-P7Xs16/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-31705 726s + local certificate=/tmp/sssd-softhsm2-P7Xs16/test-root-CA-trusted-certificate-0001.pem 726s + local key_pass=pass:random-root-ca-trusted-cert-0001-31705 726s + local key_cn 726s + local key_name 726s + local tokens_dir 726s + local output_cert_file 726s + token_name= 726s ++ basename /tmp/sssd-softhsm2-P7Xs16/test-root-CA-trusted-certificate-0001.pem .pem 726s + key_name=test-root-CA-trusted-certificate-0001 726s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-P7Xs16/test-root-CA-trusted-certificate-0001.pem 726s ++ sed -n 's/ *commonName *= //p' 726s + key_cn='Test Organization Root Trusted Certificate 0001' 726s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 726s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-P7Xs16/softhsm2-test-root-CA-trusted-certificate-0001.conf 726s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-P7Xs16/softhsm2-test-root-CA-trusted-certificate-0001.conf 726s ++ basename /tmp/sssd-softhsm2-P7Xs16/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 726s + tokens_dir=/tmp/sssd-softhsm2-P7Xs16/softhsm2-test-root-CA-trusted-certificate-0001 726s + token_name='Test Organization Root Tr Token' 726s + '[' '!' -e /tmp/sssd-softhsm2-P7Xs16/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 726s + '[' '!' -d /tmp/sssd-softhsm2-P7Xs16/softhsm2-test-root-CA-trusted-certificate-0001 ']' 726s + echo 'Test Organization Root Tr Token' 726s + '[' -n '' ']' 726s + local output_base_name=SSSD-child-30776 726s + local output_file=/tmp/sssd-softhsm2-P7Xs16/SSSD-child-30776.output 726s + output_cert_file=/tmp/sssd-softhsm2-P7Xs16/SSSD-child-30776.pem 726s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-P7Xs16/test-full-chain-CA.pem 726s Test Organization Root Tr Token 726s [p11_child[2554]] [main] (0x0400): p11_child started. 726s [p11_child[2554]] [main] (0x2000): Running in [pre-auth] mode. 726s [p11_child[2554]] [main] (0x2000): Running with effective IDs: [0][0]. 726s [p11_child[2554]] [main] (0x2000): Running with real IDs [0][0]. 726s [p11_child[2554]] [do_card] (0x4000): Module List: 726s [p11_child[2554]] [do_card] (0x4000): common name: [softhsm2]. 726s [p11_child[2554]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 726s [p11_child[2554]] [do_card] (0x4000): Description [SoftHSM slot ID 0x58b1724f] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 726s [p11_child[2554]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 726s [p11_child[2554]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x58b1724f][1488024143] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 726s [p11_child[2554]] [do_card] (0x4000): Login NOT required. 726s [p11_child[2554]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 726s [p11_child[2554]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 726s [p11_child[2554]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Root Tr Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 726s [p11_child[2554]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x58b1724f;slot-manufacturer=SoftHSM%20project;slot-id=1488024143;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=6be8fe08d8b1724f;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 726s [p11_child[2554]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 726s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-P7Xs16/SSSD-child-30776.output 726s + echo '-----BEGIN CERTIFICATE-----' 726s + tail -n1 /tmp/sssd-softhsm2-P7Xs16/SSSD-child-30776.output 726s + echo '-----END CERTIFICATE-----' 726s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-P7Xs16/SSSD-child-30776.pem 726s Certificate: 726s Data: 726s Version: 3 (0x2) 726s Serial Number: 3 (0x3) 726s Signature Algorithm: sha256WithRSAEncryption 726s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root CA 726s Validity 726s Not Before: Jan 18 18:58:07 2025 GMT 726s Not After : Jan 18 18:58:07 2026 GMT 726s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root Trusted Certificate 0001 726s Subject Public Key Info: 726s Public Key Algorithm: rsaEncryption 726s Public-Key: (1024 bit) 726s Modulus: 726s 00:bf:73:84:9d:6a:ae:ae:fd:3b:4c:a5:0c:f4:4b: 726s 39:15:7c:d6:8d:1b:d3:39:e9:9d:61:c8:6f:76:55: 726s 64:56:01:5e:9b:fc:ef:30:42:f7:0c:f6:7b:0c:7a: 726s 13:bf:45:04:6e:53:8a:44:1a:38:95:4a:36:81:5e: 726s b5:68:2d:f2:e5:7b:b4:d3:cf:43:30:6b:b3:7c:a1: 726s b8:85:9a:59:9a:fc:46:a0:65:5f:76:0e:44:68:ca: 726s fa:b6:91:85:58:c5:d5:5f:de:45:7c:61:d6:f6:aa: 726s c2:38:ae:35:84:85:42:f0:35:f2:fd:f3:5b:c4:a0: 726s bd:98:3b:0d:e1:9e:62:5c:5f 726s Exponent: 65537 (0x10001) 726s X509v3 extensions: 726s X509v3 Authority Key Identifier: 726s DD:C4:4D:2D:40:3E:9C:92:A4:3A:7C:77:FC:10:CD:6C:6A:F0:F5:88 726s X509v3 Basic Constraints: 726s CA:FALSE 726s Netscape Cert Type: 726s SSL Client, S/MIME 726s Netscape Comment: 726s Test Organization Root CA trusted Certificate 726s X509v3 Subject Key Identifier: 726s DB:38:6F:EF:EA:42:DC:CD:83:9F:84:0F:B2:0B:C6:62:A1:C4:CB:99 726s X509v3 Key Usage: critical 726s Digital Signature, Non Repudiation, Key Encipherment 726s X509v3 Extended Key Usage: 726s TLS Web Client Authentication, E-mail Protection 726s X509v3 Subject Alternative Name: 726s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 726s Signature Algorithm: sha256WithRSAEncryption 726s Signature Value: 726s af:d1:08:be:51:59:f3:2a:e8:46:6a:00:49:6a:bf:2d:17:6b: 726s dd:c4:07:1f:fc:e8:86:76:2e:e1:de:7f:0d:71:e9:3c:92:78: 726s 08:af:fb:1a:ba:17:a7:b6:eb:e1:a2:d9:93:79:6b:d0:db:39: 726s db:5a:f5:83:98:08:61:fe:1c:20:e5:4d:55:2b:2d:59:74:7e: 726s f6:75:e6:57:da:65:9f:25:57:fe:a5:91:a6:4b:df:ba:1b:eb: 726s 9e:44:d9:27:e8:12:f8:e9:d7:1c:26:b4:a9:4a:3c:f9:ec:d3: 726s 8b:11:8f:e9:eb:22:56:0d:cd:cc:e2:28:00:f6:2e:a1:c0:c5: 726s 8a:55 726s + local found_md5 expected_md5 726s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-P7Xs16/test-root-CA-trusted-certificate-0001.pem 726s + expected_md5=Modulus=BF73849D6AAEAEFD3B4CA50CF44B39157CD68D1BD339E99D61C86F76556456015E9BFCEF3042F70CF67B0C7A13BF45046E538A441A38954A36815EB5682DF2E57BB4D3CF43306BB37CA1B8859A599AFC46A0655F760E4468CAFAB6918558C5D55FDE457C61D6F6AAC238AE35848542F035F2FDF35BC4A0BD983B0DE19E625C5F 726s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-P7Xs16/SSSD-child-30776.pem 726s + found_md5=Modulus=BF73849D6AAEAEFD3B4CA50CF44B39157CD68D1BD339E99D61C86F76556456015E9BFCEF3042F70CF67B0C7A13BF45046E538A441A38954A36815EB5682DF2E57BB4D3CF43306BB37CA1B8859A599AFC46A0655F760E4468CAFAB6918558C5D55FDE457C61D6F6AAC238AE35848542F035F2FDF35BC4A0BD983B0DE19E625C5F 726s + '[' Modulus=BF73849D6AAEAEFD3B4CA50CF44B39157CD68D1BD339E99D61C86F76556456015E9BFCEF3042F70CF67B0C7A13BF45046E538A441A38954A36815EB5682DF2E57BB4D3CF43306BB37CA1B8859A599AFC46A0655F760E4468CAFAB6918558C5D55FDE457C61D6F6AAC238AE35848542F035F2FDF35BC4A0BD983B0DE19E625C5F '!=' Modulus=BF73849D6AAEAEFD3B4CA50CF44B39157CD68D1BD339E99D61C86F76556456015E9BFCEF3042F70CF67B0C7A13BF45046E538A441A38954A36815EB5682DF2E57BB4D3CF43306BB37CA1B8859A599AFC46A0655F760E4468CAFAB6918558C5D55FDE457C61D6F6AAC238AE35848542F035F2FDF35BC4A0BD983B0DE19E625C5F ']' 726s + output_file=/tmp/sssd-softhsm2-P7Xs16/SSSD-child-30776-auth.output 726s ++ basename /tmp/sssd-softhsm2-P7Xs16/SSSD-child-30776-auth.output .output 726s + output_cert_file=/tmp/sssd-softhsm2-P7Xs16/SSSD-child-30776-auth.pem 726s + echo -n 053350 726s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-P7Xs16/test-full-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 '' --token_name 'Test Organization Root Tr Token' --module_name /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so 726s [p11_child[2562]] [main] (0x0400): p11_child started. 726s [p11_child[2562]] [main] (0x2000): Running in [auth] mode. 726s [p11_child[2562]] [main] (0x2000): Running with effective IDs: [0][0]. 726s [p11_child[2562]] [main] (0x2000): Running with real IDs [0][0]. 726s [p11_child[2562]] [do_card] (0x4000): Module List: 726s [p11_child[2562]] [do_card] (0x4000): common name: [softhsm2]. 726s [p11_child[2562]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 726s [p11_child[2562]] [do_card] (0x4000): Description [SoftHSM slot ID 0x58b1724f] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 726s [p11_child[2562]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 726s [p11_child[2562]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x58b1724f][1488024143] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 726s [p11_child[2562]] [do_card] (0x4000): Login required. 726s [p11_child[2562]] [do_card] (0x4000): Token flags [1069]. 726s [p11_child[2562]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 726s [p11_child[2562]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 726s [p11_child[2562]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so Test Organization Root Tr Token Test Organization Root Tr Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 726s [p11_child[2562]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x58b1724f;slot-manufacturer=SoftHSM%20project;slot-id=1488024143;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=6be8fe08d8b1724f;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 726s [p11_child[2562]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 726s [p11_child[2562]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 726s [p11_child[2562]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 726s [p11_child[2562]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 726s [p11_child[2562]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 726s [p11_child[2562]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 726s [p11_child[2562]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 726s [p11_child[2562]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 726s [p11_child[2562]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 726s [p11_child[2562]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 726s [p11_child[2562]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 726s [p11_child[2562]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 726s [p11_child[2562]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 726s [p11_child[2562]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 726s [p11_child[2562]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 726s [p11_child[2562]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 726s [p11_child[2562]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 726s [p11_child[2562]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 726s [p11_child[2562]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 726s [p11_child[2562]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 726s [p11_child[2562]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 726s [p11_child[2562]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 726s [p11_child[2562]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 726s [p11_child[2562]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 726s [p11_child[2562]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 726s [p11_child[2562]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 726s [p11_child[2562]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 726s [p11_child[2562]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 726s [p11_child[2562]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 726s [p11_child[2562]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 726s [p11_child[2562]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 726s [p11_child[2562]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 726s [p11_child[2562]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 726s [p11_child[2562]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 726s [p11_child[2562]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 726s [p11_child[2562]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 726s [p11_child[2562]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 726s [p11_child[2562]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 726s [p11_child[2562]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 726s [p11_child[2562]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 726s [p11_child[2562]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 726s [p11_child[2562]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 726s [p11_child[2562]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 726s [p11_child[2562]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 726s [p11_child[2562]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 726s [p11_child[2562]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 726s [p11_child[2562]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 726s [p11_child[2562]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 726s [p11_child[2562]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 726s [p11_child[2562]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 726s [p11_child[2562]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 726s [p11_child[2562]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 726s [p11_child[2562]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 726s [p11_child[2562]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 726s [p11_child[2562]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 726s [p11_child[2562]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 726s [p11_child[2562]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 726s [p11_child[2562]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 726s [p11_child[2562]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 726s [p11_child[2562]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 726s [p11_child[2562]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 726s [p11_child[2562]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 726s [p11_child[2562]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 726s [p11_child[2562]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 726s [p11_child[2562]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 726s [p11_child[2562]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 726s [p11_child[2562]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 726s [p11_child[2562]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 726s [p11_child[2562]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 726s [p11_child[2562]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 726s [p11_child[2562]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 726s [p11_child[2562]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 726s [p11_child[2562]] [do_card] (0x4000): Certificate verified and validated. 726s [p11_child[2562]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 726s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-P7Xs16/SSSD-child-30776-auth.output 726s + echo '-----BEGIN CERTIFICATE-----' 726s + tail -n1 /tmp/sssd-softhsm2-P7Xs16/SSSD-child-30776-auth.output 726s + echo '-----END CERTIFICATE-----' 726s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-P7Xs16/SSSD-child-30776-auth.pem 726s Certificate: 726s Data: 726s Version: 3 (0x2) 726s Serial Number: 3 (0x3) 726s Signature Algorithm: sha256WithRSAEncryption 726s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root CA 726s Validity 726s Not Before: Jan 18 18:58:07 2025 GMT 726s Not After : Jan 18 18:58:07 2026 GMT 726s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root Trusted Certificate 0001 726s Subject Public Key Info: 726s Public Key Algorithm: rsaEncryption 726s Public-Key: (1024 bit) 726s Modulus: 726s 00:bf:73:84:9d:6a:ae:ae:fd:3b:4c:a5:0c:f4:4b: 726s 39:15:7c:d6:8d:1b:d3:39:e9:9d:61:c8:6f:76:55: 726s 64:56:01:5e:9b:fc:ef:30:42:f7:0c:f6:7b:0c:7a: 726s 13:bf:45:04:6e:53:8a:44:1a:38:95:4a:36:81:5e: 726s b5:68:2d:f2:e5:7b:b4:d3:cf:43:30:6b:b3:7c:a1: 726s b8:85:9a:59:9a:fc:46:a0:65:5f:76:0e:44:68:ca: 726s fa:b6:91:85:58:c5:d5:5f:de:45:7c:61:d6:f6:aa: 726s c2:38:ae:35:84:85:42:f0:35:f2:fd:f3:5b:c4:a0: 726s bd:98:3b:0d:e1:9e:62:5c:5f 726s Exponent: 65537 (0x10001) 726s X509v3 extensions: 726s X509v3 Authority Key Identifier: 726s DD:C4:4D:2D:40:3E:9C:92:A4:3A:7C:77:FC:10:CD:6C:6A:F0:F5:88 726s X509v3 Basic Constraints: 726s CA:FALSE 726s Netscape Cert Type: 726s SSL Client, S/MIME 726s Netscape Comment: 726s Test Organization Root CA trusted Certificate 726s X509v3 Subject Key Identifier: 726s DB:38:6F:EF:EA:42:DC:CD:83:9F:84:0F:B2:0B:C6:62:A1:C4:CB:99 726s X509v3 Key Usage: critical 726s Digital Signature, Non Repudiation, Key Encipherment 726s X509v3 Extended Key Usage: 726s TLS Web Client Authentication, E-mail Protection 726s X509v3 Subject Alternative Name: 726s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 726s Signature Algorithm: sha256WithRSAEncryption 726s Signature Value: 726s af:d1:08:be:51:59:f3:2a:e8:46:6a:00:49:6a:bf:2d:17:6b: 726s dd:c4:07:1f:fc:e8:86:76:2e:e1:de:7f:0d:71:e9:3c:92:78: 726s 08:af:fb:1a:ba:17:a7:b6:eb:e1:a2:d9:93:79:6b:d0:db:39: 726s db:5a:f5:83:98:08:61:fe:1c:20:e5:4d:55:2b:2d:59:74:7e: 726s f6:75:e6:57:da:65:9f:25:57:fe:a5:91:a6:4b:df:ba:1b:eb: 726s 9e:44:d9:27:e8:12:f8:e9:d7:1c:26:b4:a9:4a:3c:f9:ec:d3: 726s 8b:11:8f:e9:eb:22:56:0d:cd:cc:e2:28:00:f6:2e:a1:c0:c5: 726s 8a:55 726s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-P7Xs16/SSSD-child-30776-auth.pem 726s + found_md5=Modulus=BF73849D6AAEAEFD3B4CA50CF44B39157CD68D1BD339E99D61C86F76556456015E9BFCEF3042F70CF67B0C7A13BF45046E538A441A38954A36815EB5682DF2E57BB4D3CF43306BB37CA1B8859A599AFC46A0655F760E4468CAFAB6918558C5D55FDE457C61D6F6AAC238AE35848542F035F2FDF35BC4A0BD983B0DE19E625C5F 726s + '[' Modulus=BF73849D6AAEAEFD3B4CA50CF44B39157CD68D1BD339E99D61C86F76556456015E9BFCEF3042F70CF67B0C7A13BF45046E538A441A38954A36815EB5682DF2E57BB4D3CF43306BB37CA1B8859A599AFC46A0655F760E4468CAFAB6918558C5D55FDE457C61D6F6AAC238AE35848542F035F2FDF35BC4A0BD983B0DE19E625C5F '!=' Modulus=BF73849D6AAEAEFD3B4CA50CF44B39157CD68D1BD339E99D61C86F76556456015E9BFCEF3042F70CF67B0C7A13BF45046E538A441A38954A36815EB5682DF2E57BB4D3CF43306BB37CA1B8859A599AFC46A0655F760E4468CAFAB6918558C5D55FDE457C61D6F6AAC238AE35848542F035F2FDF35BC4A0BD983B0DE19E625C5F ']' 726s + valid_certificate /tmp/sssd-softhsm2-P7Xs16/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-31705 /tmp/sssd-softhsm2-P7Xs16/test-full-chain-CA.pem partial_chain 726s + check_certificate /tmp/sssd-softhsm2-P7Xs16/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-31705 /tmp/sssd-softhsm2-P7Xs16/test-full-chain-CA.pem partial_chain 726s + local certificate=/tmp/sssd-softhsm2-P7Xs16/test-root-CA-trusted-certificate-0001.pem 726s + local key_pass=pass:random-root-ca-trusted-cert-0001-31705 726s + local key_ring=/tmp/sssd-softhsm2-P7Xs16/test-full-chain-CA.pem 726s + local verify_option=partial_chain 726s + prepare_softhsm2_card /tmp/sssd-softhsm2-P7Xs16/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-31705 726s + local certificate=/tmp/sssd-softhsm2-P7Xs16/test-root-CA-trusted-certificate-0001.pem 726s + local key_pass=pass:random-root-ca-trusted-cert-0001-31705 726s + local key_cn 726s + local key_name 726s + local tokens_dir 726s + local output_cert_file 726s + token_name= 726s ++ basename /tmp/sssd-softhsm2-P7Xs16/test-root-CA-trusted-certificate-0001.pem .pem 726s + key_name=test-root-CA-trusted-certificate-0001 726s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-P7Xs16/test-root-CA-trusted-certificate-0001.pem 726s ++ sed -n 's/ *commonName *= //p' 726s + key_cn='Test Organization Root Trusted Certificate 0001' 726s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 726s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-P7Xs16/softhsm2-test-root-CA-trusted-certificate-0001.conf 726s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-P7Xs16/softhsm2-test-root-CA-trusted-certificate-0001.conf 726s ++ basename /tmp/sssd-softhsm2-P7Xs16/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 726s Test Organization Root Tr Token 726s + tokens_dir=/tmp/sssd-softhsm2-P7Xs16/softhsm2-test-root-CA-trusted-certificate-0001 726s + token_name='Test Organization Root Tr Token' 726s + '[' '!' -e /tmp/sssd-softhsm2-P7Xs16/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 726s + '[' '!' -d /tmp/sssd-softhsm2-P7Xs16/softhsm2-test-root-CA-trusted-certificate-0001 ']' 726s + echo 'Test Organization Root Tr Token' 726s + '[' -n partial_chain ']' 726s + local verify_arg=--verify=partial_chain 726s + local output_base_name=SSSD-child-20212 726s + local output_file=/tmp/sssd-softhsm2-P7Xs16/SSSD-child-20212.output 726s + output_cert_file=/tmp/sssd-softhsm2-P7Xs16/SSSD-child-20212.pem 726s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-P7Xs16/test-full-chain-CA.pem 726s [p11_child[2572]] [main] (0x0400): p11_child started. 726s [p11_child[2572]] [main] (0x2000): Running in [pre-auth] mode. 726s [p11_child[2572]] [main] (0x2000): Running with effective IDs: [0][0]. 726s [p11_child[2572]] [main] (0x2000): Running with real IDs [0][0]. 726s [p11_child[2572]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 726s [p11_child[2572]] [do_card] (0x4000): Module List: 726s [p11_child[2572]] [do_card] (0x4000): common name: [softhsm2]. 726s [p11_child[2572]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 726s [p11_child[2572]] [do_card] (0x4000): Description [SoftHSM slot ID 0x58b1724f] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 726s [p11_child[2572]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 726s [p11_child[2572]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x58b1724f][1488024143] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 726s [p11_child[2572]] [do_card] (0x4000): Login NOT required. 726s [p11_child[2572]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 726s [p11_child[2572]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 726s [p11_child[2572]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Root Tr Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 726s [p11_child[2572]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x58b1724f;slot-manufacturer=SoftHSM%20project;slot-id=1488024143;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=6be8fe08d8b1724f;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 726s [p11_child[2572]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 726s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-P7Xs16/SSSD-child-20212.output 726s + echo '-----BEGIN CERTIFICATE-----' 726s + tail -n1 /tmp/sssd-softhsm2-P7Xs16/SSSD-child-20212.output 726s + echo '-----END CERTIFICATE-----' 726s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-P7Xs16/SSSD-child-20212.pem 726s Certificate: 726s Data: 726s Version: 3 (0x2) 726s Serial Number: 3 (0x3) 726s Signature Algorithm: sha256WithRSAEncryption 726s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root CA 726s Validity 726s Not Before: Jan 18 18:58:07 2025 GMT 726s Not After : Jan 18 18:58:07 2026 GMT 726s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root Trusted Certificate 0001 726s Subject Public Key Info: 726s Public Key Algorithm: rsaEncryption 726s Public-Key: (1024 bit) 726s Modulus: 726s 00:bf:73:84:9d:6a:ae:ae:fd:3b:4c:a5:0c:f4:4b: 726s 39:15:7c:d6:8d:1b:d3:39:e9:9d:61:c8:6f:76:55: 726s 64:56:01:5e:9b:fc:ef:30:42:f7:0c:f6:7b:0c:7a: 726s 13:bf:45:04:6e:53:8a:44:1a:38:95:4a:36:81:5e: 726s b5:68:2d:f2:e5:7b:b4:d3:cf:43:30:6b:b3:7c:a1: 726s b8:85:9a:59:9a:fc:46:a0:65:5f:76:0e:44:68:ca: 726s fa:b6:91:85:58:c5:d5:5f:de:45:7c:61:d6:f6:aa: 726s c2:38:ae:35:84:85:42:f0:35:f2:fd:f3:5b:c4:a0: 726s bd:98:3b:0d:e1:9e:62:5c:5f 726s Exponent: 65537 (0x10001) 726s X509v3 extensions: 726s X509v3 Authority Key Identifier: 726s DD:C4:4D:2D:40:3E:9C:92:A4:3A:7C:77:FC:10:CD:6C:6A:F0:F5:88 726s X509v3 Basic Constraints: 726s CA:FALSE 726s Netscape Cert Type: 726s SSL Client, S/MIME 726s Netscape Comment: 726s Test Organization Root CA trusted Certificate 726s X509v3 Subject Key Identifier: 726s DB:38:6F:EF:EA:42:DC:CD:83:9F:84:0F:B2:0B:C6:62:A1:C4:CB:99 726s X509v3 Key Usage: critical 726s Digital Signature, Non Repudiation, Key Encipherment 726s X509v3 Extended Key Usage: 726s TLS Web Client Authentication, E-mail Protection 726s X509v3 Subject Alternative Name: 726s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 726s Signature Algorithm: sha256WithRSAEncryption 726s Signature Value: 726s af:d1:08:be:51:59:f3:2a:e8:46:6a:00:49:6a:bf:2d:17:6b: 726s dd:c4:07:1f:fc:e8:86:76:2e:e1:de:7f:0d:71:e9:3c:92:78: 726s 08:af:fb:1a:ba:17:a7:b6:eb:e1:a2:d9:93:79:6b:d0:db:39: 726s db:5a:f5:83:98:08:61:fe:1c:20:e5:4d:55:2b:2d:59:74:7e: 726s f6:75:e6:57:da:65:9f:25:57:fe:a5:91:a6:4b:df:ba:1b:eb: 726s 9e:44:d9:27:e8:12:f8:e9:d7:1c:26:b4:a9:4a:3c:f9:ec:d3: 726s 8b:11:8f:e9:eb:22:56:0d:cd:cc:e2:28:00:f6:2e:a1:c0:c5: 726s 8a:55 726s + local found_md5 expected_md5 726s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-P7Xs16/test-root-CA-trusted-certificate-0001.pem 726s + expected_md5=Modulus=BF73849D6AAEAEFD3B4CA50CF44B39157CD68D1BD339E99D61C86F76556456015E9BFCEF3042F70CF67B0C7A13BF45046E538A441A38954A36815EB5682DF2E57BB4D3CF43306BB37CA1B8859A599AFC46A0655F760E4468CAFAB6918558C5D55FDE457C61D6F6AAC238AE35848542F035F2FDF35BC4A0BD983B0DE19E625C5F 726s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-P7Xs16/SSSD-child-20212.pem 726s + found_md5=Modulus=BF73849D6AAEAEFD3B4CA50CF44B39157CD68D1BD339E99D61C86F76556456015E9BFCEF3042F70CF67B0C7A13BF45046E538A441A38954A36815EB5682DF2E57BB4D3CF43306BB37CA1B8859A599AFC46A0655F760E4468CAFAB6918558C5D55FDE457C61D6F6AAC238AE35848542F035F2FDF35BC4A0BD983B0DE19E625C5F 726s + '[' Modulus=BF73849D6AAEAEFD3B4CA50CF44B39157CD68D1BD339E99D61C86F76556456015E9BFCEF3042F70CF67B0C7A13BF45046E538A441A38954A36815EB5682DF2E57BB4D3CF43306BB37CA1B8859A599AFC46A0655F760E4468CAFAB6918558C5D55FDE457C61D6F6AAC238AE35848542F035F2FDF35BC4A0BD983B0DE19E625C5F '!=' Modulus=BF73849D6AAEAEFD3B4CA50CF44B39157CD68D1BD339E99D61C86F76556456015E9BFCEF3042F70CF67B0C7A13BF45046E538A441A38954A36815EB5682DF2E57BB4D3CF43306BB37CA1B8859A599AFC46A0655F760E4468CAFAB6918558C5D55FDE457C61D6F6AAC238AE35848542F035F2FDF35BC4A0BD983B0DE19E625C5F ']' 726s + output_file=/tmp/sssd-softhsm2-P7Xs16/SSSD-child-20212-auth.output 726s ++ basename /tmp/sssd-softhsm2-P7Xs16/SSSD-child-20212-auth.output .output 726s + output_cert_file=/tmp/sssd-softhsm2-P7Xs16/SSSD-child-20212-auth.pem 726s + echo -n 053350 726s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-P7Xs16/test-full-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Root Tr Token' --module_name /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so 726s [p11_child[2580]] [main] (0x0400): p11_child started. 726s [p11_child[2580]] [main] (0x2000): Running in [auth] mode. 726s [p11_child[2580]] [main] (0x2000): Running with effective IDs: [0][0]. 726s [p11_child[2580]] [main] (0x2000): Running with real IDs [0][0]. 726s [p11_child[2580]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 726s [p11_child[2580]] [do_card] (0x4000): Module List: 726s [p11_child[2580]] [do_card] (0x4000): common name: [softhsm2]. 726s [p11_child[2580]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 726s [p11_child[2580]] [do_card] (0x4000): Description [SoftHSM slot ID 0x58b1724f] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 726s [p11_child[2580]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 726s [p11_child[2580]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x58b1724f][1488024143] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 726s [p11_child[2580]] [do_card] (0x4000): Login required. 726s [p11_child[2580]] [do_card] (0x4000): Token flags [1069]. 726s [p11_child[2580]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 726s [p11_child[2580]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 726s [p11_child[2580]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so Test Organization Root Tr Token Test Organization Root Tr Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 726s [p11_child[2580]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x58b1724f;slot-manufacturer=SoftHSM%20project;slot-id=1488024143;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=6be8fe08d8b1724f;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 726s [p11_child[2580]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 726s [p11_child[2580]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 726s [p11_child[2580]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 726s [p11_child[2580]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 726s [p11_child[2580]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 726s [p11_child[2580]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 726s [p11_child[2580]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 726s [p11_child[2580]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 726s [p11_child[2580]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 726s [p11_child[2580]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 726s [p11_child[2580]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 726s [p11_child[2580]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 726s [p11_child[2580]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 726s [p11_child[2580]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 726s [p11_child[2580]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 726s [p11_child[2580]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 726s [p11_child[2580]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 726s [p11_child[2580]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 726s [p11_child[2580]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 726s [p11_child[2580]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 726s [p11_child[2580]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 726s [p11_child[2580]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 726s [p11_child[2580]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 726s [p11_child[2580]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 726s [p11_child[2580]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 726s [p11_child[2580]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 726s [p11_child[2580]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 726s [p11_child[2580]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 726s [p11_child[2580]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 726s [p11_child[2580]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 726s [p11_child[2580]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 726s [p11_child[2580]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 726s [p11_child[2580]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 726s [p11_child[2580]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 726s [p11_child[2580]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 726s [p11_child[2580]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 726s [p11_child[2580]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 726s [p11_child[2580]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 726s [p11_child[2580]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 726s [p11_child[2580]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 726s [p11_child[2580]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 726s [p11_child[2580]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 726s [p11_child[2580]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 726s [p11_child[2580]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 726s [p11_child[2580]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 726s [p11_child[2580]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 726s [p11_child[2580]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 726s [p11_child[2580]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 726s [p11_child[2580]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 726s [p11_child[2580]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 726s [p11_child[2580]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 726s [p11_child[2580]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 726s [p11_child[2580]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 726s [p11_child[2580]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 726s [p11_child[2580]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 726s [p11_child[2580]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 726s [p11_child[2580]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 726s [p11_child[2580]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 726s [p11_child[2580]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 726s [p11_child[2580]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 726s [p11_child[2580]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 726s [p11_child[2580]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 726s [p11_child[2580]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 726s [p11_child[2580]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 726s [p11_child[2580]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 726s [p11_child[2580]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 726s [p11_child[2580]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 726s [p11_child[2580]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 726s [p11_child[2580]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 726s [p11_child[2580]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 726s [p11_child[2580]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 726s [p11_child[2580]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 726s [p11_child[2580]] [do_card] (0x4000): Certificate verified and validated. 726s [p11_child[2580]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 726s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-P7Xs16/SSSD-child-20212-auth.output 726s + echo '-----BEGIN CERTIFICATE-----' 726s + tail -n1 /tmp/sssd-softhsm2-P7Xs16/SSSD-child-20212-auth.output 726s + echo '-----END CERTIFICATE-----' 726s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-P7Xs16/SSSD-child-20212-auth.pem 726s Certificate: 726s Data: 726s Version: 3 (0x2) 726s Serial Number: 3 (0x3) 726s Signature Algorithm: sha256WithRSAEncryption 726s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root CA 726s Validity 726s Not Before: Jan 18 18:58:07 2025 GMT 726s Not After : Jan 18 18:58:07 2026 GMT 726s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root Trusted Certificate 0001 726s Subject Public Key Info: 726s Public Key Algorithm: rsaEncryption 726s Public-Key: (1024 bit) 726s Modulus: 726s 00:bf:73:84:9d:6a:ae:ae:fd:3b:4c:a5:0c:f4:4b: 726s 39:15:7c:d6:8d:1b:d3:39:e9:9d:61:c8:6f:76:55: 726s 64:56:01:5e:9b:fc:ef:30:42:f7:0c:f6:7b:0c:7a: 726s 13:bf:45:04:6e:53:8a:44:1a:38:95:4a:36:81:5e: 726s b5:68:2d:f2:e5:7b:b4:d3:cf:43:30:6b:b3:7c:a1: 726s b8:85:9a:59:9a:fc:46:a0:65:5f:76:0e:44:68:ca: 726s fa:b6:91:85:58:c5:d5:5f:de:45:7c:61:d6:f6:aa: 726s c2:38:ae:35:84:85:42:f0:35:f2:fd:f3:5b:c4:a0: 726s bd:98:3b:0d:e1:9e:62:5c:5f 726s Exponent: 65537 (0x10001) 726s X509v3 extensions: 726s X509v3 Authority Key Identifier: 726s DD:C4:4D:2D:40:3E:9C:92:A4:3A:7C:77:FC:10:CD:6C:6A:F0:F5:88 726s X509v3 Basic Constraints: 726s CA:FALSE 726s Netscape Cert Type: 726s SSL Client, S/MIME 726s Netscape Comment: 726s Test Organization Root CA trusted Certificate 726s X509v3 Subject Key Identifier: 726s DB:38:6F:EF:EA:42:DC:CD:83:9F:84:0F:B2:0B:C6:62:A1:C4:CB:99 726s X509v3 Key Usage: critical 726s Digital Signature, Non Repudiation, Key Encipherment 726s X509v3 Extended Key Usage: 726s TLS Web Client Authentication, E-mail Protection 726s X509v3 Subject Alternative Name: 726s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 726s Signature Algorithm: sha256WithRSAEncryption 726s Signature Value: 726s af:d1:08:be:51:59:f3:2a:e8:46:6a:00:49:6a:bf:2d:17:6b: 726s dd:c4:07:1f:fc:e8:86:76:2e:e1:de:7f:0d:71:e9:3c:92:78: 726s 08:af:fb:1a:ba:17:a7:b6:eb:e1:a2:d9:93:79:6b:d0:db:39: 726s db:5a:f5:83:98:08:61:fe:1c:20:e5:4d:55:2b:2d:59:74:7e: 726s f6:75:e6:57:da:65:9f:25:57:fe:a5:91:a6:4b:df:ba:1b:eb: 726s 9e:44:d9:27:e8:12:f8:e9:d7:1c:26:b4:a9:4a:3c:f9:ec:d3: 726s 8b:11:8f:e9:eb:22:56:0d:cd:cc:e2:28:00:f6:2e:a1:c0:c5: 726s 8a:55 726s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-P7Xs16/SSSD-child-20212-auth.pem 726s + found_md5=Modulus=BF73849D6AAEAEFD3B4CA50CF44B39157CD68D1BD339E99D61C86F76556456015E9BFCEF3042F70CF67B0C7A13BF45046E538A441A38954A36815EB5682DF2E57BB4D3CF43306BB37CA1B8859A599AFC46A0655F760E4468CAFAB6918558C5D55FDE457C61D6F6AAC238AE35848542F035F2FDF35BC4A0BD983B0DE19E625C5F 726s + '[' Modulus=BF73849D6AAEAEFD3B4CA50CF44B39157CD68D1BD339E99D61C86F76556456015E9BFCEF3042F70CF67B0C7A13BF45046E538A441A38954A36815EB5682DF2E57BB4D3CF43306BB37CA1B8859A599AFC46A0655F760E4468CAFAB6918558C5D55FDE457C61D6F6AAC238AE35848542F035F2FDF35BC4A0BD983B0DE19E625C5F '!=' Modulus=BF73849D6AAEAEFD3B4CA50CF44B39157CD68D1BD339E99D61C86F76556456015E9BFCEF3042F70CF67B0C7A13BF45046E538A441A38954A36815EB5682DF2E57BB4D3CF43306BB37CA1B8859A599AFC46A0655F760E4468CAFAB6918558C5D55FDE457C61D6F6AAC238AE35848542F035F2FDF35BC4A0BD983B0DE19E625C5F ']' 726s + invalid_certificate /tmp/sssd-softhsm2-P7Xs16/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-31705 /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA.pem 726s + check_certificate /tmp/sssd-softhsm2-P7Xs16/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-31705 /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA.pem 726s + local certificate=/tmp/sssd-softhsm2-P7Xs16/test-root-CA-trusted-certificate-0001.pem 726s + local key_pass=pass:random-root-ca-trusted-cert-0001-31705 726s + local key_ring=/tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA.pem 726s + local verify_option= 726s + prepare_softhsm2_card /tmp/sssd-softhsm2-P7Xs16/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-31705 726s + local certificate=/tmp/sssd-softhsm2-P7Xs16/test-root-CA-trusted-certificate-0001.pem 726s + local key_pass=pass:random-root-ca-trusted-cert-0001-31705 726s + local key_cn 726s + local key_name 726s + local tokens_dir 726s + local output_cert_file 726s + token_name= 726s ++ basename /tmp/sssd-softhsm2-P7Xs16/test-root-CA-trusted-certificate-0001.pem .pem 726s + key_name=test-root-CA-trusted-certificate-0001 726s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-P7Xs16/test-root-CA-trusted-certificate-0001.pem 726s ++ sed -n 's/ *commonName *= //p' 726s + key_cn='Test Organization Root Trusted Certificate 0001' 726s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 726s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-P7Xs16/softhsm2-test-root-CA-trusted-certificate-0001.conf 726s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-P7Xs16/softhsm2-test-root-CA-trusted-certificate-0001.conf 726s ++ basename /tmp/sssd-softhsm2-P7Xs16/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 726s + tokens_dir=/tmp/sssd-softhsm2-P7Xs16/softhsm2-test-root-CA-trusted-certificate-0001 726s + token_name='Test Organization Root Tr Token' 726s + '[' '!' -e /tmp/sssd-softhsm2-P7Xs16/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 726s + '[' '!' -d /tmp/sssd-softhsm2-P7Xs16/softhsm2-test-root-CA-trusted-certificate-0001 ']' 726s + echo 'Test Organization Root Tr Token' 726s + '[' -n '' ']' 726s + local output_base_name=SSSD-child-29422 726s + local output_file=/tmp/sssd-softhsm2-P7Xs16/SSSD-child-29422.output 726s + output_cert_file=/tmp/sssd-softhsm2-P7Xs16/SSSD-child-29422.pem 726s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA.pem 726s Test Organization Root Tr Token 726s [p11_child[2590]] [main] (0x0400): p11_child started. 726s [p11_child[2590]] [main] (0x2000): Running in [pre-auth] mode. 726s [p11_child[2590]] [main] (0x2000): Running with effective IDs: [0][0]. 726s [p11_child[2590]] [main] (0x2000): Running with real IDs [0][0]. 726s [p11_child[2590]] [do_card] (0x4000): Module List: 726s [p11_child[2590]] [do_card] (0x4000): common name: [softhsm2]. 726s [p11_child[2590]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 726s [p11_child[2590]] [do_card] (0x4000): Description [SoftHSM slot ID 0x58b1724f] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 726s [p11_child[2590]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 726s [p11_child[2590]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x58b1724f][1488024143] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 726s [p11_child[2590]] [do_card] (0x4000): Login NOT required. 726s [p11_child[2590]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 726s [p11_child[2590]] [do_verification] (0x0040): X509_verify_cert failed [0]. 726s [p11_child[2590]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 726s [p11_child[2590]] [read_certs] (0x0040): Certificate [Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] not valid, skipping. 726s [p11_child[2590]] [do_card] (0x4000): No certificate found. 726s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-P7Xs16/SSSD-child-29422.output 726s + return 2 726s + invalid_certificate /tmp/sssd-softhsm2-P7Xs16/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-31705 /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA.pem partial_chain 726s + check_certificate /tmp/sssd-softhsm2-P7Xs16/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-31705 /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA.pem partial_chain 726s + local certificate=/tmp/sssd-softhsm2-P7Xs16/test-root-CA-trusted-certificate-0001.pem 726s + local key_pass=pass:random-root-ca-trusted-cert-0001-31705 726s + local key_ring=/tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA.pem 726s + local verify_option=partial_chain 726s + prepare_softhsm2_card /tmp/sssd-softhsm2-P7Xs16/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-31705 726s + local certificate=/tmp/sssd-softhsm2-P7Xs16/test-root-CA-trusted-certificate-0001.pem 726s + local key_pass=pass:random-root-ca-trusted-cert-0001-31705 726s + local key_cn 726s + local key_name 726s + local tokens_dir 726s + local output_cert_file 726s + token_name= 726s ++ basename /tmp/sssd-softhsm2-P7Xs16/test-root-CA-trusted-certificate-0001.pem .pem 726s + key_name=test-root-CA-trusted-certificate-0001 726s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-P7Xs16/test-root-CA-trusted-certificate-0001.pem 726s ++ sed -n 's/ *commonName *= //p' 726s + key_cn='Test Organization Root Trusted Certificate 0001' 726s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 726s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-P7Xs16/softhsm2-test-root-CA-trusted-certificate-0001.conf 726s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-P7Xs16/softhsm2-test-root-CA-trusted-certificate-0001.conf 726s ++ basename /tmp/sssd-softhsm2-P7Xs16/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 726s + tokens_dir=/tmp/sssd-softhsm2-P7Xs16/softhsm2-test-root-CA-trusted-certificate-0001 726s + token_name='Test Organization Root Tr Token' 726s + '[' '!' -e /tmp/sssd-softhsm2-P7Xs16/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 726s + '[' '!' -d /tmp/sssd-softhsm2-P7Xs16/softhsm2-test-root-CA-trusted-certificate-0001 ']' 726s + echo 'Test Organization Root Tr Token' 726s + '[' -n partial_chain ']' 726s + local verify_arg=--verify=partial_chain 726s + local output_base_name=SSSD-child-6403 726s + local output_file=/tmp/sssd-softhsm2-P7Xs16/SSSD-child-6403.output 726s + output_cert_file=/tmp/sssd-softhsm2-P7Xs16/SSSD-child-6403.pem 726s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA.pem 726s Test Organization Root Tr Token 726s [p11_child[2597]] [main] (0x0400): p11_child started. 726s [p11_child[2597]] [main] (0x2000): Running in [pre-auth] mode. 726s [p11_child[2597]] [main] (0x2000): Running with effective IDs: [0][0]. 726s [p11_child[2597]] [main] (0x2000): Running with real IDs [0][0]. 726s [p11_child[2597]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 726s [p11_child[2597]] [do_card] (0x4000): Module List: 726s [p11_child[2597]] [do_card] (0x4000): common name: [softhsm2]. 726s [p11_child[2597]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 726s [p11_child[2597]] [do_card] (0x4000): Description [SoftHSM slot ID 0x58b1724f] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 726s [p11_child[2597]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 726s [p11_child[2597]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x58b1724f][1488024143] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 726s [p11_child[2597]] [do_card] (0x4000): Login NOT required. 726s [p11_child[2597]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 726s [p11_child[2597]] [do_verification] (0x0040): X509_verify_cert failed [0]. 726s [p11_child[2597]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 726s [p11_child[2597]] [read_certs] (0x0040): Certificate [Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] not valid, skipping. 726s [p11_child[2597]] [do_card] (0x4000): No certificate found. 726s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-P7Xs16/SSSD-child-6403.output 726s + return 2 726s + invalid_certificate /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-28208 /dev/null 726s + check_certificate /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-28208 /dev/null 726s + local certificate=/tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA-trusted-certificate-0001.pem 726s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-28208 726s + local key_ring=/dev/null 726s + local verify_option= 726s + prepare_softhsm2_card /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-28208 726s + local certificate=/tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA-trusted-certificate-0001.pem 726s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-28208 726s + local key_cn 726s + local key_name 726s + local tokens_dir 726s + local output_cert_file 726s + token_name= 726s ++ basename /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA-trusted-certificate-0001.pem .pem 726s + key_name=test-intermediate-CA-trusted-certificate-0001 726s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA-trusted-certificate-0001.pem 726s ++ sed -n 's/ *commonName *= //p' 726s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 726s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 726s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-P7Xs16/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 726s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-P7Xs16/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 726s ++ basename /tmp/sssd-softhsm2-P7Xs16/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 726s + tokens_dir=/tmp/sssd-softhsm2-P7Xs16/softhsm2-test-intermediate-CA-trusted-certificate-0001 726s + token_name='Test Organization Interme Token' 726s + '[' '!' -e /tmp/sssd-softhsm2-P7Xs16/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 726s + local key_file 726s + local decrypted_key 726s + mkdir -p /tmp/sssd-softhsm2-P7Xs16/softhsm2-test-intermediate-CA-trusted-certificate-0001 726s + key_file=/tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA-trusted-certificate-0001-key.pem 726s + decrypted_key=/tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 726s + cat 726s + softhsm2-util --init-token --label 'Test Organization Interme Token' --pin 053350 --so-pin 053350 --free 726s Slot 0 has a free/uninitialized token. 726s The token has been initialized and is reassigned to slot 512746185 726s + softhsm2-util --show-slots 726s Available slots: 726s Slot 512746185 726s Slot info: 726s Description: SoftHSM slot ID 0x1e8fe2c9 726s Manufacturer ID: SoftHSM project 726s Hardware version: 2.6 726s Firmware version: 2.6 726s Token present: yes 726s Token info: 726s Manufacturer ID: SoftHSM project 726s Model: SoftHSM v2 726s Hardware version: 2.6 726s Firmware version: 2.6 726s Serial number: e85268dd1e8fe2c9 726s Initialized: yes 726s User PIN init.: yes 726s Label: Test Organization Interme Token 726s Slot 1 726s Slot info: 726s Description: SoftHSM slot ID 0x1 726s Manufacturer ID: SoftHSM project 726s Hardware version: 2.6 726s Firmware version: 2.6 726s Token present: yes 726s Token info: 726s Manufacturer ID: SoftHSM project 726s Model: SoftHSM v2 726s Hardware version: 2.6 726s Firmware version: 2.6 726s Serial number: 726s Initialized: no 726s User PIN init.: no 726s Label: 726s + p11tool --provider=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --write --no-mark-private --load-certificate=/tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA-trusted-certificate-0001.pem --login --set-pin=053350 --label 'Test Organization Intermediate Trusted Certificate 0001' --id 00112233445566778899FFAABBCCDDEEFF012345 726s + openssl rsa -passin pass:random-intermediate-ca-trusted-cert-0001-28208 -in /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA-trusted-certificate-0001-key.pem -out /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 726s writing RSA key 726s + p11tool --provider=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --write --load-privkey=/tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem --login --set-pin=053350 --label 'Test Organization Intermediate Trusted Certificate 0001 Key' --id 00112233445566778899FFAABBCCDDEEFF012345 726s + rm /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 726s + p11tool --provider=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --list-all 726s Object 0: 726s URL: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=e85268dd1e8fe2c9;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert 726s Type: X.509 Certificate (RSA-1024) 726s Expires: Sun Jan 18 18:58:07 2026 726s Label: Test Organization Intermediate Trusted Certificate 0001 726s ID: 00:11:22:33:44:55:66:77:88:99:ff:aa:bb:cc:dd:ee:ff:01:23:45 726s 726s Test Organization Interme Token 726s + echo 'Test Organization Interme Token' 726s + '[' -n '' ']' 726s + local output_base_name=SSSD-child-20298 726s + local output_file=/tmp/sssd-softhsm2-P7Xs16/SSSD-child-20298.output 726s + output_cert_file=/tmp/sssd-softhsm2-P7Xs16/SSSD-child-20298.pem 726s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/dev/null 726s [p11_child[2613]] [main] (0x0400): p11_child started. 726s [p11_child[2613]] [main] (0x2000): Running in [pre-auth] mode. 726s [p11_child[2613]] [main] (0x2000): Running with effective IDs: [0][0]. 726s [p11_child[2613]] [main] (0x2000): Running with real IDs [0][0]. 726s [p11_child[2613]] [init_verification] (0x0040): X509_LOOKUP_load_file [/dev/null] failed [92274824][error:05800088:x509 certificate routines::no certificate or crl found]. 726s [p11_child[2613]] [do_work] (0x0040): init_verification failed. 726s [p11_child[2613]] [main] (0x0020): p11_child failed (5) 726s + return 2 726s + valid_certificate /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-28208 /dev/null no_verification 726s + check_certificate /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-28208 /dev/null no_verification 726s + local certificate=/tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA-trusted-certificate-0001.pem 726s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-28208 726s + local key_ring=/dev/null 726s + local verify_option=no_verification 726s + prepare_softhsm2_card /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-28208 726s + local certificate=/tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA-trusted-certificate-0001.pem 726s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-28208 726s + local key_cn 726s + local key_name 726s + local tokens_dir 726s + local output_cert_file 726s + token_name= 726s ++ basename /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA-trusted-certificate-0001.pem .pem 726s + key_name=test-intermediate-CA-trusted-certificate-0001 726s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA-trusted-certificate-0001.pem 726s ++ sed -n 's/ *commonName *= //p' 726s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 726s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 726s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-P7Xs16/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 726s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-P7Xs16/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 726s ++ basename /tmp/sssd-softhsm2-P7Xs16/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 726s + tokens_dir=/tmp/sssd-softhsm2-P7Xs16/softhsm2-test-intermediate-CA-trusted-certificate-0001 726s + token_name='Test Organization Interme Token' 726s + '[' '!' -e /tmp/sssd-softhsm2-P7Xs16/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 726s + '[' '!' -d /tmp/sssd-softhsm2-P7Xs16/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 726s + echo 'Test Organization Interme Token' 726s + '[' -n no_verification ']' 726s + local verify_arg=--verify=no_verification 726s + local output_base_name=SSSD-child-26878 726s + local output_file=/tmp/sssd-softhsm2-P7Xs16/SSSD-child-26878.output 726s + output_cert_file=/tmp/sssd-softhsm2-P7Xs16/SSSD-child-26878.pem 726s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --verify=no_verification --ca_db=/dev/null 726s Test Organization Interme Token 726s [p11_child[2619]] [main] (0x0400): p11_child started. 726s [p11_child[2619]] [main] (0x2000): Running in [pre-auth] mode. 726s [p11_child[2619]] [main] (0x2000): Running with effective IDs: [0][0]. 726s [p11_child[2619]] [main] (0x2000): Running with real IDs [0][0]. 726s [p11_child[2619]] [parse_cert_verify_opts] (0x0020): Found 'no_verification' option, disabling verification completely. This should not be used in production. 726s [p11_child[2619]] [do_card] (0x4000): Module List: 726s [p11_child[2619]] [do_card] (0x4000): common name: [softhsm2]. 726s [p11_child[2619]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 726s [p11_child[2619]] [do_card] (0x4000): Description [SoftHSM slot ID 0x1e8fe2c9] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 726s [p11_child[2619]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 726s [p11_child[2619]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x1e8fe2c9][512746185] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 726s [p11_child[2619]] [do_card] (0x4000): Login NOT required. 726s [p11_child[2619]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 726s [p11_child[2619]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Interme Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 726s [p11_child[2619]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x1e8fe2c9;slot-manufacturer=SoftHSM%20project;slot-id=512746185;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=e85268dd1e8fe2c9;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 726s [p11_child[2619]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 726s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-P7Xs16/SSSD-child-26878.output 726s + echo '-----BEGIN CERTIFICATE-----' 726s + tail -n1 /tmp/sssd-softhsm2-P7Xs16/SSSD-child-26878.output 726s + echo '-----END CERTIFICATE-----' 726s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-P7Xs16/SSSD-child-26878.pem 726s Certificate: 726s Data: 726s Version: 3 (0x2) 726s Serial Number: 4 (0x4) 726s Signature Algorithm: sha256WithRSAEncryption 726s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate CA 726s Validity 726s Not Before: Jan 18 18:58:07 2025 GMT 726s Not After : Jan 18 18:58:07 2026 GMT 726s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate Trusted Certificate 0001 726s Subject Public Key Info: 726s Public Key Algorithm: rsaEncryption 726s Public-Key: (1024 bit) 726s Modulus: 726s 00:de:0f:4b:51:b6:e2:37:2c:33:47:10:1b:c8:67: 726s 03:bd:d8:a7:0b:4b:c2:60:a2:62:b4:21:33:fe:38: 726s 77:42:8f:c5:cb:6b:c9:fd:ea:ac:77:81:1a:6a:dd: 726s 6f:51:6a:6c:30:8e:b3:7c:8a:44:6f:91:12:8b:e5: 726s 23:73:65:87:e5:82:77:7d:d0:08:a8:51:bc:4e:0d: 726s f5:98:dd:8a:ef:8c:92:e9:49:c0:3f:cd:78:48:51: 726s 3d:ca:bf:76:0c:88:04:60:2e:20:d3:28:e9:72:c0: 726s 71:c2:f7:d6:1f:76:4d:e7:47:87:b8:f3:d9:de:d9: 726s 46:e2:93:63:59:4f:2c:9f:2f 726s Exponent: 65537 (0x10001) 726s X509v3 extensions: 726s X509v3 Authority Key Identifier: 726s AC:04:14:1D:7B:38:42:77:66:9C:2E:5E:A9:51:0B:CF:56:5A:9B:B3 726s X509v3 Basic Constraints: 726s CA:FALSE 726s Netscape Cert Type: 726s SSL Client, S/MIME 726s Netscape Comment: 726s Test Organization Intermediate CA trusted Certificate 726s X509v3 Subject Key Identifier: 726s 70:F1:9E:0B:95:90:49:1F:AE:5E:06:8E:6C:DD:BC:3F:5B:C2:40:4A 726s X509v3 Key Usage: critical 726s Digital Signature, Non Repudiation, Key Encipherment 726s X509v3 Extended Key Usage: 726s TLS Web Client Authentication, E-mail Protection 726s X509v3 Subject Alternative Name: 726s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 726s Signature Algorithm: sha256WithRSAEncryption 726s Signature Value: 726s 71:5a:9b:c7:1b:23:d7:c8:c4:30:55:90:5d:24:be:5f:ea:51: 726s 20:e3:30:22:3d:3a:fe:d3:91:b5:dc:78:89:ff:66:e9:f3:5a: 726s 12:0b:d4:37:6b:c7:89:c4:dc:66:fa:45:b9:7b:4d:c7:1a:c2: 726s 10:50:e5:80:c8:89:f7:27:dc:6f:03:90:40:f4:cd:76:8a:ff: 726s 6e:4d:90:42:f3:75:50:a5:fe:49:9a:9a:6e:bb:b5:0a:11:0f: 726s b3:86:52:39:4b:2d:7a:cb:22:9c:28:a3:fd:ea:97:f5:5a:87: 726s a1:d1:35:46:cb:37:b0:fa:46:92:af:4b:d9:e5:72:8a:38:2d: 726s b4:ae 726s + local found_md5 expected_md5 726s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA-trusted-certificate-0001.pem 726s + expected_md5=Modulus=DE0F4B51B6E2372C3347101BC86703BDD8A70B4BC260A262B42133FE3877428FC5CB6BC9FDEAAC77811A6ADD6F516A6C308EB37C8A446F91128BE523736587E582777DD008A851BC4E0DF598DD8AEF8C92E949C03FCD7848513DCABF760C8804602E20D328E972C071C2F7D61F764DE74787B8F3D9DED946E29363594F2C9F2F 726s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-P7Xs16/SSSD-child-26878.pem 726s + found_md5=Modulus=DE0F4B51B6E2372C3347101BC86703BDD8A70B4BC260A262B42133FE3877428FC5CB6BC9FDEAAC77811A6ADD6F516A6C308EB37C8A446F91128BE523736587E582777DD008A851BC4E0DF598DD8AEF8C92E949C03FCD7848513DCABF760C8804602E20D328E972C071C2F7D61F764DE74787B8F3D9DED946E29363594F2C9F2F 726s + '[' Modulus=DE0F4B51B6E2372C3347101BC86703BDD8A70B4BC260A262B42133FE3877428FC5CB6BC9FDEAAC77811A6ADD6F516A6C308EB37C8A446F91128BE523736587E582777DD008A851BC4E0DF598DD8AEF8C92E949C03FCD7848513DCABF760C8804602E20D328E972C071C2F7D61F764DE74787B8F3D9DED946E29363594F2C9F2F '!=' Modulus=DE0F4B51B6E2372C3347101BC86703BDD8A70B4BC260A262B42133FE3877428FC5CB6BC9FDEAAC77811A6ADD6F516A6C308EB37C8A446F91128BE523736587E582777DD008A851BC4E0DF598DD8AEF8C92E949C03FCD7848513DCABF760C8804602E20D328E972C071C2F7D61F764DE74787B8F3D9DED946E29363594F2C9F2F ']' 726s + output_file=/tmp/sssd-softhsm2-P7Xs16/SSSD-child-26878-auth.output 726s ++ basename /tmp/sssd-softhsm2-P7Xs16/SSSD-child-26878-auth.output .output 726s + output_cert_file=/tmp/sssd-softhsm2-P7Xs16/SSSD-child-26878-auth.pem 726s + echo -n 053350 726s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/dev/null --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=no_verification --token_name 'Test Organization Interme Token' --module_name /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so 726s [p11_child[2627]] [main] (0x0400): p11_child started. 726s [p11_child[2627]] [main] (0x2000): Running in [auth] mode. 726s [p11_child[2627]] [main] (0x2000): Running with effective IDs: [0][0]. 726s [p11_child[2627]] [main] (0x2000): Running with real IDs [0][0]. 726s [p11_child[2627]] [parse_cert_verify_opts] (0x0020): Found 'no_verification' option, disabling verification completely. This should not be used in production. 726s [p11_child[2627]] [do_card] (0x4000): Module List: 726s [p11_child[2627]] [do_card] (0x4000): common name: [softhsm2]. 726s [p11_child[2627]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 726s [p11_child[2627]] [do_card] (0x4000): Description [SoftHSM slot ID 0x1e8fe2c9] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 726s [p11_child[2627]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 726s [p11_child[2627]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x1e8fe2c9][512746185] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 726s [p11_child[2627]] [do_card] (0x4000): Login required. 726s [p11_child[2627]] [do_card] (0x4000): Token flags [1069]. 726s [p11_child[2627]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 726s [p11_child[2627]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so Test Organization Interme Token Test Organization Interme Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 726s [p11_child[2627]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x1e8fe2c9;slot-manufacturer=SoftHSM%20project;slot-id=512746185;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=e85268dd1e8fe2c9;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 726s [p11_child[2627]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 726s [p11_child[2627]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 726s [p11_child[2627]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 726s [p11_child[2627]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 726s [p11_child[2627]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 726s [p11_child[2627]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 726s [p11_child[2627]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 726s [p11_child[2627]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 726s [p11_child[2627]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 726s [p11_child[2627]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 726s [p11_child[2627]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 726s [p11_child[2627]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 726s [p11_child[2627]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 726s [p11_child[2627]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 726s [p11_child[2627]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 726s [p11_child[2627]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 726s [p11_child[2627]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 726s [p11_child[2627]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 726s [p11_child[2627]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 726s [p11_child[2627]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 726s [p11_child[2627]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 726s [p11_child[2627]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 726s [p11_child[2627]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 726s [p11_child[2627]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 726s [p11_child[2627]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 726s [p11_child[2627]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 726s [p11_child[2627]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 726s [p11_child[2627]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 726s [p11_child[2627]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 726s [p11_child[2627]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 726s [p11_child[2627]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 726s [p11_child[2627]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 726s [p11_child[2627]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 726s [p11_child[2627]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 726s [p11_child[2627]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 726s [p11_child[2627]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 726s [p11_child[2627]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 726s [p11_child[2627]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 726s [p11_child[2627]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 726s [p11_child[2627]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 726s [p11_child[2627]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 726s [p11_child[2627]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 726s [p11_child[2627]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 726s [p11_child[2627]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 726s [p11_child[2627]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 726s [p11_child[2627]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 726s [p11_child[2627]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 726s [p11_child[2627]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 726s [p11_child[2627]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 726s [p11_child[2627]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 726s [p11_child[2627]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 726s [p11_child[2627]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 726s [p11_child[2627]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 726s [p11_child[2627]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 726s [p11_child[2627]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 726s [p11_child[2627]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 726s [p11_child[2627]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 726s [p11_child[2627]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 726s [p11_child[2627]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 726s [p11_child[2627]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 726s [p11_child[2627]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 726s [p11_child[2627]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 726s [p11_child[2627]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 726s [p11_child[2627]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 726s [p11_child[2627]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 726s [p11_child[2627]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 726s [p11_child[2627]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 726s [p11_child[2627]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 726s [p11_child[2627]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 726s [p11_child[2627]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 726s [p11_child[2627]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 726s [p11_child[2627]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 726s [p11_child[2627]] [do_card] (0x4000): Certificate verified and validated. 726s [p11_child[2627]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 726s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-P7Xs16/SSSD-child-26878-auth.output 726s + echo '-----BEGIN CERTIFICATE-----' 726s + tail -n1 /tmp/sssd-softhsm2-P7Xs16/SSSD-child-26878-auth.output 726s + echo '-----END CERTIFICATE-----' 726s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-P7Xs16/SSSD-child-26878-auth.pem 726s Certificate: 726s Data: 726s Version: 3 (0x2) 726s Serial Number: 4 (0x4) 726s Signature Algorithm: sha256WithRSAEncryption 726s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate CA 726s Validity 726s Not Before: Jan 18 18:58:07 2025 GMT 726s Not After : Jan 18 18:58:07 2026 GMT 726s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate Trusted Certificate 0001 726s Subject Public Key Info: 726s Public Key Algorithm: rsaEncryption 726s Public-Key: (1024 bit) 726s Modulus: 726s 00:de:0f:4b:51:b6:e2:37:2c:33:47:10:1b:c8:67: 726s 03:bd:d8:a7:0b:4b:c2:60:a2:62:b4:21:33:fe:38: 726s 77:42:8f:c5:cb:6b:c9:fd:ea:ac:77:81:1a:6a:dd: 726s 6f:51:6a:6c:30:8e:b3:7c:8a:44:6f:91:12:8b:e5: 726s 23:73:65:87:e5:82:77:7d:d0:08:a8:51:bc:4e:0d: 726s f5:98:dd:8a:ef:8c:92:e9:49:c0:3f:cd:78:48:51: 726s 3d:ca:bf:76:0c:88:04:60:2e:20:d3:28:e9:72:c0: 726s 71:c2:f7:d6:1f:76:4d:e7:47:87:b8:f3:d9:de:d9: 726s 46:e2:93:63:59:4f:2c:9f:2f 726s Exponent: 65537 (0x10001) 726s X509v3 extensions: 726s X509v3 Authority Key Identifier: 726s AC:04:14:1D:7B:38:42:77:66:9C:2E:5E:A9:51:0B:CF:56:5A:9B:B3 726s X509v3 Basic Constraints: 726s CA:FALSE 726s Netscape Cert Type: 726s SSL Client, S/MIME 726s Netscape Comment: 726s Test Organization Intermediate CA trusted Certificate 726s X509v3 Subject Key Identifier: 726s 70:F1:9E:0B:95:90:49:1F:AE:5E:06:8E:6C:DD:BC:3F:5B:C2:40:4A 726s X509v3 Key Usage: critical 726s Digital Signature, Non Repudiation, Key Encipherment 726s X509v3 Extended Key Usage: 726s TLS Web Client Authentication, E-mail Protection 726s X509v3 Subject Alternative Name: 726s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 726s Signature Algorithm: sha256WithRSAEncryption 726s Signature Value: 726s 71:5a:9b:c7:1b:23:d7:c8:c4:30:55:90:5d:24:be:5f:ea:51: 726s 20:e3:30:22:3d:3a:fe:d3:91:b5:dc:78:89:ff:66:e9:f3:5a: 726s 12:0b:d4:37:6b:c7:89:c4:dc:66:fa:45:b9:7b:4d:c7:1a:c2: 726s 10:50:e5:80:c8:89:f7:27:dc:6f:03:90:40:f4:cd:76:8a:ff: 726s 6e:4d:90:42:f3:75:50:a5:fe:49:9a:9a:6e:bb:b5:0a:11:0f: 726s b3:86:52:39:4b:2d:7a:cb:22:9c:28:a3:fd:ea:97:f5:5a:87: 726s a1:d1:35:46:cb:37:b0:fa:46:92:af:4b:d9:e5:72:8a:38:2d: 726s b4:ae 726s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-P7Xs16/SSSD-child-26878-auth.pem 726s + found_md5=Modulus=DE0F4B51B6E2372C3347101BC86703BDD8A70B4BC260A262B42133FE3877428FC5CB6BC9FDEAAC77811A6ADD6F516A6C308EB37C8A446F91128BE523736587E582777DD008A851BC4E0DF598DD8AEF8C92E949C03FCD7848513DCABF760C8804602E20D328E972C071C2F7D61F764DE74787B8F3D9DED946E29363594F2C9F2F 726s + '[' Modulus=DE0F4B51B6E2372C3347101BC86703BDD8A70B4BC260A262B42133FE3877428FC5CB6BC9FDEAAC77811A6ADD6F516A6C308EB37C8A446F91128BE523736587E582777DD008A851BC4E0DF598DD8AEF8C92E949C03FCD7848513DCABF760C8804602E20D328E972C071C2F7D61F764DE74787B8F3D9DED946E29363594F2C9F2F '!=' Modulus=DE0F4B51B6E2372C3347101BC86703BDD8A70B4BC260A262B42133FE3877428FC5CB6BC9FDEAAC77811A6ADD6F516A6C308EB37C8A446F91128BE523736587E582777DD008A851BC4E0DF598DD8AEF8C92E949C03FCD7848513DCABF760C8804602E20D328E972C071C2F7D61F764DE74787B8F3D9DED946E29363594F2C9F2F ']' 726s + invalid_certificate /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-28208 /tmp/sssd-softhsm2-P7Xs16/test-root-CA.pem 726s + check_certificate /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-28208 /tmp/sssd-softhsm2-P7Xs16/test-root-CA.pem 726s + local certificate=/tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA-trusted-certificate-0001.pem 726s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-28208 726s + local key_ring=/tmp/sssd-softhsm2-P7Xs16/test-root-CA.pem 726s + local verify_option= 726s + prepare_softhsm2_card /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-28208 726s + local certificate=/tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA-trusted-certificate-0001.pem 726s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-28208 726s + local key_cn 726s + local key_name 726s + local tokens_dir 726s + local output_cert_file 726s + token_name= 726s ++ basename /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA-trusted-certificate-0001.pem .pem 726s + key_name=test-intermediate-CA-trusted-certificate-0001 726s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA-trusted-certificate-0001.pem 726s ++ sed -n 's/ *commonName *= //p' 726s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 726s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 726s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-P7Xs16/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 726s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-P7Xs16/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 726s ++ basename /tmp/sssd-softhsm2-P7Xs16/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 726s + tokens_dir=/tmp/sssd-softhsm2-P7Xs16/softhsm2-test-intermediate-CA-trusted-certificate-0001 726s + token_name='Test Organization Interme Token' 726s + '[' '!' -e /tmp/sssd-softhsm2-P7Xs16/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 726s + '[' '!' -d /tmp/sssd-softhsm2-P7Xs16/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 726s + echo 'Test Organization Interme Token' 726s Test Organization Interme Token 726s + '[' -n '' ']' 726s + local output_base_name=SSSD-child-23651 726s + local output_file=/tmp/sssd-softhsm2-P7Xs16/SSSD-child-23651.output 726s + output_cert_file=/tmp/sssd-softhsm2-P7Xs16/SSSD-child-23651.pem 726s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-P7Xs16/test-root-CA.pem 726s [p11_child[2637]] [main] (0x0400): p11_child started. 726s [p11_child[2637]] [main] (0x2000): Running in [pre-auth] mode. 726s [p11_child[2637]] [main] (0x2000): Running with effective IDs: [0][0]. 726s [p11_child[2637]] [main] (0x2000): Running with real IDs [0][0]. 726s [p11_child[2637]] [do_card] (0x4000): Module List: 726s [p11_child[2637]] [do_card] (0x4000): common name: [softhsm2]. 726s [p11_child[2637]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 726s [p11_child[2637]] [do_card] (0x4000): Description [SoftHSM slot ID 0x1e8fe2c9] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 726s [p11_child[2637]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 726s [p11_child[2637]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x1e8fe2c9][512746185] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 726s [p11_child[2637]] [do_card] (0x4000): Login NOT required. 726s [p11_child[2637]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 726s [p11_child[2637]] [do_verification] (0x0040): X509_verify_cert failed [0]. 726s [p11_child[2637]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 726s [p11_child[2637]] [read_certs] (0x0040): Certificate [Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] not valid, skipping. 726s [p11_child[2637]] [do_card] (0x4000): No certificate found. 726s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-P7Xs16/SSSD-child-23651.output 726s + return 2 726s + invalid_certificate /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-28208 /tmp/sssd-softhsm2-P7Xs16/test-root-CA.pem partial_chain 726s + check_certificate /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-28208 /tmp/sssd-softhsm2-P7Xs16/test-root-CA.pem partial_chain 726s + local certificate=/tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA-trusted-certificate-0001.pem 726s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-28208 726s + local key_ring=/tmp/sssd-softhsm2-P7Xs16/test-root-CA.pem 726s + local verify_option=partial_chain 726s + prepare_softhsm2_card /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-28208 726s + local certificate=/tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA-trusted-certificate-0001.pem 726s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-28208 726s + local key_cn 726s + local key_name 726s + local tokens_dir 726s + local output_cert_file 726s + token_name= 726s ++ basename /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA-trusted-certificate-0001.pem .pem 726s + key_name=test-intermediate-CA-trusted-certificate-0001 726s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA-trusted-certificate-0001.pem 726s ++ sed -n 's/ *commonName *= //p' 726s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 726s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 726s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-P7Xs16/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 726s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-P7Xs16/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 726s ++ basename /tmp/sssd-softhsm2-P7Xs16/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 726s Test Organization Interme Token 726s + tokens_dir=/tmp/sssd-softhsm2-P7Xs16/softhsm2-test-intermediate-CA-trusted-certificate-0001 726s + token_name='Test Organization Interme Token' 726s + '[' '!' -e /tmp/sssd-softhsm2-P7Xs16/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 726s + '[' '!' -d /tmp/sssd-softhsm2-P7Xs16/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 726s + echo 'Test Organization Interme Token' 726s + '[' -n partial_chain ']' 726s + local verify_arg=--verify=partial_chain 726s + local output_base_name=SSSD-child-30772 726s + local output_file=/tmp/sssd-softhsm2-P7Xs16/SSSD-child-30772.output 726s + output_cert_file=/tmp/sssd-softhsm2-P7Xs16/SSSD-child-30772.pem 726s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-P7Xs16/test-root-CA.pem 726s [p11_child[2644]] [main] (0x0400): p11_child started. 726s [p11_child[2644]] [main] (0x2000): Running in [pre-auth] mode. 726s [p11_child[2644]] [main] (0x2000): Running with effective IDs: [0][0]. 726s [p11_child[2644]] [main] (0x2000): Running with real IDs [0][0]. 726s [p11_child[2644]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 726s [p11_child[2644]] [do_card] (0x4000): Module List: 726s [p11_child[2644]] [do_card] (0x4000): common name: [softhsm2]. 726s [p11_child[2644]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 726s [p11_child[2644]] [do_card] (0x4000): Description [SoftHSM slot ID 0x1e8fe2c9] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 726s [p11_child[2644]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 726s [p11_child[2644]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x1e8fe2c9][512746185] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 726s [p11_child[2644]] [do_card] (0x4000): Login NOT required. 726s [p11_child[2644]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 726s [p11_child[2644]] [do_verification] (0x0040): X509_verify_cert failed [0]. 726s [p11_child[2644]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 726s [p11_child[2644]] [read_certs] (0x0040): Certificate [Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] not valid, skipping. 726s [p11_child[2644]] [do_card] (0x4000): No certificate found. 726s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-P7Xs16/SSSD-child-30772.output 726s + return 2 726s + valid_certificate /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-28208 /tmp/sssd-softhsm2-P7Xs16/test-full-chain-CA.pem 726s + check_certificate /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-28208 /tmp/sssd-softhsm2-P7Xs16/test-full-chain-CA.pem 726s + local certificate=/tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA-trusted-certificate-0001.pem 726s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-28208 726s + local key_ring=/tmp/sssd-softhsm2-P7Xs16/test-full-chain-CA.pem 726s + local verify_option= 726s + prepare_softhsm2_card /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-28208 726s + local certificate=/tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA-trusted-certificate-0001.pem 726s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-28208 726s + local key_cn 726s + local key_name 726s + local tokens_dir 726s + local output_cert_file 726s + token_name= 726s ++ basename /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA-trusted-certificate-0001.pem .pem 726s + key_name=test-intermediate-CA-trusted-certificate-0001 726s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA-trusted-certificate-0001.pem 726s ++ sed -n 's/ *commonName *= //p' 726s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 726s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 726s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-P7Xs16/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 726s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-P7Xs16/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 726s ++ basename /tmp/sssd-softhsm2-P7Xs16/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 726s + tokens_dir=/tmp/sssd-softhsm2-P7Xs16/softhsm2-test-intermediate-CA-trusted-certificate-0001 726s + token_name='Test Organization Interme Token' 726s + '[' '!' -e /tmp/sssd-softhsm2-P7Xs16/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 726s + '[' '!' -d /tmp/sssd-softhsm2-P7Xs16/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 726s + echo 'Test Organization Interme Token' 726s + '[' -n '' ']' 726s Test Organization Interme Token 726s + local output_base_name=SSSD-child-19545 726s + local output_file=/tmp/sssd-softhsm2-P7Xs16/SSSD-child-19545.output 726s + output_cert_file=/tmp/sssd-softhsm2-P7Xs16/SSSD-child-19545.pem 726s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-P7Xs16/test-full-chain-CA.pem 726s [p11_child[2651]] [main] (0x0400): p11_child started. 726s [p11_child[2651]] [main] (0x2000): Running in [pre-auth] mode. 726s [p11_child[2651]] [main] (0x2000): Running with effective IDs: [0][0]. 726s [p11_child[2651]] [main] (0x2000): Running with real IDs [0][0]. 726s [p11_child[2651]] [do_card] (0x4000): Module List: 726s [p11_child[2651]] [do_card] (0x4000): common name: [softhsm2]. 726s [p11_child[2651]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 726s [p11_child[2651]] [do_card] (0x4000): Description [SoftHSM slot ID 0x1e8fe2c9] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 726s [p11_child[2651]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 726s [p11_child[2651]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x1e8fe2c9][512746185] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 726s [p11_child[2651]] [do_card] (0x4000): Login NOT required. 726s [p11_child[2651]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 726s [p11_child[2651]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 726s [p11_child[2651]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Interme Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 726s [p11_child[2651]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x1e8fe2c9;slot-manufacturer=SoftHSM%20project;slot-id=512746185;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=e85268dd1e8fe2c9;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 726s [p11_child[2651]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 726s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-P7Xs16/SSSD-child-19545.output 726s + echo '-----BEGIN CERTIFICATE-----' 726s + tail -n1 /tmp/sssd-softhsm2-P7Xs16/SSSD-child-19545.output 726s + echo '-----END CERTIFICATE-----' 726s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-P7Xs16/SSSD-child-19545.pem 726s Certificate: 726s Data: 726s Version: 3 (0x2) 726s Serial Number: 4 (0x4) 726s Signature Algorithm: sha256WithRSAEncryption 726s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate CA 726s Validity 726s Not Before: Jan 18 18:58:07 2025 GMT 726s Not After : Jan 18 18:58:07 2026 GMT 726s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate Trusted Certificate 0001 726s Subject Public Key Info: 726s Public Key Algorithm: rsaEncryption 726s Public-Key: (1024 bit) 726s Modulus: 726s 00:de:0f:4b:51:b6:e2:37:2c:33:47:10:1b:c8:67: 726s 03:bd:d8:a7:0b:4b:c2:60:a2:62:b4:21:33:fe:38: 726s 77:42:8f:c5:cb:6b:c9:fd:ea:ac:77:81:1a:6a:dd: 726s 6f:51:6a:6c:30:8e:b3:7c:8a:44:6f:91:12:8b:e5: 726s 23:73:65:87:e5:82:77:7d:d0:08:a8:51:bc:4e:0d: 726s f5:98:dd:8a:ef:8c:92:e9:49:c0:3f:cd:78:48:51: 726s 3d:ca:bf:76:0c:88:04:60:2e:20:d3:28:e9:72:c0: 726s 71:c2:f7:d6:1f:76:4d:e7:47:87:b8:f3:d9:de:d9: 726s 46:e2:93:63:59:4f:2c:9f:2f 726s Exponent: 65537 (0x10001) 726s X509v3 extensions: 726s X509v3 Authority Key Identifier: 726s AC:04:14:1D:7B:38:42:77:66:9C:2E:5E:A9:51:0B:CF:56:5A:9B:B3 726s X509v3 Basic Constraints: 726s CA:FALSE 726s Netscape Cert Type: 726s SSL Client, S/MIME 726s Netscape Comment: 726s Test Organization Intermediate CA trusted Certificate 726s X509v3 Subject Key Identifier: 726s 70:F1:9E:0B:95:90:49:1F:AE:5E:06:8E:6C:DD:BC:3F:5B:C2:40:4A 726s X509v3 Key Usage: critical 726s Digital Signature, Non Repudiation, Key Encipherment 726s X509v3 Extended Key Usage: 726s TLS Web Client Authentication, E-mail Protection 726s X509v3 Subject Alternative Name: 726s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 726s Signature Algorithm: sha256WithRSAEncryption 726s Signature Value: 726s 71:5a:9b:c7:1b:23:d7:c8:c4:30:55:90:5d:24:be:5f:ea:51: 726s 20:e3:30:22:3d:3a:fe:d3:91:b5:dc:78:89:ff:66:e9:f3:5a: 726s 12:0b:d4:37:6b:c7:89:c4:dc:66:fa:45:b9:7b:4d:c7:1a:c2: 726s 10:50:e5:80:c8:89:f7:27:dc:6f:03:90:40:f4:cd:76:8a:ff: 726s 6e:4d:90:42:f3:75:50:a5:fe:49:9a:9a:6e:bb:b5:0a:11:0f: 726s b3:86:52:39:4b:2d:7a:cb:22:9c:28:a3:fd:ea:97:f5:5a:87: 726s a1:d1:35:46:cb:37:b0:fa:46:92:af:4b:d9:e5:72:8a:38:2d: 726s b4:ae 726s + local found_md5 expected_md5 726s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA-trusted-certificate-0001.pem 726s + expected_md5=Modulus=DE0F4B51B6E2372C3347101BC86703BDD8A70B4BC260A262B42133FE3877428FC5CB6BC9FDEAAC77811A6ADD6F516A6C308EB37C8A446F91128BE523736587E582777DD008A851BC4E0DF598DD8AEF8C92E949C03FCD7848513DCABF760C8804602E20D328E972C071C2F7D61F764DE74787B8F3D9DED946E29363594F2C9F2F 726s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-P7Xs16/SSSD-child-19545.pem 726s + found_md5=Modulus=DE0F4B51B6E2372C3347101BC86703BDD8A70B4BC260A262B42133FE3877428FC5CB6BC9FDEAAC77811A6ADD6F516A6C308EB37C8A446F91128BE523736587E582777DD008A851BC4E0DF598DD8AEF8C92E949C03FCD7848513DCABF760C8804602E20D328E972C071C2F7D61F764DE74787B8F3D9DED946E29363594F2C9F2F 726s + '[' Modulus=DE0F4B51B6E2372C3347101BC86703BDD8A70B4BC260A262B42133FE3877428FC5CB6BC9FDEAAC77811A6ADD6F516A6C308EB37C8A446F91128BE523736587E582777DD008A851BC4E0DF598DD8AEF8C92E949C03FCD7848513DCABF760C8804602E20D328E972C071C2F7D61F764DE74787B8F3D9DED946E29363594F2C9F2F '!=' Modulus=DE0F4B51B6E2372C3347101BC86703BDD8A70B4BC260A262B42133FE3877428FC5CB6BC9FDEAAC77811A6ADD6F516A6C308EB37C8A446F91128BE523736587E582777DD008A851BC4E0DF598DD8AEF8C92E949C03FCD7848513DCABF760C8804602E20D328E972C071C2F7D61F764DE74787B8F3D9DED946E29363594F2C9F2F ']' 726s + output_file=/tmp/sssd-softhsm2-P7Xs16/SSSD-child-19545-auth.output 726s ++ basename /tmp/sssd-softhsm2-P7Xs16/SSSD-child-19545-auth.output .output 726s + output_cert_file=/tmp/sssd-softhsm2-P7Xs16/SSSD-child-19545-auth.pem 726s + echo -n 053350 726s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-P7Xs16/test-full-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 '' --token_name 'Test Organization Interme Token' --module_name /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so 726s [p11_child[2659]] [main] (0x0400): p11_child started. 726s [p11_child[2659]] [main] (0x2000): Running in [auth] mode. 726s [p11_child[2659]] [main] (0x2000): Running with effective IDs: [0][0]. 726s [p11_child[2659]] [main] (0x2000): Running with real IDs [0][0]. 726s [p11_child[2659]] [do_card] (0x4000): Module List: 726s [p11_child[2659]] [do_card] (0x4000): common name: [softhsm2]. 726s [p11_child[2659]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 726s [p11_child[2659]] [do_card] (0x4000): Description [SoftHSM slot ID 0x1e8fe2c9] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 726s [p11_child[2659]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 726s [p11_child[2659]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x1e8fe2c9][512746185] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 726s [p11_child[2659]] [do_card] (0x4000): Login required. 726s [p11_child[2659]] [do_card] (0x4000): Token flags [1069]. 726s [p11_child[2659]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 726s [p11_child[2659]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 726s [p11_child[2659]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so Test Organization Interme Token Test Organization Interme Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 726s [p11_child[2659]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x1e8fe2c9;slot-manufacturer=SoftHSM%20project;slot-id=512746185;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=e85268dd1e8fe2c9;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 726s [p11_child[2659]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 726s [p11_child[2659]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 726s [p11_child[2659]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 726s [p11_child[2659]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 726s [p11_child[2659]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 726s [p11_child[2659]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 726s [p11_child[2659]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 726s [p11_child[2659]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 726s [p11_child[2659]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 726s [p11_child[2659]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 726s [p11_child[2659]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 726s [p11_child[2659]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 726s [p11_child[2659]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 726s [p11_child[2659]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 726s [p11_child[2659]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 726s [p11_child[2659]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 726s [p11_child[2659]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 726s [p11_child[2659]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 726s [p11_child[2659]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 726s [p11_child[2659]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 726s [p11_child[2659]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 726s [p11_child[2659]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 726s [p11_child[2659]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 726s [p11_child[2659]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 726s [p11_child[2659]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 726s [p11_child[2659]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 726s [p11_child[2659]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 726s [p11_child[2659]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 726s [p11_child[2659]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 726s [p11_child[2659]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 726s [p11_child[2659]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 726s [p11_child[2659]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 726s [p11_child[2659]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 726s [p11_child[2659]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 726s [p11_child[2659]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 726s [p11_child[2659]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 726s [p11_child[2659]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 726s [p11_child[2659]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 726s [p11_child[2659]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 726s [p11_child[2659]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 726s [p11_child[2659]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 726s [p11_child[2659]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 726s [p11_child[2659]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 726s [p11_child[2659]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 726s [p11_child[2659]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 726s [p11_child[2659]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 726s [p11_child[2659]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 726s [p11_child[2659]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 726s [p11_child[2659]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 726s [p11_child[2659]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 726s [p11_child[2659]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 726s [p11_child[2659]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 726s [p11_child[2659]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 726s [p11_child[2659]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 726s [p11_child[2659]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 726s [p11_child[2659]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 726s [p11_child[2659]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 726s [p11_child[2659]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 726s [p11_child[2659]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 726s [p11_child[2659]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 726s [p11_child[2659]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 726s [p11_child[2659]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 726s [p11_child[2659]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 726s [p11_child[2659]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 726s [p11_child[2659]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 726s [p11_child[2659]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 726s [p11_child[2659]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 726s [p11_child[2659]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 726s [p11_child[2659]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 726s [p11_child[2659]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 726s [p11_child[2659]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 726s [p11_child[2659]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 726s [p11_child[2659]] [do_card] (0x4000): Certificate verified and validated. 726s [p11_child[2659]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 726s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-P7Xs16/SSSD-child-19545-auth.output 726s + echo '-----BEGIN CERTIFICATE-----' 726s + tail -n1 /tmp/sssd-softhsm2-P7Xs16/SSSD-child-19545-auth.output 726s + echo '-----END CERTIFICATE-----' 726s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-P7Xs16/SSSD-child-19545-auth.pem 726s Certificate: 726s Data: 726s Version: 3 (0x2) 726s Serial Number: 4 (0x4) 726s Signature Algorithm: sha256WithRSAEncryption 726s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate CA 726s Validity 726s Not Before: Jan 18 18:58:07 2025 GMT 726s Not After : Jan 18 18:58:07 2026 GMT 726s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate Trusted Certificate 0001 726s Subject Public Key Info: 726s Public Key Algorithm: rsaEncryption 726s Public-Key: (1024 bit) 726s Modulus: 726s 00:de:0f:4b:51:b6:e2:37:2c:33:47:10:1b:c8:67: 726s 03:bd:d8:a7:0b:4b:c2:60:a2:62:b4:21:33:fe:38: 726s 77:42:8f:c5:cb:6b:c9:fd:ea:ac:77:81:1a:6a:dd: 726s 6f:51:6a:6c:30:8e:b3:7c:8a:44:6f:91:12:8b:e5: 726s 23:73:65:87:e5:82:77:7d:d0:08:a8:51:bc:4e:0d: 726s f5:98:dd:8a:ef:8c:92:e9:49:c0:3f:cd:78:48:51: 726s 3d:ca:bf:76:0c:88:04:60:2e:20:d3:28:e9:72:c0: 726s 71:c2:f7:d6:1f:76:4d:e7:47:87:b8:f3:d9:de:d9: 726s 46:e2:93:63:59:4f:2c:9f:2f 726s Exponent: 65537 (0x10001) 726s X509v3 extensions: 726s X509v3 Authority Key Identifier: 726s AC:04:14:1D:7B:38:42:77:66:9C:2E:5E:A9:51:0B:CF:56:5A:9B:B3 726s X509v3 Basic Constraints: 726s CA:FALSE 726s Netscape Cert Type: 726s SSL Client, S/MIME 726s Netscape Comment: 726s Test Organization Intermediate CA trusted Certificate 726s X509v3 Subject Key Identifier: 726s 70:F1:9E:0B:95:90:49:1F:AE:5E:06:8E:6C:DD:BC:3F:5B:C2:40:4A 726s X509v3 Key Usage: critical 726s Digital Signature, Non Repudiation, Key Encipherment 726s X509v3 Extended Key Usage: 726s TLS Web Client Authentication, E-mail Protection 726s X509v3 Subject Alternative Name: 726s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 726s Signature Algorithm: sha256WithRSAEncryption 726s Signature Value: 726s 71:5a:9b:c7:1b:23:d7:c8:c4:30:55:90:5d:24:be:5f:ea:51: 726s 20:e3:30:22:3d:3a:fe:d3:91:b5:dc:78:89:ff:66:e9:f3:5a: 726s 12:0b:d4:37:6b:c7:89:c4:dc:66:fa:45:b9:7b:4d:c7:1a:c2: 726s 10:50:e5:80:c8:89:f7:27:dc:6f:03:90:40:f4:cd:76:8a:ff: 726s 6e:4d:90:42:f3:75:50:a5:fe:49:9a:9a:6e:bb:b5:0a:11:0f: 726s b3:86:52:39:4b:2d:7a:cb:22:9c:28:a3:fd:ea:97:f5:5a:87: 726s a1:d1:35:46:cb:37:b0:fa:46:92:af:4b:d9:e5:72:8a:38:2d: 726s b4:ae 726s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-P7Xs16/SSSD-child-19545-auth.pem 726s + found_md5=Modulus=DE0F4B51B6E2372C3347101BC86703BDD8A70B4BC260A262B42133FE3877428FC5CB6BC9FDEAAC77811A6ADD6F516A6C308EB37C8A446F91128BE523736587E582777DD008A851BC4E0DF598DD8AEF8C92E949C03FCD7848513DCABF760C8804602E20D328E972C071C2F7D61F764DE74787B8F3D9DED946E29363594F2C9F2F 726s + '[' Modulus=DE0F4B51B6E2372C3347101BC86703BDD8A70B4BC260A262B42133FE3877428FC5CB6BC9FDEAAC77811A6ADD6F516A6C308EB37C8A446F91128BE523736587E582777DD008A851BC4E0DF598DD8AEF8C92E949C03FCD7848513DCABF760C8804602E20D328E972C071C2F7D61F764DE74787B8F3D9DED946E29363594F2C9F2F '!=' Modulus=DE0F4B51B6E2372C3347101BC86703BDD8A70B4BC260A262B42133FE3877428FC5CB6BC9FDEAAC77811A6ADD6F516A6C308EB37C8A446F91128BE523736587E582777DD008A851BC4E0DF598DD8AEF8C92E949C03FCD7848513DCABF760C8804602E20D328E972C071C2F7D61F764DE74787B8F3D9DED946E29363594F2C9F2F ']' 726s + valid_certificate /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-28208 /tmp/sssd-softhsm2-P7Xs16/test-full-chain-CA.pem partial_chain 726s + check_certificate /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-28208 /tmp/sssd-softhsm2-P7Xs16/test-full-chain-CA.pem partial_chain 726s + local certificate=/tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA-trusted-certificate-0001.pem 726s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-28208 726s + local key_ring=/tmp/sssd-softhsm2-P7Xs16/test-full-chain-CA.pem 726s + local verify_option=partial_chain 726s + prepare_softhsm2_card /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-28208 726s + local certificate=/tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA-trusted-certificate-0001.pem 726s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-28208 726s + local key_cn 726s + local key_name 726s + local tokens_dir 726s + local output_cert_file 726s + token_name= 726s ++ basename /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA-trusted-certificate-0001.pem .pem 726s + key_name=test-intermediate-CA-trusted-certificate-0001 726s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA-trusted-certificate-0001.pem 726s ++ sed -n 's/ *commonName *= //p' 726s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 726s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 726s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-P7Xs16/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 726s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-P7Xs16/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 726s ++ basename /tmp/sssd-softhsm2-P7Xs16/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 726s Test Organization Interme Token 726s + tokens_dir=/tmp/sssd-softhsm2-P7Xs16/softhsm2-test-intermediate-CA-trusted-certificate-0001 726s + token_name='Test Organization Interme Token' 726s + '[' '!' -e /tmp/sssd-softhsm2-P7Xs16/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 726s + '[' '!' -d /tmp/sssd-softhsm2-P7Xs16/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 726s + echo 'Test Organization Interme Token' 726s + '[' -n partial_chain ']' 726s + local verify_arg=--verify=partial_chain 726s + local output_base_name=SSSD-child-3543 726s + local output_file=/tmp/sssd-softhsm2-P7Xs16/SSSD-child-3543.output 726s + output_cert_file=/tmp/sssd-softhsm2-P7Xs16/SSSD-child-3543.pem 726s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-P7Xs16/test-full-chain-CA.pem 726s [p11_child[2669]] [main] (0x0400): p11_child started. 726s [p11_child[2669]] [main] (0x2000): Running in [pre-auth] mode. 726s [p11_child[2669]] [main] (0x2000): Running with effective IDs: [0][0]. 726s [p11_child[2669]] [main] (0x2000): Running with real IDs [0][0]. 726s [p11_child[2669]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 726s [p11_child[2669]] [do_card] (0x4000): Module List: 726s [p11_child[2669]] [do_card] (0x4000): common name: [softhsm2]. 726s [p11_child[2669]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 726s [p11_child[2669]] [do_card] (0x4000): Description [SoftHSM slot ID 0x1e8fe2c9] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 726s [p11_child[2669]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 726s [p11_child[2669]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x1e8fe2c9][512746185] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 726s [p11_child[2669]] [do_card] (0x4000): Login NOT required. 726s [p11_child[2669]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 726s [p11_child[2669]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 726s [p11_child[2669]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Interme Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 726s [p11_child[2669]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x1e8fe2c9;slot-manufacturer=SoftHSM%20project;slot-id=512746185;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=e85268dd1e8fe2c9;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 726s [p11_child[2669]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 726s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-P7Xs16/SSSD-child-3543.output 726s + echo '-----BEGIN CERTIFICATE-----' 726s + tail -n1 /tmp/sssd-softhsm2-P7Xs16/SSSD-child-3543.output 726s + echo '-----END CERTIFICATE-----' 726s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-P7Xs16/SSSD-child-3543.pem 726s Certificate: 726s Data: 726s Version: 3 (0x2) 726s Serial Number: 4 (0x4) 726s Signature Algorithm: sha256WithRSAEncryption 726s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate CA 726s Validity 726s Not Before: Jan 18 18:58:07 2025 GMT 726s Not After : Jan 18 18:58:07 2026 GMT 726s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate Trusted Certificate 0001 726s Subject Public Key Info: 726s Public Key Algorithm: rsaEncryption 726s Public-Key: (1024 bit) 726s Modulus: 726s 00:de:0f:4b:51:b6:e2:37:2c:33:47:10:1b:c8:67: 726s 03:bd:d8:a7:0b:4b:c2:60:a2:62:b4:21:33:fe:38: 726s 77:42:8f:c5:cb:6b:c9:fd:ea:ac:77:81:1a:6a:dd: 726s 6f:51:6a:6c:30:8e:b3:7c:8a:44:6f:91:12:8b:e5: 726s 23:73:65:87:e5:82:77:7d:d0:08:a8:51:bc:4e:0d: 726s f5:98:dd:8a:ef:8c:92:e9:49:c0:3f:cd:78:48:51: 726s 3d:ca:bf:76:0c:88:04:60:2e:20:d3:28:e9:72:c0: 726s 71:c2:f7:d6:1f:76:4d:e7:47:87:b8:f3:d9:de:d9: 726s 46:e2:93:63:59:4f:2c:9f:2f 726s Exponent: 65537 (0x10001) 726s X509v3 extensions: 726s X509v3 Authority Key Identifier: 726s AC:04:14:1D:7B:38:42:77:66:9C:2E:5E:A9:51:0B:CF:56:5A:9B:B3 726s X509v3 Basic Constraints: 726s CA:FALSE 726s Netscape Cert Type: 726s SSL Client, S/MIME 726s Netscape Comment: 726s Test Organization Intermediate CA trusted Certificate 726s X509v3 Subject Key Identifier: 726s 70:F1:9E:0B:95:90:49:1F:AE:5E:06:8E:6C:DD:BC:3F:5B:C2:40:4A 726s X509v3 Key Usage: critical 726s Digital Signature, Non Repudiation, Key Encipherment 726s X509v3 Extended Key Usage: 726s TLS Web Client Authentication, E-mail Protection 726s X509v3 Subject Alternative Name: 726s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 726s Signature Algorithm: sha256WithRSAEncryption 726s Signature Value: 726s 71:5a:9b:c7:1b:23:d7:c8:c4:30:55:90:5d:24:be:5f:ea:51: 726s 20:e3:30:22:3d:3a:fe:d3:91:b5:dc:78:89:ff:66:e9:f3:5a: 726s 12:0b:d4:37:6b:c7:89:c4:dc:66:fa:45:b9:7b:4d:c7:1a:c2: 726s 10:50:e5:80:c8:89:f7:27:dc:6f:03:90:40:f4:cd:76:8a:ff: 726s 6e:4d:90:42:f3:75:50:a5:fe:49:9a:9a:6e:bb:b5:0a:11:0f: 726s b3:86:52:39:4b:2d:7a:cb:22:9c:28:a3:fd:ea:97:f5:5a:87: 726s a1:d1:35:46:cb:37:b0:fa:46:92:af:4b:d9:e5:72:8a:38:2d: 726s b4:ae 726s + local found_md5 expected_md5 726s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA-trusted-certificate-0001.pem 726s + expected_md5=Modulus=DE0F4B51B6E2372C3347101BC86703BDD8A70B4BC260A262B42133FE3877428FC5CB6BC9FDEAAC77811A6ADD6F516A6C308EB37C8A446F91128BE523736587E582777DD008A851BC4E0DF598DD8AEF8C92E949C03FCD7848513DCABF760C8804602E20D328E972C071C2F7D61F764DE74787B8F3D9DED946E29363594F2C9F2F 726s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-P7Xs16/SSSD-child-3543.pem 726s + found_md5=Modulus=DE0F4B51B6E2372C3347101BC86703BDD8A70B4BC260A262B42133FE3877428FC5CB6BC9FDEAAC77811A6ADD6F516A6C308EB37C8A446F91128BE523736587E582777DD008A851BC4E0DF598DD8AEF8C92E949C03FCD7848513DCABF760C8804602E20D328E972C071C2F7D61F764DE74787B8F3D9DED946E29363594F2C9F2F 726s + '[' Modulus=DE0F4B51B6E2372C3347101BC86703BDD8A70B4BC260A262B42133FE3877428FC5CB6BC9FDEAAC77811A6ADD6F516A6C308EB37C8A446F91128BE523736587E582777DD008A851BC4E0DF598DD8AEF8C92E949C03FCD7848513DCABF760C8804602E20D328E972C071C2F7D61F764DE74787B8F3D9DED946E29363594F2C9F2F '!=' Modulus=DE0F4B51B6E2372C3347101BC86703BDD8A70B4BC260A262B42133FE3877428FC5CB6BC9FDEAAC77811A6ADD6F516A6C308EB37C8A446F91128BE523736587E582777DD008A851BC4E0DF598DD8AEF8C92E949C03FCD7848513DCABF760C8804602E20D328E972C071C2F7D61F764DE74787B8F3D9DED946E29363594F2C9F2F ']' 726s + output_file=/tmp/sssd-softhsm2-P7Xs16/SSSD-child-3543-auth.output 726s ++ basename /tmp/sssd-softhsm2-P7Xs16/SSSD-child-3543-auth.output .output 726s + output_cert_file=/tmp/sssd-softhsm2-P7Xs16/SSSD-child-3543-auth.pem 726s + echo -n 053350 726s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-P7Xs16/test-full-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Interme Token' --module_name /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so 726s [p11_child[2677]] [main] (0x0400): p11_child started. 726s [p11_child[2677]] [main] (0x2000): Running in [auth] mode. 726s [p11_child[2677]] [main] (0x2000): Running with effective IDs: [0][0]. 726s [p11_child[2677]] [main] (0x2000): Running with real IDs [0][0]. 726s [p11_child[2677]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 726s [p11_child[2677]] [do_card] (0x4000): Module List: 726s [p11_child[2677]] [do_card] (0x4000): common name: [softhsm2]. 726s [p11_child[2677]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 726s [p11_child[2677]] [do_card] (0x4000): Description [SoftHSM slot ID 0x1e8fe2c9] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 726s [p11_child[2677]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 726s [p11_child[2677]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x1e8fe2c9][512746185] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 726s [p11_child[2677]] [do_card] (0x4000): Login required. 726s [p11_child[2677]] [do_card] (0x4000): Token flags [1069]. 726s [p11_child[2677]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 726s [p11_child[2677]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 726s [p11_child[2677]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so Test Organization Interme Token Test Organization Interme Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 726s [p11_child[2677]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x1e8fe2c9;slot-manufacturer=SoftHSM%20project;slot-id=512746185;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=e85268dd1e8fe2c9;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 726s [p11_child[2677]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 726s [p11_child[2677]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 726s [p11_child[2677]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 726s [p11_child[2677]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 726s [p11_child[2677]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 726s [p11_child[2677]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 726s [p11_child[2677]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 726s [p11_child[2677]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 726s [p11_child[2677]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 726s [p11_child[2677]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 726s [p11_child[2677]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 726s [p11_child[2677]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 726s [p11_child[2677]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 726s [p11_child[2677]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 726s [p11_child[2677]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 726s [p11_child[2677]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 726s [p11_child[2677]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 726s [p11_child[2677]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 726s [p11_child[2677]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 726s [p11_child[2677]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 726s [p11_child[2677]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 726s [p11_child[2677]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 726s [p11_child[2677]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 726s [p11_child[2677]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 726s [p11_child[2677]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 726s [p11_child[2677]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 726s [p11_child[2677]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 726s [p11_child[2677]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 726s [p11_child[2677]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 726s [p11_child[2677]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 726s [p11_child[2677]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 726s [p11_child[2677]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 726s [p11_child[2677]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 726s [p11_child[2677]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 726s [p11_child[2677]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 726s [p11_child[2677]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 726s [p11_child[2677]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 726s [p11_child[2677]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 726s [p11_child[2677]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 726s [p11_child[2677]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 726s [p11_child[2677]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 726s [p11_child[2677]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 726s [p11_child[2677]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 726s [p11_child[2677]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 726s [p11_child[2677]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 726s [p11_child[2677]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 726s [p11_child[2677]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 726s [p11_child[2677]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 726s [p11_child[2677]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 726s [p11_child[2677]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 726s [p11_child[2677]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 726s [p11_child[2677]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 726s [p11_child[2677]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 726s [p11_child[2677]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 726s [p11_child[2677]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 726s [p11_child[2677]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 726s [p11_child[2677]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 726s [p11_child[2677]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 726s [p11_child[2677]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 726s [p11_child[2677]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 726s [p11_child[2677]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 726s [p11_child[2677]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 726s [p11_child[2677]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 726s [p11_child[2677]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 726s [p11_child[2677]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 726s [p11_child[2677]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 726s [p11_child[2677]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 726s [p11_child[2677]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 726s [p11_child[2677]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 726s [p11_child[2677]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 726s [p11_child[2677]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 726s [p11_child[2677]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 726s [p11_child[2677]] [do_card] (0x4000): Certificate verified and validated. 726s [p11_child[2677]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 726s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-P7Xs16/SSSD-child-3543-auth.output 726s + echo '-----BEGIN CERTIFICATE-----' 726s + tail -n1 /tmp/sssd-softhsm2-P7Xs16/SSSD-child-3543-auth.output 726s + echo '-----END CERTIFICATE-----' 726s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-P7Xs16/SSSD-child-3543-auth.pem 726s Certificate: 726s Data: 726s Version: 3 (0x2) 726s Serial Number: 4 (0x4) 726s Signature Algorithm: sha256WithRSAEncryption 726s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate CA 726s Validity 726s Not Before: Jan 18 18:58:07 2025 GMT 726s Not After : Jan 18 18:58:07 2026 GMT 726s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate Trusted Certificate 0001 726s Subject Public Key Info: 726s Public Key Algorithm: rsaEncryption 726s Public-Key: (1024 bit) 726s Modulus: 726s 00:de:0f:4b:51:b6:e2:37:2c:33:47:10:1b:c8:67: 726s 03:bd:d8:a7:0b:4b:c2:60:a2:62:b4:21:33:fe:38: 726s 77:42:8f:c5:cb:6b:c9:fd:ea:ac:77:81:1a:6a:dd: 726s 6f:51:6a:6c:30:8e:b3:7c:8a:44:6f:91:12:8b:e5: 726s 23:73:65:87:e5:82:77:7d:d0:08:a8:51:bc:4e:0d: 726s f5:98:dd:8a:ef:8c:92:e9:49:c0:3f:cd:78:48:51: 726s 3d:ca:bf:76:0c:88:04:60:2e:20:d3:28:e9:72:c0: 726s 71:c2:f7:d6:1f:76:4d:e7:47:87:b8:f3:d9:de:d9: 726s 46:e2:93:63:59:4f:2c:9f:2f 726s Exponent: 65537 (0x10001) 726s X509v3 extensions: 726s X509v3 Authority Key Identifier: 726s AC:04:14:1D:7B:38:42:77:66:9C:2E:5E:A9:51:0B:CF:56:5A:9B:B3 726s X509v3 Basic Constraints: 726s CA:FALSE 726s Netscape Cert Type: 726s SSL Client, S/MIME 726s Netscape Comment: 726s Test Organization Intermediate CA trusted Certificate 726s X509v3 Subject Key Identifier: 726s 70:F1:9E:0B:95:90:49:1F:AE:5E:06:8E:6C:DD:BC:3F:5B:C2:40:4A 726s X509v3 Key Usage: critical 726s Digital Signature, Non Repudiation, Key Encipherment 726s X509v3 Extended Key Usage: 726s TLS Web Client Authentication, E-mail Protection 726s X509v3 Subject Alternative Name: 726s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 726s Signature Algorithm: sha256WithRSAEncryption 726s Signature Value: 726s 71:5a:9b:c7:1b:23:d7:c8:c4:30:55:90:5d:24:be:5f:ea:51: 726s 20:e3:30:22:3d:3a:fe:d3:91:b5:dc:78:89:ff:66:e9:f3:5a: 726s 12:0b:d4:37:6b:c7:89:c4:dc:66:fa:45:b9:7b:4d:c7:1a:c2: 726s 10:50:e5:80:c8:89:f7:27:dc:6f:03:90:40:f4:cd:76:8a:ff: 726s 6e:4d:90:42:f3:75:50:a5:fe:49:9a:9a:6e:bb:b5:0a:11:0f: 726s b3:86:52:39:4b:2d:7a:cb:22:9c:28:a3:fd:ea:97:f5:5a:87: 726s a1:d1:35:46:cb:37:b0:fa:46:92:af:4b:d9:e5:72:8a:38:2d: 726s b4:ae 726s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-P7Xs16/SSSD-child-3543-auth.pem 726s + found_md5=Modulus=DE0F4B51B6E2372C3347101BC86703BDD8A70B4BC260A262B42133FE3877428FC5CB6BC9FDEAAC77811A6ADD6F516A6C308EB37C8A446F91128BE523736587E582777DD008A851BC4E0DF598DD8AEF8C92E949C03FCD7848513DCABF760C8804602E20D328E972C071C2F7D61F764DE74787B8F3D9DED946E29363594F2C9F2F 726s + '[' Modulus=DE0F4B51B6E2372C3347101BC86703BDD8A70B4BC260A262B42133FE3877428FC5CB6BC9FDEAAC77811A6ADD6F516A6C308EB37C8A446F91128BE523736587E582777DD008A851BC4E0DF598DD8AEF8C92E949C03FCD7848513DCABF760C8804602E20D328E972C071C2F7D61F764DE74787B8F3D9DED946E29363594F2C9F2F '!=' Modulus=DE0F4B51B6E2372C3347101BC86703BDD8A70B4BC260A262B42133FE3877428FC5CB6BC9FDEAAC77811A6ADD6F516A6C308EB37C8A446F91128BE523736587E582777DD008A851BC4E0DF598DD8AEF8C92E949C03FCD7848513DCABF760C8804602E20D328E972C071C2F7D61F764DE74787B8F3D9DED946E29363594F2C9F2F ']' 726s + invalid_certificate /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-28208 /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA.pem 726s + check_certificate /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-28208 /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA.pem 726s + local certificate=/tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA-trusted-certificate-0001.pem 726s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-28208 726s + local key_ring=/tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA.pem 726s + local verify_option= 726s + prepare_softhsm2_card /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-28208 726s + local certificate=/tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA-trusted-certificate-0001.pem 726s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-28208 726s + local key_cn 726s + local key_name 726s + local tokens_dir 726s + local output_cert_file 726s + token_name= 726s ++ basename /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA-trusted-certificate-0001.pem .pem 726s + key_name=test-intermediate-CA-trusted-certificate-0001 726s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA-trusted-certificate-0001.pem 726s ++ sed -n 's/ *commonName *= //p' 726s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 726s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 726s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-P7Xs16/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 726s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-P7Xs16/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 726s ++ basename /tmp/sssd-softhsm2-P7Xs16/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 726s Test Organization Interme Token 726s + tokens_dir=/tmp/sssd-softhsm2-P7Xs16/softhsm2-test-intermediate-CA-trusted-certificate-0001 726s + token_name='Test Organization Interme Token' 726s + '[' '!' -e /tmp/sssd-softhsm2-P7Xs16/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 726s + '[' '!' -d /tmp/sssd-softhsm2-P7Xs16/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 726s + echo 'Test Organization Interme Token' 726s + '[' -n '' ']' 726s + local output_base_name=SSSD-child-6614 726s + local output_file=/tmp/sssd-softhsm2-P7Xs16/SSSD-child-6614.output 726s + output_cert_file=/tmp/sssd-softhsm2-P7Xs16/SSSD-child-6614.pem 726s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA.pem 726s [p11_child[2687]] [main] (0x0400): p11_child started. 726s [p11_child[2687]] [main] (0x2000): Running in [pre-auth] mode. 726s [p11_child[2687]] [main] (0x2000): Running with effective IDs: [0][0]. 726s [p11_child[2687]] [main] (0x2000): Running with real IDs [0][0]. 726s [p11_child[2687]] [do_card] (0x4000): Module List: 726s [p11_child[2687]] [do_card] (0x4000): common name: [softhsm2]. 726s [p11_child[2687]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 726s [p11_child[2687]] [do_card] (0x4000): Description [SoftHSM slot ID 0x1e8fe2c9] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 726s [p11_child[2687]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 726s [p11_child[2687]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x1e8fe2c9][512746185] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 726s [p11_child[2687]] [do_card] (0x4000): Login NOT required. 726s [p11_child[2687]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 726s [p11_child[2687]] [do_verification] (0x0040): X509_verify_cert failed [0]. 726s [p11_child[2687]] [do_verification] (0x0040): X509_verify_cert failed [2][unable to get issuer certificate]. 726s [p11_child[2687]] [read_certs] (0x0040): Certificate [Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] not valid, skipping. 726s [p11_child[2687]] [do_card] (0x4000): No certificate found. 726s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-P7Xs16/SSSD-child-6614.output 726s + return 2 726s + valid_certificate /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-28208 /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA.pem partial_chain 726s + check_certificate /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-28208 /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA.pem partial_chain 726s + local certificate=/tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA-trusted-certificate-0001.pem 726s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-28208 726s + local key_ring=/tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA.pem 726s + local verify_option=partial_chain 726s + prepare_softhsm2_card /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-28208 726s + local certificate=/tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA-trusted-certificate-0001.pem 726s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-28208 726s + local key_cn 726s + local key_name 726s + local tokens_dir 726s + local output_cert_file 726s + token_name= 726s ++ basename /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA-trusted-certificate-0001.pem .pem 726s + key_name=test-intermediate-CA-trusted-certificate-0001 727s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA-trusted-certificate-0001.pem 727s ++ sed -n 's/ *commonName *= //p' 727s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 727s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 727s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-P7Xs16/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 727s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-P7Xs16/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 727s ++ basename /tmp/sssd-softhsm2-P7Xs16/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 727s + tokens_dir=/tmp/sssd-softhsm2-P7Xs16/softhsm2-test-intermediate-CA-trusted-certificate-0001 727s + token_name='Test Organization Interme Token' 727s + '[' '!' -e /tmp/sssd-softhsm2-P7Xs16/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 727s + '[' '!' -d /tmp/sssd-softhsm2-P7Xs16/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 727s Test Organization Interme Token 727s + echo 'Test Organization Interme Token' 727s + '[' -n partial_chain ']' 727s + local verify_arg=--verify=partial_chain 727s + local output_base_name=SSSD-child-2766 727s + local output_file=/tmp/sssd-softhsm2-P7Xs16/SSSD-child-2766.output 727s + output_cert_file=/tmp/sssd-softhsm2-P7Xs16/SSSD-child-2766.pem 727s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA.pem 727s [p11_child[2694]] [main] (0x0400): p11_child started. 727s [p11_child[2694]] [main] (0x2000): Running in [pre-auth] mode. 727s [p11_child[2694]] [main] (0x2000): Running with effective IDs: [0][0]. 727s [p11_child[2694]] [main] (0x2000): Running with real IDs [0][0]. 727s [p11_child[2694]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 727s [p11_child[2694]] [do_card] (0x4000): Module List: 727s [p11_child[2694]] [do_card] (0x4000): common name: [softhsm2]. 727s [p11_child[2694]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 727s [p11_child[2694]] [do_card] (0x4000): Description [SoftHSM slot ID 0x1e8fe2c9] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 727s [p11_child[2694]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 727s [p11_child[2694]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x1e8fe2c9][512746185] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 727s [p11_child[2694]] [do_card] (0x4000): Login NOT required. 727s [p11_child[2694]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 727s [p11_child[2694]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 727s [p11_child[2694]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Interme Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 727s [p11_child[2694]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x1e8fe2c9;slot-manufacturer=SoftHSM%20project;slot-id=512746185;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=e85268dd1e8fe2c9;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 727s [p11_child[2694]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 727s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-P7Xs16/SSSD-child-2766.output 727s + echo '-----BEGIN CERTIFICATE-----' 727s + tail -n1 /tmp/sssd-softhsm2-P7Xs16/SSSD-child-2766.output 727s + echo '-----END CERTIFICATE-----' 727s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-P7Xs16/SSSD-child-2766.pem 727s Certificate: 727s Data: 727s Version: 3 (0x2) 727s Serial Number: 4 (0x4) 727s Signature Algorithm: sha256WithRSAEncryption 727s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate CA 727s Validity 727s Not Before: Jan 18 18:58:07 2025 GMT 727s Not After : Jan 18 18:58:07 2026 GMT 727s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate Trusted Certificate 0001 727s Subject Public Key Info: 727s Public Key Algorithm: rsaEncryption 727s Public-Key: (1024 bit) 727s Modulus: 727s 00:de:0f:4b:51:b6:e2:37:2c:33:47:10:1b:c8:67: 727s 03:bd:d8:a7:0b:4b:c2:60:a2:62:b4:21:33:fe:38: 727s 77:42:8f:c5:cb:6b:c9:fd:ea:ac:77:81:1a:6a:dd: 727s 6f:51:6a:6c:30:8e:b3:7c:8a:44:6f:91:12:8b:e5: 727s 23:73:65:87:e5:82:77:7d:d0:08:a8:51:bc:4e:0d: 727s f5:98:dd:8a:ef:8c:92:e9:49:c0:3f:cd:78:48:51: 727s 3d:ca:bf:76:0c:88:04:60:2e:20:d3:28:e9:72:c0: 727s 71:c2:f7:d6:1f:76:4d:e7:47:87:b8:f3:d9:de:d9: 727s 46:e2:93:63:59:4f:2c:9f:2f 727s Exponent: 65537 (0x10001) 727s X509v3 extensions: 727s X509v3 Authority Key Identifier: 727s AC:04:14:1D:7B:38:42:77:66:9C:2E:5E:A9:51:0B:CF:56:5A:9B:B3 727s X509v3 Basic Constraints: 727s CA:FALSE 727s Netscape Cert Type: 727s SSL Client, S/MIME 727s Netscape Comment: 727s Test Organization Intermediate CA trusted Certificate 727s X509v3 Subject Key Identifier: 727s 70:F1:9E:0B:95:90:49:1F:AE:5E:06:8E:6C:DD:BC:3F:5B:C2:40:4A 727s X509v3 Key Usage: critical 727s Digital Signature, Non Repudiation, Key Encipherment 727s X509v3 Extended Key Usage: 727s TLS Web Client Authentication, E-mail Protection 727s X509v3 Subject Alternative Name: 727s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 727s Signature Algorithm: sha256WithRSAEncryption 727s Signature Value: 727s 71:5a:9b:c7:1b:23:d7:c8:c4:30:55:90:5d:24:be:5f:ea:51: 727s 20:e3:30:22:3d:3a:fe:d3:91:b5:dc:78:89:ff:66:e9:f3:5a: 727s 12:0b:d4:37:6b:c7:89:c4:dc:66:fa:45:b9:7b:4d:c7:1a:c2: 727s 10:50:e5:80:c8:89:f7:27:dc:6f:03:90:40:f4:cd:76:8a:ff: 727s 6e:4d:90:42:f3:75:50:a5:fe:49:9a:9a:6e:bb:b5:0a:11:0f: 727s b3:86:52:39:4b:2d:7a:cb:22:9c:28:a3:fd:ea:97:f5:5a:87: 727s a1:d1:35:46:cb:37:b0:fa:46:92:af:4b:d9:e5:72:8a:38:2d: 727s b4:ae 727s + local found_md5 expected_md5 727s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA-trusted-certificate-0001.pem 727s + expected_md5=Modulus=DE0F4B51B6E2372C3347101BC86703BDD8A70B4BC260A262B42133FE3877428FC5CB6BC9FDEAAC77811A6ADD6F516A6C308EB37C8A446F91128BE523736587E582777DD008A851BC4E0DF598DD8AEF8C92E949C03FCD7848513DCABF760C8804602E20D328E972C071C2F7D61F764DE74787B8F3D9DED946E29363594F2C9F2F 727s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-P7Xs16/SSSD-child-2766.pem 727s + found_md5=Modulus=DE0F4B51B6E2372C3347101BC86703BDD8A70B4BC260A262B42133FE3877428FC5CB6BC9FDEAAC77811A6ADD6F516A6C308EB37C8A446F91128BE523736587E582777DD008A851BC4E0DF598DD8AEF8C92E949C03FCD7848513DCABF760C8804602E20D328E972C071C2F7D61F764DE74787B8F3D9DED946E29363594F2C9F2F 727s + '[' Modulus=DE0F4B51B6E2372C3347101BC86703BDD8A70B4BC260A262B42133FE3877428FC5CB6BC9FDEAAC77811A6ADD6F516A6C308EB37C8A446F91128BE523736587E582777DD008A851BC4E0DF598DD8AEF8C92E949C03FCD7848513DCABF760C8804602E20D328E972C071C2F7D61F764DE74787B8F3D9DED946E29363594F2C9F2F '!=' Modulus=DE0F4B51B6E2372C3347101BC86703BDD8A70B4BC260A262B42133FE3877428FC5CB6BC9FDEAAC77811A6ADD6F516A6C308EB37C8A446F91128BE523736587E582777DD008A851BC4E0DF598DD8AEF8C92E949C03FCD7848513DCABF760C8804602E20D328E972C071C2F7D61F764DE74787B8F3D9DED946E29363594F2C9F2F ']' 727s + output_file=/tmp/sssd-softhsm2-P7Xs16/SSSD-child-2766-auth.output 727s ++ basename /tmp/sssd-softhsm2-P7Xs16/SSSD-child-2766-auth.output .output 727s + output_cert_file=/tmp/sssd-softhsm2-P7Xs16/SSSD-child-2766-auth.pem 727s + echo -n 053350 727s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-P7Xs16/test-intermediate-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Interme Token' --module_name /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so 727s [p11_child[2702]] [main] (0x0400): p11_child started. 727s [p11_child[2702]] [main] (0x2000): Running in [auth] mode. 727s [p11_child[2702]] [main] (0x2000): Running with effective IDs: [0][0]. 727s [p11_child[2702]] [main] (0x2000): Running with real IDs [0][0]. 727s [p11_child[2702]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 727s [p11_child[2702]] [do_card] (0x4000): Module List: 727s [p11_child[2702]] [do_card] (0x4000): common name: [softhsm2]. 727s [p11_child[2702]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 727s [p11_child[2702]] [do_card] (0x4000): Description [SoftHSM slot ID 0x1e8fe2c9] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 727s [p11_child[2702]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 727s [p11_child[2702]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x1e8fe2c9][512746185] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 727s [p11_child[2702]] [do_card] (0x4000): Login required. 727s [p11_child[2702]] [do_card] (0x4000): Token flags [1069]. 727s [p11_child[2702]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 727s [p11_child[2702]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 727s [p11_child[2702]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so Test Organization Interme Token Test Organization Interme Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 727s [p11_child[2702]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x1e8fe2c9;slot-manufacturer=SoftHSM%20project;slot-id=512746185;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=e85268dd1e8fe2c9;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 727s [p11_child[2702]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 727s [p11_child[2702]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 727s [p11_child[2702]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 727s [p11_child[2702]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 727s [p11_child[2702]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 727s [p11_child[2702]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 727s [p11_child[2702]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 727s [p11_child[2702]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 727s [p11_child[2702]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 727s [p11_child[2702]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 727s [p11_child[2702]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 727s [p11_child[2702]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 727s [p11_child[2702]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 727s [p11_child[2702]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 727s [p11_child[2702]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 727s [p11_child[2702]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 727s [p11_child[2702]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 727s [p11_child[2702]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 727s [p11_child[2702]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 727s [p11_child[2702]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 727s [p11_child[2702]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 727s [p11_child[2702]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 727s [p11_child[2702]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 727s [p11_child[2702]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 727s [p11_child[2702]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 727s [p11_child[2702]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 727s [p11_child[2702]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 727s [p11_child[2702]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 727s [p11_child[2702]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 727s [p11_child[2702]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 727s [p11_child[2702]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 727s [p11_child[2702]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 727s [p11_child[2702]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 727s [p11_child[2702]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 727s [p11_child[2702]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 727s [p11_child[2702]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 727s [p11_child[2702]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 727s [p11_child[2702]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 727s [p11_child[2702]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 727s [p11_child[2702]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 727s [p11_child[2702]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 727s [p11_child[2702]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 727s [p11_child[2702]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 727s [p11_child[2702]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 727s [p11_child[2702]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 727s [p11_child[2702]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 727s [p11_child[2702]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 727s [p11_child[2702]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 727s [p11_child[2702]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 727s [p11_child[2702]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 727s [p11_child[2702]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 727s [p11_child[2702]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 727s [p11_child[2702]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 727s [p11_child[2702]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 727s [p11_child[2702]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 727s [p11_child[2702]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 727s [p11_child[2702]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 727s [p11_child[2702]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 727s [p11_child[2702]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 727s [p11_child[2702]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 727s [p11_child[2702]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 727s [p11_child[2702]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 727s [p11_child[2702]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 727s [p11_child[2702]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 727s [p11_child[2702]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 727s [p11_child[2702]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 727s [p11_child[2702]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 727s [p11_child[2702]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 727s [p11_child[2702]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 727s [p11_child[2702]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 727s [p11_child[2702]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 727s [p11_child[2702]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 727s [p11_child[2702]] [do_card] (0x4000): Certificate verified and validated. 727s [p11_child[2702]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 727s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-P7Xs16/SSSD-child-2766-auth.output 727s + echo '-----BEGIN CERTIFICATE-----' 727s + tail -n1 /tmp/sssd-softhsm2-P7Xs16/SSSD-child-2766-auth.output 727s + echo '-----END CERTIFICATE-----' 727s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-P7Xs16/SSSD-child-2766-auth.pem 727s Certificate: 727s Data: 727s Version: 3 (0x2) 727s Serial Number: 4 (0x4) 727s Signature Algorithm: sha256WithRSAEncryption 727s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate CA 727s Validity 727s Not Before: Jan 18 18:58:07 2025 GMT 727s Not After : Jan 18 18:58:07 2026 GMT 727s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate Trusted Certificate 0001 727s Subject Public Key Info: 727s Public Key Algorithm: rsaEncryption 727s Public-Key: (1024 bit) 727s Modulus: 727s 00:de:0f:4b:51:b6:e2:37:2c:33:47:10:1b:c8:67: 727s 03:bd:d8:a7:0b:4b:c2:60:a2:62:b4:21:33:fe:38: 727s 77:42:8f:c5:cb:6b:c9:fd:ea:ac:77:81:1a:6a:dd: 727s 6f:51:6a:6c:30:8e:b3:7c:8a:44:6f:91:12:8b:e5: 727s 23:73:65:87:e5:82:77:7d:d0:08:a8:51:bc:4e:0d: 727s f5:98:dd:8a:ef:8c:92:e9:49:c0:3f:cd:78:48:51: 727s 3d:ca:bf:76:0c:88:04:60:2e:20:d3:28:e9:72:c0: 727s 71:c2:f7:d6:1f:76:4d:e7:47:87:b8:f3:d9:de:d9: 727s 46:e2:93:63:59:4f:2c:9f:2f 727s Exponent: 65537 (0x10001) 727s X509v3 extensions: 727s X509v3 Authority Key Identifier: 727s AC:04:14:1D:7B:38:42:77:66:9C:2E:5E:A9:51:0B:CF:56:5A:9B:B3 727s X509v3 Basic Constraints: 727s CA:FALSE 727s Netscape Cert Type: 727s SSL Client, S/MIME 727s Netscape Comment: 727s Test Organization Intermediate CA trusted Certificate 727s X509v3 Subject Key Identifier: 727s 70:F1:9E:0B:95:90:49:1F:AE:5E:06:8E:6C:DD:BC:3F:5B:C2:40:4A 727s X509v3 Key Usage: critical 727s Digital Signature, Non Repudiation, Key Encipherment 727s X509v3 Extended Key Usage: 727s TLS Web Client Authentication, E-mail Protection 727s X509v3 Subject Alternative Name: 727s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 727s Signature Algorithm: sha256WithRSAEncryption 727s Signature Value: 727s 71:5a:9b:c7:1b:23:d7:c8:c4:30:55:90:5d:24:be:5f:ea:51: 727s 20:e3:30:22:3d:3a:fe:d3:91:b5:dc:78:89:ff:66:e9:f3:5a: 727s 12:0b:d4:37:6b:c7:89:c4:dc:66:fa:45:b9:7b:4d:c7:1a:c2: 727s 10:50:e5:80:c8:89:f7:27:dc:6f:03:90:40:f4:cd:76:8a:ff: 727s 6e:4d:90:42:f3:75:50:a5:fe:49:9a:9a:6e:bb:b5:0a:11:0f: 727s b3:86:52:39:4b:2d:7a:cb:22:9c:28:a3:fd:ea:97:f5:5a:87: 727s a1:d1:35:46:cb:37:b0:fa:46:92:af:4b:d9:e5:72:8a:38:2d: 727s b4:ae 727s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-P7Xs16/SSSD-child-2766-auth.pem 727s + found_md5=Modulus=DE0F4B51B6E2372C3347101BC86703BDD8A70B4BC260A262B42133FE3877428FC5CB6BC9FDEAAC77811A6ADD6F516A6C308EB37C8A446F91128BE523736587E582777DD008A851BC4E0DF598DD8AEF8C92E949C03FCD7848513DCABF760C8804602E20D328E972C071C2F7D61F764DE74787B8F3D9DED946E29363594F2C9F2F 727s + '[' Modulus=DE0F4B51B6E2372C3347101BC86703BDD8A70B4BC260A262B42133FE3877428FC5CB6BC9FDEAAC77811A6ADD6F516A6C308EB37C8A446F91128BE523736587E582777DD008A851BC4E0DF598DD8AEF8C92E949C03FCD7848513DCABF760C8804602E20D328E972C071C2F7D61F764DE74787B8F3D9DED946E29363594F2C9F2F '!=' Modulus=DE0F4B51B6E2372C3347101BC86703BDD8A70B4BC260A262B42133FE3877428FC5CB6BC9FDEAAC77811A6ADD6F516A6C308EB37C8A446F91128BE523736587E582777DD008A851BC4E0DF598DD8AEF8C92E949C03FCD7848513DCABF760C8804602E20D328E972C071C2F7D61F764DE74787B8F3D9DED946E29363594F2C9F2F ']' 727s + invalid_certificate /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-4585 /tmp/sssd-softhsm2-P7Xs16/test-root-CA.pem 727s + check_certificate /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-4585 /tmp/sssd-softhsm2-P7Xs16/test-root-CA.pem 727s + local certificate=/tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-trusted-certificate-0001.pem 727s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-4585 727s + local key_ring=/tmp/sssd-softhsm2-P7Xs16/test-root-CA.pem 727s + local verify_option= 727s + prepare_softhsm2_card /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-4585 727s + local certificate=/tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-trusted-certificate-0001.pem 727s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-4585 727s + local key_cn 727s + local key_name 727s + local tokens_dir 727s + local output_cert_file 727s + token_name= 727s ++ basename /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 727s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 727s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-trusted-certificate-0001.pem 727s ++ sed -n 's/ *commonName *= //p' 727s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 727s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 727s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-P7Xs16/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 727s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-P7Xs16/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 727s ++ basename /tmp/sssd-softhsm2-P7Xs16/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 727s + tokens_dir=/tmp/sssd-softhsm2-P7Xs16/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 727s + token_name='Test Organization Sub Int Token' 727s + '[' '!' -e /tmp/sssd-softhsm2-P7Xs16/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 727s + local key_file 727s + local decrypted_key 727s + mkdir -p /tmp/sssd-softhsm2-P7Xs16/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 727s + key_file=/tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-trusted-certificate-0001-key.pem 727s + decrypted_key=/tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 727s + cat 727s + softhsm2-util --init-token --label 'Test Organization Sub Int Token' --pin 053350 --so-pin 053350 --free 727s Slot 0 has a free/uninitialized token. 727s The token has been initialized and is reassigned to slot 47937925 727s + softhsm2-util --show-slots 727s Available slots: 727s Slot 47937925 727s Slot info: 727s Description: SoftHSM slot ID 0x2db7985 727s Manufacturer ID: SoftHSM project 727s Hardware version: 2.6 727s Firmware version: 2.6 727s Token present: yes 727s Token info: 727s Manufacturer ID: SoftHSM project 727s Model: SoftHSM v2 727s Hardware version: 2.6 727s Firmware version: 2.6 727s Serial number: 596672bb82db7985 727s Initialized: yes 727s User PIN init.: yes 727s Label: Test Organization Sub Int Token 727s Slot 1 727s Slot info: 727s Description: SoftHSM slot ID 0x1 727s Manufacturer ID: SoftHSM project 727s Hardware version: 2.6 727s Firmware version: 2.6 727s Token present: yes 727s Token info: 727s Manufacturer ID: SoftHSM project 727s Model: SoftHSM v2 727s Hardware version: 2.6 727s Firmware version: 2.6 727s Serial number: 727s Initialized: no 727s User PIN init.: no 727s Label: 727s + p11tool --provider=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --write --no-mark-private --load-certificate=/tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-trusted-certificate-0001.pem --login --set-pin=053350 --label 'Test Organization Sub Intermediate Trusted Certificate 0001' --id 00112233445566778899FFAABBCCDDEEFF012345 727s + openssl rsa -passin pass:random-sub-intermediate-ca-trusted-cert-0001-4585 -in /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-trusted-certificate-0001-key.pem -out /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 727s writing RSA key 727s + p11tool --provider=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --write --load-privkey=/tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem --login --set-pin=053350 --label 'Test Organization Sub Intermediate Trusted Certificate 0001 Key' --id 00112233445566778899FFAABBCCDDEEFF012345 727s + rm /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 727s + p11tool --provider=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --list-all 727s Object 0: 727s URL: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=596672bb82db7985;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert 727s Type: X.509 Certificate (RSA-1024) 727s Expires: Sun Jan 18 18:58:07 2026 727s Label: Test Organization Sub Intermediate Trusted Certificate 0001 727s ID: 00:11:22:33:44:55:66:77:88:99:ff:aa:bb:cc:dd:ee:ff:01:23:45 727s 727s + echo 'Test Organization Sub Int Token' 727s Test Organization Sub Int Token 727s + '[' -n '' ']' 727s + local output_base_name=SSSD-child-2887 727s + local output_file=/tmp/sssd-softhsm2-P7Xs16/SSSD-child-2887.output 727s + output_cert_file=/tmp/sssd-softhsm2-P7Xs16/SSSD-child-2887.pem 727s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-P7Xs16/test-root-CA.pem 727s [p11_child[2721]] [main] (0x0400): p11_child started. 727s [p11_child[2721]] [main] (0x2000): Running in [pre-auth] mode. 727s [p11_child[2721]] [main] (0x2000): Running with effective IDs: [0][0]. 727s [p11_child[2721]] [main] (0x2000): Running with real IDs [0][0]. 727s [p11_child[2721]] [do_card] (0x4000): Module List: 727s [p11_child[2721]] [do_card] (0x4000): common name: [softhsm2]. 727s [p11_child[2721]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 727s [p11_child[2721]] [do_card] (0x4000): Description [SoftHSM slot ID 0x2db7985] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 727s [p11_child[2721]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 727s [p11_child[2721]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x2db7985][47937925] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 727s [p11_child[2721]] [do_card] (0x4000): Login NOT required. 727s [p11_child[2721]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 727s [p11_child[2721]] [do_verification] (0x0040): X509_verify_cert failed [0]. 727s [p11_child[2721]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 727s [p11_child[2721]] [read_certs] (0x0040): Certificate [Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] not valid, skipping. 727s [p11_child[2721]] [do_card] (0x4000): No certificate found. 727s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-P7Xs16/SSSD-child-2887.output 727s + return 2 727s + invalid_certificate /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-4585 /tmp/sssd-softhsm2-P7Xs16/test-root-CA.pem partial_chain 727s + check_certificate /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-4585 /tmp/sssd-softhsm2-P7Xs16/test-root-CA.pem partial_chain 727s + local certificate=/tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-trusted-certificate-0001.pem 727s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-4585 727s + local key_ring=/tmp/sssd-softhsm2-P7Xs16/test-root-CA.pem 727s + local verify_option=partial_chain 727s + prepare_softhsm2_card /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-4585 727s + local certificate=/tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-trusted-certificate-0001.pem 727s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-4585 727s + local key_cn 727s + local key_name 727s + local tokens_dir 727s + local output_cert_file 727s + token_name= 727s ++ basename /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 727s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 727s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-trusted-certificate-0001.pem 727s ++ sed -n 's/ *commonName *= //p' 727s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 727s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 727s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-P7Xs16/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 727s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-P7Xs16/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 727s ++ basename /tmp/sssd-softhsm2-P7Xs16/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 727s + tokens_dir=/tmp/sssd-softhsm2-P7Xs16/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 727s + token_name='Test Organization Sub Int Token' 727s + '[' '!' -e /tmp/sssd-softhsm2-P7Xs16/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 727s + '[' '!' -d /tmp/sssd-softhsm2-P7Xs16/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 727s + echo 'Test Organization Sub Int Token' 727s + '[' -n partial_chain ']' 727s + local verify_arg=--verify=partial_chain 727s Test Organization Sub Int Token 727s + local output_base_name=SSSD-child-32379 727s + local output_file=/tmp/sssd-softhsm2-P7Xs16/SSSD-child-32379.output 727s + output_cert_file=/tmp/sssd-softhsm2-P7Xs16/SSSD-child-32379.pem 727s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-P7Xs16/test-root-CA.pem 727s [p11_child[2728]] [main] (0x0400): p11_child started. 727s [p11_child[2728]] [main] (0x2000): Running in [pre-auth] mode. 727s [p11_child[2728]] [main] (0x2000): Running with effective IDs: [0][0]. 727s [p11_child[2728]] [main] (0x2000): Running with real IDs [0][0]. 727s [p11_child[2728]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 727s [p11_child[2728]] [do_card] (0x4000): Module List: 727s [p11_child[2728]] [do_card] (0x4000): common name: [softhsm2]. 727s [p11_child[2728]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 727s [p11_child[2728]] [do_card] (0x4000): Description [SoftHSM slot ID 0x2db7985] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 727s [p11_child[2728]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 727s [p11_child[2728]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x2db7985][47937925] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 727s [p11_child[2728]] [do_card] (0x4000): Login NOT required. 727s [p11_child[2728]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 727s [p11_child[2728]] [do_verification] (0x0040): X509_verify_cert failed [0]. 727s [p11_child[2728]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 727s [p11_child[2728]] [read_certs] (0x0040): Certificate [Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] not valid, skipping. 727s [p11_child[2728]] [do_card] (0x4000): No certificate found. 727s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-P7Xs16/SSSD-child-32379.output 727s + return 2 727s + valid_certificate /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-4585 /tmp/sssd-softhsm2-P7Xs16/test-full-chain-CA.pem 727s + check_certificate /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-4585 /tmp/sssd-softhsm2-P7Xs16/test-full-chain-CA.pem 727s + local certificate=/tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-trusted-certificate-0001.pem 727s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-4585 727s + local key_ring=/tmp/sssd-softhsm2-P7Xs16/test-full-chain-CA.pem 727s + local verify_option= 727s + prepare_softhsm2_card /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-4585 727s + local certificate=/tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-trusted-certificate-0001.pem 727s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-4585 727s + local key_cn 727s + local key_name 727s + local tokens_dir 727s + local output_cert_file 727s + token_name= 727s ++ basename /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 727s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 727s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-trusted-certificate-0001.pem 727s ++ sed -n 's/ *commonName *= //p' 727s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 727s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 727s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-P7Xs16/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 727s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-P7Xs16/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 727s ++ basename /tmp/sssd-softhsm2-P7Xs16/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 727s Test Organization Sub Int Token 727s + tokens_dir=/tmp/sssd-softhsm2-P7Xs16/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 727s + token_name='Test Organization Sub Int Token' 727s + '[' '!' -e /tmp/sssd-softhsm2-P7Xs16/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 727s + '[' '!' -d /tmp/sssd-softhsm2-P7Xs16/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 727s + echo 'Test Organization Sub Int Token' 727s + '[' -n '' ']' 727s + local output_base_name=SSSD-child-9410 727s + local output_file=/tmp/sssd-softhsm2-P7Xs16/SSSD-child-9410.output 727s + output_cert_file=/tmp/sssd-softhsm2-P7Xs16/SSSD-child-9410.pem 727s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-P7Xs16/test-full-chain-CA.pem 727s [p11_child[2735]] [main] (0x0400): p11_child started. 727s [p11_child[2735]] [main] (0x2000): Running in [pre-auth] mode. 727s [p11_child[2735]] [main] (0x2000): Running with effective IDs: [0][0]. 727s [p11_child[2735]] [main] (0x2000): Running with real IDs [0][0]. 727s [p11_child[2735]] [do_card] (0x4000): Module List: 727s [p11_child[2735]] [do_card] (0x4000): common name: [softhsm2]. 727s [p11_child[2735]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 727s [p11_child[2735]] [do_card] (0x4000): Description [SoftHSM slot ID 0x2db7985] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 727s [p11_child[2735]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 727s [p11_child[2735]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x2db7985][47937925] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 727s [p11_child[2735]] [do_card] (0x4000): Login NOT required. 727s [p11_child[2735]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 727s [p11_child[2735]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 727s [p11_child[2735]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Sub Int Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 727s [p11_child[2735]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x2db7985;slot-manufacturer=SoftHSM%20project;slot-id=47937925;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=596672bb82db7985;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 727s [p11_child[2735]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 727s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-P7Xs16/SSSD-child-9410.output 727s + echo '-----BEGIN CERTIFICATE-----' 727s + tail -n1 /tmp/sssd-softhsm2-P7Xs16/SSSD-child-9410.output 727s + echo '-----END CERTIFICATE-----' 727s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-P7Xs16/SSSD-child-9410.pem 727s Certificate: 727s Data: 727s Version: 3 (0x2) 727s Serial Number: 5 (0x5) 727s Signature Algorithm: sha256WithRSAEncryption 727s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate CA 727s Validity 727s Not Before: Jan 18 18:58:07 2025 GMT 727s Not After : Jan 18 18:58:07 2026 GMT 727s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate Trusted Certificate 0001 727s Subject Public Key Info: 727s Public Key Algorithm: rsaEncryption 727s Public-Key: (1024 bit) 727s Modulus: 727s 00:c9:66:3d:bb:d5:ad:bf:9f:2d:f7:e4:3e:f8:e2: 727s 98:71:c7:f9:d7:08:4d:b3:b2:0d:c8:04:04:c0:69: 727s 04:cc:93:01:b7:b2:c0:db:00:7c:e8:ac:13:6d:15: 727s 03:0d:75:f1:85:df:a8:06:21:ba:7a:14:18:c1:c9: 727s f6:8b:f8:24:b8:dc:d6:82:b6:b5:90:cc:87:59:00: 727s ab:8a:b8:72:f6:fe:3a:78:c0:8b:8e:12:2c:57:40: 727s d1:70:73:a5:ca:e0:03:2b:b4:0f:cd:11:e2:67:ad: 727s a0:86:c8:c8:ac:b2:7e:86:5d:21:19:67:58:46:e2: 727s b1:85:db:7d:0e:32:61:1c:73 727s Exponent: 65537 (0x10001) 727s X509v3 extensions: 727s X509v3 Authority Key Identifier: 727s CE:1C:22:BE:FA:6F:2C:4B:B2:05:25:AB:60:04:98:BE:D8:1D:5C:01 727s X509v3 Basic Constraints: 727s CA:FALSE 727s Netscape Cert Type: 727s SSL Client, S/MIME 727s Netscape Comment: 727s Test Organization Sub Intermediate CA trusted Certificate 727s X509v3 Subject Key Identifier: 727s F8:06:4B:70:B2:D5:BA:61:70:C3:AF:A2:F9:E8:23:D2:35:D8:46:CE 727s X509v3 Key Usage: critical 727s Digital Signature, Non Repudiation, Key Encipherment 727s X509v3 Extended Key Usage: 727s TLS Web Client Authentication, E-mail Protection 727s X509v3 Subject Alternative Name: 727s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 727s Signature Algorithm: sha256WithRSAEncryption 727s Signature Value: 727s 4b:7b:cf:a4:28:4e:a7:32:00:2a:4d:32:00:77:45:dd:6a:54: 727s 96:6a:c9:8a:38:91:4b:14:d5:cf:c3:6f:84:87:ef:d3:89:12: 727s 2b:86:ce:61:36:33:5d:42:30:77:0d:6b:42:1b:7c:e1:d0:1b: 727s 59:92:c8:a1:83:c0:0b:a0:84:71:a1:f3:f8:fb:03:f5:cd:d6: 727s f8:f8:6b:a2:58:d5:bf:c1:d2:eb:22:45:44:70:3e:10:f9:21: 727s 80:7a:b9:bc:e6:95:e8:77:f7:39:b5:5b:cb:dd:73:6c:1a:79: 727s 92:55:65:b1:a0:35:c3:54:bb:68:1e:f1:51:3c:d9:a3:51:ab: 727s 01:e8 727s + local found_md5 expected_md5 727s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-trusted-certificate-0001.pem 727s + expected_md5=Modulus=C9663DBBD5ADBF9F2DF7E43EF8E29871C7F9D7084DB3B20DC80404C06904CC9301B7B2C0DB007CE8AC136D15030D75F185DFA80621BA7A1418C1C9F68BF824B8DCD682B6B590CC875900AB8AB872F6FE3A78C08B8E122C5740D17073A5CAE0032BB40FCD11E267ADA086C8C8ACB27E865D2119675846E2B185DB7D0E32611C73 727s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-P7Xs16/SSSD-child-9410.pem 727s + found_md5=Modulus=C9663DBBD5ADBF9F2DF7E43EF8E29871C7F9D7084DB3B20DC80404C06904CC9301B7B2C0DB007CE8AC136D15030D75F185DFA80621BA7A1418C1C9F68BF824B8DCD682B6B590CC875900AB8AB872F6FE3A78C08B8E122C5740D17073A5CAE0032BB40FCD11E267ADA086C8C8ACB27E865D2119675846E2B185DB7D0E32611C73 727s + '[' Modulus=C9663DBBD5ADBF9F2DF7E43EF8E29871C7F9D7084DB3B20DC80404C06904CC9301B7B2C0DB007CE8AC136D15030D75F185DFA80621BA7A1418C1C9F68BF824B8DCD682B6B590CC875900AB8AB872F6FE3A78C08B8E122C5740D17073A5CAE0032BB40FCD11E267ADA086C8C8ACB27E865D2119675846E2B185DB7D0E32611C73 '!=' Modulus=C9663DBBD5ADBF9F2DF7E43EF8E29871C7F9D7084DB3B20DC80404C06904CC9301B7B2C0DB007CE8AC136D15030D75F185DFA80621BA7A1418C1C9F68BF824B8DCD682B6B590CC875900AB8AB872F6FE3A78C08B8E122C5740D17073A5CAE0032BB40FCD11E267ADA086C8C8ACB27E865D2119675846E2B185DB7D0E32611C73 ']' 727s + output_file=/tmp/sssd-softhsm2-P7Xs16/SSSD-child-9410-auth.output 727s ++ basename /tmp/sssd-softhsm2-P7Xs16/SSSD-child-9410-auth.output .output 727s + output_cert_file=/tmp/sssd-softhsm2-P7Xs16/SSSD-child-9410-auth.pem 727s + echo -n 053350 727s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-P7Xs16/test-full-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 '' --token_name 'Test Organization Sub Int Token' --module_name /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so 727s [p11_child[2743]] [main] (0x0400): p11_child started. 727s [p11_child[2743]] [main] (0x2000): Running in [auth] mode. 727s [p11_child[2743]] [main] (0x2000): Running with effective IDs: [0][0]. 727s [p11_child[2743]] [main] (0x2000): Running with real IDs [0][0]. 727s [p11_child[2743]] [do_card] (0x4000): Module List: 727s [p11_child[2743]] [do_card] (0x4000): common name: [softhsm2]. 727s [p11_child[2743]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 727s [p11_child[2743]] [do_card] (0x4000): Description [SoftHSM slot ID 0x2db7985] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 727s [p11_child[2743]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 727s [p11_child[2743]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x2db7985][47937925] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 727s [p11_child[2743]] [do_card] (0x4000): Login required. 727s [p11_child[2743]] [do_card] (0x4000): Token flags [1069]. 727s [p11_child[2743]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 727s [p11_child[2743]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 727s [p11_child[2743]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so Test Organization Sub Int Token Test Organization Sub Int Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 727s [p11_child[2743]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x2db7985;slot-manufacturer=SoftHSM%20project;slot-id=47937925;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=596672bb82db7985;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 727s [p11_child[2743]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 727s [p11_child[2743]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 727s [p11_child[2743]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 727s [p11_child[2743]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 727s [p11_child[2743]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 727s [p11_child[2743]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 727s [p11_child[2743]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 727s [p11_child[2743]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 727s [p11_child[2743]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 727s [p11_child[2743]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 727s [p11_child[2743]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 727s [p11_child[2743]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 727s [p11_child[2743]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 727s [p11_child[2743]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 727s [p11_child[2743]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 727s [p11_child[2743]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 727s [p11_child[2743]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 727s [p11_child[2743]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 727s [p11_child[2743]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 727s [p11_child[2743]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 727s [p11_child[2743]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 727s [p11_child[2743]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 727s [p11_child[2743]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 727s [p11_child[2743]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 727s [p11_child[2743]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 727s [p11_child[2743]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 727s [p11_child[2743]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 727s [p11_child[2743]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 727s [p11_child[2743]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 727s [p11_child[2743]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 727s [p11_child[2743]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 727s [p11_child[2743]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 727s [p11_child[2743]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 727s [p11_child[2743]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 727s [p11_child[2743]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 727s [p11_child[2743]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 727s [p11_child[2743]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 727s [p11_child[2743]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 727s [p11_child[2743]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 727s [p11_child[2743]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 727s [p11_child[2743]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 727s [p11_child[2743]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 727s [p11_child[2743]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 727s [p11_child[2743]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 727s [p11_child[2743]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 727s [p11_child[2743]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 727s [p11_child[2743]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 727s [p11_child[2743]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 727s [p11_child[2743]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 727s [p11_child[2743]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 727s [p11_child[2743]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 727s [p11_child[2743]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 727s [p11_child[2743]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 727s [p11_child[2743]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 727s [p11_child[2743]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 727s [p11_child[2743]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 727s [p11_child[2743]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 727s [p11_child[2743]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 727s [p11_child[2743]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 727s [p11_child[2743]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 727s [p11_child[2743]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 727s [p11_child[2743]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 727s [p11_child[2743]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 727s [p11_child[2743]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 727s [p11_child[2743]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 727s [p11_child[2743]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 727s [p11_child[2743]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 727s [p11_child[2743]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 727s [p11_child[2743]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 727s [p11_child[2743]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 727s [p11_child[2743]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 727s [p11_child[2743]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 727s [p11_child[2743]] [do_card] (0x4000): Certificate verified and validated. 727s [p11_child[2743]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 727s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-P7Xs16/SSSD-child-9410-auth.output 727s + echo '-----BEGIN CERTIFICATE-----' 727s + tail -n1 /tmp/sssd-softhsm2-P7Xs16/SSSD-child-9410-auth.output 727s + echo '-----END CERTIFICATE-----' 727s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-P7Xs16/SSSD-child-9410-auth.pem 727s Certificate: 727s Data: 727s Version: 3 (0x2) 727s Serial Number: 5 (0x5) 727s Signature Algorithm: sha256WithRSAEncryption 727s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate CA 727s Validity 727s Not Before: Jan 18 18:58:07 2025 GMT 727s Not After : Jan 18 18:58:07 2026 GMT 727s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate Trusted Certificate 0001 727s Subject Public Key Info: 727s Public Key Algorithm: rsaEncryption 727s Public-Key: (1024 bit) 727s Modulus: 727s 00:c9:66:3d:bb:d5:ad:bf:9f:2d:f7:e4:3e:f8:e2: 727s 98:71:c7:f9:d7:08:4d:b3:b2:0d:c8:04:04:c0:69: 727s 04:cc:93:01:b7:b2:c0:db:00:7c:e8:ac:13:6d:15: 727s 03:0d:75:f1:85:df:a8:06:21:ba:7a:14:18:c1:c9: 727s f6:8b:f8:24:b8:dc:d6:82:b6:b5:90:cc:87:59:00: 727s ab:8a:b8:72:f6:fe:3a:78:c0:8b:8e:12:2c:57:40: 727s d1:70:73:a5:ca:e0:03:2b:b4:0f:cd:11:e2:67:ad: 727s a0:86:c8:c8:ac:b2:7e:86:5d:21:19:67:58:46:e2: 727s b1:85:db:7d:0e:32:61:1c:73 727s Exponent: 65537 (0x10001) 727s X509v3 extensions: 727s X509v3 Authority Key Identifier: 727s CE:1C:22:BE:FA:6F:2C:4B:B2:05:25:AB:60:04:98:BE:D8:1D:5C:01 727s X509v3 Basic Constraints: 727s CA:FALSE 727s Netscape Cert Type: 727s SSL Client, S/MIME 727s Netscape Comment: 727s Test Organization Sub Intermediate CA trusted Certificate 727s X509v3 Subject Key Identifier: 727s F8:06:4B:70:B2:D5:BA:61:70:C3:AF:A2:F9:E8:23:D2:35:D8:46:CE 727s X509v3 Key Usage: critical 727s Digital Signature, Non Repudiation, Key Encipherment 727s X509v3 Extended Key Usage: 727s TLS Web Client Authentication, E-mail Protection 727s X509v3 Subject Alternative Name: 727s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 727s Signature Algorithm: sha256WithRSAEncryption 727s Signature Value: 727s 4b:7b:cf:a4:28:4e:a7:32:00:2a:4d:32:00:77:45:dd:6a:54: 727s 96:6a:c9:8a:38:91:4b:14:d5:cf:c3:6f:84:87:ef:d3:89:12: 727s 2b:86:ce:61:36:33:5d:42:30:77:0d:6b:42:1b:7c:e1:d0:1b: 727s 59:92:c8:a1:83:c0:0b:a0:84:71:a1:f3:f8:fb:03:f5:cd:d6: 727s f8:f8:6b:a2:58:d5:bf:c1:d2:eb:22:45:44:70:3e:10:f9:21: 727s 80:7a:b9:bc:e6:95:e8:77:f7:39:b5:5b:cb:dd:73:6c:1a:79: 727s 92:55:65:b1:a0:35:c3:54:bb:68:1e:f1:51:3c:d9:a3:51:ab: 727s 01:e8 727s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-P7Xs16/SSSD-child-9410-auth.pem 727s + found_md5=Modulus=C9663DBBD5ADBF9F2DF7E43EF8E29871C7F9D7084DB3B20DC80404C06904CC9301B7B2C0DB007CE8AC136D15030D75F185DFA80621BA7A1418C1C9F68BF824B8DCD682B6B590CC875900AB8AB872F6FE3A78C08B8E122C5740D17073A5CAE0032BB40FCD11E267ADA086C8C8ACB27E865D2119675846E2B185DB7D0E32611C73 727s + '[' Modulus=C9663DBBD5ADBF9F2DF7E43EF8E29871C7F9D7084DB3B20DC80404C06904CC9301B7B2C0DB007CE8AC136D15030D75F185DFA80621BA7A1418C1C9F68BF824B8DCD682B6B590CC875900AB8AB872F6FE3A78C08B8E122C5740D17073A5CAE0032BB40FCD11E267ADA086C8C8ACB27E865D2119675846E2B185DB7D0E32611C73 '!=' Modulus=C9663DBBD5ADBF9F2DF7E43EF8E29871C7F9D7084DB3B20DC80404C06904CC9301B7B2C0DB007CE8AC136D15030D75F185DFA80621BA7A1418C1C9F68BF824B8DCD682B6B590CC875900AB8AB872F6FE3A78C08B8E122C5740D17073A5CAE0032BB40FCD11E267ADA086C8C8ACB27E865D2119675846E2B185DB7D0E32611C73 ']' 727s + valid_certificate /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-4585 /tmp/sssd-softhsm2-P7Xs16/test-full-chain-CA.pem partial_chain 727s + check_certificate /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-4585 /tmp/sssd-softhsm2-P7Xs16/test-full-chain-CA.pem partial_chain 727s + local certificate=/tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-trusted-certificate-0001.pem 727s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-4585 727s + local key_ring=/tmp/sssd-softhsm2-P7Xs16/test-full-chain-CA.pem 727s + local verify_option=partial_chain 727s + prepare_softhsm2_card /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-4585 727s + local certificate=/tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-trusted-certificate-0001.pem 727s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-4585 727s + local key_cn 727s + local key_name 727s + local tokens_dir 727s + local output_cert_file 727s + token_name= 727s ++ basename /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 727s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 727s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-trusted-certificate-0001.pem 727s ++ sed -n 's/ *commonName *= //p' 727s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 727s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 727s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-P7Xs16/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 727s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-P7Xs16/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 727s ++ basename /tmp/sssd-softhsm2-P7Xs16/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 727s + tokens_dir=/tmp/sssd-softhsm2-P7Xs16/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 727s + token_name='Test Organization Sub Int Token' 727s + '[' '!' -e /tmp/sssd-softhsm2-P7Xs16/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 727s Test Organization Sub Int Token 727s + '[' '!' -d /tmp/sssd-softhsm2-P7Xs16/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 727s + echo 'Test Organization Sub Int Token' 727s + '[' -n partial_chain ']' 727s + local verify_arg=--verify=partial_chain 727s + local output_base_name=SSSD-child-27980 727s + local output_file=/tmp/sssd-softhsm2-P7Xs16/SSSD-child-27980.output 727s + output_cert_file=/tmp/sssd-softhsm2-P7Xs16/SSSD-child-27980.pem 727s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-P7Xs16/test-full-chain-CA.pem 727s [p11_child[2753]] [main] (0x0400): p11_child started. 727s [p11_child[2753]] [main] (0x2000): Running in [pre-auth] mode. 727s [p11_child[2753]] [main] (0x2000): Running with effective IDs: [0][0]. 727s [p11_child[2753]] [main] (0x2000): Running with real IDs [0][0]. 727s [p11_child[2753]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 727s [p11_child[2753]] [do_card] (0x4000): Module List: 727s [p11_child[2753]] [do_card] (0x4000): common name: [softhsm2]. 727s [p11_child[2753]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 727s [p11_child[2753]] [do_card] (0x4000): Description [SoftHSM slot ID 0x2db7985] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 727s [p11_child[2753]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 727s [p11_child[2753]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x2db7985][47937925] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 727s [p11_child[2753]] [do_card] (0x4000): Login NOT required. 727s [p11_child[2753]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 727s [p11_child[2753]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 727s [p11_child[2753]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Sub Int Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 727s [p11_child[2753]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x2db7985;slot-manufacturer=SoftHSM%20project;slot-id=47937925;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=596672bb82db7985;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 727s [p11_child[2753]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 727s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-P7Xs16/SSSD-child-27980.output 727s + echo '-----BEGIN CERTIFICATE-----' 727s + tail -n1 /tmp/sssd-softhsm2-P7Xs16/SSSD-child-27980.output 727s + echo '-----END CERTIFICATE-----' 727s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-P7Xs16/SSSD-child-27980.pem 727s Certificate: 727s Data: 727s Version: 3 (0x2) 727s Serial Number: 5 (0x5) 727s Signature Algorithm: sha256WithRSAEncryption 727s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate CA 727s Validity 727s Not Before: Jan 18 18:58:07 2025 GMT 727s Not After : Jan 18 18:58:07 2026 GMT 727s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate Trusted Certificate 0001 727s Subject Public Key Info: 727s Public Key Algorithm: rsaEncryption 727s Public-Key: (1024 bit) 727s Modulus: 727s 00:c9:66:3d:bb:d5:ad:bf:9f:2d:f7:e4:3e:f8:e2: 727s 98:71:c7:f9:d7:08:4d:b3:b2:0d:c8:04:04:c0:69: 727s 04:cc:93:01:b7:b2:c0:db:00:7c:e8:ac:13:6d:15: 727s 03:0d:75:f1:85:df:a8:06:21:ba:7a:14:18:c1:c9: 727s f6:8b:f8:24:b8:dc:d6:82:b6:b5:90:cc:87:59:00: 727s ab:8a:b8:72:f6:fe:3a:78:c0:8b:8e:12:2c:57:40: 727s d1:70:73:a5:ca:e0:03:2b:b4:0f:cd:11:e2:67:ad: 727s a0:86:c8:c8:ac:b2:7e:86:5d:21:19:67:58:46:e2: 727s b1:85:db:7d:0e:32:61:1c:73 727s Exponent: 65537 (0x10001) 727s X509v3 extensions: 727s X509v3 Authority Key Identifier: 727s CE:1C:22:BE:FA:6F:2C:4B:B2:05:25:AB:60:04:98:BE:D8:1D:5C:01 727s X509v3 Basic Constraints: 727s CA:FALSE 727s Netscape Cert Type: 727s SSL Client, S/MIME 727s Netscape Comment: 727s Test Organization Sub Intermediate CA trusted Certificate 727s X509v3 Subject Key Identifier: 727s F8:06:4B:70:B2:D5:BA:61:70:C3:AF:A2:F9:E8:23:D2:35:D8:46:CE 727s X509v3 Key Usage: critical 727s Digital Signature, Non Repudiation, Key Encipherment 727s X509v3 Extended Key Usage: 727s TLS Web Client Authentication, E-mail Protection 727s X509v3 Subject Alternative Name: 727s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 727s Signature Algorithm: sha256WithRSAEncryption 727s Signature Value: 727s 4b:7b:cf:a4:28:4e:a7:32:00:2a:4d:32:00:77:45:dd:6a:54: 727s 96:6a:c9:8a:38:91:4b:14:d5:cf:c3:6f:84:87:ef:d3:89:12: 727s 2b:86:ce:61:36:33:5d:42:30:77:0d:6b:42:1b:7c:e1:d0:1b: 727s 59:92:c8:a1:83:c0:0b:a0:84:71:a1:f3:f8:fb:03:f5:cd:d6: 727s f8:f8:6b:a2:58:d5:bf:c1:d2:eb:22:45:44:70:3e:10:f9:21: 727s 80:7a:b9:bc:e6:95:e8:77:f7:39:b5:5b:cb:dd:73:6c:1a:79: 727s 92:55:65:b1:a0:35:c3:54:bb:68:1e:f1:51:3c:d9:a3:51:ab: 727s 01:e8 727s + local found_md5 expected_md5 727s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-trusted-certificate-0001.pem 727s + expected_md5=Modulus=C9663DBBD5ADBF9F2DF7E43EF8E29871C7F9D7084DB3B20DC80404C06904CC9301B7B2C0DB007CE8AC136D15030D75F185DFA80621BA7A1418C1C9F68BF824B8DCD682B6B590CC875900AB8AB872F6FE3A78C08B8E122C5740D17073A5CAE0032BB40FCD11E267ADA086C8C8ACB27E865D2119675846E2B185DB7D0E32611C73 727s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-P7Xs16/SSSD-child-27980.pem 727s + found_md5=Modulus=C9663DBBD5ADBF9F2DF7E43EF8E29871C7F9D7084DB3B20DC80404C06904CC9301B7B2C0DB007CE8AC136D15030D75F185DFA80621BA7A1418C1C9F68BF824B8DCD682B6B590CC875900AB8AB872F6FE3A78C08B8E122C5740D17073A5CAE0032BB40FCD11E267ADA086C8C8ACB27E865D2119675846E2B185DB7D0E32611C73 727s + '[' Modulus=C9663DBBD5ADBF9F2DF7E43EF8E29871C7F9D7084DB3B20DC80404C06904CC9301B7B2C0DB007CE8AC136D15030D75F185DFA80621BA7A1418C1C9F68BF824B8DCD682B6B590CC875900AB8AB872F6FE3A78C08B8E122C5740D17073A5CAE0032BB40FCD11E267ADA086C8C8ACB27E865D2119675846E2B185DB7D0E32611C73 '!=' Modulus=C9663DBBD5ADBF9F2DF7E43EF8E29871C7F9D7084DB3B20DC80404C06904CC9301B7B2C0DB007CE8AC136D15030D75F185DFA80621BA7A1418C1C9F68BF824B8DCD682B6B590CC875900AB8AB872F6FE3A78C08B8E122C5740D17073A5CAE0032BB40FCD11E267ADA086C8C8ACB27E865D2119675846E2B185DB7D0E32611C73 ']' 727s + output_file=/tmp/sssd-softhsm2-P7Xs16/SSSD-child-27980-auth.output 727s ++ basename /tmp/sssd-softhsm2-P7Xs16/SSSD-child-27980-auth.output .output 727s + output_cert_file=/tmp/sssd-softhsm2-P7Xs16/SSSD-child-27980-auth.pem 727s + echo -n 053350 727s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-P7Xs16/test-full-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Sub Int Token' --module_name /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so 727s [p11_child[2761]] [main] (0x0400): p11_child started. 727s [p11_child[2761]] [main] (0x2000): Running in [auth] mode. 727s [p11_child[2761]] [main] (0x2000): Running with effective IDs: [0][0]. 727s [p11_child[2761]] [main] (0x2000): Running with real IDs [0][0]. 727s [p11_child[2761]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 727s [p11_child[2761]] [do_card] (0x4000): Module List: 727s [p11_child[2761]] [do_card] (0x4000): common name: [softhsm2]. 727s [p11_child[2761]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 727s [p11_child[2761]] [do_card] (0x4000): Description [SoftHSM slot ID 0x2db7985] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 727s [p11_child[2761]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 727s [p11_child[2761]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x2db7985][47937925] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 727s [p11_child[2761]] [do_card] (0x4000): Login required. 727s [p11_child[2761]] [do_card] (0x4000): Token flags [1069]. 727s [p11_child[2761]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 727s [p11_child[2761]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 727s [p11_child[2761]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so Test Organization Sub Int Token Test Organization Sub Int Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 727s [p11_child[2761]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x2db7985;slot-manufacturer=SoftHSM%20project;slot-id=47937925;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=596672bb82db7985;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 727s [p11_child[2761]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 727s [p11_child[2761]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 727s [p11_child[2761]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 727s [p11_child[2761]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 727s [p11_child[2761]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 727s [p11_child[2761]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 727s [p11_child[2761]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 727s [p11_child[2761]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 727s [p11_child[2761]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 727s [p11_child[2761]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 727s [p11_child[2761]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 727s [p11_child[2761]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 727s [p11_child[2761]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 727s [p11_child[2761]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 727s [p11_child[2761]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 727s [p11_child[2761]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 727s [p11_child[2761]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 727s [p11_child[2761]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 727s [p11_child[2761]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 727s [p11_child[2761]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 727s [p11_child[2761]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 727s [p11_child[2761]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 727s [p11_child[2761]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 727s [p11_child[2761]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 727s [p11_child[2761]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 727s [p11_child[2761]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 727s [p11_child[2761]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 727s [p11_child[2761]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 727s [p11_child[2761]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 727s [p11_child[2761]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 727s [p11_child[2761]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 727s [p11_child[2761]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 727s [p11_child[2761]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 727s [p11_child[2761]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 727s [p11_child[2761]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 727s [p11_child[2761]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 727s [p11_child[2761]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 727s [p11_child[2761]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 727s [p11_child[2761]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 727s [p11_child[2761]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 727s [p11_child[2761]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 727s [p11_child[2761]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 727s [p11_child[2761]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 727s [p11_child[2761]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 727s [p11_child[2761]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 727s [p11_child[2761]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 727s [p11_child[2761]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 727s [p11_child[2761]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 727s [p11_child[2761]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 727s [p11_child[2761]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 727s [p11_child[2761]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 727s [p11_child[2761]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 727s [p11_child[2761]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 727s [p11_child[2761]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 727s [p11_child[2761]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 727s [p11_child[2761]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 727s [p11_child[2761]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 727s [p11_child[2761]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 727s [p11_child[2761]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 727s [p11_child[2761]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 727s [p11_child[2761]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 727s [p11_child[2761]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 727s [p11_child[2761]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 727s [p11_child[2761]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 727s [p11_child[2761]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 727s [p11_child[2761]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 727s [p11_child[2761]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 727s [p11_child[2761]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 727s [p11_child[2761]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 727s [p11_child[2761]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 727s [p11_child[2761]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 727s [p11_child[2761]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 727s [p11_child[2761]] [do_card] (0x4000): Certificate verified and validated. 727s [p11_child[2761]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 727s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-P7Xs16/SSSD-child-27980-auth.output 727s + echo '-----BEGIN CERTIFICATE-----' 727s + tail -n1 /tmp/sssd-softhsm2-P7Xs16/SSSD-child-27980-auth.output 727s + echo '-----END CERTIFICATE-----' 727s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-P7Xs16/SSSD-child-27980-auth.pem 727s Certificate: 727s Data: 727s Version: 3 (0x2) 727s Serial Number: 5 (0x5) 727s Signature Algorithm: sha256WithRSAEncryption 727s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate CA 727s Validity 727s Not Before: Jan 18 18:58:07 2025 GMT 727s Not After : Jan 18 18:58:07 2026 GMT 727s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate Trusted Certificate 0001 727s Subject Public Key Info: 727s Public Key Algorithm: rsaEncryption 727s Public-Key: (1024 bit) 727s Modulus: 727s 00:c9:66:3d:bb:d5:ad:bf:9f:2d:f7:e4:3e:f8:e2: 727s 98:71:c7:f9:d7:08:4d:b3:b2:0d:c8:04:04:c0:69: 727s 04:cc:93:01:b7:b2:c0:db:00:7c:e8:ac:13:6d:15: 727s 03:0d:75:f1:85:df:a8:06:21:ba:7a:14:18:c1:c9: 727s f6:8b:f8:24:b8:dc:d6:82:b6:b5:90:cc:87:59:00: 727s ab:8a:b8:72:f6:fe:3a:78:c0:8b:8e:12:2c:57:40: 727s d1:70:73:a5:ca:e0:03:2b:b4:0f:cd:11:e2:67:ad: 727s a0:86:c8:c8:ac:b2:7e:86:5d:21:19:67:58:46:e2: 727s b1:85:db:7d:0e:32:61:1c:73 727s Exponent: 65537 (0x10001) 727s X509v3 extensions: 727s X509v3 Authority Key Identifier: 727s CE:1C:22:BE:FA:6F:2C:4B:B2:05:25:AB:60:04:98:BE:D8:1D:5C:01 727s X509v3 Basic Constraints: 727s CA:FALSE 727s Netscape Cert Type: 727s SSL Client, S/MIME 727s Netscape Comment: 727s Test Organization Sub Intermediate CA trusted Certificate 727s X509v3 Subject Key Identifier: 727s F8:06:4B:70:B2:D5:BA:61:70:C3:AF:A2:F9:E8:23:D2:35:D8:46:CE 727s X509v3 Key Usage: critical 727s Digital Signature, Non Repudiation, Key Encipherment 727s X509v3 Extended Key Usage: 727s TLS Web Client Authentication, E-mail Protection 727s X509v3 Subject Alternative Name: 727s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 727s Signature Algorithm: sha256WithRSAEncryption 727s Signature Value: 727s 4b:7b:cf:a4:28:4e:a7:32:00:2a:4d:32:00:77:45:dd:6a:54: 727s 96:6a:c9:8a:38:91:4b:14:d5:cf:c3:6f:84:87:ef:d3:89:12: 727s 2b:86:ce:61:36:33:5d:42:30:77:0d:6b:42:1b:7c:e1:d0:1b: 727s 59:92:c8:a1:83:c0:0b:a0:84:71:a1:f3:f8:fb:03:f5:cd:d6: 727s f8:f8:6b:a2:58:d5:bf:c1:d2:eb:22:45:44:70:3e:10:f9:21: 727s 80:7a:b9:bc:e6:95:e8:77:f7:39:b5:5b:cb:dd:73:6c:1a:79: 727s 92:55:65:b1:a0:35:c3:54:bb:68:1e:f1:51:3c:d9:a3:51:ab: 727s 01:e8 727s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-P7Xs16/SSSD-child-27980-auth.pem 727s + found_md5=Modulus=C9663DBBD5ADBF9F2DF7E43EF8E29871C7F9D7084DB3B20DC80404C06904CC9301B7B2C0DB007CE8AC136D15030D75F185DFA80621BA7A1418C1C9F68BF824B8DCD682B6B590CC875900AB8AB872F6FE3A78C08B8E122C5740D17073A5CAE0032BB40FCD11E267ADA086C8C8ACB27E865D2119675846E2B185DB7D0E32611C73 727s + '[' Modulus=C9663DBBD5ADBF9F2DF7E43EF8E29871C7F9D7084DB3B20DC80404C06904CC9301B7B2C0DB007CE8AC136D15030D75F185DFA80621BA7A1418C1C9F68BF824B8DCD682B6B590CC875900AB8AB872F6FE3A78C08B8E122C5740D17073A5CAE0032BB40FCD11E267ADA086C8C8ACB27E865D2119675846E2B185DB7D0E32611C73 '!=' Modulus=C9663DBBD5ADBF9F2DF7E43EF8E29871C7F9D7084DB3B20DC80404C06904CC9301B7B2C0DB007CE8AC136D15030D75F185DFA80621BA7A1418C1C9F68BF824B8DCD682B6B590CC875900AB8AB872F6FE3A78C08B8E122C5740D17073A5CAE0032BB40FCD11E267ADA086C8C8ACB27E865D2119675846E2B185DB7D0E32611C73 ']' 727s + invalid_certificate /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-4585 /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA.pem 727s + check_certificate /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-4585 /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA.pem 727s + local certificate=/tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-trusted-certificate-0001.pem 727s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-4585 727s + local key_ring=/tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA.pem 727s + local verify_option= 727s + prepare_softhsm2_card /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-4585 727s + local certificate=/tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-trusted-certificate-0001.pem 727s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-4585 727s + local key_cn 727s + local key_name 727s + local tokens_dir 727s + local output_cert_file 727s + token_name= 727s ++ basename /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 727s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 727s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-trusted-certificate-0001.pem 727s ++ sed -n 's/ *commonName *= //p' 727s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 727s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 727s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-P7Xs16/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 727s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-P7Xs16/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 727s ++ basename /tmp/sssd-softhsm2-P7Xs16/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 727s + tokens_dir=/tmp/sssd-softhsm2-P7Xs16/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 727s + token_name='Test Organization Sub Int Token' 727s + '[' '!' -e /tmp/sssd-softhsm2-P7Xs16/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 727s + '[' '!' -d /tmp/sssd-softhsm2-P7Xs16/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 727s + echo 'Test Organization Sub Int Token' 727s + '[' -n '' ']' 727s + local output_base_name=SSSD-child-6038 727s + local output_file=/tmp/sssd-softhsm2-P7Xs16/SSSD-child-6038.output 727s Test Organization Sub Int Token 727s + output_cert_file=/tmp/sssd-softhsm2-P7Xs16/SSSD-child-6038.pem 727s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA.pem 727s [p11_child[2771]] [main] (0x0400): p11_child started. 727s [p11_child[2771]] [main] (0x2000): Running in [pre-auth] mode. 727s [p11_child[2771]] [main] (0x2000): Running with effective IDs: [0][0]. 727s [p11_child[2771]] [main] (0x2000): Running with real IDs [0][0]. 727s [p11_child[2771]] [do_card] (0x4000): Module List: 727s [p11_child[2771]] [do_card] (0x4000): common name: [softhsm2]. 727s [p11_child[2771]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 727s [p11_child[2771]] [do_card] (0x4000): Description [SoftHSM slot ID 0x2db7985] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 727s [p11_child[2771]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 727s [p11_child[2771]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x2db7985][47937925] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 727s [p11_child[2771]] [do_card] (0x4000): Login NOT required. 727s [p11_child[2771]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 727s [p11_child[2771]] [do_verification] (0x0040): X509_verify_cert failed [0]. 727s [p11_child[2771]] [do_verification] (0x0040): X509_verify_cert failed [2][unable to get issuer certificate]. 727s [p11_child[2771]] [read_certs] (0x0040): Certificate [Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] not valid, skipping. 727s [p11_child[2771]] [do_card] (0x4000): No certificate found. 727s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-P7Xs16/SSSD-child-6038.output 727s + return 2 727s + invalid_certificate /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-4585 /tmp/sssd-softhsm2-P7Xs16/test-root-intermediate-chain-CA.pem partial_chain 727s + check_certificate /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-4585 /tmp/sssd-softhsm2-P7Xs16/test-root-intermediate-chain-CA.pem partial_chain 727s + local certificate=/tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-trusted-certificate-0001.pem 727s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-4585 727s + local key_ring=/tmp/sssd-softhsm2-P7Xs16/test-root-intermediate-chain-CA.pem 727s + local verify_option=partial_chain 727s + prepare_softhsm2_card /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-4585 727s + local certificate=/tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-trusted-certificate-0001.pem 727s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-4585 727s + local key_cn 727s + local key_name 727s + local tokens_dir 727s + local output_cert_file 727s + token_name= 727s ++ basename /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 727s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 727s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-trusted-certificate-0001.pem 727s ++ sed -n 's/ *commonName *= //p' 727s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 727s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 727s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-P7Xs16/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 727s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-P7Xs16/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 727s ++ basename /tmp/sssd-softhsm2-P7Xs16/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 727s + tokens_dir=/tmp/sssd-softhsm2-P7Xs16/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 727s + token_name='Test Organization Sub Int Token' 727s + '[' '!' -e /tmp/sssd-softhsm2-P7Xs16/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 727s + '[' '!' -d /tmp/sssd-softhsm2-P7Xs16/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 727s + echo 'Test Organization Sub Int Token' 727s Test Organization Sub Int Token 727s + '[' -n partial_chain ']' 727s + local verify_arg=--verify=partial_chain 727s + local output_base_name=SSSD-child-18833 727s + local output_file=/tmp/sssd-softhsm2-P7Xs16/SSSD-child-18833.output 727s + output_cert_file=/tmp/sssd-softhsm2-P7Xs16/SSSD-child-18833.pem 727s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-P7Xs16/test-root-intermediate-chain-CA.pem 727s [p11_child[2778]] [main] (0x0400): p11_child started. 727s [p11_child[2778]] [main] (0x2000): Running in [pre-auth] mode. 727s [p11_child[2778]] [main] (0x2000): Running with effective IDs: [0][0]. 727s [p11_child[2778]] [main] (0x2000): Running with real IDs [0][0]. 727s [p11_child[2778]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 727s [p11_child[2778]] [do_card] (0x4000): Module List: 727s [p11_child[2778]] [do_card] (0x4000): common name: [softhsm2]. 727s [p11_child[2778]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 727s [p11_child[2778]] [do_card] (0x4000): Description [SoftHSM slot ID 0x2db7985] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 727s [p11_child[2778]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 727s [p11_child[2778]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x2db7985][47937925] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 727s [p11_child[2778]] [do_card] (0x4000): Login NOT required. 727s [p11_child[2778]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 727s [p11_child[2778]] [do_verification] (0x0040): X509_verify_cert failed [0]. 727s [p11_child[2778]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 727s [p11_child[2778]] [read_certs] (0x0040): Certificate [Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] not valid, skipping. 727s [p11_child[2778]] [do_card] (0x4000): No certificate found. 727s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-P7Xs16/SSSD-child-18833.output 727s + return 2 727s + valid_certificate /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-4585 /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA.pem partial_chain 727s + check_certificate /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-4585 /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA.pem partial_chain 727s + local certificate=/tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-trusted-certificate-0001.pem 727s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-4585 727s + local key_ring=/tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA.pem 727s + local verify_option=partial_chain 727s + prepare_softhsm2_card /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-4585 727s + local certificate=/tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-trusted-certificate-0001.pem 727s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-4585 727s + local key_cn 727s + local key_name 727s + local tokens_dir 727s + local output_cert_file 727s + token_name= 727s ++ basename /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 727s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 727s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-trusted-certificate-0001.pem 727s ++ sed -n 's/ *commonName *= //p' 727s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 727s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 727s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-P7Xs16/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 727s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-P7Xs16/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 727s ++ basename /tmp/sssd-softhsm2-P7Xs16/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 727s Test Organization Sub Int Token 727s + tokens_dir=/tmp/sssd-softhsm2-P7Xs16/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 727s + token_name='Test Organization Sub Int Token' 727s + '[' '!' -e /tmp/sssd-softhsm2-P7Xs16/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 727s + '[' '!' -d /tmp/sssd-softhsm2-P7Xs16/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 727s + echo 'Test Organization Sub Int Token' 727s + '[' -n partial_chain ']' 727s + local verify_arg=--verify=partial_chain 727s + local output_base_name=SSSD-child-6748 727s + local output_file=/tmp/sssd-softhsm2-P7Xs16/SSSD-child-6748.output 727s + output_cert_file=/tmp/sssd-softhsm2-P7Xs16/SSSD-child-6748.pem 727s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA.pem 727s [p11_child[2785]] [main] (0x0400): p11_child started. 727s [p11_child[2785]] [main] (0x2000): Running in [pre-auth] mode. 727s [p11_child[2785]] [main] (0x2000): Running with effective IDs: [0][0]. 727s [p11_child[2785]] [main] (0x2000): Running with real IDs [0][0]. 727s [p11_child[2785]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 727s [p11_child[2785]] [do_card] (0x4000): Module List: 727s [p11_child[2785]] [do_card] (0x4000): common name: [softhsm2]. 727s [p11_child[2785]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 727s [p11_child[2785]] [do_card] (0x4000): Description [SoftHSM slot ID 0x2db7985] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 727s [p11_child[2785]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 727s [p11_child[2785]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x2db7985][47937925] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 727s [p11_child[2785]] [do_card] (0x4000): Login NOT required. 727s [p11_child[2785]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 727s [p11_child[2785]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 727s [p11_child[2785]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Sub Int Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 727s [p11_child[2785]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x2db7985;slot-manufacturer=SoftHSM%20project;slot-id=47937925;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=596672bb82db7985;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 727s [p11_child[2785]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 727s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-P7Xs16/SSSD-child-6748.output 727s + echo '-----BEGIN CERTIFICATE-----' 727s + tail -n1 /tmp/sssd-softhsm2-P7Xs16/SSSD-child-6748.output 727s + echo '-----END CERTIFICATE-----' 727s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-P7Xs16/SSSD-child-6748.pem 727s Certificate: 727s Data: 727s Version: 3 (0x2) 727s Serial Number: 5 (0x5) 727s Signature Algorithm: sha256WithRSAEncryption 727s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate CA 727s Validity 727s Not Before: Jan 18 18:58:07 2025 GMT 727s Not After : Jan 18 18:58:07 2026 GMT 727s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate Trusted Certificate 0001 727s Subject Public Key Info: 727s Public Key Algorithm: rsaEncryption 727s Public-Key: (1024 bit) 727s Modulus: 727s 00:c9:66:3d:bb:d5:ad:bf:9f:2d:f7:e4:3e:f8:e2: 727s 98:71:c7:f9:d7:08:4d:b3:b2:0d:c8:04:04:c0:69: 727s 04:cc:93:01:b7:b2:c0:db:00:7c:e8:ac:13:6d:15: 727s 03:0d:75:f1:85:df:a8:06:21:ba:7a:14:18:c1:c9: 727s f6:8b:f8:24:b8:dc:d6:82:b6:b5:90:cc:87:59:00: 727s ab:8a:b8:72:f6:fe:3a:78:c0:8b:8e:12:2c:57:40: 727s d1:70:73:a5:ca:e0:03:2b:b4:0f:cd:11:e2:67:ad: 727s a0:86:c8:c8:ac:b2:7e:86:5d:21:19:67:58:46:e2: 727s b1:85:db:7d:0e:32:61:1c:73 727s Exponent: 65537 (0x10001) 727s X509v3 extensions: 727s X509v3 Authority Key Identifier: 727s CE:1C:22:BE:FA:6F:2C:4B:B2:05:25:AB:60:04:98:BE:D8:1D:5C:01 727s X509v3 Basic Constraints: 727s CA:FALSE 727s Netscape Cert Type: 727s SSL Client, S/MIME 727s Netscape Comment: 727s Test Organization Sub Intermediate CA trusted Certificate 727s X509v3 Subject Key Identifier: 727s F8:06:4B:70:B2:D5:BA:61:70:C3:AF:A2:F9:E8:23:D2:35:D8:46:CE 727s X509v3 Key Usage: critical 727s Digital Signature, Non Repudiation, Key Encipherment 727s X509v3 Extended Key Usage: 727s TLS Web Client Authentication, E-mail Protection 727s X509v3 Subject Alternative Name: 727s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 727s Signature Algorithm: sha256WithRSAEncryption 727s Signature Value: 727s 4b:7b:cf:a4:28:4e:a7:32:00:2a:4d:32:00:77:45:dd:6a:54: 727s 96:6a:c9:8a:38:91:4b:14:d5:cf:c3:6f:84:87:ef:d3:89:12: 727s 2b:86:ce:61:36:33:5d:42:30:77:0d:6b:42:1b:7c:e1:d0:1b: 727s 59:92:c8:a1:83:c0:0b:a0:84:71:a1:f3:f8:fb:03:f5:cd:d6: 727s f8:f8:6b:a2:58:d5:bf:c1:d2:eb:22:45:44:70:3e:10:f9:21: 727s 80:7a:b9:bc:e6:95:e8:77:f7:39:b5:5b:cb:dd:73:6c:1a:79: 727s 92:55:65:b1:a0:35:c3:54:bb:68:1e:f1:51:3c:d9:a3:51:ab: 727s 01:e8 727s + local found_md5 expected_md5 727s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-trusted-certificate-0001.pem 727s + expected_md5=Modulus=C9663DBBD5ADBF9F2DF7E43EF8E29871C7F9D7084DB3B20DC80404C06904CC9301B7B2C0DB007CE8AC136D15030D75F185DFA80621BA7A1418C1C9F68BF824B8DCD682B6B590CC875900AB8AB872F6FE3A78C08B8E122C5740D17073A5CAE0032BB40FCD11E267ADA086C8C8ACB27E865D2119675846E2B185DB7D0E32611C73 727s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-P7Xs16/SSSD-child-6748.pem 727s + found_md5=Modulus=C9663DBBD5ADBF9F2DF7E43EF8E29871C7F9D7084DB3B20DC80404C06904CC9301B7B2C0DB007CE8AC136D15030D75F185DFA80621BA7A1418C1C9F68BF824B8DCD682B6B590CC875900AB8AB872F6FE3A78C08B8E122C5740D17073A5CAE0032BB40FCD11E267ADA086C8C8ACB27E865D2119675846E2B185DB7D0E32611C73 727s + '[' Modulus=C9663DBBD5ADBF9F2DF7E43EF8E29871C7F9D7084DB3B20DC80404C06904CC9301B7B2C0DB007CE8AC136D15030D75F185DFA80621BA7A1418C1C9F68BF824B8DCD682B6B590CC875900AB8AB872F6FE3A78C08B8E122C5740D17073A5CAE0032BB40FCD11E267ADA086C8C8ACB27E865D2119675846E2B185DB7D0E32611C73 '!=' Modulus=C9663DBBD5ADBF9F2DF7E43EF8E29871C7F9D7084DB3B20DC80404C06904CC9301B7B2C0DB007CE8AC136D15030D75F185DFA80621BA7A1418C1C9F68BF824B8DCD682B6B590CC875900AB8AB872F6FE3A78C08B8E122C5740D17073A5CAE0032BB40FCD11E267ADA086C8C8ACB27E865D2119675846E2B185DB7D0E32611C73 ']' 727s + output_file=/tmp/sssd-softhsm2-P7Xs16/SSSD-child-6748-auth.output 727s ++ basename /tmp/sssd-softhsm2-P7Xs16/SSSD-child-6748-auth.output .output 727s + output_cert_file=/tmp/sssd-softhsm2-P7Xs16/SSSD-child-6748-auth.pem 727s + echo -n 053350 727s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Sub Int Token' --module_name /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so 727s [p11_child[2793]] [main] (0x0400): p11_child started. 727s [p11_child[2793]] [main] (0x2000): Running in [auth] mode. 727s [p11_child[2793]] [main] (0x2000): Running with effective IDs: [0][0]. 727s [p11_child[2793]] [main] (0x2000): Running with real IDs [0][0]. 727s [p11_child[2793]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 727s [p11_child[2793]] [do_card] (0x4000): Module List: 727s [p11_child[2793]] [do_card] (0x4000): common name: [softhsm2]. 727s [p11_child[2793]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 727s [p11_child[2793]] [do_card] (0x4000): Description [SoftHSM slot ID 0x2db7985] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 727s [p11_child[2793]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 727s [p11_child[2793]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x2db7985][47937925] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 727s [p11_child[2793]] [do_card] (0x4000): Login required. 727s [p11_child[2793]] [do_card] (0x4000): Token flags [1069]. 727s [p11_child[2793]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 727s [p11_child[2793]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 727s [p11_child[2793]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so Test Organization Sub Int Token Test Organization Sub Int Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 727s [p11_child[2793]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x2db7985;slot-manufacturer=SoftHSM%20project;slot-id=47937925;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=596672bb82db7985;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 727s [p11_child[2793]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 727s [p11_child[2793]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 727s [p11_child[2793]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 727s [p11_child[2793]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 727s [p11_child[2793]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 727s [p11_child[2793]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 727s [p11_child[2793]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 727s [p11_child[2793]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 727s [p11_child[2793]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 727s [p11_child[2793]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 727s [p11_child[2793]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 727s [p11_child[2793]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 727s [p11_child[2793]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 727s [p11_child[2793]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 727s [p11_child[2793]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 727s [p11_child[2793]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 727s [p11_child[2793]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 727s [p11_child[2793]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 727s [p11_child[2793]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 727s [p11_child[2793]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 727s [p11_child[2793]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 727s [p11_child[2793]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 727s [p11_child[2793]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 727s [p11_child[2793]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 727s [p11_child[2793]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 727s [p11_child[2793]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 727s [p11_child[2793]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 727s [p11_child[2793]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 727s [p11_child[2793]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 727s [p11_child[2793]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 727s [p11_child[2793]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 727s [p11_child[2793]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 727s [p11_child[2793]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 727s [p11_child[2793]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 727s [p11_child[2793]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 727s [p11_child[2793]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 727s [p11_child[2793]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 727s [p11_child[2793]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 727s [p11_child[2793]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 727s [p11_child[2793]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 727s [p11_child[2793]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 727s [p11_child[2793]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 727s [p11_child[2793]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 727s [p11_child[2793]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 727s [p11_child[2793]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 727s [p11_child[2793]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 727s [p11_child[2793]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 727s [p11_child[2793]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 727s [p11_child[2793]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 727s [p11_child[2793]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 727s [p11_child[2793]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 727s [p11_child[2793]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 727s [p11_child[2793]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 727s [p11_child[2793]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 727s [p11_child[2793]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 727s [p11_child[2793]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 727s [p11_child[2793]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 727s [p11_child[2793]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 727s [p11_child[2793]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 727s [p11_child[2793]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 727s [p11_child[2793]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 727s [p11_child[2793]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 727s [p11_child[2793]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 727s [p11_child[2793]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 727s [p11_child[2793]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 727s [p11_child[2793]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 727s [p11_child[2793]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 727s [p11_child[2793]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 727s [p11_child[2793]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 727s [p11_child[2793]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 727s [p11_child[2793]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 727s [p11_child[2793]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 727s [p11_child[2793]] [do_card] (0x4000): Certificate verified and validated. 727s [p11_child[2793]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 727s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-P7Xs16/SSSD-child-6748-auth.output 727s + echo '-----BEGIN CERTIFICATE-----' 727s + tail -n1 /tmp/sssd-softhsm2-P7Xs16/SSSD-child-6748-auth.output 727s + echo '-----END CERTIFICATE-----' 727s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-P7Xs16/SSSD-child-6748-auth.pem 727s Certificate: 727s Data: 727s Version: 3 (0x2) 727s Serial Number: 5 (0x5) 727s Signature Algorithm: sha256WithRSAEncryption 727s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate CA 727s Validity 727s Not Before: Jan 18 18:58:07 2025 GMT 727s Not After : Jan 18 18:58:07 2026 GMT 727s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate Trusted Certificate 0001 727s Subject Public Key Info: 727s Public Key Algorithm: rsaEncryption 727s Public-Key: (1024 bit) 727s Modulus: 727s 00:c9:66:3d:bb:d5:ad:bf:9f:2d:f7:e4:3e:f8:e2: 727s 98:71:c7:f9:d7:08:4d:b3:b2:0d:c8:04:04:c0:69: 727s 04:cc:93:01:b7:b2:c0:db:00:7c:e8:ac:13:6d:15: 727s 03:0d:75:f1:85:df:a8:06:21:ba:7a:14:18:c1:c9: 727s f6:8b:f8:24:b8:dc:d6:82:b6:b5:90:cc:87:59:00: 727s ab:8a:b8:72:f6:fe:3a:78:c0:8b:8e:12:2c:57:40: 727s d1:70:73:a5:ca:e0:03:2b:b4:0f:cd:11:e2:67:ad: 727s a0:86:c8:c8:ac:b2:7e:86:5d:21:19:67:58:46:e2: 727s b1:85:db:7d:0e:32:61:1c:73 727s Exponent: 65537 (0x10001) 727s X509v3 extensions: 727s X509v3 Authority Key Identifier: 727s CE:1C:22:BE:FA:6F:2C:4B:B2:05:25:AB:60:04:98:BE:D8:1D:5C:01 727s X509v3 Basic Constraints: 727s CA:FALSE 727s Netscape Cert Type: 727s SSL Client, S/MIME 727s Netscape Comment: 727s Test Organization Sub Intermediate CA trusted Certificate 727s X509v3 Subject Key Identifier: 727s F8:06:4B:70:B2:D5:BA:61:70:C3:AF:A2:F9:E8:23:D2:35:D8:46:CE 727s X509v3 Key Usage: critical 727s Digital Signature, Non Repudiation, Key Encipherment 727s X509v3 Extended Key Usage: 727s TLS Web Client Authentication, E-mail Protection 727s X509v3 Subject Alternative Name: 727s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 727s Signature Algorithm: sha256WithRSAEncryption 727s Signature Value: 727s 4b:7b:cf:a4:28:4e:a7:32:00:2a:4d:32:00:77:45:dd:6a:54: 727s 96:6a:c9:8a:38:91:4b:14:d5:cf:c3:6f:84:87:ef:d3:89:12: 727s 2b:86:ce:61:36:33:5d:42:30:77:0d:6b:42:1b:7c:e1:d0:1b: 727s 59:92:c8:a1:83:c0:0b:a0:84:71:a1:f3:f8:fb:03:f5:cd:d6: 727s f8:f8:6b:a2:58:d5:bf:c1:d2:eb:22:45:44:70:3e:10:f9:21: 727s 80:7a:b9:bc:e6:95:e8:77:f7:39:b5:5b:cb:dd:73:6c:1a:79: 727s 92:55:65:b1:a0:35:c3:54:bb:68:1e:f1:51:3c:d9:a3:51:ab: 727s 01:e8 727s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-P7Xs16/SSSD-child-6748-auth.pem 727s + found_md5=Modulus=C9663DBBD5ADBF9F2DF7E43EF8E29871C7F9D7084DB3B20DC80404C06904CC9301B7B2C0DB007CE8AC136D15030D75F185DFA80621BA7A1418C1C9F68BF824B8DCD682B6B590CC875900AB8AB872F6FE3A78C08B8E122C5740D17073A5CAE0032BB40FCD11E267ADA086C8C8ACB27E865D2119675846E2B185DB7D0E32611C73 727s + '[' Modulus=C9663DBBD5ADBF9F2DF7E43EF8E29871C7F9D7084DB3B20DC80404C06904CC9301B7B2C0DB007CE8AC136D15030D75F185DFA80621BA7A1418C1C9F68BF824B8DCD682B6B590CC875900AB8AB872F6FE3A78C08B8E122C5740D17073A5CAE0032BB40FCD11E267ADA086C8C8ACB27E865D2119675846E2B185DB7D0E32611C73 '!=' Modulus=C9663DBBD5ADBF9F2DF7E43EF8E29871C7F9D7084DB3B20DC80404C06904CC9301B7B2C0DB007CE8AC136D15030D75F185DFA80621BA7A1418C1C9F68BF824B8DCD682B6B590CC875900AB8AB872F6FE3A78C08B8E122C5740D17073A5CAE0032BB40FCD11E267ADA086C8C8ACB27E865D2119675846E2B185DB7D0E32611C73 ']' 727s + valid_certificate /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-4585 /tmp/sssd-softhsm2-P7Xs16/test-intermediate-sub-chain-CA.pem partial_chain 727s + check_certificate /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-4585 /tmp/sssd-softhsm2-P7Xs16/test-intermediate-sub-chain-CA.pem partial_chain 727s + local certificate=/tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-trusted-certificate-0001.pem 727s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-4585 727s + local key_ring=/tmp/sssd-softhsm2-P7Xs16/test-intermediate-sub-chain-CA.pem 727s + local verify_option=partial_chain 727s + prepare_softhsm2_card /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-4585 727s + local certificate=/tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-trusted-certificate-0001.pem 727s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-4585 727s + local key_cn 727s + local key_name 727s + local tokens_dir 727s + local output_cert_file 727s + token_name= 727s ++ basename /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 727s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 727s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-trusted-certificate-0001.pem 727s ++ sed -n 's/ *commonName *= //p' 727s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 727s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 727s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-P7Xs16/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 727s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-P7Xs16/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 727s ++ basename /tmp/sssd-softhsm2-P7Xs16/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 727s + tokens_dir=/tmp/sssd-softhsm2-P7Xs16/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 727s + token_name='Test Organization Sub Int Token' 727s + '[' '!' -e /tmp/sssd-softhsm2-P7Xs16/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 727s + '[' '!' -d /tmp/sssd-softhsm2-P7Xs16/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 727s + echo 'Test Organization Sub Int Token' 727s + '[' -n partial_chain ']' 727s + local verify_arg=--verify=partial_chain 727s + local output_base_name=SSSD-child-13652 727s + local output_file=/tmp/sssd-softhsm2-P7Xs16/SSSD-child-13652.output 727s + output_cert_file=/tmp/sssd-softhsm2-P7Xs16/SSSD-child-13652.pem 727s Test Organization Sub Int Token 727s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-P7Xs16/test-intermediate-sub-chain-CA.pem 727s [p11_child[2803]] [main] (0x0400): p11_child started. 727s [p11_child[2803]] [main] (0x2000): Running in [pre-auth] mode. 727s [p11_child[2803]] [main] (0x2000): Running with effective IDs: [0][0]. 727s [p11_child[2803]] [main] (0x2000): Running with real IDs [0][0]. 727s [p11_child[2803]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 727s [p11_child[2803]] [do_card] (0x4000): Module List: 727s [p11_child[2803]] [do_card] (0x4000): common name: [softhsm2]. 727s [p11_child[2803]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 727s [p11_child[2803]] [do_card] (0x4000): Description [SoftHSM slot ID 0x2db7985] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 727s [p11_child[2803]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 727s [p11_child[2803]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x2db7985][47937925] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 727s [p11_child[2803]] [do_card] (0x4000): Login NOT required. 727s [p11_child[2803]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 727s [p11_child[2803]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 727s [p11_child[2803]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Sub Int Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 727s [p11_child[2803]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x2db7985;slot-manufacturer=SoftHSM%20project;slot-id=47937925;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=596672bb82db7985;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 727s [p11_child[2803]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 727s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-P7Xs16/SSSD-child-13652.output 727s + echo '-----BEGIN CERTIFICATE-----' 727s + tail -n1 /tmp/sssd-softhsm2-P7Xs16/SSSD-child-13652.output 727s + echo '-----END CERTIFICATE-----' 727s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-P7Xs16/SSSD-child-13652.pem 727s Certificate: 727s Data: 727s Version: 3 (0x2) 727s Serial Number: 5 (0x5) 727s Signature Algorithm: sha256WithRSAEncryption 727s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate CA 727s Validity 727s Not Before: Jan 18 18:58:07 2025 GMT 727s Not After : Jan 18 18:58:07 2026 GMT 727s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate Trusted Certificate 0001 727s Subject Public Key Info: 727s Public Key Algorithm: rsaEncryption 727s Public-Key: (1024 bit) 727s Modulus: 727s 00:c9:66:3d:bb:d5:ad:bf:9f:2d:f7:e4:3e:f8:e2: 727s 98:71:c7:f9:d7:08:4d:b3:b2:0d:c8:04:04:c0:69: 727s 04:cc:93:01:b7:b2:c0:db:00:7c:e8:ac:13:6d:15: 727s 03:0d:75:f1:85:df:a8:06:21:ba:7a:14:18:c1:c9: 727s f6:8b:f8:24:b8:dc:d6:82:b6:b5:90:cc:87:59:00: 727s ab:8a:b8:72:f6:fe:3a:78:c0:8b:8e:12:2c:57:40: 727s d1:70:73:a5:ca:e0:03:2b:b4:0f:cd:11:e2:67:ad: 727s a0:86:c8:c8:ac:b2:7e:86:5d:21:19:67:58:46:e2: 727s b1:85:db:7d:0e:32:61:1c:73 727s Exponent: 65537 (0x10001) 727s X509v3 extensions: 727s X509v3 Authority Key Identifier: 727s CE:1C:22:BE:FA:6F:2C:4B:B2:05:25:AB:60:04:98:BE:D8:1D:5C:01 727s X509v3 Basic Constraints: 727s CA:FALSE 727s Netscape Cert Type: 727s SSL Client, S/MIME 727s Netscape Comment: 727s Test Organization Sub Intermediate CA trusted Certificate 727s X509v3 Subject Key Identifier: 727s F8:06:4B:70:B2:D5:BA:61:70:C3:AF:A2:F9:E8:23:D2:35:D8:46:CE 727s X509v3 Key Usage: critical 727s Digital Signature, Non Repudiation, Key Encipherment 727s X509v3 Extended Key Usage: 727s TLS Web Client Authentication, E-mail Protection 727s X509v3 Subject Alternative Name: 727s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 727s Signature Algorithm: sha256WithRSAEncryption 727s Signature Value: 727s 4b:7b:cf:a4:28:4e:a7:32:00:2a:4d:32:00:77:45:dd:6a:54: 727s 96:6a:c9:8a:38:91:4b:14:d5:cf:c3:6f:84:87:ef:d3:89:12: 727s 2b:86:ce:61:36:33:5d:42:30:77:0d:6b:42:1b:7c:e1:d0:1b: 727s 59:92:c8:a1:83:c0:0b:a0:84:71:a1:f3:f8:fb:03:f5:cd:d6: 727s f8:f8:6b:a2:58:d5:bf:c1:d2:eb:22:45:44:70:3e:10:f9:21: 727s 80:7a:b9:bc:e6:95:e8:77:f7:39:b5:5b:cb:dd:73:6c:1a:79: 727s 92:55:65:b1:a0:35:c3:54:bb:68:1e:f1:51:3c:d9:a3:51:ab: 727s 01:e8 727s + local found_md5 expected_md5 727s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-P7Xs16/test-sub-intermediate-CA-trusted-certificate-0001.pem 727s + expected_md5=Modulus=C9663DBBD5ADBF9F2DF7E43EF8E29871C7F9D7084DB3B20DC80404C06904CC9301B7B2C0DB007CE8AC136D15030D75F185DFA80621BA7A1418C1C9F68BF824B8DCD682B6B590CC875900AB8AB872F6FE3A78C08B8E122C5740D17073A5CAE0032BB40FCD11E267ADA086C8C8ACB27E865D2119675846E2B185DB7D0E32611C73 727s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-P7Xs16/SSSD-child-13652.pem 727s + found_md5=Modulus=C9663DBBD5ADBF9F2DF7E43EF8E29871C7F9D7084DB3B20DC80404C06904CC9301B7B2C0DB007CE8AC136D15030D75F185DFA80621BA7A1418C1C9F68BF824B8DCD682B6B590CC875900AB8AB872F6FE3A78C08B8E122C5740D17073A5CAE0032BB40FCD11E267ADA086C8C8ACB27E865D2119675846E2B185DB7D0E32611C73 727s + '[' Modulus=C9663DBBD5ADBF9F2DF7E43EF8E29871C7F9D7084DB3B20DC80404C06904CC9301B7B2C0DB007CE8AC136D15030D75F185DFA80621BA7A1418C1C9F68BF824B8DCD682B6B590CC875900AB8AB872F6FE3A78C08B8E122C5740D17073A5CAE0032BB40FCD11E267ADA086C8C8ACB27E865D2119675846E2B185DB7D0E32611C73 '!=' Modulus=C9663DBBD5ADBF9F2DF7E43EF8E29871C7F9D7084DB3B20DC80404C06904CC9301B7B2C0DB007CE8AC136D15030D75F185DFA80621BA7A1418C1C9F68BF824B8DCD682B6B590CC875900AB8AB872F6FE3A78C08B8E122C5740D17073A5CAE0032BB40FCD11E267ADA086C8C8ACB27E865D2119675846E2B185DB7D0E32611C73 ']' 727s + output_file=/tmp/sssd-softhsm2-P7Xs16/SSSD-child-13652-auth.output 727s ++ basename /tmp/sssd-softhsm2-P7Xs16/SSSD-child-13652-auth.output .output 727s + output_cert_file=/tmp/sssd-softhsm2-P7Xs16/SSSD-child-13652-auth.pem 727s + echo -n 053350 727s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-P7Xs16/test-intermediate-sub-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Sub Int Token' --module_name /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so 727s [p11_child[2811]] [main] (0x0400): p11_child started. 727s [p11_child[2811]] [main] (0x2000): Running in [auth] mode. 727s [p11_child[2811]] [main] (0x2000): Running with effective IDs: [0][0]. 727s [p11_child[2811]] [main] (0x2000): Running with real IDs [0][0]. 727s [p11_child[2811]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 727s [p11_child[2811]] [do_card] (0x4000): Module List: 727s [p11_child[2811]] [do_card] (0x4000): common name: [softhsm2]. 727s [p11_child[2811]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 727s [p11_child[2811]] [do_card] (0x4000): Description [SoftHSM slot ID 0x2db7985] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 727s [p11_child[2811]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 727s [p11_child[2811]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x2db7985][47937925] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 727s [p11_child[2811]] [do_card] (0x4000): Login required. 727s [p11_child[2811]] [do_card] (0x4000): Token flags [1069]. 727s [p11_child[2811]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 727s [p11_child[2811]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 727s [p11_child[2811]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so Test Organization Sub Int Token Test Organization Sub Int Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 727s [p11_child[2811]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x2db7985;slot-manufacturer=SoftHSM%20project;slot-id=47937925;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=596672bb82db7985;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 727s [p11_child[2811]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 727s [p11_child[2811]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 727s [p11_child[2811]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 727s [p11_child[2811]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 727s [p11_child[2811]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 727s [p11_child[2811]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 727s [p11_child[2811]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 727s [p11_child[2811]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 727s [p11_child[2811]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 727s [p11_child[2811]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 727s [p11_child[2811]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 727s [p11_child[2811]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 727s [p11_child[2811]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 727s [p11_child[2811]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 727s [p11_child[2811]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 727s [p11_child[2811]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 727s [p11_child[2811]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 727s [p11_child[2811]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 727s [p11_child[2811]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 727s [p11_child[2811]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 727s [p11_child[2811]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 727s [p11_child[2811]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 727s [p11_child[2811]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 727s [p11_child[2811]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 727s [p11_child[2811]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 727s [p11_child[2811]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 727s [p11_child[2811]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 727s [p11_child[2811]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 727s [p11_child[2811]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 727s [p11_child[2811]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 727s [p11_child[2811]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 727s [p11_child[2811]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 727s [p11_child[2811]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 727s [p11_child[2811]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 727s [p11_child[2811]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 727s [p11_child[2811]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 727s [p11_child[2811]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 727s [p11_child[2811]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 727s [p11_child[2811]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 727s [p11_child[2811]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 727s [p11_child[2811]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 727s [p11_child[2811]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 727s [p11_child[2811]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 727s [p11_child[2811]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 727s [p11_child[2811]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 727s [p11_child[2811]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 727s [p11_child[2811]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 727s [p11_child[2811]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 727s [p11_child[2811]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 727s [p11_child[2811]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 727s [p11_child[2811]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 727s [p11_child[2811]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 727s [p11_child[2811]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 727s [p11_child[2811]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 727s [p11_child[2811]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 727s [p11_child[2811]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 727s [p11_child[2811]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 727s [p11_child[2811]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 727s [p11_child[2811]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 727s [p11_child[2811]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 727s [p11_child[2811]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 727s [p11_child[2811]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 727s [p11_child[2811]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 727s [p11_child[2811]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 727s [p11_child[2811]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 727s [p11_child[2811]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 727s [p11_child[2811]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 727s [p11_child[2811]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 727s [p11_child[2811]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 727s [p11_child[2811]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 727s [p11_child[2811]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 727s [p11_child[2811]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 727s [p11_child[2811]] [do_card] (0x4000): Certificate verified and validated. 727s [p11_child[2811]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 727s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-P7Xs16/SSSD-child-13652-auth.output 727s + echo '-----BEGIN CERTIFICATE-----' 727s + tail -n1 /tmp/sssd-softhsm2-P7Xs16/SSSD-child-13652-auth.output 727s + echo '-----END CERTIFICATE-----' 727s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-P7Xs16/SSSD-child-13652-auth.pem 727s Certificate: 727s Data: 727s Version: 3 (0x2) 727s Serial Number: 5 (0x5) 727s Signature Algorithm: sha256WithRSAEncryption 727s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate CA 727s Validity 727s Not Before: Jan 18 18:58:07 2025 GMT 727s Not After : Jan 18 18:58:07 2026 GMT 727s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate Trusted Certificate 0001 727s Subject Public Key Info: 727s Public Key Algorithm: rsaEncryption 727s Public-Key: (1024 bit) 727s Modulus: 727s 00:c9:66:3d:bb:d5:ad:bf:9f:2d:f7:e4:3e:f8:e2: 727s 98:71:c7:f9:d7:08:4d:b3:b2:0d:c8:04:04:c0:69: 727s 04:cc:93:01:b7:b2:c0:db:00:7c:e8:ac:13:6d:15: 727s 03:0d:75:f1:85:df:a8:06:21:ba:7a:14:18:c1:c9: 727s f6:8b:f8:24:b8:dc:d6:82:b6:b5:90:cc:87:59:00: 727s ab:8a:b8:72:f6:fe:3a:78:c0:8b:8e:12:2c:57:40: 727s d1:70:73:a5:ca:e0:03:2b:b4:0f:cd:11:e2:67:ad: 727s a0:86:c8:c8:ac:b2:7e:86:5d:21:19:67:58:46:e2: 727s b1:85:db:7d:0e:32:61:1c:73 727s Exponent: 65537 (0x10001) 727s X509v3 extensions: 727s X509v3 Authority Key Identifier: 727s CE:1C:22:BE:FA:6F:2C:4B:B2:05:25:AB:60:04:98:BE:D8:1D:5C:01 727s X509v3 Basic Constraints: 727s CA:FALSE 727s Netscape Cert Type: 727s SSL Client, S/MIME 727s Netscape Comment: 727s Test Organization Sub Intermediate CA trusted Certificate 727s X509v3 Subject Key Identifier: 727s F8:06:4B:70:B2:D5:BA:61:70:C3:AF:A2:F9:E8:23:D2:35:D8:46:CE 727s X509v3 Key Usage: critical 727s Digital Signature, Non Repudiation, Key Encipherment 727s X509v3 Extended Key Usage: 727s TLS Web Client Authentication, E-mail Protection 727s X509v3 Subject Alternative Name: 727s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 727s Signature Algorithm: sha256WithRSAEncryption 727s Signature Value: 727s 4b:7b:cf:a4:28:4e:a7:32:00:2a:4d:32:00:77:45:dd:6a:54: 727s 96:6a:c9:8a:38:91:4b:14:d5:cf:c3:6f:84:87:ef:d3:89:12: 727s 2b:86:ce:61:36:33:5d:42:30:77:0d:6b:42:1b:7c:e1:d0:1b: 727s 59:92:c8:a1:83:c0:0b:a0:84:71:a1:f3:f8:fb:03:f5:cd:d6: 727s f8:f8:6b:a2:58:d5:bf:c1:d2:eb:22:45:44:70:3e:10:f9:21: 727s 80:7a:b9:bc:e6:95:e8:77:f7:39:b5:5b:cb:dd:73:6c:1a:79: 727s 92:55:65:b1:a0:35:c3:54:bb:68:1e:f1:51:3c:d9:a3:51:ab: 727s 01:e8 727s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-P7Xs16/SSSD-child-13652-auth.pem 727s 727s Test completed, Root CA and intermediate issued certificates verified! 727s + found_md5=Modulus=C9663DBBD5ADBF9F2DF7E43EF8E29871C7F9D7084DB3B20DC80404C06904CC9301B7B2C0DB007CE8AC136D15030D75F185DFA80621BA7A1418C1C9F68BF824B8DCD682B6B590CC875900AB8AB872F6FE3A78C08B8E122C5740D17073A5CAE0032BB40FCD11E267ADA086C8C8ACB27E865D2119675846E2B185DB7D0E32611C73 727s + '[' Modulus=C9663DBBD5ADBF9F2DF7E43EF8E29871C7F9D7084DB3B20DC80404C06904CC9301B7B2C0DB007CE8AC136D15030D75F185DFA80621BA7A1418C1C9F68BF824B8DCD682B6B590CC875900AB8AB872F6FE3A78C08B8E122C5740D17073A5CAE0032BB40FCD11E267ADA086C8C8ACB27E865D2119675846E2B185DB7D0E32611C73 '!=' Modulus=C9663DBBD5ADBF9F2DF7E43EF8E29871C7F9D7084DB3B20DC80404C06904CC9301B7B2C0DB007CE8AC136D15030D75F185DFA80621BA7A1418C1C9F68BF824B8DCD682B6B590CC875900AB8AB872F6FE3A78C08B8E122C5740D17073A5CAE0032BB40FCD11E267ADA086C8C8ACB27E865D2119675846E2B185DB7D0E32611C73 ']' 727s + set +x 727s autopkgtest [18:58:09]: test sssd-softhism2-certificates-tests.sh: -----------------------] 728s autopkgtest [18:58:10]: test sssd-softhism2-certificates-tests.sh: - - - - - - - - - - results - - - - - - - - - - 728s sssd-softhism2-certificates-tests.sh PASS 728s autopkgtest [18:58:10]: test sssd-smart-card-pam-auth-configs: preparing testbed 729s Reading package lists... 729s Building dependency tree... 729s Reading state information... 729s Starting pkgProblemResolver with broken count: 0 729s Starting 2 pkgProblemResolver with broken count: 0 729s Done 729s The following packages were automatically installed and are no longer required: 729s python3.12 python3.12-minimal 729s Use 'sudo apt autoremove' to remove them. 729s The following NEW packages will be installed: 729s pamtester 730s 0 upgraded, 1 newly installed, 0 to remove and 130 not upgraded. 730s Need to get 12.7 kB of archives. 730s After this operation, 36.9 kB of additional disk space will be used. 730s Get:1 http://ftpmaster.internal/ubuntu plucky/universe amd64 pamtester amd64 0.1.2-4 [12.7 kB] 730s Fetched 12.7 kB in 0s (83.5 kB/s) 730s Selecting previously unselected package pamtester. 730s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 90773 files and directories currently installed.) 730s Preparing to unpack .../pamtester_0.1.2-4_amd64.deb ... 730s Unpacking pamtester (0.1.2-4) ... 730s Setting up pamtester (0.1.2-4) ... 730s Processing triggers for man-db (2.13.0-1) ... 731s 731s Running kernel seems to be up-to-date. 731s 731s No services need to be restarted. 731s 731s No containers need to be restarted. 731s 731s No user sessions are running outdated binaries. 731s 731s No VM guests are running outdated hypervisor (qemu) binaries on this host. 733s autopkgtest [18:58:15]: test sssd-smart-card-pam-auth-configs: env OFFLINE_MODE=1 bash debian/tests/sssd-smart-card-pam-auth-configs-tester.sh 733s autopkgtest [18:58:15]: test sssd-smart-card-pam-auth-configs: [----------------------- 733s + '[' -z ubuntu ']' 733s + export DEBIAN_FRONTEND=noninteractive 733s + DEBIAN_FRONTEND=noninteractive 733s + required_tools=(pamtester softhsm2-util sssd) 733s + [[ ! -v OFFLINE_MODE ]] 733s + for cmd in "${required_tools[@]}" 733s + command -v pamtester 733s + for cmd in "${required_tools[@]}" 733s + command -v softhsm2-util 733s + for cmd in "${required_tools[@]}" 733s + command -v sssd 733s + PIN=123456 733s ++ mktemp -d -t sssd-softhsm2-certs-XXXXXX 733s + tmpdir=/tmp/sssd-softhsm2-certs-GlJKhx 733s + backupsdir= 733s + alternative_pam_configs=(sss-smart-card-optional sss-smart-card-required) 733s + declare -a restore_paths 733s + declare -a delete_paths 733s + trap handle_exit EXIT 733s ++ dirname debian/tests/sssd-smart-card-pam-auth-configs-tester.sh 733s + tester=debian/tests/sssd-softhism2-certificates-tests.sh 733s + '[' '!' -e debian/tests/sssd-softhism2-certificates-tests.sh ']' 733s + '[' '!' -e debian/tests/sssd-softhism2-certificates-tests.sh ']' 733s + export PIN TEST_TMPDIR=/tmp/sssd-softhsm2-certs-GlJKhx GENERATE_SMART_CARDS=1 KEEP_TEMPORARY_FILES=1 NO_SSSD_TESTS=1 733s + TEST_TMPDIR=/tmp/sssd-softhsm2-certs-GlJKhx 733s + GENERATE_SMART_CARDS=1 733s + KEEP_TEMPORARY_FILES=1 733s + NO_SSSD_TESTS=1 733s + bash debian/tests/sssd-softhism2-certificates-tests.sh 733s + '[' -z ubuntu ']' 733s + required_tools=(p11tool openssl softhsm2-util) 733s + for cmd in "${required_tools[@]}" 733s + command -v p11tool 733s + for cmd in "${required_tools[@]}" 733s + command -v openssl 733s + for cmd in "${required_tools[@]}" 733s + command -v softhsm2-util 733s + PIN=123456 733s +++ find /usr/lib/softhsm/libsofthsm2.so 733s +++ head -n 1 733s ++ realpath /usr/lib/softhsm/libsofthsm2.so 733s + SOFTHSM2_MODULE=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so 733s + SSSD_P11_CHILD=/usr/libexec/sssd/p11_child 733s + TOKEN_ID=00112233445566778899FFAABBCCDDEEFF012345 733s + '[' '!' -v NO_SSSD_TESTS ']' 733s + '[' '!' -e /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so ']' 733s + tmpdir=/tmp/sssd-softhsm2-certs-GlJKhx 733s + keys_size=1024 733s + [[ ! -v KEEP_TEMPORARY_FILES ]] 733s + trap 'set +x; echo -e "\nUnexpected failure!!!"' ERR 733s + echo -n 01 733s + touch /tmp/sssd-softhsm2-certs-GlJKhx/index.txt 733s + mkdir -p /tmp/sssd-softhsm2-certs-GlJKhx/new_certs 733s + cat 733s + root_ca_key_pass=pass:random-root-CA-password-9443 733s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-certs-GlJKhx/test-root-CA-key.pem -passout pass:random-root-CA-password-9443 1024 733s + openssl req -passin pass:random-root-CA-password-9443 -batch -config /tmp/sssd-softhsm2-certs-GlJKhx/test-root-CA.config -x509 -new -nodes -key /tmp/sssd-softhsm2-certs-GlJKhx/test-root-CA-key.pem -sha256 -days 1024 -set_serial 0 -extensions v3_ca -out /tmp/sssd-softhsm2-certs-GlJKhx/test-root-CA.pem 733s + openssl x509 -noout -in /tmp/sssd-softhsm2-certs-GlJKhx/test-root-CA.pem 733s + cat 733s + intermediate_ca_key_pass=pass:random-intermediate-CA-password-24531 733s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-certs-GlJKhx/test-intermediate-CA-key.pem -passout pass:random-intermediate-CA-password-24531 1024 733s + openssl req -batch -new -nodes -passin pass:random-intermediate-CA-password-24531 -config /tmp/sssd-softhsm2-certs-GlJKhx/test-intermediate-CA.config -key /tmp/sssd-softhsm2-certs-GlJKhx/test-intermediate-CA-key.pem -passout pass:random-root-CA-password-9443 -sha256 -out /tmp/sssd-softhsm2-certs-GlJKhx/test-intermediate-CA-certificate-request.pem 733s Certificate Request: 733s Data: 733s Version: 1 (0x0) 733s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate CA 733s Subject Public Key Info: 733s Public Key Algorithm: rsaEncryption 733s Public-Key: (1024 bit) 733s Modulus: 733s 00:c3:16:8d:ce:f0:4b:fa:b1:c5:b0:37:34:35:ec: 733s dd:54:17:d8:19:bf:54:e4:c8:f8:3e:7c:63:de:d2: 733s 48:82:bd:14:85:81:5c:41:78:74:22:a2:c5:64:16: 733s 58:6e:69:4d:7c:e6:4d:27:76:df:50:32:c7:f4:55: 733s 42:f1:65:07:4e:cc:0d:d9:0c:c5:35:29:c9:7c:5b: 733s 32:62:59:e1:d0:9a:cf:0e:05:7a:b9:c8:6f:4a:71: 733s 4b:02:b8:63:2e:b3:15:78:de:16:2b:26:42:27:6a: 733s 05:02:1d:bf:08:31:f8:89:fa:2d:70:16:8c:04:b3: 733s d8:f7:b9:c5:02:f1:99:f7:f7 733s Exponent: 65537 (0x10001) 733s Attributes: 733s (none) 733s Requested Extensions: 733s Signature Algorithm: sha256WithRSAEncryption 733s Signature Value: 733s 3a:61:ae:f6:e7:cb:80:db:db:0b:1c:3b:b6:6a:0a:9b:30:18: 733s bf:62:65:17:5b:78:a2:65:30:5c:52:29:ec:00:0f:0e:64:d0: 733s d6:99:9a:86:d6:62:c2:db:c9:f1:f2:9f:00:f3:8f:60:0a:0e: 733s 28:ce:34:45:5d:7c:f1:34:57:5e:bc:f8:c1:33:b2:c4:68:7d: 733s 9c:93:15:d3:57:bd:6f:5a:18:8a:a5:27:0e:04:75:ac:5f:e4: 733s b7:78:8e:a6:dd:cc:7d:69:96:ef:ba:84:09:1b:b8:67:f0:e3: 733s 55:2a:28:69:b3:77:a7:05:9b:8a:72:67:04:4d:da:c2:d5:1d: 733s 73:b4 733s + openssl req -text -noout -in /tmp/sssd-softhsm2-certs-GlJKhx/test-intermediate-CA-certificate-request.pem 733s + openssl ca -batch -notext -config /tmp/sssd-softhsm2-certs-GlJKhx/test-root-CA.config -passin pass:random-root-CA-password-9443 -keyfile /tmp/sssd-softhsm2-certs-GlJKhx/test-root-CA-key.pem -in /tmp/sssd-softhsm2-certs-GlJKhx/test-intermediate-CA-certificate-request.pem -days 365 -extensions v3_intermediate_ca -out /tmp/sssd-softhsm2-certs-GlJKhx/test-intermediate-CA.pem 733s Using configuration from /tmp/sssd-softhsm2-certs-GlJKhx/test-root-CA.config 733s Check that the request matches the signature 733s Signature ok 733s Certificate Details: 733s Serial Number: 1 (0x1) 733s Validity 733s Not Before: Jan 18 18:58:15 2025 GMT 733s Not After : Jan 18 18:58:15 2026 GMT 733s Subject: 733s organizationName = Test Organization 733s organizationalUnitName = Test Organization Unit 733s commonName = Test Organization Intermediate CA 733s X509v3 extensions: 733s X509v3 Subject Key Identifier: 733s 08:B6:E3:2E:5E:12:7F:B4:42:31:4A:0A:08:B8:34:7E:47:4A:66:7B 733s X509v3 Authority Key Identifier: 733s keyid:55:25:70:C3:65:EA:DF:25:54:F3:40:B4:82:33:B0:A3:FC:97:D5:C2 733s DirName:/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root CA 733s serial:00 733s X509v3 Basic Constraints: 733s CA:TRUE 733s X509v3 Key Usage: critical 733s Digital Signature, Certificate Sign, CRL Sign 733s Certificate is to be certified until Jan 18 18:58:15 2026 GMT (365 days) 733s 733s Write out database with 1 new entries 733s Database updated 733s + openssl x509 -noout -in /tmp/sssd-softhsm2-certs-GlJKhx/test-intermediate-CA.pem 733s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-GlJKhx/test-root-CA.pem /tmp/sssd-softhsm2-certs-GlJKhx/test-intermediate-CA.pem 733s /tmp/sssd-softhsm2-certs-GlJKhx/test-intermediate-CA.pem: OK 733s + cat 733s + sub_intermediate_ca_key_pass=pass:random-sub-intermediate-CA-password-2189 733s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-certs-GlJKhx/test-sub-intermediate-CA-key.pem -passout pass:random-sub-intermediate-CA-password-2189 1024 733s + openssl req -batch -new -nodes -passin pass:random-sub-intermediate-CA-password-2189 -config /tmp/sssd-softhsm2-certs-GlJKhx/test-sub-intermediate-CA.config -key /tmp/sssd-softhsm2-certs-GlJKhx/test-sub-intermediate-CA-key.pem -passout pass:random-intermediate-CA-password-24531 -sha256 -out /tmp/sssd-softhsm2-certs-GlJKhx/test-sub-intermediate-CA-certificate-request.pem 733s + openssl req -text -noout -in /tmp/sssd-softhsm2-certs-GlJKhx/test-sub-intermediate-CA-certificate-request.pem 733s Certificate Request: 733s Data: 733s Version: 1 (0x0) 733s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate CA 733s Subject Public Key Info: 733s Public Key Algorithm: rsaEncryption 733s Public-Key: (1024 bit) 733s Modulus: 733s 00:ba:8d:c5:21:63:ce:54:7a:20:9e:c4:20:a2:fd: 733s 80:8e:f6:50:f9:f3:17:1c:7a:4b:3e:55:38:c3:12: 733s 0a:54:8a:05:bd:a9:75:dc:0a:02:bd:bb:12:00:d6: 733s fe:7a:e9:7e:61:72:61:d7:85:83:98:79:96:cb:3b: 733s 0e:04:2b:07:a9:db:38:83:36:e3:d8:0d:57:01:41: 733s 7a:35:2c:c8:f6:0b:93:43:82:98:16:56:0b:96:dc: 733s 23:ab:58:7e:3c:90:33:5d:79:30:cd:c6:ca:5c:31: 733s 27:bd:69:6b:77:c6:2e:c3:41:90:78:ab:e6:bb:12: 733s fd:c7:c3:e2:78:a9:ec:7f:6d 733s Exponent: 65537 (0x10001) 733s Attributes: 733s (none) 733s Requested Extensions: 733s Signature Algorithm: sha256WithRSAEncryption 733s Signature Value: 733s 3f:8c:98:2f:c2:c0:3f:4e:f3:ea:e5:0a:39:e5:a2:58:73:ce: 733s 6a:d3:c8:d2:6d:dc:04:a8:42:47:18:90:27:76:ba:53:20:35: 733s 9a:11:7d:31:00:d9:54:98:58:32:bd:eb:8f:45:7c:9b:53:d9: 733s 07:53:7c:d3:b0:c1:ab:42:85:89:98:66:ed:54:ec:e3:47:92: 733s b9:26:43:7e:09:76:9b:ee:ba:74:42:0c:1f:7e:3b:00:83:cb: 733s cc:df:ba:d3:8f:68:83:99:fb:14:0d:a1:63:67:77:51:cf:ab: 733s af:cb:e8:54:f1:0c:c1:84:a2:66:0d:e0:83:ac:b5:bb:13:d6: 733s d6:dc 733s + openssl ca -batch -notext -config /tmp/sssd-softhsm2-certs-GlJKhx/test-intermediate-CA.config -passin pass:random-intermediate-CA-password-24531 -keyfile /tmp/sssd-softhsm2-certs-GlJKhx/test-intermediate-CA-key.pem -in /tmp/sssd-softhsm2-certs-GlJKhx/test-sub-intermediate-CA-certificate-request.pem -days 365 -extensions v3_intermediate_ca -out /tmp/sssd-softhsm2-certs-GlJKhx/test-sub-intermediate-CA.pem 733s Using configuration from /tmp/sssd-softhsm2-certs-GlJKhx/test-intermediate-CA.config 733s Check that the request matches the signature 733s Signature ok 733s Certificate Details: 733s Serial Number: 2 (0x2) 733s Validity 733s Not Before: Jan 18 18:58:15 2025 GMT 733s Not After : Jan 18 18:58:15 2026 GMT 733s Subject: 733s organizationName = Test Organization 733s organizationalUnitName = Test Organization Unit 733s commonName = Test Organization Sub Intermediate CA 733s X509v3 extensions: 733s X509v3 Subject Key Identifier: 733s 7F:12:D8:7B:62:82:23:82:69:03:AE:32:50:5B:0C:E1:2F:98:9C:9B 733s X509v3 Authority Key Identifier: 733s keyid:08:B6:E3:2E:5E:12:7F:B4:42:31:4A:0A:08:B8:34:7E:47:4A:66:7B 733s DirName:/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root CA 733s serial:01 733s X509v3 Basic Constraints: 733s CA:TRUE 733s X509v3 Key Usage: critical 733s Digital Signature, Certificate Sign, CRL Sign 733s Certificate is to be certified until Jan 18 18:58:15 2026 GMT (365 days) 733s 733s Write out database with 1 new entries 733s Database updated 733s + openssl x509 -noout -in /tmp/sssd-softhsm2-certs-GlJKhx/test-sub-intermediate-CA.pem 733s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-certs-GlJKhx/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-GlJKhx/test-sub-intermediate-CA.pem 733s /tmp/sssd-softhsm2-certs-GlJKhx/test-sub-intermediate-CA.pem: OK 733s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-certs-GlJKhx/test-root-CA.pem /tmp/sssd-softhsm2-certs-GlJKhx/test-sub-intermediate-CA.pem 733s + local cmd=openssl 733s + shift 733s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-GlJKhx/test-root-CA.pem /tmp/sssd-softhsm2-certs-GlJKhx/test-sub-intermediate-CA.pem 733s O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate CA 733s error 20 at 0 depth lookup: unable to get local issuer certificate 733s error /tmp/sssd-softhsm2-certs-GlJKhx/test-sub-intermediate-CA.pem: verification failed 733s + cat 733s + root_ca_trusted_cert_0001_key_pass=pass:random-root-ca-trusted-cert-0001-4995 733s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-certs-GlJKhx/test-root-CA-trusted-certificate-0001-key.pem -passout pass:random-root-ca-trusted-cert-0001-4995 1024 733s + openssl req -new -nodes -reqexts req_exts -passin pass:random-root-ca-trusted-cert-0001-4995 -key /tmp/sssd-softhsm2-certs-GlJKhx/test-root-CA-trusted-certificate-0001-key.pem -config /tmp/sssd-softhsm2-certs-GlJKhx/test-root-CA-trusted-certificate-0001.config -out /tmp/sssd-softhsm2-certs-GlJKhx/test-root-CA-trusted-certificate-0001-request.pem 733s + openssl req -text -noout -in /tmp/sssd-softhsm2-certs-GlJKhx/test-root-CA-trusted-certificate-0001-request.pem 733s Certificate Request: 733s Data: 733s Version: 1 (0x0) 733s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root Trusted Certificate 0001 733s Subject Public Key Info: 733s Public Key Algorithm: rsaEncryption 733s Public-Key: (1024 bit) 733s Modulus: 733s 00:dc:7e:1b:48:0e:88:c1:11:fb:43:ab:49:ea:3d: 733s 8b:dc:95:8f:69:f0:d4:bb:80:c6:0a:35:9b:a3:b7: 733s 57:f6:68:9d:66:ff:fe:e2:3e:32:4c:13:00:79:fd: 733s fa:c2:06:9d:dd:67:41:72:9b:3c:2a:a8:52:bf:bc: 733s 60:59:d0:98:8e:25:5d:3f:65:41:c3:5d:db:2a:3e: 733s 76:6e:98:01:bd:09:65:7c:49:07:d8:28:99:00:4e: 733s d3:49:82:f5:d9:8c:9d:86:0b:b2:96:1e:f0:f3:f0: 733s 9e:92:3c:60:f3:ae:09:1d:bf:56:95:9d:f9:af:71: 733s 96:d5:1d:80:75:f5:e3:b8:d9 733s Exponent: 65537 (0x10001) 733s Attributes: 733s Requested Extensions: 733s X509v3 Basic Constraints: 733s CA:FALSE 733s Netscape Cert Type: 733s SSL Client, S/MIME 733s Netscape Comment: 733s Test Organization Root CA trusted Certificate 733s X509v3 Subject Key Identifier: 733s DA:3E:05:0A:97:DC:34:93:D8:8A:02:6F:9D:38:8F:4B:96:7D:4E:D3 733s X509v3 Key Usage: critical 733s Digital Signature, Non Repudiation, Key Encipherment 733s X509v3 Extended Key Usage: 733s TLS Web Client Authentication, E-mail Protection 733s X509v3 Subject Alternative Name: 733s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 733s Signature Algorithm: sha256WithRSAEncryption 733s Signature Value: 733s c5:d6:b8:c2:50:26:e4:48:a7:c1:6a:84:9f:a4:f0:e5:ff:76: 733s 2a:4c:91:72:a8:64:ee:e0:e6:61:5b:2f:8a:e2:38:a3:28:e1: 733s 57:51:f6:7a:8f:45:46:1b:bb:e2:2d:a5:78:f5:69:fd:bf:da: 733s 5d:28:57:2e:cf:4a:70:b4:5f:b8:5b:24:d9:f7:54:60:71:cc: 733s 8f:e2:9a:38:63:2c:5c:ed:22:79:70:e6:fa:00:c6:75:1e:77: 733s 07:b9:fe:e5:a0:59:31:a0:ab:09:e4:05:08:c9:5a:3f:32:8f: 733s 01:1b:b0:54:96:1d:2f:9c:42:66:22:cf:33:35:27:d0:05:1a: 733s 37:53 733s + openssl ca -batch -notext -config /tmp/sssd-softhsm2-certs-GlJKhx/test-root-CA.config -passin pass:random-root-CA-password-9443 -keyfile /tmp/sssd-softhsm2-certs-GlJKhx/test-root-CA-key.pem -in /tmp/sssd-softhsm2-certs-GlJKhx/test-root-CA-trusted-certificate-0001-request.pem -days 365 -extensions usr_cert -out /tmp/sssd-softhsm2-certs-GlJKhx/test-root-CA-trusted-certificate-0001.pem 733s Using configuration from /tmp/sssd-softhsm2-certs-GlJKhx/test-root-CA.config 733s Check that the request matches the signature 733s Signature ok 733s Certificate Details: 733s Serial Number: 3 (0x3) 733s Validity 733s Not Before: Jan 18 18:58:15 2025 GMT 733s Not After : Jan 18 18:58:15 2026 GMT 733s Subject: 733s organizationName = Test Organization 733s organizationalUnitName = Test Organization Unit 733s commonName = Test Organization Root Trusted Certificate 0001 733s X509v3 extensions: 733s X509v3 Authority Key Identifier: 733s 55:25:70:C3:65:EA:DF:25:54:F3:40:B4:82:33:B0:A3:FC:97:D5:C2 733s X509v3 Basic Constraints: 733s CA:FALSE 733s Netscape Cert Type: 733s SSL Client, S/MIME 733s Netscape Comment: 733s Test Organization Root CA trusted Certificate 733s X509v3 Subject Key Identifier: 733s DA:3E:05:0A:97:DC:34:93:D8:8A:02:6F:9D:38:8F:4B:96:7D:4E:D3 733s X509v3 Key Usage: critical 733s Digital Signature, Non Repudiation, Key Encipherment 733s X509v3 Extended Key Usage: 733s TLS Web Client Authentication, E-mail Protection 733s X509v3 Subject Alternative Name: 733s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 733s Certificate is to be certified until Jan 18 18:58:15 2026 GMT (365 days) 733s 733s Write out database with 1 new entries 733s Database updated 733s + openssl x509 -noout -in /tmp/sssd-softhsm2-certs-GlJKhx/test-root-CA-trusted-certificate-0001.pem 733s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-GlJKhx/test-root-CA.pem /tmp/sssd-softhsm2-certs-GlJKhx/test-root-CA-trusted-certificate-0001.pem 733s /tmp/sssd-softhsm2-certs-GlJKhx/test-root-CA-trusted-certificate-0001.pem: OK 733s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-certs-GlJKhx/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-GlJKhx/test-root-CA-trusted-certificate-0001.pem 733s + local cmd=openssl 733s + shift 733s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-GlJKhx/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-GlJKhx/test-root-CA-trusted-certificate-0001.pem 733s O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root Trusted Certificate 0001 733s error 20 at 0 depth lookup: unable to get local issuer certificate 733s error /tmp/sssd-softhsm2-certs-GlJKhx/test-root-CA-trusted-certificate-0001.pem: verification failed 733s + cat 733s + intermediate_ca_trusted_cert_0001_key_pass=pass:random-intermediate-ca-trusted-cert-0001-11784 733s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-certs-GlJKhx/test-intermediate-CA-trusted-certificate-0001-key.pem -passout pass:random-intermediate-ca-trusted-cert-0001-11784 1024 733s + openssl req -new -nodes -reqexts req_exts -passin pass:random-intermediate-ca-trusted-cert-0001-11784 -key /tmp/sssd-softhsm2-certs-GlJKhx/test-intermediate-CA-trusted-certificate-0001-key.pem -config /tmp/sssd-softhsm2-certs-GlJKhx/test-intermediate-CA-trusted-certificate-0001.config -out /tmp/sssd-softhsm2-certs-GlJKhx/test-intermediate-CA-trusted-certificate-0001-request.pem 733s + openssl req -text -noout -in /tmp/sssd-softhsm2-certs-GlJKhx/test-intermediate-CA-trusted-certificate-0001-request.pem 733s Certificate Request: 733s Data: 733s Version: 1 (0x0) 733s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate Trusted Certificate 0001 733s Subject Public Key Info: 733s Public Key Algorithm: rsaEncryption 733s Public-Key: (1024 bit) 733s Modulus: 733s 00:b7:a4:9f:2c:22:b7:90:80:e1:93:1f:e8:ca:3f: 733s ec:e7:de:ca:3f:75:44:47:4e:d0:d1:b4:74:44:b1: 733s f7:0b:d3:bc:92:2f:8f:aa:ce:07:22:54:dd:97:49: 733s bf:18:c6:d6:88:8a:b7:2b:21:53:71:5e:50:1d:1e: 733s 6a:06:bc:2a:40:e3:85:85:48:46:3e:1f:c0:78:c7: 733s 64:ce:a2:4f:f2:48:37:2e:a6:63:6a:73:6b:d2:dc: 733s 41:83:54:d4:ef:2e:1f:1f:c4:d0:6d:18:51:b2:11: 733s 3e:d3:92:e6:65:28:6f:c9:91:95:78:e1:28:6e:e9: 733s ef:00:1b:5f:26:dd:90:bf:f7 733s Exponent: 65537 (0x10001) 733s Attributes: 733s Requested Extensions: 733s X509v3 Basic Constraints: 733s CA:FALSE 733s Netscape Cert Type: 733s SSL Client, S/MIME 733s Netscape Comment: 733s Test Organization Intermediate CA trusted Certificate 733s X509v3 Subject Key Identifier: 733s 9D:91:75:F4:D9:3C:4B:89:BF:02:C5:12:C0:A4:E4:57:03:DD:03:C1 733s X509v3 Key Usage: critical 733s Digital Signature, Non Repudiation, Key Encipherment 733s X509v3 Extended Key Usage: 733s TLS Web Client Authentication, E-mail Protection 733s X509v3 Subject Alternative Name: 733s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 733s Signature Algorithm: sha256WithRSAEncryption 733s Signature Value: 733s 34:f9:88:3f:b4:45:82:5e:df:c8:9f:eb:62:5e:f2:57:96:80: 733s ab:8f:13:5e:2b:7b:62:2e:25:f4:b7:1e:85:57:ad:30:77:37: 733s 24:6c:37:1d:7f:ae:98:e1:16:f8:6e:70:f1:61:71:72:38:ca: 733s df:c2:4c:e4:18:21:0d:2f:12:7b:bd:21:58:5e:e5:70:58:cf: 733s a5:11:b8:c4:79:16:94:14:96:1c:92:d0:7d:d6:ec:10:20:2b: 733s 7c:8d:b2:8f:21:a9:dc:1c:91:46:31:b2:03:c7:13:d9:23:a9: 733s d3:7d:c9:c6:4b:0a:b3:9e:59:74:54:f6:84:e5:b4:a0:63:6d: 733s 2e:8b 733s + openssl ca -passin pass:random-intermediate-CA-password-24531 -config /tmp/sssd-softhsm2-certs-GlJKhx/test-intermediate-CA.config -batch -notext -keyfile /tmp/sssd-softhsm2-certs-GlJKhx/test-intermediate-CA-key.pem -in /tmp/sssd-softhsm2-certs-GlJKhx/test-intermediate-CA-trusted-certificate-0001-request.pem -days 365 -extensions usr_cert -out /tmp/sssd-softhsm2-certs-GlJKhx/test-intermediate-CA-trusted-certificate-0001.pem 733s Using configuration from /tmp/sssd-softhsm2-certs-GlJKhx/test-intermediate-CA.config 733s Check that the request matches the signature 733s Signature ok 733s Certificate Details: 733s Serial Number: 4 (0x4) 733s Validity 733s Not Before: Jan 18 18:58:15 2025 GMT 733s Not After : Jan 18 18:58:15 2026 GMT 733s Subject: 733s organizationName = Test Organization 733s organizationalUnitName = Test Organization Unit 733s commonName = Test Organization Intermediate Trusted Certificate 0001 733s X509v3 extensions: 733s X509v3 Authority Key Identifier: 733s 08:B6:E3:2E:5E:12:7F:B4:42:31:4A:0A:08:B8:34:7E:47:4A:66:7B 733s X509v3 Basic Constraints: 733s CA:FALSE 733s Netscape Cert Type: 733s SSL Client, S/MIME 733s Netscape Comment: 733s Test Organization Intermediate CA trusted Certificate 733s X509v3 Subject Key Identifier: 733s 9D:91:75:F4:D9:3C:4B:89:BF:02:C5:12:C0:A4:E4:57:03:DD:03:C1 733s X509v3 Key Usage: critical 733s Digital Signature, Non Repudiation, Key Encipherment 733s X509v3 Extended Key Usage: 733s TLS Web Client Authentication, E-mail Protection 733s X509v3 Subject Alternative Name: 733s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 733s Certificate is to be certified until Jan 18 18:58:15 2026 GMT (365 days) 733s 733s Write out database with 1 new entries 733s Database updated 733s + openssl x509 -noout -in /tmp/sssd-softhsm2-certs-GlJKhx/test-intermediate-CA-trusted-certificate-0001.pem 733s This certificate should not be trusted fully 733s + echo 'This certificate should not be trusted fully' 733s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-certs-GlJKhx/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-GlJKhx/test-intermediate-CA-trusted-certificate-0001.pem 733s + local cmd=openssl 733s + shift 733s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-GlJKhx/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-GlJKhx/test-intermediate-CA-trusted-certificate-0001.pem 733s O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate CA 733s error 2 at 1 depth lookup: unable to get issuer certificate 733s error /tmp/sssd-softhsm2-certs-GlJKhx/test-intermediate-CA-trusted-certificate-0001.pem: verification failed 733s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-certs-GlJKhx/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-GlJKhx/test-intermediate-CA-trusted-certificate-0001.pem 733s /tmp/sssd-softhsm2-certs-GlJKhx/test-intermediate-CA-trusted-certificate-0001.pem: OK 733s + cat 733s + sub_intermediate_ca_trusted_cert_0001_key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-9442 733s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-certs-GlJKhx/test-sub-intermediate-CA-trusted-certificate-0001-key.pem -passout pass:random-sub-intermediate-ca-trusted-cert-0001-9442 1024 733s + openssl req -new -nodes -reqexts req_exts -passin pass:random-sub-intermediate-ca-trusted-cert-0001-9442 -key /tmp/sssd-softhsm2-certs-GlJKhx/test-sub-intermediate-CA-trusted-certificate-0001-key.pem -config /tmp/sssd-softhsm2-certs-GlJKhx/test-sub-intermediate-CA-trusted-certificate-0001.config -out /tmp/sssd-softhsm2-certs-GlJKhx/test-sub-intermediate-CA-trusted-certificate-0001-request.pem 733s + openssl req -text -noout -in /tmp/sssd-softhsm2-certs-GlJKhx/test-sub-intermediate-CA-trusted-certificate-0001-request.pem 733s Certificate Request: 733s Data: 733s Version: 1 (0x0) 733s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate Trusted Certificate 0001 733s Subject Public Key Info: 733s Public Key Algorithm: rsaEncryption 733s Public-Key: (1024 bit) 733s Modulus: 733s 00:d5:50:e6:00:f1:73:4d:37:cd:c4:c1:76:83:2a: 733s d6:fa:24:28:1b:89:73:dc:db:6a:01:48:fa:c7:54: 733s b7:46:7b:27:22:34:43:e9:a7:b2:85:ec:44:9d:c9: 733s 2f:e3:3a:ec:74:f7:0d:b2:ab:c6:78:eb:c5:bd:47: 733s 99:dc:01:05:1b:f6:cc:58:9b:64:6c:6e:04:a5:43: 733s 0e:fb:90:0e:ac:7e:bb:67:f5:81:6e:80:f8:5c:7c: 733s 7d:4e:be:47:42:29:cf:24:a4:0e:c0:ed:3b:fd:e9: 733s b5:19:5e:f3:c4:09:9e:fd:c5:97:6b:f9:5f:74:ec: 733s 50:99:45:55:af:57:26:1f:17 733s Exponent: 65537 (0x10001) 733s Attributes: 733s Requested Extensions: 733s X509v3 Basic Constraints: 733s CA:FALSE 733s Netscape Cert Type: 733s SSL Client, S/MIME 733s Netscape Comment: 733s Test Organization Sub Intermediate CA trusted Certificate 733s X509v3 Subject Key Identifier: 733s 37:61:1D:22:7C:EB:CF:CC:AE:AA:57:F4:5F:DB:61:60:E1:64:3D:FB 733s X509v3 Key Usage: critical 733s Digital Signature, Non Repudiation, Key Encipherment 733s X509v3 Extended Key Usage: 733s TLS Web Client Authentication, E-mail Protection 733s X509v3 Subject Alternative Name: 733s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 733s Signature Algorithm: sha256WithRSAEncryption 733s Signature Value: 733s 8c:2d:1a:2b:e4:54:f5:01:5c:ef:30:ac:a9:d3:78:d1:b0:e7: 733s 49:36:17:1f:99:87:d7:06:ff:6e:0f:0e:04:32:6e:65:36:1a: 733s 8f:63:f3:9e:db:ee:63:8b:d8:49:f0:34:a3:d3:2c:32:7b:89: 733s 36:11:33:6b:66:d5:fc:3b:84:42:22:a2:70:61:eb:fb:8f:8f: 733s dd:1a:c4:b9:94:ac:f3:dc:87:19:1b:07:5e:0c:90:a4:20:01: 733s f1:2a:8a:c4:0f:5f:59:45:f2:1f:9d:f1:5a:06:1f:af:93:5e: 733s 66:ce:58:e1:ae:6e:ff:cd:0f:d9:d6:3d:eb:89:35:e9:a9:12: 733s 89:5c 733s + openssl ca -passin pass:random-sub-intermediate-CA-password-2189 -config /tmp/sssd-softhsm2-certs-GlJKhx/test-sub-intermediate-CA.config -batch -notext -keyfile /tmp/sssd-softhsm2-certs-GlJKhx/test-sub-intermediate-CA-key.pem -in /tmp/sssd-softhsm2-certs-GlJKhx/test-sub-intermediate-CA-trusted-certificate-0001-request.pem -days 365 -extensions usr_cert -out /tmp/sssd-softhsm2-certs-GlJKhx/test-sub-intermediate-CA-trusted-certificate-0001.pem 733s Using configuration from /tmp/sssd-softhsm2-certs-GlJKhx/test-sub-intermediate-CA.config 733s Check that the request matches the signature 733s Signature ok 733s Certificate Details: 733s Serial Number: 5 (0x5) 733s Validity 733s Not Before: Jan 18 18:58:15 2025 GMT 733s Not After : Jan 18 18:58:15 2026 GMT 733s Subject: 733s organizationName = Test Organization 733s organizationalUnitName = Test Organization Unit 733s commonName = Test Organization Sub Intermediate Trusted Certificate 0001 733s X509v3 extensions: 733s X509v3 Authority Key Identifier: 733s 7F:12:D8:7B:62:82:23:82:69:03:AE:32:50:5B:0C:E1:2F:98:9C:9B 733s X509v3 Basic Constraints: 733s CA:FALSE 733s Netscape Cert Type: 733s SSL Client, S/MIME 733s Netscape Comment: 733s Test Organization Sub Intermediate CA trusted Certificate 733s X509v3 Subject Key Identifier: 733s 37:61:1D:22:7C:EB:CF:CC:AE:AA:57:F4:5F:DB:61:60:E1:64:3D:FB 733s X509v3 Key Usage: critical 733s Digital Signature, Non Repudiation, Key Encipherment 733s X509v3 Extended Key Usage: 733s TLS Web Client Authentication, E-mail Protection 733s X509v3 Subject Alternative Name: 733s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 733s Certificate is to be certified until Jan 18 18:58:15 2026 GMT (365 days) 733s 733s Write out database with 1 new entries 733s Database updated 733s + openssl x509 -noout -in /tmp/sssd-softhsm2-certs-GlJKhx/test-sub-intermediate-CA-trusted-certificate-0001.pem 733s This certificate should not be trusted fully 733s + echo 'This certificate should not be trusted fully' 733s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-certs-GlJKhx/test-sub-intermediate-CA.pem /tmp/sssd-softhsm2-certs-GlJKhx/test-sub-intermediate-CA-trusted-certificate-0001.pem 733s + local cmd=openssl 733s + shift 733s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-GlJKhx/test-sub-intermediate-CA.pem /tmp/sssd-softhsm2-certs-GlJKhx/test-sub-intermediate-CA-trusted-certificate-0001.pem 733s O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate CA 733s error 2 at 1 depth lookup: unable to get issuer certificate 733s error /tmp/sssd-softhsm2-certs-GlJKhx/test-sub-intermediate-CA-trusted-certificate-0001.pem: verification failed 733s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-certs-GlJKhx/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-GlJKhx/test-sub-intermediate-CA-trusted-certificate-0001.pem 733s + local cmd=openssl 733s + shift 733s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-GlJKhx/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-GlJKhx/test-sub-intermediate-CA-trusted-certificate-0001.pem 733s O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate Trusted Certificate 0001 733s error 20 at 0 depth lookup: unable to get local issuer certificate 733s error /tmp/sssd-softhsm2-certs-GlJKhx/test-sub-intermediate-CA-trusted-certificate-0001.pem: verification failed 733s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-certs-GlJKhx/test-sub-intermediate-CA.pem /tmp/sssd-softhsm2-certs-GlJKhx/test-sub-intermediate-CA-trusted-certificate-0001.pem 733s /tmp/sssd-softhsm2-certs-GlJKhx/test-sub-intermediate-CA-trusted-certificate-0001.pem: OK 733s + expect_fail openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-certs-GlJKhx/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-GlJKhx/test-sub-intermediate-CA-trusted-certificate-0001.pem 733s + local cmd=openssl 733s + shift 733s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-certs-GlJKhx/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-GlJKhx/test-sub-intermediate-CA-trusted-certificate-0001.pem 733s O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate Trusted Certificate 0001 733s error 20 at 0 depth lookup: unable to get local issuer certificate 733s error /tmp/sssd-softhsm2-certs-GlJKhx/test-sub-intermediate-CA-trusted-certificate-0001.pem: verification failed 733s Building a the full-chain CA file... 733s + echo 'Building a the full-chain CA file...' 733s + cat /tmp/sssd-softhsm2-certs-GlJKhx/test-root-CA.pem /tmp/sssd-softhsm2-certs-GlJKhx/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-GlJKhx/test-sub-intermediate-CA.pem 733s + cat /tmp/sssd-softhsm2-certs-GlJKhx/test-root-CA.pem /tmp/sssd-softhsm2-certs-GlJKhx/test-intermediate-CA.pem 733s + cat /tmp/sssd-softhsm2-certs-GlJKhx/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-GlJKhx/test-sub-intermediate-CA.pem 733s + openssl crl2pkcs7 -nocrl -certfile /tmp/sssd-softhsm2-certs-GlJKhx/test-full-chain-CA.pem 733s + openssl pkcs7 -print_certs -noout 733s subject=O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root CA 733s issuer=O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root CA 733s 733s subject=O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate CA 733s issuer=O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root CA 733s 733s subject=O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate CA 733s issuer=O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate CA 733s 733s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-GlJKhx/test-full-chain-CA.pem /tmp/sssd-softhsm2-certs-GlJKhx/test-intermediate-CA.pem 733s /tmp/sssd-softhsm2-certs-GlJKhx/test-intermediate-CA.pem: OK 733s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-GlJKhx/test-full-chain-CA.pem /tmp/sssd-softhsm2-certs-GlJKhx/test-root-CA-trusted-certificate-0001.pem 733s /tmp/sssd-softhsm2-certs-GlJKhx/test-root-CA-trusted-certificate-0001.pem: OK 733s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-GlJKhx/test-full-chain-CA.pem /tmp/sssd-softhsm2-certs-GlJKhx/test-intermediate-CA-trusted-certificate-0001.pem 733s /tmp/sssd-softhsm2-certs-GlJKhx/test-intermediate-CA-trusted-certificate-0001.pem: OK 733s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-GlJKhx/test-full-chain-CA.pem /tmp/sssd-softhsm2-certs-GlJKhx/test-root-intermediate-chain-CA.pem 733s /tmp/sssd-softhsm2-certs-GlJKhx/test-root-intermediate-chain-CA.pem: OK 733s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-GlJKhx/test-full-chain-CA.pem /tmp/sssd-softhsm2-certs-GlJKhx/test-sub-intermediate-CA-trusted-certificate-0001.pem 733s /tmp/sssd-softhsm2-certs-GlJKhx/test-sub-intermediate-CA-trusted-certificate-0001.pem: OK 733s Certificates generation completed! 733s + echo 'Certificates generation completed!' 733s + [[ -v NO_SSSD_TESTS ]] 733s + [[ -v GENERATE_SMART_CARDS ]] 733s + prepare_softhsm2_card /tmp/sssd-softhsm2-certs-GlJKhx/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-4995 733s + local certificate=/tmp/sssd-softhsm2-certs-GlJKhx/test-root-CA-trusted-certificate-0001.pem 733s + local key_pass=pass:random-root-ca-trusted-cert-0001-4995 733s + local key_cn 733s + local key_name 733s + local tokens_dir 733s + local output_cert_file 733s + token_name= 733s ++ basename /tmp/sssd-softhsm2-certs-GlJKhx/test-root-CA-trusted-certificate-0001.pem .pem 733s + key_name=test-root-CA-trusted-certificate-0001 733s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-certs-GlJKhx/test-root-CA-trusted-certificate-0001.pem 733s ++ sed -n 's/ *commonName *= //p' 733s + key_cn='Test Organization Root Trusted Certificate 0001' 733s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 733s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-certs-GlJKhx/softhsm2-test-root-CA-trusted-certificate-0001.conf 733s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-certs-GlJKhx/softhsm2-test-root-CA-trusted-certificate-0001.conf 733s ++ basename /tmp/sssd-softhsm2-certs-GlJKhx/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 733s + tokens_dir=/tmp/sssd-softhsm2-certs-GlJKhx/softhsm2-test-root-CA-trusted-certificate-0001 733s + token_name='Test Organization Root Tr Token' 733s + '[' '!' -e /tmp/sssd-softhsm2-certs-GlJKhx/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 733s + local key_file 733s + local decrypted_key 733s + mkdir -p /tmp/sssd-softhsm2-certs-GlJKhx/softhsm2-test-root-CA-trusted-certificate-0001 733s + key_file=/tmp/sssd-softhsm2-certs-GlJKhx/test-root-CA-trusted-certificate-0001-key.pem 733s + decrypted_key=/tmp/sssd-softhsm2-certs-GlJKhx/test-root-CA-trusted-certificate-0001-key-decrypted.pem 733s + cat 733s + softhsm2-util --init-token --label 'Test Organization Root Tr Token' --pin 123456 --so-pin 123456 --free 733s Slot 0 has a free/uninitialized token. 733s The token has been initialized and is reassigned to slot 374106080 733s + softhsm2-util --show-slots 733s Available slots: 733s Slot 374106080 733s Slot info: 733s Description: SoftHSM slot ID 0x164c67e0 733s Manufacturer ID: SoftHSM project 733s Hardware version: 2.6 733s Firmware version: 2.6 733s Token present: yes 733s Token info: 733s Manufacturer ID: SoftHSM project 733s Model: SoftHSM v2 733s Hardware version: 2.6 733s Firmware version: 2.6 733s Serial number: 34d949c2164c67e0 733s Initialized: yes 733s User PIN init.: yes 733s Label: Test Organization Root Tr Token 733s Slot 1 733s Slot info: 733s Description: SoftHSM slot ID 0x1 733s Manufacturer ID: SoftHSM project 733s Hardware version: 2.6 733s Firmware version: 2.6 733s Token present: yes 733s Token info: 733s Manufacturer ID: SoftHSM project 733s Model: SoftHSM v2 733s Hardware version: 2.6 733s Firmware version: 2.6 733s Serial number: 733s Initialized: no 733s User PIN init.: no 733s Label: 733s + p11tool --provider=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --write --no-mark-private --load-certificate=/tmp/sssd-softhsm2-certs-GlJKhx/test-root-CA-trusted-certificate-0001.pem --login --set-pin=123456 --label 'Test Organization Root Trusted Certificate 0001' --id 00112233445566778899FFAABBCCDDEEFF012345 733s + openssl rsa -passin pass:random-root-ca-trusted-cert-0001-4995 -in /tmp/sssd-softhsm2-certs-GlJKhx/test-root-CA-trusted-certificate-0001-key.pem -out /tmp/sssd-softhsm2-certs-GlJKhx/test-root-CA-trusted-certificate-0001-key-decrypted.pem 733s writing RSA key 733s + p11tool --provider=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --write --load-privkey=/tmp/sssd-softhsm2-certs-GlJKhx/test-root-CA-trusted-certificate-0001-key-decrypted.pem --login --set-pin=123456 --label 'Test Organization Root Trusted Certificate 0001 Key' --id 00112233445566778899FFAABBCCDDEEFF012345 733s + rm /tmp/sssd-softhsm2-certs-GlJKhx/test-root-CA-trusted-certificate-0001-key-decrypted.pem 733s + p11tool --provider=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --list-all 733s Object 0: 733s URL: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=34d949c2164c67e0;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert 733s Type: X.509 Certificate (RSA-1024) 733s Expires: Sun Jan 18 18:58:15 2026 733s Label: Test Organization Root Trusted Certificate 0001 733s ID: 00:11:22:33:44:55:66:77:88:99:ff:aa:bb:cc:dd:ee:ff:01:23:45 733s 733s Test Organization Root Tr Token 733s + echo 'Test Organization Root Tr Token' 733s + prepare_softhsm2_card /tmp/sssd-softhsm2-certs-GlJKhx/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-11784 733s + local certificate=/tmp/sssd-softhsm2-certs-GlJKhx/test-intermediate-CA-trusted-certificate-0001.pem 733s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-11784 733s + local key_cn 733s + local key_name 733s + local tokens_dir 733s + local output_cert_file 733s + token_name= 733s ++ basename /tmp/sssd-softhsm2-certs-GlJKhx/test-intermediate-CA-trusted-certificate-0001.pem .pem 733s + key_name=test-intermediate-CA-trusted-certificate-0001 733s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-certs-GlJKhx/test-intermediate-CA-trusted-certificate-0001.pem 733s ++ sed -n 's/ *commonName *= //p' 733s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 733s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 733s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-certs-GlJKhx/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 733s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-certs-GlJKhx/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 733s ++ basename /tmp/sssd-softhsm2-certs-GlJKhx/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 733s + tokens_dir=/tmp/sssd-softhsm2-certs-GlJKhx/softhsm2-test-intermediate-CA-trusted-certificate-0001 733s + token_name='Test Organization Interme Token' 733s + '[' '!' -e /tmp/sssd-softhsm2-certs-GlJKhx/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 733s + local key_file 733s + local decrypted_key 733s + mkdir -p /tmp/sssd-softhsm2-certs-GlJKhx/softhsm2-test-intermediate-CA-trusted-certificate-0001 733s + key_file=/tmp/sssd-softhsm2-certs-GlJKhx/test-intermediate-CA-trusted-certificate-0001-key.pem 733s + decrypted_key=/tmp/sssd-softhsm2-certs-GlJKhx/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 733s + cat 733s + softhsm2-util --init-token --label 'Test Organization Interme Token' --pin 123456 --so-pin 123456 --free 733s Slot 0 has a free/uninitialized token. 733s The token has been initialized and is reassigned to slot 1427897234 733s + softhsm2-util --show-slots 733s Available slots: 733s Slot 1427897234 733s Slot info: 733s Description: SoftHSM slot ID 0x551bfb92 733s Manufacturer ID: SoftHSM project 733s Hardware version: 2.6 733s Firmware version: 2.6 733s Token present: yes 733s Token info: 733s Manufacturer ID: SoftHSM project 733s Model: SoftHSM v2 733s Hardware version: 2.6 733s Firmware version: 2.6 733s Serial number: 32232b3ad51bfb92 733s Initialized: yes 733s User PIN init.: yes 733s Label: Test Organization Interme Token 733s Slot 1 733s Slot info: 733s Description: SoftHSM slot ID 0x1 733s Manufacturer ID: SoftHSM project 733s Hardware version: 2.6 733s Firmware version: 2.6 733s Token present: yes 733s Token info: 733s Manufacturer ID: SoftHSM project 733s Model: SoftHSM v2 733s Hardware version: 2.6 733s Firmware version: 2.6 733s Serial number: 733s Initialized: no 733s User PIN init.: no 733s Label: 733s + p11tool --provider=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --write --no-mark-private --load-certificate=/tmp/sssd-softhsm2-certs-GlJKhx/test-intermediate-CA-trusted-certificate-0001.pem --login --set-pin=123456 --label 'Test Organization Intermediate Trusted Certificate 0001' --id 00112233445566778899FFAABBCCDDEEFF012345 733s + openssl rsa -passin pass:random-intermediate-ca-trusted-cert-0001-11784 -in /tmp/sssd-softhsm2-certs-GlJKhx/test-intermediate-CA-trusted-certificate-0001-key.pem -out /tmp/sssd-softhsm2-certs-GlJKhx/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 733s writing RSA key 733s + p11tool --provider=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --write --load-privkey=/tmp/sssd-softhsm2-certs-GlJKhx/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem --login --set-pin=123456 --label 'Test Organization Intermediate Trusted Certificate 0001 Key' --id 00112233445566778899FFAABBCCDDEEFF012345 733s + rm /tmp/sssd-softhsm2-certs-GlJKhx/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 733s + p11tool --provider=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --list-all 733s Object 0: 733s URL: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=32232b3ad51bfb92;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert 733s Type: X.509 Certificate (RSA-1024) 733s Expires: Sun Jan 18 18:58:15 2026 733s Label: Test Organization Intermediate Trusted Certificate 0001 733s ID: 00:11:22:33:44:55:66:77:88:99:ff:aa:bb:cc:dd:ee:ff:01:23:45 733s 733s Test Organization Interme Token 733s + echo 'Test Organization Interme Token' 733s + prepare_softhsm2_card /tmp/sssd-softhsm2-certs-GlJKhx/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-9442 733s + local certificate=/tmp/sssd-softhsm2-certs-GlJKhx/test-sub-intermediate-CA-trusted-certificate-0001.pem 733s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-9442 733s + local key_cn 733s + local key_name 733s + local tokens_dir 733s + local output_cert_file 733s + token_name= 733s ++ basename /tmp/sssd-softhsm2-certs-GlJKhx/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 733s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 733s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-certs-GlJKhx/test-sub-intermediate-CA-trusted-certificate-0001.pem 733s ++ sed -n 's/ *commonName *= //p' 733s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 733s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 733s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-certs-GlJKhx/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 733s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-certs-GlJKhx/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 733s ++ basename /tmp/sssd-softhsm2-certs-GlJKhx/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 733s + tokens_dir=/tmp/sssd-softhsm2-certs-GlJKhx/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 733s + token_name='Test Organization Sub Int Token' 733s + '[' '!' -e /tmp/sssd-softhsm2-certs-GlJKhx/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 733s + local key_file 733s + local decrypted_key 733s + mkdir -p /tmp/sssd-softhsm2-certs-GlJKhx/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 733s + key_file=/tmp/sssd-softhsm2-certs-GlJKhx/test-sub-intermediate-CA-trusted-certificate-0001-key.pem 733s + decrypted_key=/tmp/sssd-softhsm2-certs-GlJKhx/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 733s + cat 733s + softhsm2-util --init-token --label 'Test Organization Sub Int Token' --pin 123456 --so-pin 123456 --free 733s Slot 0 has a free/uninitialized token. 733s The token has been initialized and is reassigned to slot 1924880055 733s + softhsm2-util --show-slots 733s Available slots: 733s Slot 1924880055 733s Slot info: 733s Description: SoftHSM slot ID 0x72bb56b7 733s Manufacturer ID: SoftHSM project 733s Hardware version: 2.6 733s Firmware version: 2.6 733s Token present: yes 733s Token info: 733s Manufacturer ID: SoftHSM project 733s Model: SoftHSM v2 733s Hardware version: 2.6 733s Firmware version: 2.6 733s Serial number: d27df387f2bb56b7 733s Initialized: yes 733s User PIN init.: yes 733s Label: Test Organization Sub Int Token 733s Slot 1 733s Slot info: 733s Description: SoftHSM slot ID 0x1 733s Manufacturer ID: SoftHSM project 733s Hardware version: 2.6 733s Firmware version: 2.6 733s Token present: yes 733s Token info: 733s Manufacturer ID: SoftHSM project 733s Model: SoftHSM v2 733s Hardware version: 2.6 733s Firmware version: 2.6 733s Serial number: 733s Initialized: no 733s User PIN init.: no 733s Label: 733s + p11tool --provider=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --write --no-mark-private --load-certificate=/tmp/sssd-softhsm2-certs-GlJKhx/test-sub-intermediate-CA-trusted-certificate-0001.pem --login --set-pin=123456 --label 'Test Organization Sub Intermediate Trusted Certificate 0001' --id 00112233445566778899FFAABBCCDDEEFF012345 733s + openssl rsa -passin pass:random-sub-intermediate-ca-trusted-cert-0001-9442 -in /tmp/sssd-softhsm2-certs-GlJKhx/test-sub-intermediate-CA-trusted-certificate-0001-key.pem -out /tmp/sssd-softhsm2-certs-GlJKhx/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 733s writing RSA key 733s + p11tool --provider=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --write --load-privkey=/tmp/sssd-softhsm2-certs-GlJKhx/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem --login --set-pin=123456 --label 'Test Organization Sub Intermediate Trusted Certificate 0001 Key' --id 00112233445566778899FFAABBCCDDEEFF012345 733s + rm /tmp/sssd-softhsm2-certs-GlJKhx/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 733s + p11tool --provider=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --list-all 733s Object 0: 733s URL: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=d27df387f2bb56b7;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert 733s Type: X.509 Certificate (RSA-1024) 733s Expires: Sun Jan 18 18:58:15 2026 733s Label: Test Organization Sub Intermediate Trusted Certificate 0001 733s ID: 00:11:22:33:44:55:66:77:88:99:ff:aa:bb:cc:dd:ee:ff:01:23:45 733s 733s Test Organization Sub Int Token 733s Certificates generation completed! 733s + echo 'Test Organization Sub Int Token' 733s + echo 'Certificates generation completed!' 733s + exit 0 733s + find /tmp/sssd-softhsm2-certs-GlJKhx -type d -exec chmod 777 '{}' ';' 733s + find /tmp/sssd-softhsm2-certs-GlJKhx -type f -exec chmod 666 '{}' ';' 733s + backup_file /etc/sssd/sssd.conf 733s + '[' -z '' ']' 733s ++ mktemp -d -t sssd-softhsm2-backups-XXXXXX 733s + backupsdir=/tmp/sssd-softhsm2-backups-fOATYv 733s + '[' -e /etc/sssd/sssd.conf ']' 733s + delete_paths+=("$1") 733s + rm -f /etc/sssd/sssd.conf 733s ++ runuser -u ubuntu -- sh -c 'echo ~' 733s + user_home=/home/ubuntu 733s + mkdir -p /home/ubuntu 733s + chown ubuntu:ubuntu /home/ubuntu 733s ++ runuser -u ubuntu -- sh -c 'echo ${XDG_CONFIG_HOME:-~/.config}' 733s + user_config=/home/ubuntu/.config 733s + system_config=/etc 733s + softhsm2_conf_paths=("${AUTOPKGTEST_NORMAL_USER}:$user_config/softhsm2/softhsm2.conf" "root:$system_config/softhsm/softhsm2.conf") 733s + for path_pair in "${softhsm2_conf_paths[@]}" 733s + IFS=: 733s + read -r -a path 733s + path=/home/ubuntu/.config/softhsm2/softhsm2.conf 733s + backup_file /home/ubuntu/.config/softhsm2/softhsm2.conf 733s + '[' -z /tmp/sssd-softhsm2-backups-fOATYv ']' 733s + '[' -e /home/ubuntu/.config/softhsm2/softhsm2.conf ']' 733s + delete_paths+=("$1") 733s + rm -f /home/ubuntu/.config/softhsm2/softhsm2.conf 733s + for path_pair in "${softhsm2_conf_paths[@]}" 733s + IFS=: 733s + read -r -a path 733s + path=/etc/softhsm/softhsm2.conf 733s + backup_file /etc/softhsm/softhsm2.conf 733s + '[' -z /tmp/sssd-softhsm2-backups-fOATYv ']' 733s + '[' -e /etc/softhsm/softhsm2.conf ']' 733s ++ dirname /etc/softhsm/softhsm2.conf 733s + local back_dir=/tmp/sssd-softhsm2-backups-fOATYv//etc/softhsm 733s ++ basename /etc/softhsm/softhsm2.conf 733s + local back_path=/tmp/sssd-softhsm2-backups-fOATYv//etc/softhsm/softhsm2.conf 733s + '[' '!' -e /tmp/sssd-softhsm2-backups-fOATYv//etc/softhsm/softhsm2.conf ']' 733s + mkdir -p /tmp/sssd-softhsm2-backups-fOATYv//etc/softhsm 733s + cp -a /etc/softhsm/softhsm2.conf /tmp/sssd-softhsm2-backups-fOATYv//etc/softhsm/softhsm2.conf 733s + restore_paths+=("$back_path") 733s + rm -f /etc/softhsm/softhsm2.conf 733s + test_authentication login /tmp/sssd-softhsm2-certs-GlJKhx/softhsm2-test-root-CA-trusted-certificate-0001.conf /tmp/sssd-softhsm2-certs-GlJKhx/test-full-chain-CA.pem 733s + pam_service=login 733s + certificate_config=/tmp/sssd-softhsm2-certs-GlJKhx/softhsm2-test-root-CA-trusted-certificate-0001.conf 733s + ca_db=/tmp/sssd-softhsm2-certs-GlJKhx/test-full-chain-CA.pem 733s + verification_options= 733s + mkdir -p -m 700 /etc/sssd 733s Using CA DB '/tmp/sssd-softhsm2-certs-GlJKhx/test-full-chain-CA.pem' with verification options: '' 733s + echo 'Using CA DB '\''/tmp/sssd-softhsm2-certs-GlJKhx/test-full-chain-CA.pem'\'' with verification options: '\'''\''' 733s + cat 733s + chmod 600 /etc/sssd/sssd.conf 733s + for path_pair in "${softhsm2_conf_paths[@]}" 733s + IFS=: 733s + read -r -a path 733s + user=ubuntu 733s + path=/home/ubuntu/.config/softhsm2/softhsm2.conf 733s ++ dirname /home/ubuntu/.config/softhsm2/softhsm2.conf 733s + runuser -u ubuntu -- mkdir -p /home/ubuntu/.config/softhsm2 733s + runuser -u ubuntu -- ln -sf /tmp/sssd-softhsm2-certs-GlJKhx/softhsm2-test-root-CA-trusted-certificate-0001.conf /home/ubuntu/.config/softhsm2/softhsm2.conf 733s + runuser -u ubuntu -- softhsm2-util --show-slots 733s + grep 'Test Organization' 733s Label: Test Organization Root Tr Token 733s + for path_pair in "${softhsm2_conf_paths[@]}" 733s + IFS=: 733s + read -r -a path 733s + user=root 733s + path=/etc/softhsm/softhsm2.conf 733s ++ dirname /etc/softhsm/softhsm2.conf 733s + runuser -u root -- mkdir -p /etc/softhsm 733s + runuser -u root -- ln -sf /tmp/sssd-softhsm2-certs-GlJKhx/softhsm2-test-root-CA-trusted-certificate-0001.conf /etc/softhsm/softhsm2.conf 733s + runuser -u root -- softhsm2-util --show-slots 733s + grep 'Test Organization' 733s Label: Test Organization Root Tr Token 733s + systemctl restart sssd 734s + pam-auth-update --disable sss-smart-card-optional sss-smart-card-required 734s + for alternative in "${alternative_pam_configs[@]}" 734s + pam-auth-update --enable sss-smart-card-optional 734s + cat /etc/pam.d/common-auth 734s # 734s # /etc/pam.d/common-auth - authentication settings common to all services 734s # 734s # This file is included from other service-specific PAM config files, 734s # and should contain a list of the authentication modules that define 734s # the central authentication scheme for use on the system 734s # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the 734s # traditional Unix authentication mechanisms. 734s # 734s # As of pam 1.0.1-6, this file is managed by pam-auth-update by default. 734s # To take advantage of this, it is recommended that you configure any 734s # local modules either before or after the default block, and use 734s # pam-auth-update to manage selection of other modules. See 734s # pam-auth-update(8) for details. 734s 734s # here are the per-package modules (the "Primary" block) 734s auth [success=3 default=ignore] pam_sss.so allow_missing_name try_cert_auth 734s auth [success=2 default=ignore] pam_unix.so nullok try_first_pass 734s auth [success=1 default=ignore] pam_sss.so use_first_pass 734s # here's the fallback if no module succeeds 734s auth requisite pam_deny.so 734s # prime the stack with a positive return value if there isn't one already; 734s # this avoids us returning an error just because nothing sets a success code 734s # since the modules above will each just jump around 734s auth required pam_permit.so 734s # and here are more per-package modules (the "Additional" block) 734s auth optional pam_cap.so 734s # end of pam-auth-update config 734s + echo -n -e 123456 734s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 734s pamtester: invoking pam_start(login, ubuntu, ...) 734s pamtester: performing operation - authenticate 734s PIN for Test Organization Root Tr Token: pamtester: successfully authenticated 734s + echo -n -e 123456 734s + runuser -u ubuntu -- pamtester -v login '' authenticate 734s pamtester: invoking pam_start(login, , ...) 734s pamtester: performing operation - authenticate 734s PIN for Test Organization Root Tr Token: pamtester: successfully authenticated 734s + echo -n -e wrong123456 734s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 734s pamtester: invoking pam_start(login, ubuntu, ...) 734s pamtester: performing operation - authenticate 738s PIN for Test Organization Root Tr Token: Password: pamtester: Authentication failure 738s + echo -n -e wrong123456 738s + runuser -u ubuntu -- pamtester -v login '' authenticate 738s pamtester: invoking pam_start(login, , ...) 738s pamtester: performing operation - authenticate 740s PIN for Test Organization Root Tr Token: Password: pamtester: Authentication failure 740s + echo -n -e 123456 740s + pamtester -v login root authenticate 740s pamtester: invoking pam_start(login, root, ...) 740s pamtester: performing operation - authenticate 744s Password: pamtester: Authentication failure 744s + for alternative in "${alternative_pam_configs[@]}" 744s + pam-auth-update --enable sss-smart-card-required 744s PAM configuration 744s ----------------- 744s 744s Incompatible PAM profiles selected. 744s 744s The following PAM profiles cannot be used together: 744s 744s SSS required smart card authentication, SSS optional smart card 744s authentication 744s 744s Please select a different set of modules to enable. 744s 744s + cat /etc/pam.d/common-auth 744s # 744s # /etc/pam.d/common-auth - authentication settings common to all services 744s # 744s # This file is included from other service-specific PAM config files, 744s # and should contain a list of the authentication modules that define 744s # the central authentication scheme for use on the system 744s # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the 744s # traditional Unix authentication mechanisms. 744s # 744s # As of pam 1.0.1-6, this file is managed by pam-auth-update by default. 744s # To take advantage of this, it is recommended that you configure any 744s # local modules either before or after the default block, and use 744s # pam-auth-update to manage selection of other modules. See 744s # pam-auth-update(8) for details. 744s 744s # here are the per-package modules (the "Primary" block) 744s auth [success=3 ignore=ignore default=die] pam_sss.so allow_missing_name require_cert_auth 744s auth [success=2 default=ignore] pam_unix.so nullok try_first_pass 744s auth [success=1 default=ignore] pam_sss.so use_first_pass 744s # here's the fallback if no module succeeds 744s auth requisite pam_deny.so 744s # prime the stack with a positive return value if there isn't one already; 744s # this avoids us returning an error just because nothing sets a success code 744s # since the modules above will each just jump around 744s auth required pam_permit.so 744s # and here are more per-package modules (the "Additional" block) 744s auth optional pam_cap.so 744s # end of pam-auth-update config 744s + echo -n -e 123456 744s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 744s pamtester: invoking pam_start(login, ubuntu, ...) 744s pamtester: performing operation - authenticate 744s PIN for Test Organization Root Tr Token: pamtester: successfully authenticated 744s + echo -n -e 123456 744s + runuser -u ubuntu -- pamtester -v login '' authenticate 744s pamtester: invoking pam_start(login, , ...) 744s pamtester: performing operation - authenticate 744s PIN for Test Organization Root Tr Token: pamtester: successfully authenticated 744s + echo -n -e wrong123456 744s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 744s pamtester: invoking pam_start(login, ubuntu, ...) 744s pamtester: performing operation - authenticate 746s PIN for Test Organization Root Tr Token: pamtester: Authentication failure 746s + runuser -u ubuntu -- pamtester -v login '' authenticate 746s + echo -n -e wrong123456 746s pamtester: invoking pam_start(login, , ...) 746s pamtester: performing operation - authenticate 750s PIN for Test Organization Root Tr Token: pamtester: Authentication failure 750s + echo -n -e 123456 750s + pamtester -v login root authenticate 750s pamtester: invoking pam_start(login, root, ...) 750s pamtester: performing operation - authenticate 753s pamtester: Authentication service cannot retrieve authentication info 753s + test_authentication login /tmp/sssd-softhsm2-certs-GlJKhx/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf /tmp/sssd-softhsm2-certs-GlJKhx/test-full-chain-CA.pem 753s + pam_service=login 753s + certificate_config=/tmp/sssd-softhsm2-certs-GlJKhx/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 753s + ca_db=/tmp/sssd-softhsm2-certs-GlJKhx/test-full-chain-CA.pem 753s + verification_options= 753s + mkdir -p -m 700 /etc/sssd 753s Using CA DB '/tmp/sssd-softhsm2-certs-GlJKhx/test-full-chain-CA.pem' with verification options: '' 753s + echo 'Using CA DB '\''/tmp/sssd-softhsm2-certs-GlJKhx/test-full-chain-CA.pem'\'' with verification options: '\'''\''' 753s + cat 753s + chmod 600 /etc/sssd/sssd.conf 753s Label: Test Organization Sub Int Token 753s Label: Test Organization Sub Int Token 753s + for path_pair in "${softhsm2_conf_paths[@]}" 753s + IFS=: 753s + read -r -a path 753s + user=ubuntu 753s + path=/home/ubuntu/.config/softhsm2/softhsm2.conf 753s ++ dirname /home/ubuntu/.config/softhsm2/softhsm2.conf 753s + runuser -u ubuntu -- mkdir -p /home/ubuntu/.config/softhsm2 753s + runuser -u ubuntu -- ln -sf /tmp/sssd-softhsm2-certs-GlJKhx/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf /home/ubuntu/.config/softhsm2/softhsm2.conf 753s + runuser -u ubuntu -- softhsm2-util --show-slots 753s + grep 'Test Organization' 753s + for path_pair in "${softhsm2_conf_paths[@]}" 753s + IFS=: 753s + read -r -a path 753s + user=root 753s + path=/etc/softhsm/softhsm2.conf 753s ++ dirname /etc/softhsm/softhsm2.conf 753s + runuser -u root -- mkdir -p /etc/softhsm 753s + runuser -u root -- ln -sf /tmp/sssd-softhsm2-certs-GlJKhx/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf /etc/softhsm/softhsm2.conf 753s + runuser -u root -- softhsm2-util --show-slots 753s + grep 'Test Organization' 753s + systemctl restart sssd 753s + pam-auth-update --disable sss-smart-card-optional sss-smart-card-required 753s + for alternative in "${alternative_pam_configs[@]}" 753s + pam-auth-update --enable sss-smart-card-optional 753s + cat /etc/pam.d/common-auth 753s # 753s # /etc/pam.d/common-auth - authentication settings common to all services 753s # 753s # This file is included from other service-specific PAM config files, 753s # and should contain a list of the authentication modules that define 753s # the central authentication scheme for use on the system 753s # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the 753s # traditional Unix authentication mechanisms. 753s # 753s # As of pam 1.0.1-6, this file is managed by pam-auth-update by default. 753s # To take advantage of this, it is recommended that you configure any 753s # local modules either before or after the default block, and use 753s # pam-auth-update to manage selection of other modules. See 753s # pam-auth-update(8) for details. 753s 753s # here are the per-package modules (the "Primary" block) 753s auth [success=3 default=ignore] pam_sss.so allow_missing_name try_cert_auth 753s auth [success=2 default=ignore] pam_unix.so nullok try_first_pass 753s auth [success=1 default=ignore] pam_sss.so use_first_pass 753s # here's the fallback if no module succeeds 753s auth requisite pam_deny.so 753s # prime the stack with a positive return value if there isn't one already; 753s # this avoids us returning an error just because nothing sets a success code 753s # since the modules above will each just jump around 753s auth required pam_permit.so 753s # and here are more per-package modules (the "Additional" block) 753s auth optional pam_cap.so 753s # end of pam-auth-update config 753s + echo -n -e 123456 753s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 753s pamtester: invoking pam_start(login, ubuntu, ...) 753s pamtester: performing operation - authenticate 753s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 753s + echo -n -e 123456 753s + runuser -u ubuntu -- pamtester -v login '' authenticate 753s pamtester: invoking pam_start(login, , ...) 753s pamtester: performing operation - authenticate 753s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 753s + echo -n -e wrong123456 753s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 753s pamtester: invoking pam_start(login, ubuntu, ...) 753s pamtester: performing operation - authenticate 756s PIN for Test Organization Sub Int Token: Password: pamtester: Authentication failure 756s + echo -n -e wrong123456 756s + runuser -u ubuntu -- pamtester -v login '' authenticate 756s pamtester: invoking pam_start(login, , ...) 756s pamtester: performing operation - authenticate 759s PIN for Test Organization Sub Int Token: Password: pamtester: Authentication failure 759s + echo -n -e 123456 759s + pamtester -v login root authenticate 759s pamtester: invoking pam_start(login, root, ...) 759s pamtester: performing operation - authenticate 761s Password: pamtester: Authentication failure 761s + for alternative in "${alternative_pam_configs[@]}" 761s + pam-auth-update --enable sss-smart-card-required 761s PAM configuration 761s ----------------- 761s 761s Incompatible PAM profiles selected. 761s 761s The following PAM profiles cannot be used together: 761s 761s SSS required smart card authentication, SSS optional smart card 761s authentication 761s 761s Please select a different set of modules to enable. 761s 761s + cat /etc/pam.d/common-auth 761s # 761s # /etc/pam.d/common-auth - authentication settings common to all services 761s # 761s # This file is included from other service-specific PAM config files, 761s # and should contain a list of the authentication modules that define 761s # the central authentication scheme for use on the system 761s # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the 761s # traditional Unix authentication mechanisms. 761s # 761s # As of pam 1.0.1-6, this file is managed by pam-auth-update by default. 761s # To take advantage of this, it is recommended that you configure any 761s # local modules either before or after the default block, and use 761s # pam-auth-update to manage selection of other modules. See 761s # pam-auth-update(8) for details. 761s 761s # here are the per-package modules (the "Primary" block) 761s auth [success=3 ignore=ignore default=die] pam_sss.so allow_missing_name require_cert_auth 761s auth [success=2 default=ignore] pam_unix.so nullok try_first_pass 761s auth [success=1 default=ignore] pam_sss.so use_first_pass 761s # here's the fallback if no module succeeds 761s auth requisite pam_deny.so 761s # prime the stack with a positive return value if there isn't one already; 761s # this avoids us returning an error just because nothing sets a success code 761s # since the modules above will each just jump around 761s auth required pam_permit.so 761s # and here are more per-package modules (the "Additional" block) 761s auth optional pam_cap.so 761s # end of pam-auth-update config 761s + echo -n -e 123456 761s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 761s pamtester: invoking pam_start(login, ubuntu, ...) 761s pamtester: performing operation - authenticate 761s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 761s + echo -n -e 123456 761s + runuser -u ubuntu -- pamtester -v login '' authenticate 761s pamtester: invoking pam_start(login, , ...) 761s pamtester: performing operation - authenticate 761s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 761s + echo -n -e wrong123456 761s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 761s pamtester: invoking pam_start(login, ubuntu, ...) 761s pamtester: performing operation - authenticate 763s PIN for Test Organization Sub Int Token: pamtester: Authentication failure 763s + echo -n -e wrong123456 763s + runuser -u ubuntu -- pamtester -v login '' authenticate 763s pamtester: invoking pam_start(login, , ...) 763s pamtester: performing operation - authenticate 766s PIN for Test Organization Sub Int Token: pamtester: Authentication failure 766s + echo -n -e 123456 766s + pamtester -v login root authenticate 766s pamtester: invoking pam_start(login, root, ...) 766s pamtester: performing operation - authenticate 769s pamtester: Authentication service cannot retrieve authentication info 769s + test_authentication login /tmp/sssd-softhsm2-certs-GlJKhx/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf /tmp/sssd-softhsm2-certs-GlJKhx/test-sub-intermediate-CA.pem partial_chain 769s + pam_service=login 769s + certificate_config=/tmp/sssd-softhsm2-certs-GlJKhx/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 769s + ca_db=/tmp/sssd-softhsm2-certs-GlJKhx/test-sub-intermediate-CA.pem 769s + verification_options=partial_chain 769s + mkdir -p -m 700 /etc/sssd 769s Using CA DB '/tmp/sssd-softhsm2-certs-GlJKhx/test-sub-intermediate-CA.pem' with verification options: 'partial_chain' 769s + echo 'Using CA DB '\''/tmp/sssd-softhsm2-certs-GlJKhx/test-sub-intermediate-CA.pem'\'' with verification options: '\''partial_chain'\''' 769s + cat 769s + chmod 600 /etc/sssd/sssd.conf 769s + for path_pair in "${softhsm2_conf_paths[@]}" 769s + IFS=: 769s + read -r -a path 769s + user=ubuntu 769s + path=/home/ubuntu/.config/softhsm2/softhsm2.conf 769s ++ dirname /home/ubuntu/.config/softhsm2/softhsm2.conf 769s + runuser -u ubuntu -- mkdir -p /home/ubuntu/.config/softhsm2 769s + runuser -u ubuntu -- ln -sf /tmp/sssd-softhsm2-certs-GlJKhx/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf /home/ubuntu/.config/softhsm2/softhsm2.conf 769s Label: Test Organization Sub Int Token 769s Label: Test Organization Sub Int Token 769s + runuser -u ubuntu -- softhsm2-util --show-slots 769s + grep 'Test Organization' 769s + for path_pair in "${softhsm2_conf_paths[@]}" 769s + IFS=: 769s + read -r -a path 769s + user=root 769s + path=/etc/softhsm/softhsm2.conf 769s ++ dirname /etc/softhsm/softhsm2.conf 769s + runuser -u root -- mkdir -p /etc/softhsm 769s + runuser -u root -- ln -sf /tmp/sssd-softhsm2-certs-GlJKhx/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf /etc/softhsm/softhsm2.conf 769s + runuser -u root -- softhsm2-util --show-slots 769s + grep 'Test Organization' 769s + systemctl restart sssd 769s + pam-auth-update --disable sss-smart-card-optional sss-smart-card-required 769s + for alternative in "${alternative_pam_configs[@]}" 769s + pam-auth-update --enable sss-smart-card-optional 769s + cat /etc/pam.d/common-auth 769s # 769s # /etc/pam.d/common-auth - authentication settings common to all services 769s # 769s # This file is included from other service-specific PAM config files, 769s # and should contain a list of the authentication modules that define 769s # the central authentication scheme for use on the system 769s # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the 769s # traditional Unix authentication mechanisms. 769s # 769s # As of pam 1.0.1-6, this file is managed by pam-auth-update by default. 769s # To take advantage of this, it is recommended that you configure any 769s # local modules either before or after the default block, and use 769s # pam-auth-update to manage selection of other modules. See 769s # pam-auth-update(8) for details. 769s 769s # here are the per-package modules (the "Primary" block) 769s auth [success=3 default=ignore] pam_sss.so allow_missing_name try_cert_auth 769s auth [success=2 default=ignore] pam_unix.so nullok try_first_pass 769s auth [success=1 default=ignore] pam_sss.so use_first_pass 769s # here's the fallback if no module succeeds 769s auth requisite pam_deny.so 769s # prime the stack with a positive return value if there isn't one already; 769s # this avoids us returning an error just because nothing sets a success code 769s # since the modules above will each just jump around 769s auth required pam_permit.so 769s # and here are more per-package modules (the "Additional" block) 769s auth optional pam_cap.so 769s # end of pam-auth-update config 769s + echo -n -e 123456 769s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 769s pamtester: invoking pam_start(login, ubuntu, ...) 769s pamtester: performing operation - authenticate 769s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 769s + echo -n -e 123456 769s + runuser -u ubuntu -- pamtester -v login '' authenticate 769s pamtester: invoking pam_start(login, , ...) 769s pamtester: performing operation - authenticate 769s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 769s + echo -n -e wrong123456 769s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 769s pamtester: invoking pam_start(login, ubuntu, ...) 769s pamtester: performing operation - authenticate 773s PIN for Test Organization Sub Int Token: Password: pamtester: Authentication failure 773s + echo -n -e wrong123456 773s + runuser -u ubuntu -- pamtester -v login '' authenticate 773s pamtester: invoking pam_start(login, , ...) 773s pamtester: performing operation - authenticate 776s PIN for Test Organization Sub Int Token: Password: pamtester: Authentication failure 776s + echo -n -e 123456 776s + pamtester -v login root authenticate 776s pamtester: invoking pam_start(login, root, ...) 776s pamtester: performing operation - authenticate 779s Password: pamtester: Authentication failure 779s + for alternative in "${alternative_pam_configs[@]}" 779s + pam-auth-update --enable sss-smart-card-required 780s PAM configuration 780s ----------------- 780s 780s Incompatible PAM profiles selected. 780s 780s The following PAM profiles cannot be used together: 780s 780s SSS required smart card authentication, SSS optional smart card 780s authentication 780s 780s Please select a different set of modules to enable. 780s 780s + cat /etc/pam.d/common-auth 780s # 780s # /etc/pam.d/common-auth - authentication settings common to all services 780s # 780s # This file is included from other service-specific PAM config files, 780s # and should contain a list of the authentication modules that define 780s # the central authentication scheme for use on the system 780s # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the 780s # traditional Unix authentication mechanisms. 780s # 780s # As of pam 1.0.1-6, this file is managed by pam-auth-update by default. 780s # To take advantage of this, it is recommended that you configure any 780s # local modules either before or after the default block, and use 780s # pam-auth-update to manage selection of other modules. See 780s # pam-auth-update(8) for details. 780s 780s # here are the per-package modules (the "Primary" block) 780s auth [success=3 ignore=ignore default=die] pam_sss.so allow_missing_name require_cert_auth 780s auth [success=2 default=ignore] pam_unix.so nullok try_first_pass 780s auth [success=1 default=ignore] pam_sss.so use_first_pass 780s # here's the fallback if no module succeeds 780s auth requisite pam_deny.so 780s # prime the stack with a positive return value if there isn't one already; 780s # this avoids us returning an error just because nothing sets a success code 780s # since the modules above will each just jump around 780s auth required pam_permit.so 780s # and here are more per-package modules (the "Additional" block) 780s auth optional pam_cap.so 780s # end of pam-auth-update config 780s + echo -n -e 123456 780s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 780s pamtester: invoking pam_start(login, ubuntu, ...) 780s pamtester: performing operation - authenticate 780s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 780s + echo -n -e 123456 780s + runuser -u ubuntu -- pamtester -v login '' authenticate 780s pamtester: invoking pam_start(login, , ...) 780s pamtester: performing operation - authenticate 780s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 780s + echo -n -e wrong123456 780s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 780s pamtester: invoking pam_start(login, ubuntu, ...) 780s pamtester: performing operation - authenticate 782s PIN for Test Organization Sub Int Token: pamtester: Authentication failure 782s + echo -n -e wrong123456 782s + runuser -u ubuntu -- pamtester -v login '' authenticate 782s pamtester: invoking pam_start(login, , ...) 782s pamtester: performing operation - authenticate 785s PIN for Test Organization Sub Int Token: pamtester: Authentication failure 785s + echo -n -e 123456 785s + pamtester -v login root authenticate 785s pamtester: invoking pam_start(login, root, ...) 785s pamtester: performing operation - authenticate 788s pamtester: Authentication service cannot retrieve authentication info 788s + handle_exit 788s + exit_code=0 788s + restore_changes 788s + for path in "${restore_paths[@]}" 788s + local original_path 788s ++ realpath --strip --relative-base=/tmp/sssd-softhsm2-backups-fOATYv /tmp/sssd-softhsm2-backups-fOATYv//etc/softhsm/softhsm2.conf 788s + original_path=/etc/softhsm/softhsm2.conf 788s + rm /etc/softhsm/softhsm2.conf 788s + mv /tmp/sssd-softhsm2-backups-fOATYv//etc/softhsm/softhsm2.conf /etc/softhsm/softhsm2.conf 788s + for path in "${delete_paths[@]}" 788s + rm -f /etc/sssd/sssd.conf 788s + for path in "${delete_paths[@]}" 788s + rm -f /home/ubuntu/.config/softhsm2/softhsm2.conf 788s + pam-auth-update --disable sss-smart-card-optional sss-smart-card-required 788s + '[' -e /etc/sssd/sssd.conf ']' 788s + systemctl stop sssd 788s + '[' -e /etc/softhsm/softhsm2.conf ']' 788s + chmod 600 /etc/softhsm/softhsm2.conf 788s + rm -rf /tmp/sssd-softhsm2-certs-GlJKhx 788s + '[' 0 = 0 ']' 788s + rm -rf /tmp/sssd-softhsm2-backups-fOATYv 788s Script completed successfully! 788s + set +x 788s autopkgtest [18:59:10]: test sssd-smart-card-pam-auth-configs: -----------------------] 789s autopkgtest [18:59:11]: test sssd-smart-card-pam-auth-configs: - - - - - - - - - - results - - - - - - - - - - 789s sssd-smart-card-pam-auth-configs PASS 789s autopkgtest [18:59:11]: @@@@@@@@@@@@@@@@@@@@ summary 789s ldap-user-group-ldap-auth FAIL non-zero exit status 253 789s ldap-user-group-krb5-auth FAIL non-zero exit status 253 789s sssd-softhism2-certificates-tests.sh PASS 789s sssd-smart-card-pam-auth-configs PASS 794s nova [W] Skipping flock for amd64 794s Creating nova instance adt-plucky-amd64-sssd-20250118-182220-juju-7f2275-prod-proposed-migration-environment-20-2e214c8e-e5a9-4fad-9e09-65d60683a46e from image adt/ubuntu-plucky-amd64-server-20250118.img (UUID e058fd01-4631-4391-b35e-268af134294d)... 794s nova [W] Skipping flock for amd64 794s Creating nova instance adt-plucky-amd64-sssd-20250118-182220-juju-7f2275-prod-proposed-migration-environment-20-2e214c8e-e5a9-4fad-9e09-65d60683a46e from image adt/ubuntu-plucky-amd64-server-20250118.img (UUID e058fd01-4631-4391-b35e-268af134294d)... 794s nova [W] Timed out waiting for b66f8849-20bd-4da7-a6a0-da199022bb6f to get deleted.